{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:42:52Z","timestamp":1725914572499},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_13","type":"book-chapter","created":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:08:03Z","timestamp":1509311283000},"page":"143-152","source":"Crossref","is-referenced-by-count":0,"title":["The Categories of Quantum Information Hiding Protocol"],"prefix":"10.1007","author":[{"given":"Shujiang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Lianhai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guangqi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Han","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Lijuan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"13_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE Press, New York (2001)"},{"key":"13_CR2","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"ZJ Fu","year":"2016","unstructured":"Fu, Z.J., Ren, K., Shu, J.G., Sun, X.M., Huang, F.X.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546\u20132559 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"13_CR3","first-page":"108","volume":"13","author":"ZG Qu","year":"2016","unstructured":"Qu, Z.G., Keeney, J., Robitzsch, S., Zaman, F., Wang, X.J.: Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun. 13, 108\u2013116 (2016)","journal-title":"China Commun."},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Xue, Y., Jiang, J.M., Zhao, B.P., Ma, T.H.: A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft Comput. (2017) doi:\n10.1007\/s00500-017-2547-1","DOI":"10.1007\/s00500-017-2547-1"},{"key":"13_CR5","doi-asserted-by":"crossref","first-page":"5807","DOI":"10.1103\/PhysRevLett.86.5807","volume":"86","author":"BM Terhal","year":"2001","unstructured":"Terhal, B.M., DiVincenzo, D.P., Leung, D.W.: Hiding bits in Bell states. Phys. Rev. Lett. 86, 5807\u20135810 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"13_CR6","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/18.985948","volume":"48","author":"DP DiVincenzo","year":"2002","unstructured":"DiVincenzo, D.P., Hayden, P.A., Terhal, B.M.: Quantum data hiding. IEEE Trans. Inf. Theor. 48, 580\u2013599 (2002)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"13_CR7","doi-asserted-by":"crossref","first-page":"097905","DOI":"10.1103\/PhysRevLett.89.097905","volume":"89","author":"T Eggeling","year":"2002","unstructured":"Eggeling, T., Werner, R.F.: Hiding classical data in multipartite quantum states. Phys. Rev. Lett. 89, 097905 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"13_CR8","doi-asserted-by":"crossref","first-page":"044303","DOI":"10.1103\/PhysRevA.68.044303","volume":"68","author":"GC Guo","year":"2003","unstructured":"Guo, G.C., Guo, G.P.: Quantum data hiding with spontaneous parameter down-conversion. Phys. Rev. A 68, 044303 (2003)","journal-title":"Phys. Rev. A"},{"key":"13_CR9","doi-asserted-by":"crossref","first-page":"062339","DOI":"10.1103\/PhysRevA.71.062339","volume":"71","author":"P Hayden","year":"2005","unstructured":"Hayden, P., Leung, D., Smith, G.: Multiparty data hiding of quantum information. Phys. Rev. A 71, 062339 (2005)","journal-title":"Phys. Rev. A"},{"key":"13_CR10","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.physleta.2007.01.030","volume":"365","author":"I Chattopadhyay","year":"2007","unstructured":"Chattopadhyay, I., Sarkar, D.: Local indistinguishability and possibility of hiding cbits in activable bound entangled states. Phys. Lett. A 365, 273\u2013277 (2007)","journal-title":"Phys. Lett. A"},{"key":"13_CR11","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s00220-009-0890-5","volume":"291","author":"W Matthews","year":"2009","unstructured":"Matthews, W., Wehner, S., Winter, A.: Distinguishability of quantum states under restricted families of measurements with an application to quantum data hiding. Commun. Math. Phys. 291, 813\u2013843 (2009)","journal-title":"Commun. Math. Phys."