{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T00:03:00Z","timestamp":1768694580251,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:00:00Z","timestamp":1578528000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:00:00Z","timestamp":1578528000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s00034-020-01345-6","type":"journal-article","created":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T07:11:56Z","timestamp":1578553916000},"page":"3925-3957","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Novel Quantum Audio Steganography\u2013Steganalysis Approach Using LSFQ-Based Embedding and QKNN-Based Classifier"],"prefix":"10.1007","volume":"39","author":[{"given":"Javad","family":"Chaharlang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0991-1623","authenticated-orcid":false,"given":"Mohammad","family":"Mosleh","sequence":"additional","affiliation":[]},{"given":"Saeed","family":"Rasouli Heikalabad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,9]]},"reference":[{"issue":"2","key":"1345_CR1","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10994-012-5316-5","volume":"90","author":"E A\u00efmeur","year":"2013","unstructured":"E. A\u00efmeur, G. Brassard, S. Gambs, Quantum speed-up for unsupervised learning. Mach. Learn. 90(2), 261\u2013287 (2013)","journal-title":"Mach. Learn."},{"issue":"23","key":"1345_CR2","doi-asserted-by":"publisher","first-page":"31487","DOI":"10.1007\/s11042-018-6213-0","volume":"77","author":"AH Ali","year":"2018","unstructured":"A.H. Ali, L.E. George, A. Zaidan, M.R. Mokhtar, High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl. 77(23), 31487\u201331516 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1345_CR3","volume-title":"Number Theory","author":"GE Andrews","year":"1994","unstructured":"G.E. Andrews, Number Theory (Courier Corporation, North Chelmsford, 1994)"},{"issue":"3","key":"1345_CR4","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1179\/136821904225020249","volume":"52","author":"K Bailey","year":"2004","unstructured":"K. Bailey, K. Curran, J. Condell, Evaluation of pixel-based steganography and stegodetection methods. Imaging Sci. J. 52(3), 131\u2013150 (2004)","journal-title":"Imaging Sci. J."},{"issue":"7671","key":"1345_CR5","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nature23474","volume":"549","author":"J Biamonte","year":"2017","unstructured":"J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe, S. Lloyd, Quantum machine learning. Nature 549(7671), 195 (2017)","journal-title":"Nature"},{"key":"1345_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14313-7","volume-title":"Advanced Statistical Steganalysis","author":"R B\u00f6hme","year":"2010","unstructured":"R. B\u00f6hme, Advanced Statistical Steganalysis (Springer, Cham, 2010)"},{"key":"1345_CR7","doi-asserted-by":"crossref","unstructured":"R. Chandramouli, M. Kharrazi, N. Memon, Image steganography and steganalysis: concepts and practice. in International Workshop on Digital Watermarking (Springer, 2003), pp. 35\u201349","DOI":"10.1007\/978-3-540-24624-4_3"},{"issue":"2","key":"1345_CR8","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/s10773-017-3580-7","volume":"57","author":"K Chen","year":"2018","unstructured":"K. Chen, F. Yan, A.M. Iliyasu, J. Zhao, Exploring the implementation of steganography protocols on quantum audio signals. Int. J. Theor. Phys. 57(2), 476\u2013494 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"1345_CR9","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/s10773-018-3950-9","volume":"58","author":"K Chen","year":"2019","unstructured":"K. Chen, F. Yan, A.M. Iliyasu, J. Zhao, Dual quantum audio watermarking schemes based on quantum discrete cosine transform. Int. J. Theor. Phys. 58(2), 502\u2013521 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"1345_CR10","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1103\/PhysRevLett.50.631","volume":"50","author":"D Deutsch","year":"1983","unstructured":"D. Deutsch, Uncertainty in quantum measurements. Phys. Rev. Lett. 50(9), 631 (1983)","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"1345_CR11","doi-asserted-by":"publisher","first-page":"074001","DOI":"10.1088\/1361-6633\/aab406","volume":"81","author":"V Dunjko","year":"2018","unstructured":"V. Dunjko, H.J. Briegel, Machine learning & artificial intelligence in the quantum domain: a review of recent progress. Rep. Prog. Phys. 81(7), 074001 (2018)","journal-title":"Rep. Prog. Phys."},{"issue":"13","key":"1345_CR12","doi-asserted-by":"publisher","first-page":"130501","DOI":"10.1103\/PhysRevLett.117.130501","volume":"117","author":"V Dunjko","year":"2016","unstructured":"V. Dunjko, J.M. Taylor, H.J. Briegel, Quantum-enhanced machine learning. Phys. Rev. Lett. 117(13), 130501 (2016)","journal-title":"Phys. Rev. Lett."},{"issue":"22","key":"1345_CR13","doi-asserted-by":"publisher","first-page":"24091","DOI":"10.1007\/s11042-016-4113-8","volume":"76","author":"SE El-Khamy","year":"2017","unstructured":"S.E. El-Khamy, N.O. Korany, M.H. El-Sherif, A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimed. Tools Appl. 76(22), 24091\u201324106 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"1345_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.optlastec.2019.03.005","volume":"116","author":"AAA EL-Latif","year":"2019","unstructured":"A.A.A. EL-Latif, B. Abd-El-Atty, S.E. Venegas-Andraca, A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 116, 92\u2013102 (2019)","journal-title":"Opt. Laser Technol."