×

Quantum image processing: a review of advances in its security technologies. (English) Zbl 1366.81007

Summary: In this review, we present an overview of the advances made in quantum image processing (QIP) comprising of the image representations, the operations realizable on them, and the likely protocols and algorithms for their applications. In particular, we focus on recent progresses on QIP-based security technologies including quantum watermarking, quantum image encryption, and quantum image steganography. This review is aimed at providing readers with a succinct, yet adequate compendium of the progresses made in the QIP sub-area. Hopefully, this effort will stimulate further interest aimed at the pursuit of more advanced algorithms and experimental validations for available technologies and extensions to other domains.

MSC:

81-02 Research exposition (monographs, survey articles) pertaining to quantum theory
81P68 Quantum computation

Software:

QC simulators
Full Text: DOI

References:

[1] Iliyasu, A., Entropy15 (2013) 2874.
[2] Yan, F., Iliyasu, A. and Venegas-Andraca, S., Quantum Inf. Process.15 (1) (2016) 1. · Zbl 1333.81110
[3] A. Vlasov, arXiv:quant-ph/9703010.
[4] Schützhold, R., Phys. Rev. A67 (6) (2003) 062311.
[5] Beach, G., Lomont, C. and Cohen, C., Quantum image processing (QUIP), in Proc. 32nd Applied Imagery Pattern Recognition Workshop (2003), pp. 39-44.
[6] Pittman, T., Shih, Y., Strekalov, D. and Sergienko, A., Phys. Rev. A52 (5) (1995) R3429.
[7] Lugiato, L., Gatti, A. and Brambilla, E., J. Opt. B4 (3) (2002) S176.
[8] Venegas-Andraca, S. and Bose, S., Storing, processing, and retrieving an image using quantum mechanics, in Proc. SPIE Conf. Quantum Information and Computation, (2003), pp. 134-147.
[9] J. Latorre, arXiv:quant-ph/0510031.
[10] Gatti, A., Brambilla, E. and Lugiato, L., Prog. Opt.51 (7) (2008) 251.
[11] Le, P., Dong, F. and Hirota, K., Quantum Inf. Process.10 (1) (2011) 63. · Zbl 1209.81066
[12] Sun, B., Iliyasu, A., Yan, F., Dong, F. and Hirota, K., J. Adv. Comput. Intell. Intell. Inf.17 (3) (2013) 404.
[13] Zhang, Y., Lu, K., Gao, Y. and Wang, M., Quantum Inf. Process.12 (8) (2013) 2833. · Zbl 1283.81042
[14] Le, P., Iliyasu, A., Dong, F. and Hirota, K., IAENG Int. J. Appl. Math.40 (3) (2010) 113. · Zbl 1229.68080
[15] Iliyasu, A., Le, P., Dong, F. and Hirota, K., Restricted geometic transformations and their applications for quantum image watermarking and authentications, in Proc. 10th Asian Conf. Quantum Information Sciences (2010), pp. 96-97.
[16] Le, P., Iliyasu, A., Dong, F. and Hirota, K., Theor. Comput. Sci.412 (15) (2011) 1406. · Zbl 1207.68427
[17] Wang, J., Jiang, N. and Wang, L., Quantum Inf. Process.14 (5) (2015) 1589. · Zbl 1327.81143
[18] Jiang, N., Wang, J. and Mu, Y., Quantum Inf. Process.14 (11) (2015) 4001. · Zbl 1327.81129
[19] Le, P., Iliyasu, A., Dong, F. and Hirota, K., J. Adv. Comput. Intell. Intell. Inf.15 (6) (2011) 698.
[20] Zhang, Y., Lu, K., Xu, K., Gao, Y. and Wilson, R., Quantum Inf. Process.14 (5) (2015) 1573. · Zbl 1327.81147
[21] Caraiman, S. and Manta, V., Theor. Comput. Sci.529 (2014) 46. · Zbl 1358.68309
[22] Yuan, S., Mao, X., Li, T., Xue, Y., Chen, L. and Xiong, Q., Quantum Inf. Process.14 (5) (2015) 1625. · Zbl 1327.81146
[23] Yan, F., Iliyasu, A., Le, P., Sun, B., Dong, F. and Hirota, K., Int. J. Innov. Comput. Appl.5 (4) (2013) 199.
[24] Iliyasu, A., Yan, F. and Hirota, K., Entropy18 (10) (2016) 360.
[25] Iliyasu, A., Le, P., Dong, F. and Hirota, K., Int. J. Quantum Inf.9 (6) (2011) 1459. · Zbl 1275.81020
[26] Yan, F., Iliyasu, A., Khan, A. and Yang, H., Int. J. Theor. Phys.55 (4) (2016) 2162. · Zbl 1338.81153
[27] Yan, F., Iliyasu, A., Hirota, K. and Yang, H., Sci. China Inf. Sci.59 (052102) (2016) 1.
[28] Yan, F., Iliyasu, A., Venegas-Andraca, S. and Yang, H., Int. J. Theor. Phys.54 (8) (2015) 2893. · Zbl 1330.81072
[29] Yan, F., Iliyasu, A. and Jiang, Z., Entropy16 (10) (2014) 5290.
[30] Wang, J., Int. J. Theor. Phys.55 (3), 1622 (2016). · Zbl 1338.81147