},{"key":"13_CR12","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1088\/0253-6102\/57\/4\/10","volume":"57","author":"A Allati El","year":"2012","unstructured":"El Allati, A., Ould Medeni, M.B., Hassouni, Y.: Quantum steganography via Greenberger-Horne-Zeilinger GHZ4 state. Commun. Theor. Phys. 57, 577\u2013582 (2012)","journal-title":"Commun. Theor. Phys."},{"key":"13_CR13","doi-asserted-by":"crossref","first-page":"060307","DOI":"10.1088\/1674-1056\/22\/6\/060307","volume":"22","author":"SJ Xu","year":"2013","unstructured":"Xu, S.J., Chen, X.B., Niu, X.X., Yang, Y.X.: Steganalysis and improvement of a quantum steganography protocol via GHZ4 state. Chin. Phys. B 22, 060307 (2013)","journal-title":"Chin. Phys. B"},{"key":"13_CR14","doi-asserted-by":"crossref","first-page":"4531","DOI":"10.1063\/1.1495073","volume":"43","author":"J Gea-Banacloche","year":"2002","unstructured":"Gea-Banacloche, J.: Hiding messages in quantum data. J. Math. Phys. 43, 4531\u20134536 (2002)","journal-title":"J. Math. Phys."},{"key":"13_CR15","doi-asserted-by":"crossref","first-page":"022310","DOI":"10.1103\/PhysRevA.83.022310","volume":"83","author":"BA Shaw","year":"2011","unstructured":"Shaw, B.A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83, 022310 (2011)","journal-title":"Phys. Rev. A"},{"key":"13_CR16","unstructured":"Shaw, B.A., Brun, T.A.: Hiding quantum information in the perfect code. \narXiv:quant-ph\/1007.0793v2"},{"key":"13_CR17","first-page":"1793","volume":"8","author":"D Cao","year":"2011","unstructured":"Cao, D., Song, W.L.: A novel quantum steganography with optimal private-key scheme. J. Inf. Comput. Sci. 8, 1793\u20131800 (2011)","journal-title":"J. Inf. Comput. Sci."},{"key":"13_CR18","first-page":"2703","volume":"8","author":"D Cao","year":"2011","unstructured":"Cao, D., Song, W.L.: Multi-party quantum steganography with GHZ private-key. J. Inf. Comput. Sci. 8, 2703\u20132709 (2011)","journal-title":"J. Inf. Comput. Sci."},{"key":"13_CR19","first-page":"52","volume":"30","author":"D Cao","year":"2012","unstructured":"Cao, D., Song, W.L.: Multi-party quantum covert communication with entanglement private-keys. J. Appl. Sci. Electron. Inf. Eng. 30, 52\u201358 (2012)","journal-title":"J. Appl. Sci. Electron. Inf. Eng."},{"key":"13_CR20","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1016\/j.physleta.2015.01.038","volume":"379","author":"T Mihara","year":"2015","unstructured":"Mihara, T.: Quantum steganography using prior entanglement. Phys. Lett. A 379, 952\u2013955 (2015)","journal-title":"Phys. Lett. A"},{"key":"13_CR21","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1134\/S0030400X12030046","volume":"112","author":"AM Basharov","year":"2012","unstructured":"Basharov, A.M., Gorbachev, V.N., Trubilko, A.I.: A quantum steganography protocol based on W class entangled states. Opt. Spectrosc. 112, 323\u2013326 (2012)","journal-title":"Opt. Spectrosc."},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-77370-2_3","volume-title":"Information Hiding","author":"K Martin","year":"2007","unstructured":"Martin, K.: Steganographic communication with quantum information. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 32\u201349. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-77370-2_3"},{"key":"13_CR23","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1016\/j.jss.2010.04.076","volume":"83","author":"X Liao","year":"2011","unstructured":"Liao, X., Wen, Q.Y., Sun, Y., Zhang, J.: Multi-party covert communication with steganography and quantum secret sharing. J. Syst. Softw. 83, 1801\u20131804 (2011)","journal-title":"J. Syst. Softw."