A Robust Quantum Audio Watermarking Using Synergy of Echo Hiding and Least Significant Bit Technique

Document Type : Original Article

Authors

1 PhD student, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran

2 Associate Professor, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran

3 Assistant Professor, Department of Computer Engineering and Information Technology, Payam Noor University, Tehran, Iran

4 Assistant Professor, Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran

Abstract

With the advent of quantum computers, the need to protect quantum data as a fundamental issue has attracted the attention of researchers. In this article,, a quantum audio watermarking approach based on a combination of echo hiding and least significant bit (LSB) methods is proposed. In the embedding stage, the proposed approach first converts the host audio signal into QRDS quantum display form and then generates a quantum echo signal from it. Next, ,it inserts the watermark data qubits into the resulting quantum echo signal using the least significant bit method. Finally, the watermarked quantum signal is obtained from the result of the original quantum signal and the echo quantum signal. In the extraction phase, of the proposed approach, based on the difference between the samples of the original quantum signal and the received quantum signal, the watermark qubits are recovered. In addition, quantum reversible circuits for insertion and extraction processes have been designed and implemented. The results obtained from the evaluation and comparison of the proposed approach, in terms of transparency, robustness to attacks and also the embedding capacity, show that the proposed scheme compared to the quantum watermarking methods based on the LSB method, has a higher resistance . In addition, the proposed method has a very good transparency (SNR=66.26dB) at the embedding capacity of 512 kbps, which shows that the proposed method has been able to improve the compromise between robustness, transparency and capacity.