[31] F. Yan, Y. Guo, A. Iliyasu and H. Yang, arXiv:1701.01291.
[32] Walker, M., Cryptography and encryption overview, CEH Certified Ethical Hacker All-in-One Exam Guide (2011) (McGraw-Hill Ocborne Media).
[33] Katzenbeisser, S. and Petitcolas, F., Information Hiding Techniques for Steganography and Digital Watermarking (Artech House Print on Demand, 1999)
[34] Iliyasu, A., Le, P., Dong, F. and Hirota, K., Inf. Sci.186 (1) (2012) 126. · Zbl 1239.94009
[35] Iliyasu, A., Le, P., Yan, F., Sun, B., Garcia, J., Dong, F. and Hirota, K., Int. J. Innov. Comput. Appl.5 (2) (2013) 85.
[36] Zhang, W., Gao, F., Liu, B., Wen, Q. and Chen, H., Quantum Inf. Process.12 (2) (2013) 793. · Zbl 1264.81131
[37] Zhang, W., Gao, F., Liu, B. and Jia, H., Int. J. Theor. Phys.52 (2) (2013) 504. · Zbl 1264.81127
[38] Song, X., Wang, S., Liu, S., Abd El-Latif, A. and Niu, X., Quantum Inf. Process.12 (2) (2013) 3689. · Zbl 1303.81052
[39] Song, X., Wang, S., Abd El-Latif, A. and Niu, X., Multimedia Syst.20 (4) (2014) 379.
[40] Yan, F., Iliyasu, A., Sun, B., Venegas-Andraca, S., Dong, F. and Hirota, K., Quantum Inf. Process.14 (5) (2015) 1675. · Zbl 1327.81144
[41] Miyake, S. and Nakamae, K., Quantum Inf. Process.15 (5) (2016) 1849. · Zbl 1338.81141
[42] Li, P., Xiao, H. and Li, B., Quantum Inf. Process.15 (2016) 4415. · Zbl 1357.81062
[43] Jiang, N., Wu, W. and Wang, L., Quantum Inf. Process.13 (5) (2014) 1223. · Zbl 1291.81097
[44] Jiang, N., Wang, L. and Wu, W., Int. J. Theor. Phys.53 (7) (2014) 2463. · Zbl 1298.81048
[45] Zhou, R., Wu, Q., Zhang, M. and Shen, C., Int. J. Theor. Phys.52 (6) (2013) 1802.
[46] Zhou, R., Sun, Y. and Fan, P., Quantum Inf. Process.14 (5) (2014) 1717.
[47] Song, X., Wang, S., Abd El-Latif, A. and Niu, X., Quantum Inf. Process.13 (8) (2014) 1765. · Zbl 1305.81058
[48] Yan, F., Guo, Y., Iliyasu, A., Jiang, Z. and Yang, H., J. Adv. Comput. Intell. Intell. Inf.20 (1) (2016) 163.
[49] Liang, H., Tao, X. and Zhou, N., Quantum Inf. Process.15 (2016) 2701. · Zbl 1348.81171
[50] Yang, Y., Xia, J., Jia, X. and Zhang, H., Quantum Inf. Process.12 (11) (2013) 3477. · Zbl 1337.94083
[51] Wang, S., Song, X. and Niu, X., A novel encryption algorithm for quantum images based on quantum wavelet transform and diffusion, Intelligent Data Analysis and its Applications, Volume II, Advances in Intelligent Systems and Computing, Vol. 298 (2014), pp. 243-250. (Springer International Publishing).
[52] Yang, Y., Jia, X., Sun, S. and Pan, Q., Inf. Sci.277 (2014) 445.
[53] Yang, Y., Tian, J., Lei, H., Zhou, Y. and Shi, W., Inf. Sci.345 (2016) 257.
[54] Yang, Y., T. J., Sun, S. and Xu, P., Optik126 (21) (2015) 3221.
[55] Jiang, N. and Wang, L., Int. J. Theor. Phys.54 (3) (2015) 1021. · Zbl 1328.81081
[56] Jiang, N., Zhao, N. and Wang, L., Int. J. Theor. Phys.55 (1) (2016) 107. · Zbl 1335.81052
[57] Wang, S., Sang, J., Song, X. and Niu, X., Measurement73 (2015) 352.
[58] Le, P., Iliyasu, A., Dong, F. and Hirota, K., A flexible representation and invertible transformations for images on quantum computers, New Advances in Intelligent Signal Processing: Studies in Computational Intelligence, Vol. 372 (2011), pp. 179-202. (SpringerBerlin Heidelberg).
[59] Hua, T., Chen, J., Pei, D., Zhang, W. and Zhou, N., Int. J. Theor. Phys.54 (2) (2015) 526. · Zbl 1312.81045
[60] M. Mastriani, arXiv:1512.02942.
[61] Nielsen, M. and Chuang, I., Quantum Computation and Quantum Information (Cambridge University Press, United Kingdom, 2000). · Zbl 1049.81015
[62] Iliyasu, A., Le, P., Yan, F., Sun, B., Garcia, J., Dong, F. and Hirota, K., Int. J. Unconv. Comput.9 (1-2) (2013) 125.
[63] D. Wecker and K. Svore, arXiv:1402.4467v1.
[64] List of QC simulators, https://quantiki.org/wiki/list-qc-simulators (14 November 2016).
[65] 1QBit-Products, http://1qbit.com/products/ (14 November 2016).
[66] QuSoft-The need for quantum software, http://www.qusoft.org/research/software/ (14 November 2016).
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.