您的位置: 专家智库 > >

国家自然科学基金(61373131)

作品数:13 被引量:13H指数:2
相关作者:黄艳红周晓彦刘文杰钮心忻毛家发更多>>
相关机构:浙江工业大学南京信息工程大学北京邮电大学更多>>
发文基金:国家自然科学基金霍英东教育基金浙江省自然科学基金更多>>
相关领域:理学电子电信自动化与计算机技术自然科学总论更多>>

文献类型

  • 9篇中文期刊文章

领域

  • 5篇理学
  • 4篇自动化与计算...
  • 2篇电子电信

主题

  • 3篇QUANTU...
  • 2篇STEGAN...
  • 1篇序列模式挖掘
  • 1篇容错
  • 1篇水印
  • 1篇水印容量
  • 1篇图像
  • 1篇图像水印
  • 1篇奇异值
  • 1篇奇异值分解
  • 1篇网络演进
  • 1篇量子
  • 1篇纠错
  • 1篇纠错码
  • 1篇空域
  • 1篇分布式
  • 1篇分布式处理
  • 1篇复杂度
  • 1篇感知
  • 1篇感知机

机构

  • 1篇北京邮电大学
  • 1篇南京信息工程...
  • 1篇浙江工业大学

作者

  • 1篇朱李楠
  • 1篇肖刚
  • 1篇盛伟国
  • 1篇毛家发
  • 1篇钮心忻
  • 1篇刘文杰
  • 1篇周晓彦
  • 1篇黄艳红

传媒

  • 2篇Chines...
  • 2篇Comput...
  • 1篇小型微型计算...
  • 1篇山东大学学报...
  • 1篇Wuhan ...
  • 1篇China ...
  • 1篇Fronti...

年份

  • 1篇2021
  • 3篇2018
  • 4篇2016
  • 1篇2015
13 条 记 录,以下是 1-9
排序方式:
基于MPUI模型的空域图像水印容量研究被引量:1
2016年
在基于失真不可感知的控制模型(maximize payload under imperceptive,MPUI)下,研究了空域图像的最大水印容量。发现最大水印容量不仅与嵌入强度有关,而且与图像尺寸大小、复杂度、视觉敏感度等因素相关。在理论上推导了最大水印容量与图像大小、嵌入强度的关系,并采用多元回归分析方法研究了图像复杂度、视觉敏感度与嵌入率的关系模型。综合这些内外因素,借助于主客观评价体系,推算出水印嵌入容量的估算方法,并在实验中验证了该估算方法的有效性。
毛家发黄艳红钮心忻肖刚朱李楠朱李楠
关键词:水印容量复杂度
Controlled remote preparation of an arbitrary four-qubit cluster-type state被引量:2
2016年
Two schemes are proposed to realize the controlled remote preparation of an arbitrary four-qubit cluster-type state via a partially entangled channel. We construct ingenious measurement bases at the sender's and the controller's locations, which play a decisive role in the proposed schemes. The success probabilities can reach 50% and 100%, respectively. Compared with the previous proposals, the success probabilities are independent of the coefficients of the entangled channel.
陈维林马松雅瞿治国
一种酉权重量子感知机被引量:1
2018年
通过将量子计算与经典感知机网络相结合,提出了一种基于酉权重的新型高效量子感知机算法.在算法过程中通过求解总的权重矩阵,并对其进行奇异值分解来保持其具有酉性.与其他人提出的量子感知机算法不同,本算法在非理想训练算例(超完备和欠完备)条件下,通过一次迭代训练学习可实现Hadamard门H、相位门S、受控非门CNOT、π/8门T这些基本量子门功能,这些基本量子门是构成任意量子门的标准集合,因此理论上该算法也能够实现任意量子门功能.最后,通过选择一个由多个基本量子门构成的组合门作为实例,以及随机选取一个训练集对算法的通用性进行了进一步验证.
周晓彦周晓彦刘文杰安星星刘文杰
关键词:奇异值分解
Multilevel Pattern Mining Architecture for Automatic Network Monitoring in Heterogeneous Wireless Communication Networks被引量:7
2016年
The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.
Zhiguo QuJohn KeeneySebastian RobitzschFaisal ZamanXiaojun Wang
关键词:序列模式挖掘分布式处理网络演进
A Method to Estimate the Steganographic Capacity in DCT Domain Based on MCUU Model
2016年
In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze the relation between steganographic capacity and affecting factors(image size, steganography operator, loading band, embedding intensity and image complexity). Then we design a steganography analyzer architecture and a steganographic algorithm which can dynamically increase the steganographic capacity. Compared with other methods of embedding capacity estimation in DCT domain, the proposed methods utilizes general steganalysis methods rather than one specific steganalysis technique and takes five essential factors into account, which improves the commonality and comprehensiveness of capacity estimation, respectively. The experimental results show that steganographic capacity for quantization index modulation(QIM) is almost twice that of spread spectrum(SS) based on MCUU model.
MAO JiafaHUANG YanhongNIU XinxinXIAO GangZHU LinanSHENG Weiguo
关键词:MODELSTEGANOGRAPHYSTEGANALYSISIMAGECOMPLEXITY
Twice-Hadamard-CNOT attack on Li et al.'s fault-tolerant quantum private comparison and the improved scheme被引量:2
2015年
季赛王芳刘文杰袁晓敏
关键词:容错ECC纠错码
A Practical Quantum Network Coding Protocol Based on Non-Maximally Entangled State
2021年
In many earlier works,perfect quantum state transmission over the butterfly network can be achieved via quantum network coding protocols with the assist of maximally entangled states.However,in actual quantum networks,a maximally entangled state as auxiliary resource is hard to be obtained or easily turned into a non-maximally entangled state subject to all kinds of environmental noises.Therefore,we propose a more practical quantum network coding scheme with the assist of non-maximally entangled states.In this paper,a practical quantum network coding protocol over grail network is proposed,in which the non-maximally entangled resource is assisted and even the desired quantum state can be perfectly transmitted.The achievable rate region,security and practicability of the proposed protocol are discussed and analyzed.This practical quantum network coding protocol proposed over the grail network can be regarded as a useful attempt to help move the theory of quantum network coding towards practicability.
Zhen-Zhen LiZi-Chen LiXiu-Bo ChenZhiguo QuXiaojun WangHaizhu Pan
A Novel Quantum Stegonagraphy Based on Brown States
2018年
In this paper,a novel quantum steganography protocol based on Brown entangled states is proposed.The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states.Comparing with the previous quantum steganography algorithms,the new protocol focuses on its anti-noise capability for the phase-flip noise,which proved its good security resisting on quantum noise.Furthermore,the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility.If the number of Brown states transmitted in carrier protocol is many enough,the imperceptibility of the secret channel can be further enhanced.In aspect of capacity,the new protocol can further expand its capacity by combining with other quantum steganography protocols.Due to that the proposed protocol does not require the participation of the classic channel when it implements the transmission of secret information,any additional information leakage will not be caused for the new algorithm with good security.The detailed theoretical analysis proves that the new protocol can own good performance on imperceptibility,capacity and security.
Zhiguo QuTiancheng ZhuJinwei WangXiaojun Wang
关键词:ENTANGLEMENT
Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio
2018年
As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually become an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit(LSQb) modification is proposed. Compared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some specific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark.Finally, the simulation results including the values of audio waveforms and signal to noise ratios(SNR) prove that the new algorithm has good transparency, robustness, and security.
瞿治国何煌兴李涛
共1页<1>
聚类工具0