Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Quantum Image Watermarking Method Based on Hamming Code

A quantum image and Hamming code technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of large amount of calculation, difficult quantum gate operation, and low computational complexity, and achieve good robustness and complete realization The effect of high performance and accuracy, and low computational complexity

Inactive Publication Date: 2017-12-08
FUJIAN NORMAL UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the Chinese invention patent with the publication number CN201310288164 provides a quantum watermark authentication method based on quantum discrete cosine transform. Through the watermark technology of quantum cosine transform, the copyright protection of color images is realized, and it has the characteristics of low computational complexity. , but it is necessary to perform quantum discrete cosine transform on the quantum image, the calculation amount is relatively large and the corresponding quantum gate operation is not easy to realize

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantum Image Watermarking Method Based on Hamming Code
  • A Quantum Image Watermarking Method Based on Hamming Code
  • A Quantum Image Watermarking Method Based on Hamming Code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] Please refer to Figure 4 with Figure 5 , Embodiment 1 of the present invention is:

[0101] see Figure 4 , the original watermark image containing "Copyright" font is clear;

[0102] see Figure 5 , the original watermark image containing "Copyright" font is encoded by Hamming code, and the encoded watermark image is blurred, which shows that the error correction encoding of the original watermark image by Hamming code is more effective.

Embodiment 2

[0104] 1. When the original watermark image is encoded with Hamming code for error correction:

[0105] Assuming that the information bit sequence of the original watermark image is a vector A of 1×4, it is divided into one group, and the code length is 4. Use (7,4) Hamming code for error correction coding on vector A, then the code length of Hamming code is 7, and the code length of each group of error correction codes is 3. The bit sequence after encoding the vector A is a 1×7 vector C, and the generator matrix of (7,4) Hamming code is G, then

[0106] A·G=C,

[0107] Among them, "·" represents the matrix multiplication operation, and

[0108]

[0109] 2. When the coded watermark image extracted from the watermark-embedded quantum carrier image is verified and decoded by Hamming code:

[0110] Assuming that the bit sequence of the coded watermark image extracted from the watermarked quantum carrier image is a 1×7 vector D, the vector D and the Hamming check matrix H sh...

Embodiment 3

[0115] Please refer to Figure 6 to Figure 10 , Embodiment three of the present invention is:

[0116] see Image 6 , assuming that the size of the original quantum carrier image is 2 2 ×2 2 , namely m=2, n=2, then

[0117] The horizontal coordinates of the original quantum carrier image are |x>=|x 1 x 0 >

[0118] The vertical coordinate of the original quantum carrier image is |y>=|y 1 the y 0 >

[0119] The original watermark image is a 1×4 vector W, and the encoded watermark image is a 1×7 vector W’;

[0120] If i=2, and x 2 = 1,y 2 = 2, the auxiliary qubit is Z 2 , then at this time

[0121] The corresponding encoded watermark image information is W 2 ';

[0122] The embedding position of the corresponding original quantum carrier image is M 1,2 , namely x 1 =0,x 0 = 1,y 1 = 1,y 0 = 0;

[0123] 1. W in the encoded watermark image information 2 ’ Embedding position M of embedding the original quantum carrier image 1,2

[0124] When the least signifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum image watermarking method based on the Hamming code, which uses the Hamming code to perform error correction coding on the original watermark image, uses a pseudo-random number to generate the watermark embedding position of the original quantum carrier image, and performs watermark embedding on the original quantum carrier image When adding an auxiliary qubit sequence, the coded watermark image is decoded by Hamming code. The method can realize the completeness and accuracy of watermark image embedding and extraction, has high efficiency, low computational complexity, and good robustness, and can realize partial position watermark embedding of quantum images, and can realize watermark embedding in the absence of original quantum carrier images. The original watermark image can be obtained from the following method, which can be applied to both grayscale image watermark encryption and color image watermark encryption.

Description

technical field [0001] The invention relates to the field of quantum secure communication, in particular to a quantum image watermarking method based on Hamming codes. Background technique [0002] With the development of information technology, it becomes easier to intercept, access, copy and tamper with images. Therefore, how to protect image data from unauthorized access has become a hot research topic. At present, there are mainly two methods to solve the image authentication problem: one method is the image cryptography system, which converts the image from one recognizable form to another unrecognizable form; the other method is image steganography, which Conceal existing information by embedding images into the carrier medium. As an important image steganography technique, image watermarking has made great progress. [0003] In recent years, with the development of quantum technology, people have done some research on the representation, storage and restoration of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 林崧王宁孔祥增
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products