تعداد نشریات | 38 |
تعداد شمارهها | 1,258 |
تعداد مقالات | 9,115 |
تعداد مشاهده مقاله | 8,325,958 |
تعداد دریافت فایل اصل مقاله | 5,040,811 |
یک رویکرد نهاننگاری صوت کوانتومی مقاوم مبتنی بر هم افزایی مخفی سازی پژواک و تکنیک کمارزشترین بیت | ||
پدافند الکترونیکی و سایبری | ||
مقاله 6، دوره 12، شماره 1 - شماره پیاپی 45، خرداد 1403، صفحه 59-76 اصل مقاله (1.53 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
معصومه ولایتی پور1؛ محمد مصلح* 2؛ محسن یوسفی نژاد3؛ محمد خیراندیش4 | ||
1دانشجوی دکتری، گروه مهندسی کامپیوتر، واحد دزفول، دانشگاه آزاد اسلامی، دزفول، ایران | ||
2دانشیار، گروه مهندسی کامپیوتر، واحد دزفول، دانشگاه آزاد اسلامی، دزفول، ایران | ||
3استادیار، گروه مهندسی کامپیوتر و فناوری اطلاعات، دانشگاه پیام نور، تهران، ایران | ||
4استادیار، گروه مهندسی کامپیوتر، واحد دزفول، دانشگاه آزاداسلامی، دزفول، ایران | ||
تاریخ دریافت: 04 دی 1402، تاریخ بازنگری: 27 فروردین 1403، تاریخ پذیرش: 16 اردیبهشت 1403 | ||
چکیده | ||
با ظهور کامپیوترهای کوانتومی، لزوم حفاظت از دادههای کوانتومی بهعنوان یک موضوع اساسی، توجه محققین را به خود جلب کرده است. در این مقاله، یک رویکرد نهاننگاری صوت کوانتومی، مبتنی بر تلفیقی از روشهای مخفیسازی پژواک(Echo Hiding) و روش کمارزشترین بیت(LSB) پیشنهاد میشود. رویکرد پیشنهادی در مرحله درج، ابتدا سیگنال صوت میزبان را به فرم نمایش کواننتومیQRDS تبدیل کرده و سپس یک سیگنال پژواک کوانتومی، از آن تولید میکند. در ادامه کیوبیتهای داده نهاننگاره را به روش کم ارزشترین بیت در سیگنال پژواک کوانتومی حاصل درج مینماید. در نهایت، سیگنال کوانتومی نهاننگاری شده از برآیند سیگنال کوانتومی اصلی و سیگنال کوانتومی پژواک حاصل میشود. در فاز استخراج رویکرد پیشنهادی، بر اساس تفاضل نمونههای سیگنال کوانتومی اصلی با سیگنال کوانتومی دریافت شده، کیوبیتهای نهاننگاره بازیابی میشوند. علاوه بر این، مدارات برگشتپذیر کوانتومی برای فرآیندهای درج و استخراج، طراحی و پیادهسازی شدهاند. نتایج حاصل از ارزیابی و مقایسه رویکرد پیشنهادی، از نظر شفافیت، مقاومتپذیری در برابر حملات و نیز ظرفیت درج، نشان میدهند که این رویکرد، در مقایسه با روشهای نهاننگاری کوانتومی مبتنی بر روش بیت کم ارزش، از مقاومتپذیری بالاتری برخوردار است. علاوه بر این، روش پیشنهادی از شفافیت بسیار مناسبی (SNR=66.26dB) در نرخ جادهی 512 کیوبیت در ثانیه برخوردار است که نشان میدهد روش پیشنهادی توانسته مصالحه بین مقاومتپذیری، شفافیت و ظرفیت را بهبود بخشد. | ||
کلیدواژهها | ||
نهاننگاری صوت کوانتومی؛ محاسبات کوانتومی؛ مخفی سازی پژواک؛ بیت کم ارزش | ||
موضوعات | ||
امنیت اطلاعات، رمزنگاری، پنهان نگاری، پروتکل ها و استانداردها | ||
عنوان مقاله [English] | ||
A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique | ||
نویسندگان [English] | ||
Masoumeh Velayatipour1؛ Mohammad Mosleh2؛ Mohsen Yoosefi Nejad3؛ Mohammad Kheyrandish4 | ||
1PhD student, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran | ||
2Associate Professor, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran | ||
3Assistant Professor, Department of Computer Engineering and Information Technology, Payam Noor University, Tehran, Iran | ||
4Assistant Professor, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran | ||
چکیده [English] | ||
With the advent of quantum computers, the need to protect quantum data as a fundamental issue has attracted the attention of researchers. In this article,, a quantum audio watermarking approach based on a combination of echo hiding and least significant bit (LSB) methods is proposed. In the embedding stage, the proposed approach first converts the host audio signal into QRDS quantum display form and then generates a quantum echo signal from it. Next, ,it inserts the watermark data qubits into the resulting quantum echo signal using the least significant bit method. Finally, the watermarked quantum signal is obtained from the result of the original quantum signal and the echo quantum signal. In the extraction phase, of the proposed approach, based on the difference between the samples of the original quantum signal and the received quantum signal, the watermark qubits are recovered. In addition, quantum reversible circuits for insertion and extraction processes have been designed and implemented. The results obtained from the evaluation and comparison of the proposed approach, in terms of transparency, robustness to attacks and also the embedding capacity, show that the proposed scheme compared to the quantum watermarking methods based on the LSB method, has a higher resistance . In addition, the proposed method has a very good transparency (SNR=66.26dB) at the embedding capacity of 512 kbps, which shows that the proposed method has been able to improve the compromise between robustness, transparency and capacity. | ||
