2017
DOI: 10.1007/s10773-017-3580-7
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the Implementation of Steganography Protocols on Quantum Audio Signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(37 citation statements)
references
References 20 publications
0
37
0
Order By: Relevance
“…Following that, in Section VII, efforts to utilize both quantum audio models (i.e. QRDA and FRQA) in quantum audio steganography (QAS) [47] and quantum endpoint detection (QEPD) [48] are recounted. Finally, the third part of the review (Sections VIII and IX) presents a brief inquisition regarding the requirements and technologies needed to support the realization of talking color quantum movies.…”
Section: Quantum Multimedia Processingmentioning
confidence: 99%
See 2 more Smart Citations
“…Following that, in Section VII, efforts to utilize both quantum audio models (i.e. QRDA and FRQA) in quantum audio steganography (QAS) [47] and quantum endpoint detection (QEPD) [48] are recounted. Finally, the third part of the review (Sections VIII and IX) presents a brief inquisition regarding the requirements and technologies needed to support the realization of talking color quantum movies.…”
Section: Quantum Multimedia Processingmentioning
confidence: 99%
“…security. This interest has extended to quantum movies where security protocols, including steganography [42], [47], encryption and decryption [41] have been proposed. Thus far, a majority of the available efforts in quantum movie security protocols are based on the MCQI-based CFQM movie representation (CFQM M ) as reviewed in the remainder of this section.…”
Section: Security Protocols For Quantum Moviesmentioning
confidence: 99%
See 1 more Smart Citation
“…| w s p s ≥ | w s p s , and the SET-0 operation is triggered. SET-0 operation could set all input qubits to |0 state by using a sequence of CNOT gates (as used in [39]). In such instances, |e 0 becomes a control qubit of the ADD module.…”
Section: Creation Of the Ghost Image By Using |R = | Wp − | W | Pmentioning
confidence: 99%
“…Audio steganography is defined as the Cover Audio + Secret data = Stego-audio signal [6][7][8]. The essential requirements for audio steganography are: (1) the secret data should not be perceptible to humans [6,7]; (2) it should maximize the hiding capacity; and (3) preferably, the hidden data should be encrypted.…”
Section: Introductionmentioning
confidence: 99%