您的位置: 专家智库 > >

国家自然科学基金(61170272)

作品数:15 被引量:21H指数:3
相关作者:钮心忻雷敏杨榆杨义先黄艳红更多>>
相关机构:北京邮电大学浙江工业大学灾备技术国家工程实验室更多>>
发文基金:国家自然科学基金霍英东教育基金国家教育部博士点基金更多>>
相关领域:理学自动化与计算机技术电子电信自然科学总论更多>>

文献类型

  • 13篇中文期刊文章

领域

  • 7篇理学
  • 5篇自动化与计算...
  • 4篇电子电信
  • 1篇机械工程
  • 1篇交通运输工程

主题

  • 4篇QUANTU...
  • 3篇水印
  • 3篇量子
  • 3篇STEGAN...
  • 2篇水印算法
  • 2篇纠缠
  • 2篇PROTOC...
  • 2篇BELL态
  • 2篇ENTANG...
  • 2篇GHZ
  • 2篇STEGAN...
  • 1篇动态图
  • 1篇信息隐藏
  • 1篇音频水印
  • 1篇张量积
  • 1篇直接通信
  • 1篇软件水印
  • 1篇软件水印算法
  • 1篇水印容量
  • 1篇通信

机构

  • 3篇北京邮电大学
  • 1篇浙江工业大学
  • 1篇灾备技术国家...

作者

  • 2篇杨榆
  • 2篇雷敏
  • 2篇钮心忻
  • 1篇朱李楠
  • 1篇肖刚
  • 1篇盛伟国
  • 1篇毛家发
  • 1篇杨义先
  • 1篇黄艳红

传媒

  • 4篇Chines...
  • 3篇Scienc...
  • 2篇Comput...
  • 1篇成都信息工程...
  • 1篇重庆大学学报...
  • 1篇山东大学学报...
  • 1篇Wuhan ...