},{"key":"13_CR24","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/s11128-012-0408-5","volume":"12","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Zhang, W.W., Wen, Q.Y., Chen, H.: Is quantum key distribution suitable for steganography? Quantum Inf. Process. 12, 625\u2013630 (2012)","journal-title":"Quantum Inf. Process."},{"key":"13_CR25","first-page":"28","volume":"282","author":"GP Collins","year":"2000","unstructured":"Collins, G.P.: Schrodinger\u2019s games: for quantum prisoners, there may be no dilemma. Sci. Am. 282, 28\u201329 (2000)","journal-title":"Sci. Am."},{"key":"13_CR26","doi-asserted-by":"crossref","first-page":"137902","DOI":"10.1103\/PhysRevLett.88.137902","volume":"88","author":"J Du","year":"2002","unstructured":"Du, J., Li, H., Xu, X., Shi, M., Wu, J., Zhou, X., Han, R.: Experimental realization of quantum games on a quantum computer. Phys. Rev. Lett. 88, 137902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"13_CR27","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/s11128-006-0012-7","volume":"5","author":"KY Chen","year":"2006","unstructured":"Chen, K.Y., Hogg, T.: How well do people play a quantum prisoner\u2019s dilemma. Quantum Inf. Process. 5, 43\u201367 (2006)","journal-title":"Quantum Inf. Process."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Mogos, G.: Stego quantum algorithm. In: International Symposium on Computer Science and its Applications, pp. 187\u2013190. IEEE Press, New York (2008)","DOI":"10.1109\/CSA.2008.24"},{"key":"13_CR29","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/j.measurement.2015.05.038","volume":"73","author":"S Wang","year":"2015","unstructured":"Wang, S., Sang, J., Song, X.H., Niu, X.M.: Least significant qubit (LSQb) information hiding algorithm for quantum image. Measurement 73, 352\u2013359 (2015)","journal-title":"Measurement"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/978-3-319-48674-1_35","volume-title":"Cloud Computing and Security","author":"Z Qu","year":"2016","unstructured":"Qu, Z., He, H., Ma, S.: A novel self-adaptive quantum steganography based on quantum image and quantum watermark. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10040, pp. 394\u2013403. Springer, Cham (2016). doi:\n10.1007\/978-3-319-48674-1_35"},{"key":"13_CR31","doi-asserted-by":"crossref","first-page":"4441","DOI":"10.1007\/s11128-016-1411-z","volume":"15","author":"JZ Sang","year":"2016","unstructured":"Sang, J.Z., Wang, S., Li, Q.: Least significant qubit algorithm for quantum images. Quantum Inf. Process. 15, 4441\u20134460 (2016)","journal-title":"Quantum Inf. Process."},{"key":"13_CR32","doi-asserted-by":"crossref","first-page":"10","DOI":"10.4236\/jqis.2012.21003","volume":"2","author":"T Mihara","year":"2012","unstructured":"Mihara, T.: Quantum steganography embedded any secret text without changing the content of cover data. J. Quantum Inf. Sci. 2, 10\u201314 (2012)","journal-title":"J. Quantum Inf. Sci."},{"key":"13_CR33","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1007\/s10773-014-2478-x","volume":"54","author":"ZH Wei","year":"2015","unstructured":"Wei, Z.H., Chen, X.B., Niu, X.X., Yang, Y.X.: The quantum steganography protocol via quantum noisy channels. Int. J. Theor. Phys. 54, 2505\u20132515 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR34","doi-asserted-by":"crossref","first-page":"1350068","DOI":"10.1142\/S0219749913500688","volume":"11","author":"ZH Wei","year":"2013","unstructured":"Wei, Z.H., Chen, X.B., Niu, X.X., Yang, Y.X.: A novel quantum steganography protocol based on probability measurements. Int. J. Quantum Inf. 11, 1350068 (2013)","journal-title":"Int. J. Quantum Inf."