Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent

Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent

In this study, the security of Novel Enhanced Quantum Representation NEQR of quantum images are suggested by using the Quantum FourierTransform QFT with blind trent. In the protocol, QFT and key are usedto share signature with recipients. So all members know only their signatureinformation which are encrypted output of the QFT. This improves thesecurity of the protocol. In addition, the security of the protocol is providedby using reorder QFT output qubits with permutation of the blind trent.The security analysis expresses security of the transfer of the image withefective secret key usage.

___

  • S. Venegas-Andraca and S. Bose, “Storing, processing, and retrieving an image using quantum mechanics,” Proceedings of SPIE Conference of Quantum Information and Computation, vol. 5105, pp. 134–147, 2003.
  • J. I. Latorre, “Image compression and entanglement,” eprint arXiv:quant-ph/0510031, 2005.
  • P. Q. Le, F. Dong, and K. Hirota, “A flexible representation of compression, and processing operations,” Quantum Information Processing, vol. 10, no. 1, pp. 63–84, 2011. [Online]. Available: https://doi.org/10.1007/s11128-010-0177-y preparation, image
  • B. Sun, A. Iliyasu, F. Yan, and K. Hirota, “An rgb multi- channel representation for images on quantum computers,” Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 17, no. 3, pp. 404–417, 2013.
  • Y. Zhang, K. Lu, Y. Gao, and M. Wang, “Neqr: a novel enhanced quantum representation of digital images,” Quantum Inf Process, vol. 12, pp. 2833–2860, 2013. [Online]. Available: https://doi.org/10.1007/s11128-013-0567-z
  • Y. Zhang, K. Lu, Y. Gao, and K. Xu, “A novel quantum representation for log-polar images,” Quantum Information Processing, vol. 12, no. 9, pp. 3103–3126, 2013. [Online]. Available: https://doi.org/10.1007/s11128-013-0587-8
  • S. Yuan, X. Mao, Y. Xue, L. Chen, Q. Xiong, and A. Compare, “Sqr: a simple quantum representation of infrared images,” Quantum Information Processing, vol. 13, no. 6, pp. 1353–1379, 2014. [Online]. Available: https://doi.org/10.1007/s11128-014- 0733-y
  • H.-S. Li, Z. Qingxin, S. Lan, C.-Y. Shen, R. Zhou, and J. Mo, “Image storage, retrieval, compression and segmentation in a quantum system,” Quantum Information Processing, vol. 12, no. 6, pp. 2269–2290, 2013. [Online]. Available: https://doi.org/10.1007/s11128-012-0521-5
  • H.-S. Li, Q. Zhu, R.-G. Zhou, L. Song, and X.-j. Yang, “Multi-dimensional color image storage and retrieval for a normal arbitrary quantum superposition state,” Quantum Information Processing, vol. 13, no. 4, pp. 991–1011, 2014. [Online]. Available: https://doi.org/10.1007/s11128-013-0705-7
  • M. Abdolmaleky, M. Naseri, J. Batle, A. Farouk, and L.-H. Gong, “Red-green-blue multi-channel quantum representation of digital images,” International Journal for Light and Electron Optics, vol. 128, no. 1, pp. 121–132, 2017. [Online]. Available: https://doi.org/10.1016/j.ijleo.2016.09.123
  • A. Iliyasu, P. Le, F. Dong, and K. Hirota, “Restricted geometric transformations and their applications for quantum image wa- termarking and authentication,” Proceeding of the 10th Asian Conference on Quantum Information Sciences, pp. 96–97, 2010. [12] A. M. Iliyasu, P. Q. Le, F. Dong, and K. Hirota, “Watermarking and authentication of quantum images based on restricted geometric transformations,” Information Sciences, vol. 186, no. 1, pp. 126 – 149, 2012. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0020025511004853
  • A. Iliyasu, P. Le, F. Yan, B. Sun, J. A. S. Garcia, F. Dong, and K. Hirota, “A two-tier scheme for greyscale quantum image watermarking and recovery,” Int. J. Innov. Comput. Appl., vol. 5, no. 2, pp. 85–101, 2013. [Online]. Available: http://dx.doi.org/10.1504/IJICA.2013.053179
  • F. Yan, A. Iliyasu, B. Sun, S. Venegas-Andraca, F. Dong, and K. Hirota, “A duple watermarking strategy for multi-channel quantum images,” Quantum Inf. Process, vol. 14, no. 5, pp. 1675–1692, 2015.
  • M. A. Nielsen and I. L. Chuang, “Quantum computation and quantum information,” 10th Anniversary Edition, Cambridge University Press, 2010.
  • C. H. Bennett and G. Brassard, “Quantum cryptography: Pub- lic key distribution and coin tossing,” Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, no. 6, pp. 661–663, 1984.
  • A. K. Ekert, “Quantum cryptography based on bell’s theorem,” Phys. Rev. Lett., vol. 67, p. 8, 1991. [Online]. Available: https://doi.org/10.1103/PhysRevLett.67.661
  • I. Yılmaz, “Quantum group proxy digital signature based on quantum fourier transform by using blinded and non blinded trent,” International Journal of Information Security Science, vol. 6, no. 4, pp. 79 – 86, 2017.
  • T. Kim, J. W. Choi, N. S. Jho, and S. Lee, “Quantum messages with signatures forgeable in arbitrated quantum signature schemes,” Physica Scripta, vol. 90, no. 2, p. 025101, 2015. [Online]. Available: http://stacks.iop.org/1402- 4896/90/i=2/a=025101
  • W. Zhang, D. Qiu, and X. Zou, “Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation,” Quantum Information Processing, vol. 15, no. 6, pp. 2499–2519, 2016. [Online]. Available: https://doi.org/10.1007/s11128-016-1289-9