یک رویکرد نهان‌نگاری صوت کوانتومی مقاوم مبتنی بر هم افزایی مخفی سازی پژواک و تکنیک کم‌ارزش‌ترین بیت

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجوی دکتری، گروه مهندسی کامپیوتر، واحد دزفول، دانشگاه آزاد اسلامی، دزفول، ایران

2 دانشیار، گروه مهندسی کامپیوتر، واحد دزفول، دانشگاه آزاد اسلامی، دزفول، ایران

3 استادیار، گروه مهندسی کامپیوتر و فناوری اطلاعات، دانشگاه پیام نور، تهران، ایران

4 استادیار، گروه مهندسی کامپیوتر، واحد دزفول، دانشگاه آزاداسلامی، دزفول، ایران

چکیده

با ظهور کامپیوترهای کوانتومی، لزوم حفاظت از دادههای کوانتومی به‌عنوان یک موضوع اساسی، توجه محققین را به خود جلب کرده است. در این مقاله، یک رویکرد نهاننگاری صوت کوانتومی، مبتنی بر تلفیقی از روش‌های مخفیسازی پژواک(Echo Hiding) و روش کم‌ارزش‌ترین بیت(LSB) پیشنهاد میشود. رویکرد پیشنهادی در مرحله درج، ابتدا سیگنال صوت میزبان را به فرم نمایش کواننتومیQRDS تبدیل کرده و سپس یک سیگنال پژواک کوانتومی، از آن تولید میکند. در ادامه کیوبیتهای داده نهاننگاره را به روش کم ارزش‌ترین بیت در سیگنال پژواک کوانتومی حاصل درج مینماید. در نهایت، سیگنال کوانتومی نهاننگاری شده از برآیند سیگنال کوانتومی اصلی و سیگنال کوانتومی پژواک حاصل میشود. در فاز استخراج رویکرد پیشنهادی، بر اساس تفاضل نمونههای سیگنال کوانتومی اصلی با سیگنال کوانتومی دریافت شده، کیوبیتهای نهاننگاره بازیابی میشوند. علاوه بر این، مدارات برگشتپذیر کوانتومی برای فرآیندهای درج و استخراج، طراحی و پیادهسازی شدهاند. نتایج حاصل از ارزیابی و مقایسه رویکرد پیشنهادی، از نظر شفافیت، مقاومت‌پذیری در برابر حملات و نیز ظرفیت درج، نشان میدهند که این رویکرد، در مقایسه با روشهای نهان‌نگاری کوانتومی مبتنی بر روش بیت کم ارزش، از مقاومت‌پذیری بالاتری برخوردار است. علاوه بر این، روش پیشنهادی از شفافیت بسیار مناسبی (SNR=66.26dB) در نرخ جادهی 512 کیوبیت در ثانیه برخوردار است که نشان میدهد روش پیشنهادی توانسته مصالحه بین مقاومتپذیری، شفافیت و ظرفیت را بهبود بخشد.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique

نویسندگان [English]

  • Masoumeh Velayatipour 1
  • Mohammad Mosleh 2
  • Mohsen Yoosefi Nejad 3
  • Mohammad Kheyrandish 4
1 PhD student, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
2 Associate Professor, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
3 Assistant Professor, Department of Computer Engineering and Information Technology, Payam Noor University, Tehran, Iran
4 Assistant Professor, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
چکیده [English]

With the advent of quantum computers, the need to protect quantum data as a fundamental issue has attracted the attention of researchers. In this article,, a quantum audio watermarking approach based on a combination of echo hiding and least significant bit (LSB) methods is proposed. In the embedding stage, the proposed approach first converts the host audio signal into QRDS quantum display form and then generates a quantum echo signal from it. Next, ,it inserts the watermark data qubits into the resulting quantum echo signal using the least significant bit method. Finally, the watermarked quantum signal is obtained from the result of the original quantum signal and the echo quantum signal. In the extraction phase, of the proposed approach, based on the difference between the samples of the original quantum signal and the received quantum signal, the watermark qubits are recovered. In addition, quantum reversible circuits for insertion and extraction processes have been designed and implemented. The results obtained from the evaluation and comparison of the proposed approach, in terms of transparency, robustness to attacks and also the embedding capacity, show that the proposed scheme compared to the quantum watermarking methods based on the LSB method, has a higher resistance . In addition, the proposed method has a very good transparency (SNR=66.26dB) at the embedding capacity of 512 kbps, which shows that the proposed method has been able to improve the compromise between robustness, transparency and capacity.

