{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T11:26:53Z","timestamp":1748950013773},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319483078"},{"type":"electronic","value":"9783319483085"}],"license":[{"start":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T00:00:00Z","timestamp":1476748800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-48308-5_33","type":"book-chapter","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T16:54:37Z","timestamp":1480438477000},"page":"342-352","source":"Crossref","is-referenced-by-count":14,"title":["New Quantum Image Steganography Scheme with Hadamard Transformation"],"prefix":"10.1007","author":[{"given":"Bassem","family":"Abd-El-Atty","sequence":"first","affiliation":[]},{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,18]]},"reference":[{"key":"33_CR1","unstructured":"Tseng, C.C., Hwang, T.M.: Quantum digital image processing algorithms. In: 16th IPPR Conference on Computer Vision. Graphics and Image Processing. Kinmen, ROC, pp. 827\u2013834 (2003)"},{"key":"33_CR2","first-page":"1745","volume":"56","author":"SJ Xu","year":"2013","unstructured":"Xu, S.J., Chen, X.B., Niu, X.X., Yang, X.Y.: High-efficiency quantum steganography based on the tensor product of Bell states. Sci. China 56, 1745\u20131754 (2013)","journal-title":"Sci. China"},{"key":"33_CR3","doi-asserted-by":"crossref","first-page":"060307","DOI":"10.1088\/1674-1056\/22\/6\/060307","volume":"22","author":"XS Jiang","year":"2013","unstructured":"Jiang, X.S., Bo, C.X., Xin, N.X., Xian, Y.Y.: Steganalysis and improvement of a quantum steganography protocol via a GHZ4 state. Chin. Phys. B 22, 060307 (2013)","journal-title":"Chin. Phys. B"},{"key":"33_CR4","doi-asserted-by":"crossref","first-page":"5807","DOI":"10.1103\/PhysRevLett.86.5807","volume":"86","author":"BM Terhal","year":"2001","unstructured":"Terhal, B.M., DiVincenzo, D.P., Leung, D.W.: Hiding bits in Bell states. Phys. Rev. Lett. 86, 5807\u20135810 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"33_CR5","doi-asserted-by":"crossref","first-page":"097905","DOI":"10.1103\/PhysRevLett.89.097905","volume":"89","author":"T Eggeling","year":"2002","unstructured":"Eggeling, T., Werner, R.F.: Hiding classical data in multipartite quantum states. Phys. Rev. Lett. 89, 097905 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"33_CR6","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/18.985948","volume":"48","author":"DP DiVincenzo","year":"2002","unstructured":"DiVincenzo, D.P., Leung, D.W., Terhal, B.M.: Quantum data hiding. IEEE Trans. Inf. Theory 48, 580\u2013598 (2002)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"33_CR7","doi-asserted-by":"crossref","first-page":"062339","DOI":"10.1103\/PhysRevA.71.062339","volume":"71","author":"P Hayden","year":"2005","unstructured":"Hayden, P., Leung, D., Smith, G.: Multiparty data hiding of quantum information. Phys. Rev. A 71, 062339 (2005)","journal-title":"Phys. Rev. A"},{"key":"33_CR8","doi-asserted-by":"crossref","first-page":"044303","DOI":"10.1103\/PhysRevA.68.044303","volume":"68","author":"GC Guo","year":"2003","unstructured":"Guo, G.C., Guo, G.P.: Quantum data hiding with spontaneous parameter down conversion. Phys. Rev. A 68, 044303 (2003)","journal-title":"Phys. Rev. A"},{"key":"33_CR9","first-page":"273","volume":"365","author":"I Chattopadhyay","year":"2007","unstructured":"Chattopadhyay, I., Sarkar, D.: Local indistinguishability and possibility of hiding cbits in activable bound entangled states. Phys. Rev. A 365, 273\u2013277 (2007)","journal-title":"Phys. Rev. A"},{"key":"33_CR10","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s00220-009-0890-5","volume":"291","author":"W Matthews","year":"2009","unstructured":"Matthews, W., Wehner, S., Winter, A.: Distinguishability of quantum states under restricted families of measurements with an application to quantum data hiding. J. Commun. Math. Phys. 291, 813\u2013843 (2009)","journal-title":"J. Commun. Math. Phys."},{"key":"33_CR11","doi-asserted-by":"crossref","first-page":"4531","DOI":"10.1063\/1.1495073","volume":"43","author":"JG Banacloche","year":"2002","unstructured":"Banacloche, J.G.: Hiding messages in quantum data. J. Math. Phys. 43, 4531 (2002)","journal-title":"J. Math. Phys."},{"key":"33_CR12","doi-asserted-by":"crossref","first-page":"022310","DOI":"10.1103\/PhysRevA.83.022310","volume":"83","author":"A ShawB","year":"2011","unstructured":"ShawB, A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83, 022310 (2011)","journal-title":"Phys. Rev. A"},{"key":"33_CR13","first-page":"757","volume":"6","author":"D Zhang","year":"2007","unstructured":"Zhang, D., Li, X.: A quantum information hiding scheme using orthogonal product states. WSEAS Trans. Comput. 6, 757\u2013762 (2007)","journal-title":"WSEAS Trans. Comput."