A Quantum Image Encryption and Watermarking Algorithm Based on QDCT and Baker map
In many situations, the dual protection of image information transmission security and identity authentication is required. A quantum encryption and watermarking technique combining quantum Baker map (QBM) and quantum discrete cosine transform (QDCT) is presented to address this issue. Firstly, the...
Saved in:
| Published in | International journal of theoretical physics Vol. 63; no. 4; p. 100 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
24.04.2024
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1572-9575 0020-7748 1572-9575 |
| DOI | 10.1007/s10773-024-05630-x |
Cover
| Summary: | In many situations, the dual protection of image information transmission security and identity authentication is required. A quantum encryption and watermarking technique combining quantum Baker map (QBM) and quantum discrete cosine transform (QDCT) is presented to address this issue. Firstly, the watermark information used for identity authentication is scrambled by QBM, and the original image is decomposed by two-level quantum Haar wavelet transform (QHWT). To ensure the invisibility and robustness of the watermark,
HL
1
obtained from
LH
is selected for further segmentation, and then QDCT is applied to
HL
1
sub-block. The obtained matrix is used for watermark embedding. Special pre-processing is applied to the binary image before embedding the identity information, increasing embedding capacity while ensuring robustness and invisibility. Then the watermarked image is encrypted. In the encryption process, QBM is used for block scrambling. A quantum artificial image constructed with chaotic sequences manufactured from 3D Henon hyperchaotic system is utilized to diffuse pixel values. Quantum swap operation is used to achieve further bit-level scrambling, and the ciphertext image containing identity information is obtained. The encrypting security and the invisibility and robustness of watermarking are tested through numerical simulation. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1572-9575 0020-7748 1572-9575 |
| DOI: | 10.1007/s10773-024-05630-x |