کلیدواژه‌ها [English]

  • Quantum Audio watermarking
  • Quantum computing
  • Echo Hiding
  • Least Significant Bit

Smiley face

 
[1]         S. M. Mohsenfar, M. Mosleh, and A. Barati, "Audio watermarking method using QR decomposition and genetic algorithm," Multimedia Tools and Applications, vol. 74, pp. 759-779, 2015. 
             https://doi.org/10.1007/s11042-013-1694-3.
[2]         R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," Proceedings 2001 international conference on image processing, vol. 3, pp. 1019-1022, 2001.  
[3]         H. Hai, X. D. Qing, and Q. Ke, "A watermarking-based authentication and image restoration in multimedia sensor networks," International Journal of High Performance Computing and Networking, vol. 12, pp. 65-73, 2018. https://doi.org/10.1504/IJHPCN.2018.093846
[4]         G. Hua, J. Huang, Y. Q. Shi, J. Goh, and V. L. Thing, "Twenty years of digital audio watermarking—a comprehensive review," Signal processing, vol. 128, pp. 222-242, 2016. https://doi.org/10.1016/j.sigpro.2016.04.005
[5]         A. A. Hassani, H. Dehghani, M. Dehghani, and R. Esfahani, "Improvement Capacity and Transparency, In Steganography Based On Mod4," (in Fa), Journal of Electronic and Cyber Defense, vol. 4, pp. 15-21, 2016. https://www.magiran.com/paper/1573331.
[6]         M. A. S. Baei, "Designing a combinatorial Image Steganography algorithm based on game theory," (in Fa), Journal of Electronic and Cyber Defense, vol. 8, pp. 133-145, 2020. https://dorl.net/dor/20.1001.1.23224347.1399.8.1.11.1
[7]         M. Shoaei and V. Sabeti, "Review and Comparison of Network Steganography Methods Based On Different Classifications," (in Fa), Passive Defense Quarterly, vol. 10, pp. 95-109, 2019.
                https://www.magiran.com/paper/2081090.
[8]         I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital watermarking and steganography". Morgan Kaufmann google scholar, pp. 893-914, 2007.
[9]         E. Gholampour, "Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling," (in Fa), Journal of Electronic and Cyber Defense, vol. 6, pp. 81-94, 2019. https://dorl.net/dor/20.1001.1.23224347.1397.6.3.7.7
[10]       M. Chetan, P. P. Bhat, V. Shet, S. B. Husenbhai, and A. Bhat, "Audio Watermarking Using Modified Least Significant Bit Technique,"  International Conference on Circuits, Controls and Communications (CCUBE), 2021,  
                doi: 10.1109/CCUBE53681.2021.9702715. 
[11]       R. K. Singh, D. K. Shaw, and M. J. Alam, "Experimental Studies of LSB Watermarking with Different Noise," Procedia Computer Science, vol. 54, pp. 612-620, 2015.
               doi: https://doi.org/10.1016/j.procs.2015.06.071.
[12]       S. Wang, W. Yuan, J. Wang, and M. Unoki, "Inaudible speech watermarking based on self-compensated echo-hiding and sparse subspace clustering," International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019.
[13]       D. Gruhl, A. Lu, and W. Bender, "Echo hiding,"  International Workshop on Information Hiding, 1996.
                https://doi.org/10.1007/3-540-61996-8_48.
[14]       M. Fahad Khan, F. Baig, and S. Beg, "Steganography between Silence Intervals of Audio in Video Content Using Chaotic Maps," Circuits, Systems, and Signal Processing, vol. 33, pp. 3901-3919, 2016. https://doi.org/10.1007/s00034-014-9830-5
[15]       M. H. Shirali-Shahreza and S. Shirali-Shahreza, "Real-time and MPEG-1 layer III compression resistant steganography in speech," IET Information security, vol. 4, pp. 1-7, 2010.
[16]       Y. Xiang, I. Natgunanathan, S. Guo, W. Zhou, and S. Nahavandi, ""Patchwork-based audio watermarking method robust to de-synchronization attacks," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, pp. 1413-1423, 2014.
[17]       N. K. Kalantari, M. A. Akhaee, S. M. Ahadi, and H. Amindavar, "Robust multiplicative patchwork method for audio watermarking," IEEE Transactions on Audio, speech, and language processing, vol. 17, pp. 1133-1141, 2009.
[18]       P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th annual symposium on foundations of computer science, 1994.  
[19]       P. Benioff, "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines," Journal of statistical physics, vol. 22,  pp. 563-591, 1980. https://doi.org/10.1007/BF01011339
