Exploring the Implementation of Steganography Protocols on Quantum Audio Signals
- 133 Downloads
Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.
KeywordsQuantum computation Quantum information Quantum audio Audio steganography Least significant qubit
This work is supported by the National Natural Science Foundation of China (No. 61502053), the Science & Technology Development Program of Jilin Province, China (No. 20170520065JH), and it is sponsored by the Prince Sattam Bin Abdulaziz University, Saudi Arabia via the Deanship for Scientific Research funding granted to the CIIS Research Group project number 2016/01/6441.
- 2.Shor, P.: Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp. 124–134 (1994)Google Scholar
- 9.Yan, F., Guo, Y., Iliyasu, A., Yang, H: Flexible representation and manipulation of audio signals on quantum computers. arXiv:1701.01291 (2017)
- 11.Nosrati, M., Karimi, R., Hariri, M.: Audio steganography: A survey on recent approaches. World Appl. Program. 2(3), 202–205 (2012)Google Scholar
- 13.Cvejic, N, Seppanen, T.: Increasing robustness of lsb audio steganography using a novel embedding method. In: International conference on information technology: coding and computing, pp. 533–537 (2004)Google Scholar
- 16.Le, P., Iliyasu, A., Dong, F., Hirota, K.: A flexible representation and invertible transformations for images on quantum computers. Adv. Intell. Signal Process. Stud. Comput. Intell. 372, 179–202 (2011)Google Scholar