{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T11:03:02Z","timestamp":1726484582674},"reference-count":36,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001700","name":"Ministry of Education, Culture, Sports, Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001700","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1016\/j.ins.2011.09.028","type":"journal-article","created":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T02:49:51Z","timestamp":1317350991000},"page":"126-149","source":"Crossref","is-referenced-by-count":190,"title":["Watermarking and authentication of quantum images based on restricted geometric transformations"],"prefix":"10.1016","volume":"186","author":[{"given":"Abdullah M.","family":"Iliyasu","sequence":"first","affiliation":[]},{"given":"Phuc Q.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Fangyan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Hirota","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2011.09.028_b0005","doi-asserted-by":"crossref","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","article-title":"Elementary gates for quantum computation","volume":"52","author":"Barenco","year":"1995","journal-title":"Phys. Rev. A"},{"key":"10.1016\/j.ins.2011.09.028_b0010","unstructured":"G. Beach, C. Lomont, C. Cohen, Quantum image processing (quip), in: Proceedings of Applied Imagery Pattern Recognition Workshop, 2003, pp. 39\u201344."},{"key":"10.1016\/j.ins.2011.09.028_b0015","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1038\/35005001","article-title":"Quantum information and computation","volume":"404","author":"Bennett","year":"2000","journal-title":"Nature"},{"key":"10.1016\/j.ins.2011.09.028_b0020","doi-asserted-by":"crossref","unstructured":"S. Caraiman, V.I. Manta, New applications of quantum algorithms to computer graphics: the quantum random sample consensus algorithm, in: Proceedings of the 6th ACM Conference on Computing Frontier, 2009, pp. 81\u201388.","DOI":"10.1145\/1531743.1531757"},{"key":"10.1016\/j.ins.2011.09.028_b0025","doi-asserted-by":"crossref","first-page":"2286","DOI":"10.1016\/j.ins.2010.01.034","article-title":"A high payload frequency-based reversible image hiding method","volume":"188","author":"Chang","year":"2010","journal-title":"Information Sciences"},{"issue":"12","key":"10.1016\/j.ins.2011.09.028_b0030","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.ins.2011.09.028_b0035","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1117\/12.506669","article-title":"Towards quantum template matching","volume":"5161","author":"Curtis","year":"2004","journal-title":"Proceedings of the SPIE"},{"key":"10.1016\/j.ins.2011.09.028_b0040","first-page":"10","article-title":"Quantum wavelet transform: fast algorithm and complete circuits","volume":"1509","author":"Fijany","year":"1999","journal-title":"LNCS"},{"issue":"2","key":"10.1016\/j.ins.2011.09.028_b0045","first-page":"13","article-title":"Hiding data in a QImage file","volume":"4","author":"Gabriella","year":"2005","journal-title":"International Journal of Multimedia and Ubiquitous Engineering (IJMUE)"},{"year":"2008","series-title":"Quantum Error Correction and Fault Tolerant Quantum Computing","author":"Gaitan","key":"10.1016\/j.ins.2011.09.028_b0050"},{"issue":"4531","key":"10.1016\/j.ins.2011.09.028_b0055","doi-asserted-by":"crossref","first-page":"4531","DOI":"10.1063\/1.1495073","article-title":"Hiding messages in quantum data","volume":"43","author":"Gea-Banacloche","year":"2002","journal-title":"Journal of Mathematical Physics"},{"key":"10.1016\/j.ins.2011.09.028_b0060","doi-asserted-by":"crossref","unstructured":"L. Grover, A fast quantum mechanical algorithm for database search, in: Proceedings of the 28th Annual ACM Symposium on the Theory of Computing (STOC 1996), 1996, pp. 212\u2013219.","DOI":"10.1145\/237814.237866"},{"key":"10.1016\/j.ins.2011.09.028_b0065","first-page":"134","article-title":"An image watermarking tutorial tool using Matlab","volume":"7075","author":"Heylen","year":"2008","journal-title":"Proceedings of the SPIE"},{"key":"10.1016\/j.ins.2011.09.028_b0070","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.ins.2008.10.035","article-title":"Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes","volume":"179","author":"Huang","year":"2009","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2011.09.028_b0075","unstructured":"A.M. Iliyasu, P.Q. Le, F. Dong, K. Hirota, Restricted geometric transformations and their applications for quantum image watermarking and authentication, in: Proceedings of the 10th Asian Conference on Quantum Information Science (AQIS 2010), 2010, pp. 212\u2013214."},{"issue":"6","key":"10.1016\/j.ins.2011.09.028_b0080","doi-asserted-by":"crossref","DOI":"10.1142\/S0219749911008015","article-title":"A framework for representing and producing movies on quantum computers","volume":"9","author":"Iliyasu","year":"2011","journal-title":"International Journal of Quantum Information"},{"key":"10.1016\/j.ins.2011.09.028_b0085","unstructured":"J.R. Kim, Y.S. Moon, A robust wavelet-based digital watermarking using level-adaptive thresholding, in: Proceedings of the IEEE International Conference on Image Processing, \u2018ICIP 99\u2019, vol. 2, 1999, pp. 226\u2013230."},{"key":"10.1016\/j.ins.2011.09.028_b0090","unstructured":"A. Klappenecker, M. Rotteler, Discrete cosine transforms on quantum computers, in: Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis, 2001, pp. 464\u2013468."