},{"key":"33_CR14","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1016\/j.jss.2010.04.076","volume":"83","author":"X Liao","year":"2010","unstructured":"Liao, X., Wen, Q., Sun, Y., Zhang, J.: Multi-party covert communication with steganography and quantum secret sharing. J. Syst. Softw. 83, 1801\u20131804 (2010)","journal-title":"J. Syst. Softw."},{"key":"33_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-009-0123-z","volume":"9","author":"SE Venegas-Andraca","year":"2010","unstructured":"Venegas-Andraca, S.E., Ball, J.L.: Processing images in entangled quantum systems. Quantum Inf. Process. 9, 1\u201311 (2010)","journal-title":"Quantum Inf. Process."},{"key":"33_CR16","unstructured":"Latorre, J.I.: Image compression and entanglement. arXiv: quant-ph\/, 0510031 (2005)"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Sun, B., Le, P.Q., Iliyasu, A.M., Yan, F., Garcia, J.A., Dong, F., Hirota, K.: A multi-channel representation for images on quantum computers using the RGB a color space. In: Proceedings of the IEEE 7th International Symposiumon Intelligent Signal Processing, pp. 1\u20136 (2011)","DOI":"10.1109\/WISP.2011.6051718"},{"key":"33_CR18","doi-asserted-by":"crossref","first-page":"3103","DOI":"10.1007\/s11128-013-0587-8","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Lu, K., Gao, Y., Xu, K.: A novel quantum representation for log polar images. Quantum Inf. Process. 12, 3103\u20133126 (2013)","journal-title":"Quantum Inf. Process."},{"key":"33_CR19","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","volume":"10","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression and processing operations. Quantum Inf. Process. 10, 63\u201384 (2011)","journal-title":"Quantum Inf. Process."},{"key":"33_CR20","doi-asserted-by":"crossref","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Lu, K., Gao, Y., Wang, M.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12, 2833\u20132860 (2013)","journal-title":"Quantum Inf. Process."},{"key":"33_CR21","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1007\/s10773-014-2245-z","volume":"54","author":"TX Hua","year":"2015","unstructured":"Hua, T.X., Chen, J.M., Pei, D.J., Zhang, W.Q., Zhou, N.R.: Quantum image encryption algorithm based on image correlation decomposition. Int. J. Theor. Phys. 54, 526\u2013537 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"33_CR22","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1007\/s11128-015-0926-z","volume":"14","author":"NR Zhou","year":"2015","unstructured":"Zhou, N.R., Hua, T.X., Gong, L.H., Pei, D.J., Liao, Q.H.: Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf. Process. 14, 1193\u20131213 (2015)","journal-title":"Quantum Inf. Process."},{"key":"33_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-016-1304-1","volume":"15","author":"HR Liang","year":"2016","unstructured":"Liang, H.R., Tao, X.Y., Zhou, N.R.: Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf. Process. 15, 1\u201324 (2016)","journal-title":"Quantum Inf. Process."},{"key":"33_CR24","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1007\/s10773-014-2294-3","volume":"54","author":"N Jiang","year":"2014","unstructured":"Jiang, N., Wang, L.: A novel strategy for quantum \u0131mage steganography based on Moir\u00b4e pattern. Int. J. Theor. Phys. 54, 1021\u20131032 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"33_CR25","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10773-015-2640-0","volume":"55","author":"N Jiang","year":"2015","unstructured":"Jiang, N., Zhao, N., Wang, L.: LSB based quantum \u0131mage steganography algorithm. Int. J. Theor. Phys. 55, 107\u2013123 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"33_CR26","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1007\/s11128-014-0841-8","volume":"14","author":"N Jiang","year":"2015","unstructured":"Jiang, N., Wang, L.: Quantum image scaling using nearest neighbor interpolation. Quantum Inf. Process. 14, 1559\u20131571 (2015)","journal-title":"Quantum Inf. Process."},{"key":"33_CR27","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/j.measurement.2015.05.038","volume":"73","author":"S Wang","year":"2015","unstructured":"Wang, S., Sang, J., Song, X., Niu, X.: Least significant qubit (LSQb) \u0131nformation hiding algorithm for quantum \u0131mage. Measurement 73, 352\u2013359 (2015)","journal-title":"Measurement"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48308-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:47:48Z","timestamp":1498351668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48308-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,18]]},"ISBN":["9783319483078","9783319483085"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48308-5_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,18]]}}}