2017
DOI: 10.1142/s0219749917300017
|View full text |Cite
|
Sign up to set email alerts
|

Quantum image processing: A review of advances in its security technologies

Abstract: In this review, we present an overview of the advances made in quantum image processing (QIP) comprising of the image representations, the operations realizable on them, and the likely protocols and algorithms for their applications. In particular, we focus on recent progresses on QIP-based security technologies including quantum watermarking, quantum image encryption, and quantum image steganography. This review is aimed at providing readers with a succinct, yet adequate compendium of the progresses made in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 122 publications
(27 citation statements)
references
References 56 publications
0
27
0
Order By: Relevance
“…Overall, as mentioned earlier, the objective of QIP is to utilize quantum computing technologies to capture, manipulate, and recover quantum images in different formats and for different purposes. Whereas detailed reviews and surveys on QIP representations, security protocols as well as their applications can be found in [6], [18], [34], and [37], in the sequel the formulation of a few quantum image representations is reviewed with focus on emphasizing their differences and suitability for varied applications. In particular, attention will be given to the FRQI and NEQR quantum image models because most of the quantum movie formats discussed in later sections of the disquisition are built around them.…”
Section: A Quantum Image Processingmentioning
confidence: 99%
See 2 more Smart Citations
“…Overall, as mentioned earlier, the objective of QIP is to utilize quantum computing technologies to capture, manipulate, and recover quantum images in different formats and for different purposes. Whereas detailed reviews and surveys on QIP representations, security protocols as well as their applications can be found in [6], [18], [34], and [37], in the sequel the formulation of a few quantum image representations is reviewed with focus on emphasizing their differences and suitability for varied applications. In particular, attention will be given to the FRQI and NEQR quantum image models because most of the quantum movie formats discussed in later sections of the disquisition are built around them.…”
Section: A Quantum Image Processingmentioning
confidence: 99%
“…The FRQI model offers a mechanism to encode an image as a normalized state that captures chromatic and spatial details about the image's composition. More than any other QIP image model, the FRQI has played an important role in the development of several strategies to execute quantum image processing tasks [6], [18], [34] and overall growth of the QIP sub-discipline.…”
Section: B Quantum Image Representationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Further to the potential applications of quantum imaging schemes, it has been demonstrated that imaging schemes at conventional wavelengths can be improved by using quantum sources, either by enhancing the resolution or decreasing the noise of images [141,52]. Future developments in quantum imaging could come through new approaches such as quantum image processing [191] or through exploiting quantum correlations via different methods such as correlation plenoptic imaging [192]. Moreover, early demonstrations of principle of quantum imaging techniques are now more and more transforming into real world practical implementations from which new imaging technologies may emerge.…”
Section: Discussionmentioning
confidence: 99%
“…Quantum computation has shown great potential for improving information processing speed and enhancing communication security [ 1 , 2 , 3 ]. The quantum image encryption technology exploits quantum mechanics principles, such as parallel and entanglement, to further protect the security of information transmission and decrease computational resource [ 4 , 5 , 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%