期刊文献+

Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment 被引量:7

下载PDF
导出
摘要 In the field of quantum communication,quantum steganography is an important branch of quantum information hiding.In a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safety and reliability of the quantum steganographic system.Therefore,it is very important to analyze the influence of noise on the quantum steganography protocol and how to reduce the effect of noise.This paper takes the quantum steganography protocol proposed in 2010 as an example to analyze the effects of noises on information qubits and secret message qubits in the four primary quantum noise environments.The results show that when the noise factor of one quantum channel noise is known,the size of the noise factor of the other quantum channel can be adjusted accordingly,such as artificially applying noise,so that the influence of noises on the protocol is minimized.In addition,this paper also proposes a method of improving the efficiency of the steganographic protocol in a noisy environment.
出处 《Computers, Materials & Continua》 SCIE EI 2019年第5期607-624,共18页 计算机、材料和连续体(英文)
基金 This work was supported by the National Natural Science Foundation of China(Nos.61373131,61303039,61232016,61501247) the Six Talent Peaks Project of Jiangsu Province(Grant No.2015-XXRJ-013) Natural Science Foundation of Jiangsu Province(Grant No.BK20171458) the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province(China under Grant No.16KJB520030) Sichuan Youth Science and Technique Foundation(No.2017JQ0048) NUIST Research Foundation for Talented Scholars(2015r014),PAPD and CICAEET funds.
  • 相关文献

参考文献2

二级参考文献27

  • 1Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, "Achieving Efficient Cloud Search Services: MultJ-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing," IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015. 被引量:1
  • 2S. D. Xie, Y. X. Wang, "Construction of Tree Net- work with Limited Delivery Latency in Homoge- neous Wireless Sensor Networks," Wireless Per- sonal Communications, 2014, 78(1): 231-246. 被引量:1
  • 3R Guo, J. Wang, B. Li, S. Y. Lee, "A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks," Journal of Internet Technology, 2014, 15(6): 929-936. 被引量:1
  • 4T. H. Ma, J. J. Zhou, M. L. Tang, Y. Tian, A. AL- DHELAAN, M. AL-RODHAAN, and S. Y. LEE, "So- cial network and tag sources based augment- ing collaborative recommender system," IEICE transactions on Information and Systems, vol. E98-D, no.4, pp. 902-910, Apr. 2015. 被引量:1
  • 5B. Gu, V. S. Sheng, K. Y. Tay, W. Romano, and S. Li, "Incremental Support Vector Learning for Ordinal Regression," IEEE Transactions on Neu- ral Networks and Learning Systems, 2014, 26(7): 1403-1416. 被引量:1
  • 6Dublin City University and Ericsson, E-Stream Project, 2014. http://www.estream-project.com. 被引量:1
  • 7G. S. Manku and R. Motwani, "Approximate Fre- quency Counts over Data Streams" In: Proceed- ings of the 28th International Conference on Very Large Databases (VLDB Endowment 2002), pp. 346-57, 2002. 被引量:1
  • 8J. H. Chang and W. S. Lee, "Finding Recent Fre- quent Itemsets Adaptively over Online Data Streams," In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (SlGKDD 2003), pp. 487-492, 2003. 被引量:1
  • 9H. F. Li and H. Chen, "Mining Non-Derivable Frequent Item Sets over Data Stream," Data & Knowledge Engineering, vol. 68, no. 5, May 2009, pp. 481-498. 被引量:1
  • 10S. K. Tanbeer, C. F. Ahmed, B. S. Jeong and Y. K. Lee, "Efficient Single-Pass Frequent Pattern Mining Using a Prefix-tree/' Information Scienc- es, 2008, 179(5): 559-583. 被引量:1

共引文献7

同被引文献16

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部