Quantum Steganography via Greenberger-Horne-Zeilinger GHZ4 State
被引:0
|
作者:
A.El Allati
论文数: 0引用数: 0
h-index: 0
机构:
Faculté des Sciences,Département de Physique,LPT-URAC-13,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,Maroc
The Abdus Salam International Centre for Theoretical Physics,Trieste,ItalyFaculté des Sciences,Département de Physique,LPT-URAC-13,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,Maroc
A.El Allati
[1
,2
]
M.B.Ould Medeni
论文数: 0引用数: 0
h-index: 0
机构:
Faculté des Sciences,Laboratory of Mathematic Informatics and Applications,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,MarocFaculté des Sciences,Département de Physique,LPT-URAC-13,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,Maroc
M.B.Ould Medeni
[3
]
Y.Hassouni
论文数: 0引用数: 0
h-index: 0
机构:
Faculté des Sciences,Département de Physique,LPT-URAC-13,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,MarocFaculté des Sciences,Département de Physique,LPT-URAC-13,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,Maroc
Y.Hassouni
[1
]
机构:
[1] Faculté des Sciences,Département de Physique,LPT-URAC-13,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,Maroc
[2] The Abdus Salam International Centre for Theoretical Physics,Trieste,Italy
[3] Faculté des Sciences,Laboratory of Mathematic Informatics and Applications,Université Mohammed V-Agdal.Av.Ibn Battouta,B.P.1014,Rabat,Maroc
A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information.Moreover,the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information.Then,the scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users.After insuring the security of the quantum channel,they begin to hide the secret information in the cover of message.Comparing the scheme with the previous quantum steganographies,capacity and imperceptibility of hidden message are good.The security of the present scheme against many attacks is also discussed.