[20]       R. P. Feynman, "Simulating physics with computers," International Journal of Theoretical Physics, vol. 21, pp. 467-488, 1982.
[21]       J. Wang, "QRDA: quantum representation of digital audio," International Journal of Theoretical Physics, vol. 55, pp. 1622-1641, 2016. https://doi.org/10.1007/s10773-015-2800-2
[22]       F. Yan, A. M. Iliyasu, Y. Guo, and H. Yang, "Flexible representation and manipulation of audio signals on quantum computers," Theoretical Computer Science, vol.752,  pp. 71-85, 2018. https://doi.org/10.1016/j.tcs.2017.12.025
[23]       P. Li, B. Wang, H. Xiao, and X. Liu, "Quantum Representation and Basic Operations of Digital Signals," International Journal of Theoretical Physics, vol. 57,  pp. 3242-3270, 2018. https://doi.org/10.1007/s10773-018-3841-0
[24]       K. Chen, F. Yan, A. M. Iliyasu, and J. Zhao, "Dual quantum audio watermarking schemes based on quantum discrete cosine transform," International Journal of Theoretical Physics, vol. 58, pp. 502-521, 2019. https://doi.org/10.1007/s10773-018-3950-9
[25]       Z.-G. Qu, H.-X. He, and T. Li, "Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio," Chinese Physics B, vol. 27, pp. 010306, 2018.
[26]       M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "An LSB-based quantum audio watermarking using MSB as arbiter," International Journal of Theoretical Physics, vol. 58, pp. 3828-3851, 2019.
                https://doi.org/10.1007/s10773-019-04251-z
[27]       M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "An enhanced LSB-based quantum audio watermarking scheme for nano communication networks," Multimedia Tools and Applications, vol. 79, pp. 26489-26515, 2020.
                https://doi.org/10.1007/s11042-020-09326-2
[28]       M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "A blind quantum audio watermarking based on quantum discrete cosine transform," Journal of Information Security and Applications, vol. 55, pp. 102495, 2020.
                https://doi.org/10.1016/j.jisa.2020.102495
[29]       M. Velayatipour, M. Mosleh, M. Y. Nejad, and M. Kheyrandish, "Quantum reversible circuits for audio watermarking based on echo hiding technique," Quantum Information Processing, vol. 21, pp. 316, 2022.
                https://doi.org/10.1007/s11128-022-03657-9
[30]       K. Chen, F. Yan, A. M. Iliyasu, and J. Zhao, "Exploring the implementation of steganography protocols on quantum audio signals," International Journal of Theoretical Physics, vol. 57, pp. 476-494, 2018. https://doi.org/10.1007/s10773-017-3580-7
[31]       A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, "A novel image steganography technique based on quantum substitution boxes," Optics & Laser Technology, vol. 116, pp. 92-102, 2019.
                https://doi.org/10.1016/j.optlastec.2019.03.005
[32]       J. Chaharlang, M. Mosleh, and S. R. Heikalabad, "A novel quantum audio steganography–steganalysis approach using LSFQ-based embedding and QKNN-based classifier," Circuits, Systems, and Signal Processing, vol. 39, pp. 1-33, 2020.
                https://doi.org/10.1007/s00034-020-01345-6
[33]       S. Norouzi Larki, M. Mosleh, and M. Kheyrandish, "Quantum Audio Steganalysis Based on Quantum Fourier Transform and Deutsch–Jozsa Algorithm," Circuits, Systems, and Signal Processing, vol. 34, pp.2235-2258, 2023.
               doi: 10.1007/s00034-022-02208-y.
[34]       V. Vedral, A. Barenco, and A. Ekert, "Quantum networks for elementary arithmetic operations," Physical Review A, vol. 54, pp. 147, 1996.
                https://doi.org/10.48550/arXiv.quant-ph/9511018.
[35]       D. Wang, Z.-H. Liu, W.-N. Zhu, and S.-Z. Li, "Design of quantum comparator based on extended general Toffoli gates with multiple targets," Computer Science, vol. 39, pp. 302-306, 2012.
[36]       M. N. Divshali, A. Rezai, and A. Karimi, "Towards multilayer QCA SISO shift register based on efficient D-FF circuits," International Journal of Theoretical Physics, vol. 57, pp. 3326-3339, 2018.
               https://doi.org/10.1007/s10773-018-3846-8
دوره 12، شماره 1 - شماره پیاپی 45
شماره پیا پی 45 بهار 1403
خرداد 1403
صفحه 59-76
  • تاریخ دریافت: 04 دی 1402
  • تاریخ بازنگری: 27 فروردین 1403
  • تاریخ پذیرش: 16 اردیبهشت 1403
  • تاریخ انتشار: 13 خرداد 1403