年份

  • 2篇2022
  • 2篇2019
  • 2篇2016
  • 2篇2015
  • 1篇2014
  • 3篇2013
  • 1篇2012
15 条 记 录,以下是 1-10
排序方式:
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
2013年
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information.Recently,El Allati et al.proposed a new quantum steganography using the GHZ4 state.Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered,we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations.To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state,we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states.Due to the symmetry of the GHZ4 state,all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states,so the improved protocol achieves a high efficiency.
徐淑奖陈秀波钮心忻杨义先
High-efficiency quantum steganography based on the tensor product of Bell states被引量:6
2013年
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
XU ShuJiangCHEN XiuBoNIU XinXinYANG YiXian
关键词:BELL态张量积量子安全直接通信幺正变换拒绝服务攻击
DWT-DCT-QR结合的音频盲水印算法被引量:3
2012年
为保护互联网中数字音像制品的合法版权,结合离散小波变换(DWT)、离散余弦变换(DCT)、QR分解以及音频的特性,提出了一种针对音频的盲水印算法。首先对原始音频分段,然后对每个分段进行小波变换求得近似分量,再进行离散余弦变换,对低频部分进行QR分解,在QR分解后得到的上三角矩阵中嵌入水印信息。实验结果表明,该算法具有较好的透明性和鲁棒性,能够承受高斯加噪、重采样、重量化、低通滤波、MP3压缩、裁剪替换等常见音频信号处理攻击。
杨榆雷敏钮心忻杨义先
关键词:音频水印离散小波变换QR分解
Quantum partial least squares regression algorithm for multiple correlation problem
2022年
Partial least squares(PLS) regression is an important linear regression method that efficiently addresses the multiple correlation problem by combining principal component analysis and multiple regression. In this paper, we present a quantum partial least squares(QPLS) regression algorithm. To solve the high time complexity of the PLS regression, we design a quantum eigenvector search method to speed up principal components and regression parameters construction. Meanwhile, we give a density matrix product method to avoid multiple access to quantum random access memory(QRAM)during building residual matrices. The time and space complexities of the QPLS regression are logarithmic in the independent variable dimension n, the dependent variable dimension w, and the number of variables m. This algorithm achieves exponential speed-ups over the PLS regression on n, m, and w. In addition, the QPLS regression inspires us to explore more potential quantum machine learning applications in future works.
侯艳艳李剑陈秀波田源
基于动态图的软件水印算法被引量:1
2015年
软件水印可以证明软件的版权所有者。研究基于已有的CT动态图软件水印算法,通过研究现有的编码方案的优缺点,提出一种新的基于PPCT(Planted Plane Cubic Tree)、排序图和中国剩余定理的编码算法DGSW。实验分析表明,使用DGSW编码方案的CT软件水印算法在抗攻击能力方面有所提高,同时具有较为出色的数据嵌入率。
雷敏杨榆胡若翔谭逢亮
关键词:软件水印动态图
基于MPUI模型的空域图像水印容量研究被引量:1
2016年
在基于失真不可感知的控制模型(maximize payload under imperceptive,MPUI)下,研究了空域图像的最大水印容量。发现最大水印容量不仅与嵌入强度有关,而且与图像尺寸大小、复杂度、视觉敏感度等因素相关。在理论上推导了最大水印容量与图像大小、嵌入强度的关系,并采用多元回归分析方法研究了图像复杂度、视觉敏感度与嵌入率的关系模型。综合这些内外因素,借助于主客观评价体系,推算出水印嵌入容量的估算方法,并在实验中验证了该估算方法的有效性。
毛家发黄艳红钮心忻肖刚朱李楠朱李楠
关键词:水印容量复杂度
A blind quantum signature protocol using the GHZ states被引量:10
2013年
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Greenberger-Horne-Zeilinger(GHZ) states,a new weak BQS protocol is proposed.Compared with some existing schemes,our protocol has 100% efficiency.Besides,the protocol is simple and easy to implement.The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant.In our protocol,the signatory is kept blind from the content of the message.According to the security analysis,the signatory cannot disavowal his/her signature while the signature cannot be forged by others.
WANG MingMingCHEN XiuBoYANG YiXian
关键词:签名协议GHZ态安全保证GHZ
A Method to Estimate the Steganographic Capacity in DCT Domain Based on MCUU Model
2016年
In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze the relation between steganographic capacity and affecting factors(image size, steganography operator, loading band, embedding intensity and image complexity). Then we design a steganography analyzer architecture and a steganographic algorithm which can dynamically increase the steganographic capacity. Compared with other methods of embedding capacity estimation in DCT domain, the proposed methods utilizes general steganalysis methods rather than one specific steganalysis technique and takes five essential factors into account, which improves the commonality and comprehensiveness of capacity estimation, respectively. The experimental results show that steganographic capacity for quantization index modulation(QIM) is almost twice that of spread spectrum(SS) based on MCUU model.
MAO JiafaHUANG YanhongNIU XinxinXIAO GangZHU LinanSHENG Weiguo
关键词:MODELSTEGANOGRAPHYSTEGANALYSISIMAGECOMPLEXITY
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States被引量:1
2019年
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack and disentanglement attack.Then,by changing the party of the preparation of cluster states and using unitary operations,we present an improved protocol which can avoid these two kinds of attacks.Moreover,the protocol is proposed using the three-qubit partially entangled set of states.It is more efficient by only using three particles rather than four or even more to transmit one bit secret information.Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource,it makes this protocol more convenient from an applied point of view.
Gang XuKe XiaoZongpeng LiXin-Xin NiuMichael Ryan
Typical universal entanglers
2014年
A universal entangler is a very powerful fault-tolerant entangling device for generating quantum entanglements from any joint states. Our paper aims to address the construction of universal entanglers. We prove that universal entanglers may be obtained from random unitary gates according to the Harr measure. The success probability is close to 1 for large system spaces. This result represents the typical density of entanglement subspaces in large state spaces. It also partially solves an open problem of universal bipartite entanglers and is explained by some experiment simulations.
WANG FengLUO MingXingCHEN XiuBoYANG YiXianWANG XiaoJun
关键词:量子纠缠子空间
共2页<12>
聚类工具0