Keywords

Main Subjects


Smiley face

 
[1]         S. M. Mohsenfar, M. Mosleh, and A. Barati, "Audio watermarking method using QR decomposition and genetic algorithm," Multimedia Tools and Applications, vol. 74, pp. 759-779, 2015. 
             https://doi.org/10.1007/s11042-013-1694-3.
[2]         R. Chandramouli and N. Memon, "Analysis of LSB based image steganography techniques," Proceedings 2001 international conference on image processing, vol. 3, pp. 1019-1022, 2001.  
[3]         H. Hai, X. D. Qing, and Q. Ke, "A watermarking-based authentication and image restoration in multimedia sensor networks," International Journal of High Performance Computing and Networking, vol. 12, pp. 65-73, 2018. https://doi.org/10.1504/IJHPCN.2018.093846
[4]         G. Hua, J. Huang, Y. Q. Shi, J. Goh, and V. L. Thing, "Twenty years of digital audio watermarking—a comprehensive review," Signal processing, vol. 128, pp. 222-242, 2016. https://doi.org/10.1016/j.sigpro.2016.04.005
[5]         A. A. Hassani, H. Dehghani, M. Dehghani, and R. Esfahani, "Improvement Capacity and Transparency, In Steganography Based On Mod4," (in Fa), Journal of Electronic and Cyber Defense, vol. 4, pp. 15-21, 2016. https://www.magiran.com/paper/1573331.
[6]         M. A. S. Baei, "Designing a combinatorial Image Steganography algorithm based on game theory," (in Fa), Journal of Electronic and Cyber Defense, vol. 8, pp. 133-145, 2020. https://dorl.net/dor/20.1001.1.23224347.1399.8.1.11.1
[7]         M. Shoaei and V. Sabeti, "Review and Comparison of Network Steganography Methods Based On Different Classifications," (in Fa), Passive Defense Quarterly, vol. 10, pp. 95-109, 2019.
                https://www.magiran.com/paper/2081090.
[8]         I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital watermarking and steganography". Morgan Kaufmann google scholar, pp. 893-914, 2007.
[9]         E. Gholampour, "Relating the Detection Rate, Capacity and the Cost of Steganography by Steganographer Modeling," (in Fa), Journal of Electronic and Cyber Defense, vol. 6, pp. 81-94, 2019. https://dorl.net/dor/20.1001.1.23224347.1397.6.3.7.7
[10]       M. Chetan, P. P. Bhat, V. Shet, S. B. Husenbhai, and A. Bhat, "Audio Watermarking Using Modified Least Significant Bit Technique,"  International Conference on Circuits, Controls and Communications (CCUBE), 2021,  
                doi: 10.1109/CCUBE53681.2021.9702715. 
[11]       R. K. Singh, D. K. Shaw, and M. J. Alam, "Experimental Studies of LSB Watermarking with Different Noise," Procedia Computer Science, vol. 54, pp. 612-620, 2015.
               doi: https://doi.org/10.1016/j.procs.2015.06.071.
[12]       S. Wang, W. Yuan, J. Wang, and M. Unoki, "Inaudible speech watermarking based on self-compensated echo-hiding and sparse subspace clustering," International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019.
[13]       D. Gruhl, A. Lu, and W. Bender, "Echo hiding,"  International Workshop on Information Hiding, 1996.
                https://doi.org/10.1007/3-540-61996-8_48.
[14]       M. Fahad Khan, F. Baig, and S. Beg, "Steganography between Silence Intervals of Audio in Video Content Using Chaotic Maps," Circuits, Systems, and Signal Processing, vol. 33, pp. 3901-3919, 2016. https://doi.org/10.1007/s00034-014-9830-5
[15]       M. H. Shirali-Shahreza and S. Shirali-Shahreza, "Real-time and MPEG-1 layer III compression resistant steganography in speech," IET Information security, vol. 4, pp. 1-7, 2010.
[16]       Y. Xiang, I. Natgunanathan, S. Guo, W. Zhou, and S. Nahavandi, ""Patchwork-based audio watermarking method robust to de-synchronization attacks," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, pp. 1413-1423, 2014.
[17]       N. K. Kalantari, M. A. Akhaee, S. M. Ahadi, and H. Amindavar, "Robust multiplicative patchwork method for audio watermarking," IEEE Transactions on Audio, speech, and language processing, vol. 17, pp. 1133-1141, 2009.
[18]       P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th annual symposium on foundations of computer science, 1994.  
[19]       P. Benioff, "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines," Journal of statistical physics, vol. 22,  pp. 563-591, 1980. https://doi.org/10.1007/BF01011339
[20]       R. P. Feynman, "Simulating physics with computers," International Journal of Theoretical Physics, vol. 21, pp. 467-488, 1982.
[21]       J. Wang, "QRDA: quantum representation of digital audio," International Journal of Theoretical Physics, vol. 55, pp. 1622-1641, 2016. https://doi.org/10.1007/s10773-015-2800-2
[22]       F. Yan, A. M. Iliyasu, Y. Guo, and H. Yang, "Flexible representation and manipulation of audio signals on quantum computers," Theoretical Computer Science, vol.752,  pp. 71-85, 2018. https://doi.org/10.1016/j.tcs.2017.12.025
[23]       P. Li, B. Wang, H. Xiao, and X. Liu, "Quantum Representation and Basic Operations of Digital Signals," International Journal of Theoretical Physics, vol. 57,  pp. 3242-3270, 2018. https://doi.org/10.1007/s10773-018-3841-0
[24]       K. Chen, F. Yan, A. M. Iliyasu, and J. Zhao, "Dual quantum audio watermarking schemes based on quantum discrete cosine transform," International Journal of Theoretical Physics, vol. 58, pp. 502-521, 2019. https://doi.org/10.1007/s10773-018-3950-9
[25]       Z.-G. Qu, H.-X. He, and T. Li, "Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio," Chinese Physics B, vol. 27, pp. 010306, 2018.
[26]       M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "An LSB-based quantum audio watermarking using MSB as arbiter," International Journal of Theoretical Physics, vol. 58, pp. 3828-3851, 2019.
                https://doi.org/10.1007/s10773-019-04251-z
[27]       M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "An enhanced LSB-based quantum audio watermarking scheme for nano communication networks," Multimedia Tools and Applications, vol. 79, pp. 26489-26515, 2020.
                https://doi.org/10.1007/s11042-020-09326-2
[28]       M. Y. Nejad, M. Mosleh, and S. R. Heikalabad, "A blind quantum audio watermarking based on quantum discrete cosine transform," Journal of Information Security and Applications, vol. 55, pp. 102495, 2020.
                https://doi.org/10.1016/j.jisa.2020.102495
[29]       M. Velayatipour, M. Mosleh, M. Y. Nejad, and M. Kheyrandish, "Quantum reversible circuits for audio watermarking based on echo hiding technique," Quantum Information Processing, vol. 21, pp. 316, 2022.
                https://doi.org/10.1007/s11128-022-03657-9
[30]       K. Chen, F. Yan, A. M. Iliyasu, and J. Zhao, "Exploring the implementation of steganography protocols on quantum audio signals," International Journal of Theoretical Physics, vol. 57, pp. 476-494, 2018. https://doi.org/10.1007/s10773-017-3580-7
[31]       A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, "A novel image steganography technique based on quantum substitution boxes," Optics & Laser Technology, vol. 116, pp. 92-102, 2019.
                https://doi.org/10.1016/j.optlastec.2019.03.005
[32]       J. Chaharlang, M. Mosleh, and S. R. Heikalabad, "A novel quantum audio steganography–steganalysis approach using LSFQ-based embedding and QKNN-based classifier," Circuits, Systems, and Signal Processing, vol. 39, pp. 1-33, 2020.
                https://doi.org/10.1007/s00034-020-01345-6
[33]       S. Norouzi Larki, M. Mosleh, and M. Kheyrandish, "Quantum Audio Steganalysis Based on Quantum Fourier Transform and Deutsch–Jozsa Algorithm," Circuits, Systems, and Signal Processing, vol. 34, pp.2235-2258, 2023.
               doi: 10.1007/s00034-022-02208-y.
[34]       V. Vedral, A. Barenco, and A. Ekert, "Quantum networks for elementary arithmetic operations," Physical Review A, vol. 54, pp. 147, 1996.
                https://doi.org/10.48550/arXiv.quant-ph/9511018.
[35]       D. Wang, Z.-H. Liu, W.-N. Zhu, and S.-Z. Li, "Design of quantum comparator based on extended general Toffoli gates with multiple targets," Computer Science, vol. 39, pp. 302-306, 2012.
[36]       M. N. Divshali, A. Rezai, and A. Karimi, "Towards multilayer QCA SISO shift register based on efficient D-FF circuits," International Journal of Theoretical Physics, vol. 57, pp. 3326-3339, 2018.
               https://doi.org/10.1007/s10773-018-3846-8
Volume 12, Issue 1 - Serial Number 45
No. 45, Spring 2024
June 2024
Pages 59-76
  • Receive Date: 25 December 2023
  • Revise Date: 15 April 2024
  • Accept Date: 05 May 2024
  • Publish Date: 02 June 2024