},{"key":"10.1016\/j.ins.2011.09.028_b0095","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/S0378-4371(98)00513-5","article-title":"Information is a physical entity","volume":"263","author":"Landauer","year":"1999","journal-title":"Physica A"},{"key":"10.1016\/j.ins.2011.09.028_b0100","article-title":"A flexible representation of quantum images for polynomial preparation, image compression and processing operations","author":"Le","year":"2010","journal-title":"Journal of Quantum Information Processing"},{"issue":"3","key":"10.1016\/j.ins.2011.09.028_b0105","first-page":"113","article-title":"Fast geometric transformations on quantum images","volume":"40","author":"Le","year":"2010","journal-title":"IAENG International Journal of Applied Mathematics"},{"key":"10.1016\/j.ins.2011.09.028_b0110","doi-asserted-by":"crossref","first-page":"1406","DOI":"10.1016\/j.tcs.2010.11.029","article-title":"Strategies for designing geometric transformations on quantum images","volume":"412","author":"Le","year":"2011","journal-title":"Theoretical Computer Science"},{"issue":"6","key":"10.1016\/j.ins.2011.09.028_b0115","doi-asserted-by":"crossref","first-page":"698","DOI":"10.20965\/jaciii.2011.p0698","volume":"15","author":"Le","year":"2011","journal-title":"Journal of Advanced Computational Intelligence and Intelligent Informatics (JACIII)"},{"issue":"1","key":"10.1016\/j.ins.2011.09.028_b0120","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.ins.2007.08.007","article-title":"Image complexity and feature mining for steganalysis of least significant bit stegnography","volume":"178","author":"Liu","year":"2008","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2011.09.028_b0125","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.ins.2010.09.022","article-title":"Reversible data hiding based on block median preservation","volume":"181","author":"Luo","year":"2011","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2011.09.028_b0130","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.ins.2010.09.029","article-title":"Perceptually adaptive spread transform image watermarking scheme using Hadamard transform","volume":"181","author":"Maity","year":"2011","journal-title":"Information Sciences"},{"issue":"3","key":"10.1016\/j.ins.2011.09.028_b0135","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TCAD.2007.911334","article-title":"Level compaction in quantum circuits","volume":"27","author":"Maslov","year":"2008","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"issue":"3","key":"10.1016\/j.ins.2011.09.028_b0140","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TCAD.2007.911334","article-title":"Quantum circuit simplification and level compaction","volume":"27","author":"Maslov","year":"2008","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"year":"2000","series-title":"Quantum Computation and Quantum Information","author":"Nielsen","key":"10.1016\/j.ins.2011.09.028_b0145"},{"key":"10.1016\/j.ins.2011.09.028_b0150","series-title":"Proceedings of 35th Annual Symposium Foundations of Computer Science","first-page":"124","article-title":"Algorithms for quantum computation: discrete logarithms and factoring","author":"Shor","year":"1994"},{"key":"10.1016\/j.ins.2011.09.028_b0155","unstructured":"C.C. Tseng, T.M. Hwang, Quantum circuit design of 8\u00d78 discrete cosine transforms using its fast computation on graph, ISCAS 2005, vol. I, 2005, pp. 828\u2013831."},{"key":"10.1016\/j.ins.2011.09.028_b0160","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1016\/j.ins.2009.03.014","article-title":"Prediction-based reversible data hiding","volume":"179","author":"Tseng","year":"2009","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2011.09.028_b0165","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-009-0123-z","article-title":"Processing images in entangled quantum systems","volume":"9","author":"Venegas-Andraca","year":"2010","journal-title":"Journal of Quantum Information Processing"},{"issue":"5886","key":"10.1016\/j.ins.2011.09.028_b0170","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","article-title":"A single quantum cannot be cloned","volume":"299","author":"Wooters","year":"1982","journal-title":"Nature"},{"key":"10.1016\/j.ins.2011.09.028_b0175","doi-asserted-by":"crossref","DOI":"10.1155\/2010\/851920","article-title":"Estimating watermarking capacity in Gray scale images based on image complexity","author":"Yaghmaee","year":"2010","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"10.1016\/j.ins.2011.09.028_b0180","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.patrec.2006.04.020","article-title":"Digital image watermarking capacity and detection error rate","volume":"28","author":"Zhang","year":"2008","journal-title":"Pattern Recognition Letters"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025511004853?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025511004853?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T19:32:17Z","timestamp":1617478337000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025511004853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["S0020025511004853"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2011.09.028","relation":{},"ISSN":["0020-0255"],"issn-type":[{"type":"print","value":"0020-0255"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}