},{"key":"13_CR35","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1007\/s10773-014-2294-3","volume":"54","author":"N Jiang","year":"2015","unstructured":"Jiang, N., Wang, L.: A novel strategy for quantum image steganography based on Moire Pattern. Int. J. Theor. Phys. 54, 1021\u20131032 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR36","doi-asserted-by":"crossref","first-page":"4782","DOI":"10.1016\/j.optcom.2010.06.083","volume":"283","author":"ZG Qu","year":"2010","unstructured":"Qu, Z.G., Chen, X.B., Zhou, X.J., Niu, X.X., Yang, Y.X.: Novel quantum steganography with large payload. Opt. Commun. 283, 4782\u20134786 (2010)","journal-title":"Opt. Commun."},{"key":"13_CR37","doi-asserted-by":"crossref","first-page":"2075","DOI":"10.1016\/j.optcom.2010.12.031","volume":"284","author":"ZG Qu","year":"2011","unstructured":"Qu, Z.G., Chen, X.B., Luo, M.X., Niu, X.X., Yang, Y.X.: Quantum steganography with large payload based on entanglement swapping of \u03c7-type entangled states. Opt. Commun. 284, 2075\u20132082 (2011)","journal-title":"Opt. Commun."},{"key":"13_CR38","doi-asserted-by":"crossref","first-page":"050309","DOI":"10.1088\/1674-1056\/22\/5\/050309","volume":"22","author":"TY Ye","year":"2013","unstructured":"Ye, T.Y., Jiang, L.Z.: Quantum steganography with large payload based on dense coding and entanglement swapping of Greenberger-Horne-Zeilinger states. Chin. Phys. B 22, 050309 (2013)","journal-title":"Chin. Phys. B"},{"key":"13_CR39","doi-asserted-by":"crossref","first-page":"040305","DOI":"10.1088\/1674-1056\/22\/4\/040305","volume":"22","author":"TY Ye","year":"2013","unstructured":"Ye, T.Y., Jiang, L.Z.: Large payload quantum steganography based on cavity quantum electrodynamics. Chin. Phys. B 22, 040305 (2013)","journal-title":"Chin. Phys. B"},{"key":"13_CR40","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1088\/0253-6102\/59\/5\/05","volume":"59","author":"SJ Xu","year":"2013","unstructured":"Xu, S.J., Chen, X.B., Niu, X.X., Yang, Y.X.: A novel quantum covert channel protocol based on any quantum secure direct communication scheme. Commun. Theor. Phys. 59, 547\u2013553 (2013)","journal-title":"Commun. Theor. Phys."},{"key":"13_CR41","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1007\/s11433-013-5151-0","volume":"56","author":"SJ Xu","year":"2013","unstructured":"Xu, S.J., Chen, X.B., Niu, X.X., Yang, Y.X.: High-efficiency Quantum Steganography Based on the Tensor Product of Bell States. Sci. China Phys. Mech. Astron. 56, 1745\u20131754 (2013)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"13_CR42","unstructured":"Worley III, G.G.: Quantum watermarking by frequency of error when observing qubits in dissimilar bases. \narXiv:quant-ph\/0401041v2"},{"key":"13_CR43","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1007\/s10773-012-1087-9","volume":"51","author":"N Fatahi","year":"2012","unstructured":"Fatahi, N., Naseri, M.: Quantum watermarking using entanglement swapping. Int. J. Theor. Phys. 51, 2094\u20132100 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR44","doi-asserted-by":"crossref","first-page":"3813","DOI":"10.1007\/s10773-013-1687-z","volume":"52","author":"J Mo","year":"2013","unstructured":"Mo, J., Ma, Z.F., Yang, Y.X., Niu, X.X.: A quantum watermarking protocol based on Bell dual basis. Int. J. Theor. Phys. 52, 3813\u20133819 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR45","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ins.2011.09.028","volume":"186","author":"M Iliyasu","year":"2012","unstructured":"Iliyasu, M., Le, P.Q., Dong, F., Hirota, K.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186, 126\u2013149 (2012)","journal-title":"Inf. Sci."},{"key":"13_CR46","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1007\/s10773-012-1354-9","volume":"52","author":"WW Zhang","year":"2013","unstructured":"Zhang, W.W., Gao, F., Liu, B., Jia, H.Y., Wen, Q.Y., Chen, H.: A quantum watermark protocol. Int. J. Theor. Phys. 52, 504\u2013513 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR47","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s11128-012-0423-6","volume":"12","author":"WW Zhang","year":"2013","unstructured":"Zhang, W.W., Gao, F., Liu, B., Wen, Q.Y., Chen, H.: A watermark strategy for quantum images based on quantum fourier transform. Quantum Inf. Process. 