{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T09:10:52Z","timestamp":1719047452167},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373131","61671087","61601358","61501247","61672290","61303039","61232016"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent Peaks Project in Jiangsu Province","doi-asserted-by":"publisher","award":["2015-XXRJ-013"],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20171458"],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["16KJB520030"],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012556","name":"Sichuan Youth Science and Technology Foundation","doi-asserted-by":"publisher","award":["2017JQ0048"],"id":[{"id":"10.13039\/100012556","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NUIST Research Foundation for Talented Scholars","award":["2015r014"]},{"DOI":"10.13039\/501100012246","name":"PAPD","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"crossref"}]},{"name":"CICAEET funds"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2909906","type":"journal-article","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T19:58:40Z","timestamp":1556135920000},"page":"50849-50857","source":"Crossref","is-referenced-by-count":26,"title":["Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5783-313X","authenticated-orcid":false,"given":"Zhiguo","family":"Qu","sequence":"first","affiliation":[]},{"given":"Zhengyan","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1409-252X","authenticated-orcid":false,"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Shengyao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"211","article-title":"Full-blind delegating private quantum computation","volume":"56","author":"liu","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-017-3553-x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2617332"},{"key":"ref32","first-page":"1","article-title":"A novel quantum image steganography algorithm based on exploiting modification direction","author":"qu","year":"2108","journal-title":"Multimedia Tools Appl"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2592325"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-1988-5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2048-x"},{"key":"ref36","first-page":"47","article-title":"A novel quantum stegonagraphy based on brown states","volume":"56","author":"qu","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6830-7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3159170"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-1098-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.commatsci.2018.04.023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1690-z"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0669-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.137902"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1463-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.485960"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-017-3512-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1759-8"},{"key":"ref23","first-page":"1","author":"latorre","year":"2005","journal-title":"Image Compression and Entanglement"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.06.083"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.044303"},{"key":"ref50","first-page":"1","article-title":"Assessing the similarity of quantum images based on probability measurements","author":"yan","year":"2012","journal-title":"Proc IEEE Congr Evol Comput"},{"key":"ref10","first-page":"1","article-title":"A fusion steganographic algorithm based on faster R-CNN","volume":"55","author":"meng","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3716-4"},{"key":"ref11","first-page":"59","article-title":"Defining embedding distortion for intra prediction mode-based video steganography","volume":"55","author":"nie","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.commatsci.2018.08.040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4236\/jqis.2012.21003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-014-2478-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-015-2640-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-009-0123-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-010-0177-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0567-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0587-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2379253"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-1021-1"},{"key":"ref6","first-page":"790","article-title":"Quantum secure direct communication","volume":"52","author":"deng","year":"2016","journal-title":"Journal of Beijing Normal University Natural Science"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/CC.2016.7559082","article-title":"Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks","volume":"13","author":"qu","year":"2016","journal-title":"China Commun"},{"key":"ref8","first-page":"197","article-title":"Coverless information hiding based on the molecular structure images of material","volume":"54","author":"cao","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-1202-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1694-8"},{"key":"ref9","first-page":"187","article-title":"High security identity tags using spiral resonators","volume":"52","author":"pradeep","year":"2016","journal-title":"Comput Mater Continua"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.04.076"},{"key":"ref45","first-page":"13","article-title":"Hiding data in a q-image file","volume":"4","author":"mogos","year":"2009","journal-title":"Int J Multimedia Ubiquitous Eng"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48674-1_35"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2015.05.038"},{"key":"ref42","first-page":"1","author":"iii","year":"2004","journal-title":"Quantum Watermarking by Frequency of Error when Observing Qubits in Dissimilar Bases"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1063\/1.1495073"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2008.24"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77370-2_3"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08684831.pdf?arnumber=8684831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:11Z","timestamp":1628624411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8684831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2909906","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}