کلیدواژهها [English] | ||
Quantum Audio watermarking, Quantum computing, Echo Hiding, Least Significant Bit | ||
مراجع | ||
[1] S. M. Mohsenfar, M. Mosleh, and A. Barati, "Audio watermarking method using QR decomposition and genetic algorithm," Multimedia Tools and Applications, vol. 74, pp. 759-779, 2015. https://doi.org/10.1007/s11042-013-1694-3. [2] R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," Proceedings 2001 international conference on image processing, vol. 3, pp. 1019-1022, 2001. [3] H. Hai, X. D. Qing, and Q. Ke, "A watermarking-based authentication and image restoration in multimedia sensor networks," International Journal of High Performance Computing and Networking, vol. 12, pp. 65-73, 2018. https://doi.org/10.1504/IJHPCN.2018.093846 [4] G. Hua, J. Huang, Y. Q. Shi, J. Goh, and V. L. Thing, "Twenty years of digital audio watermarking—a comprehensive review," Signal processing, vol. 128, pp. 222-242, 2016. https://doi.org/10.1016/j.sigpro.2016.04.005 [5] A. A. Hassani, H. Dehghani, M. Dehghani, and R. Esfahani, "Improvement Capacity and Transparency, In Steganography Based On Mod4," (in Fa), Journal of Electronic and Cyber Defense, vol. 4, pp. 15-21, 2016. https://www.magiran.com/paper/1573331. [6] M. A. S. Baei, "Designing a combinatorial Image Steganography algorithm based on game theory," (in Fa), Journal of Electronic and Cyber Defense, vol. 8, pp. 133-145, 2020. https://dorl.net/dor/20.1001.1.23224347.1399.8.1.11.1 [7] M. Shoaei and V. Sabeti, "Review and Comparison of Network Steganography Methods Based On Different Classifications," (in Fa), Passive Defense Quarterly, vol. 10, pp. 95-109, 2019. https://www.magiran.com/paper/2081090. [8] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital watermarking and steganography". Morgan Kaufmann google scholar, pp. 893-914, 2007. [9] E. Gholampour, "Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling," (in Fa), Journal of Electronic and Cyber Defense, vol. 6, pp. 81-94, 2019. https://dorl.net/dor/20.1001.1.23224347.1397.6.3.7.7 [10] M. Chetan, P. P. Bhat, V. Shet, S. B. Husenbhai, and A. Bhat, "Audio Watermarking Using Modified Least Significant Bit Technique," International Conference on Circuits, Controls and Communications (CCUBE), 2021, doi: 10.1109/CCUBE53681.2021.9702715. [11] R. K. Singh, D. K. Shaw, and M. J. Alam, "Experimental Studies of LSB Watermarking with Different Noise," Procedia Computer Science, vol. 54, pp. 612-620, 2015. doi: https://doi.org/10.1016/j.procs.2015.06.071. [12] S. Wang, W. Yuan, J. Wang, and M. Unoki, "Inaudible speech watermarking based on self-compensated echo-hiding and sparse subspace clustering," International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019. [13] D. Gruhl, A. Lu, and W. Bender, "Echo hiding," International Workshop on Information Hiding, 1996. https://doi.org/10.1007/3-540-61996-8_48. [14] M. Fahad Khan, F. Baig, and S. Beg, "Steganography between Silence Intervals of Audio in Video Content Using Chaotic Maps," Circuits, Systems, and Signal Processing, vol. 33, pp. 3901-3919, 2016. https://doi.org/10.1007/s00034-014-9830-5 [15] M. H. Shirali-Shahreza and S. Shirali-Shahreza, "Real-time and MPEG-1 layer III compression resistant steganography in speech," IET Information security, vol. 4, pp. 1-7, 2010. [16] Y. Xiang, I. Natgunanathan, S. Guo, W. Zhou, and S. Nahavandi, ""Patchwork-based audio watermarking method robust to de-synchronization attacks," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, pp. 1413-1423, 2014. [17] N. K. Kalantari, M. A. Akhaee, S. M. Ahadi, and H. Amindavar, "Robust multiplicative patchwork method for audio watermarking," IEEE Transactions on Audio, speech, and language processing, vol. 17, pp. 1133-1141, 