12, 793\u2013803 (2013)","journal-title":"Quantum Inf. Process."},{"key":"13_CR48","doi-asserted-by":"crossref","first-page":"2765","DOI":"10.1007\/s11128-013-0561-5","volume":"12","author":"YG Yang","year":"2013","unstructured":"Yang, Y.G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12, 2765\u20132769 (2013)","journal-title":"Quantum Inf. Process."},{"key":"13_CR49","doi-asserted-by":"crossref","first-page":"3689","DOI":"10.1007\/s11128-013-0629-2","volume":"12","author":"XH Song","year":"2013","unstructured":"Song, X.H., Wang, S., Liu, S., El-Latif, A.A.A., Niu, X.M.: A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12, 3689\u20133706 (2013)","journal-title":"Quantum Inf. Process."},{"key":"13_CR50","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1007\/s00530-014-0355-3","volume":"20","author":"XH Song","year":"2014","unstructured":"Song, X.H., Wang, S., Liu, S., El-Latif, A.A.A., Niu, X.M.: Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Syst. 20, 379\u2013388 (2014)","journal-title":"Multimedia Syst."},{"key":"13_CR51","doi-asserted-by":"crossref","first-page":"1931","DOI":"10.1007\/s11128-014-0783-1","volume":"13","author":"YG Yang","year":"2014","unstructured":"Yang, Y.G., Xu, P., Tian, J., Zhang, H.: Analysis and improvement of the dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 13, 1931\u20131936 (2014)","journal-title":"Quantum Inf. Process."},{"key":"13_CR52","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1049\/cje.2015.04.016","volume":"24","author":"S Wang","year":"2015","unstructured":"Wang, S., Song, X.H., Niu, X.M.: Quantum cosine transform based watermarking scheme for quantum images. Chin. J. Electron. 24, 321\u2013325 (2015)","journal-title":"Chin. J. Electron."},{"key":"13_CR53","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1088\/0253-6102\/66\/1\/066","volume":"66","author":"ZH Wei","year":"2016","unstructured":"Wei, Z.H., Chen, X.B., Xu, S.J., Niu, X.X., Yang, Y.X.: A spatial domain quantum watermarking scheme. Commun. Theor. Phys. 66, 66\u201376 (2016)","journal-title":"Commun. Theor. Phys."},{"key":"13_CR54","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1007\/s11128-014-0912-x","volume":"14","author":"F Yan","year":"2015","unstructured":"Yan, F., Iliyasu, A.M., Sun, B., Venegas-Andraca, S.E., Dong, F.Y., Hirota, K.: A duple watermarking strategy for multi-channel quantum images. Quantum Inf. Process. 14, 1675\u20131692 (2015)","journal-title":"Quantum Inf. Process."},{"key":"13_CR55","doi-asserted-by":"crossref","first-page":"4205","DOI":"10.1007\/s10773-016-3046-3","volume":"55","author":"S Heidari","year":"2016","unstructured":"Heidari, S., Naseri, M.: A novel LSB based quantum watermarking. Int. J. Theor. Phys. 55, 4205\u20134218 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"13_CR56","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1007\/s11128-016-1260-9","volume":"15","author":"S Miyake","year":"2016","unstructured":"Miyake, S., Nakamae, K.: A quantum watermarking scheme using simple and small-scale quantum circuits. Quantum Inf. Process. 15, 1849\u20131864 (2016)","journal-title":"Quantum Inf. Process."},{"key":"13_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-015-1195-6","volume":"15","author":"P Li","year":"2016","unstructured":"Li, P., Xiao, H., Li, B.: Quantum representation and watermark strategy for color images based on the controlled rotation of qubits. Quantum Inf. Proc. 15, 1\u201326 (2016)","journal-title":"Quantum Inf. Proc."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:14:03Z","timestamp":1509311643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}