2009. [18] P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th annual symposium on foundations of computer science, 1994. [19] P. Benioff, "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines," Journal of statistical physics, vol. 22, pp. 563-591, 1980. https://doi.org/10.1007/BF01011339 [20] R. P. Feynman, "Simulating physics with computers," International Journal of Theoretical Physics, vol. 21, pp. 467-488, 1982. [21] J. Wang, "QRDA: quantum representation of digital audio," International Journal of Theoretical Physics, vol. 55, pp. 1622-1641, 2016. https://doi.org/10.1007/s10773-015-2800-2 [22] F. Yan, A. M. Iliyasu, Y. Guo, and H. Yang, "Flexible representation and manipulation of audio signals on quantum computers," Theoretical Computer Science, vol.752, pp. 71-85, 2018. https://doi.org/10.1016/j.tcs.2017.12.025 [23] P. Li, B. Wang, H. Xiao, and X. Liu, "Quantum Representation and Basic Operations of Digital Signals," International Journal of Theoretical Physics, vol. 57, pp. 3242-3270, 2018. https://doi.org/10.1007/s10773-018-3841-0 [24] K. Chen, F. Yan, A. M. Iliyasu, and J. Zhao, "Dual quantum audio watermarking schemes based on quantum discrete cosine transform," International Journal of Theoretical Physics, vol. 58, pp. 502-521, 2019. https://doi.org/10.1007/s10773-018-3950-9 [25] Z.-G. Qu, H.-X. He, and T. Li, "Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio," Chinese Physics B, vol. 27, pp. 010306, 2018. [26] M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "An LSB-based quantum audio watermarking using MSB as arbiter," International Journal of Theoretical Physics, vol. 58, pp. 3828-3851, 2019. https://doi.org/10.1007/s10773-019-04251-z [27] M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "An enhanced LSB-based quantum audio watermarking scheme for nano communication networks," Multimedia Tools and Applications, vol. 79, pp. 26489-26515, 2020. https://doi.org/10.1007/s11042-020-09326-2 [28] M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "A blind quantum audio watermarking based on quantum discrete cosine transform," Journal of Information Security and Applications, vol. 55, pp. 102495, 2020. https://doi.org/10.1016/j.jisa.2020.102495 [29] M. Velayatipour, M. Mosleh, M. Y. Nejad, and M. Kheyrandish, "Quantum reversible circuits for audio watermarking based on echo hiding technique," Quantum Information Processing, vol. 21, pp. 316, 2022. https://doi.org/10.1007/s11128-022-03657-9 [30] K. Chen, F. Yan, A. M. Iliyasu, and J. Zhao, "Exploring the implementation of steganography protocols on quantum audio signals," International Journal of Theoretical Physics, vol. 57, pp. 476-494, 2018. https://doi.org/10.1007/s10773-017-3580-7 [31] A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, "A novel image steganography technique based on quantum substitution boxes," Optics & Laser Technology, vol. 116, pp. 92-102, 2019. https://doi.org/10.1016/j.optlastec.2019.03.005 [32] J. Chaharlang, M. Mosleh, and S. R. Heikalabad, "A novel quantum audio steganography–steganalysis approach using LSFQ-based embedding and QKNN-based classifier," Circuits, Systems, and Signal Processing, vol. 39, pp. 1-33, 2020. https://doi.org/10.1007/s00034-020-01345-6 [33] S. Norouzi Larki, M. Mosleh, and M. Kheyrandish, "Quantum Audio Steganalysis Based on Quantum Fourier Transform and Deutsch–Jozsa Algorithm," Circuits, Systems, and Signal Processing, vol. 34, pp.2235-2258, 2023. doi: 10.1007/s00034-022-02208-y. [34] V. Vedral, A. Barenco, and A. Ekert, "Quantum networks for elementary arithmetic operations," Physical Review A, vol. 54, pp. 147, 1996. https://doi.org/10.48550/arXiv.quant-ph/9511018. [35] D. Wang, Z.-H. Liu, W.-N. Zhu, and S.-Z. Li, "Design of quantum comparator based on extended general Toffoli gates with multiple targets," Computer Science, vol. 39, pp. 302-306, 2012. [36] M. N. Divshali, A. Rezai, and A. Karimi, "Towards multilayer QCA SISO shift register based on efficient D-FF circuits," International Journal of Theoretical Physics, vol. 57, pp. 3326-3339, 2018. https://doi.org/10.1007/s10773-018-3846-8 | ||
آمار تعداد مشاهده مقاله: 2,073 تعداد دریافت فایل اصل مقاله: 166 |