},{"issue":"05","key":"1345_CR15","doi-asserted-by":"publisher","first-page":"1750039","DOI":"10.1142\/S0219749917500393","volume":"15","author":"S Heidari","year":"2017","unstructured":"S. Heidari, M.R. Pourarian, R. Gheibi, M. Naseri, M. Houshmand, Quantum red\u2013green\u2013blue image steganography. Int. J. Quantum Inf. 15(05), 1750039 (2017)","journal-title":"Int. J. Quantum Inf."},{"key":"1345_CR16","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s10773-014-2294-3","volume":"54","author":"N Jiang","year":"2014","unstructured":"N. Jiang, L. Wang, A quantum image information hiding algorithm based on Moir\u00e9 pattern. Int. J. Theor. Phys. 54, 1021\u20131032 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"1345_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10773-015-2640-0","volume":"55","author":"N Jiang","year":"2016","unstructured":"N. Jiang, N. Zhao, L. Wang, LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 55(1), 107\u2013123 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"1345_CR18","unstructured":"J.I. Latorre, Image compression and entanglement (2005). arXiv:quant-ph\/0510031"},{"issue":"1","key":"1345_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","volume":"10","author":"PQ Le","year":"2011","unstructured":"P.Q. Le, F. Dong, K. Hirota, A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10(1), 63\u201384 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"1345_CR20","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1007\/s10773-018-3841-0","volume":"57","author":"P Li","year":"2018","unstructured":"P. Li, B. Wang, H. Xiao, X. Liu, Quantum representation and basic operations of digital signals. Int. J. Theor. Phys. 57(10), 3242\u20133270 (2018)","journal-title":"Int. J. Theor. Phys."},{"key":"1345_CR21","unstructured":"S. Lloyd, M. Mohseni, P. Rebentrost, Quantum algorithms for supervised and unsupervised machine learning (2013). arXiv:1307.0411"},{"key":"1345_CR22","volume-title":"Understanding Digital Signal Processing","author":"RG Lyons","year":"2011","unstructured":"R.G. Lyons, Understanding Digital Signal Processing, 3rd edn. (Pearson Education India, Delhi, 2011)","edition":"3"},{"key":"1345_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ijleo.2017.03.091","volume":"139","author":"M Naseri","year":"2017","unstructured":"M. Naseri, S. Heidari, M. Baghfalaki, R. Gheibi, J. Batle, A. Farouk, A. Habibi, A new secure quantum watermarking scheme. Optik 139, 77\u201386 (2017)","journal-title":"Optik"},{"key":"1345_CR24","doi-asserted-by":"publisher","first-page":"3828","DOI":"10.1007\/s10773-019-04251-z","volume":"58","author":"MY Nejad","year":"2019","unstructured":"M.Y. Nejad, M. Mosleh, S.R. Heikalabad, An LSB-based quantum audio watermarking using MSB as arbiter. Int. J. Theor. Phys. 58, 3828\u20133851 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"1345_CR25","volume-title":"Discrete-Time Signal Processing","author":"AV Oppenheim","year":"1999","unstructured":"A.V. Oppenheim, Discrete-Time Signal Processing (Pearson Education India, Delhi, 1999)"},{"issue":"1","key":"1345_CR26","doi-asserted-by":"publisher","first-page":"010306","DOI":"10.1088\/1674-1056\/27\/1\/010306","volume":"27","author":"Z-G Qu","year":"2018","unstructured":"Z.-G. Qu, H.-X. He, T. Li, Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio. Chin. Phys. B 27(1), 010306 (2018)","journal-title":"Chin. Phys. B"},{"key":"1345_CR27","doi-asserted-by":"publisher","first-page":"7981","DOI":"10.1007\/s11042-018-6476-5","volume":"78","author":"Z Qu","year":"2018","unstructured":"Z. Qu, Z. Cheng, W. Liu, X. Wang, A novel quantum image steganography algorithm based on exploiting modification direction. Multimed. Tools Appl. 78, 7981\u20138001 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"1345_CR28","doi-asserted-by":"publisher","first-page":"7981","DOI":"10.1007\/s11042-018-6476-5","volume":"78","author":"Z Qu","year":"2019","unstructured":"Z. Qu, Z. Cheng, W. Liu, X. Wang, A novel quantum image steganography algorithm based on exploiting modification direction. Multimed. Tools Appl. 78(7), 7981\u20138001 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"13","key":"1345_CR29","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.113.130503","volume":"113","author":"P Rebentrost","year":"2014","unstructured":"P. Rebentrost, M. Mohseni, S. Lloyd, Quantum support vector machine for big data classification. Phys. Rev. Lett. 113(13), 130503 (2014)","journal-title":"Phys. Rev. Lett."},{"issue":"10","key":"1345_CR30","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1007\/s11128-016-1391-z","volume":"15","author":"Y Ruan","year":"2016","unstructured":"Y. Ruan, H. Chen, J. Tan, X. Li, Quantum computation for large-scale image classification. Quantum Inf. Process. 15(10), 4049\u20134069 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1345_CR31","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1007\/s10773-017-3514-4","volume":"56","author":"Y Ruan","year":"2017","unstructured":"Y. Ruan, X. Xue, H. Liu, J. Tan, X. Li, Quantum algorithm for k-nearest neighbors classification based on the metric of hamming distance. Int. J. Theor. Phys. 56(11), 3496\u20133507 (2017)","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"1345_CR32","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11128-018-2092-6","volume":"17","author":"E \u015eahin","year":"2018","unstructured":"E. \u015eahin, \u0130. Yilmaz, A novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images. Quantum Inf. Process. 17(11), 319 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"1345_CR33","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11128-019-2317-3","volume":"18","author":"E \u015eahin","year":"2019","unstructured":"E. \u015eahin, \u0130. Yilmaz, QRMA: quantum representation of multichannel audio. Quantum Inf. Process. 18(7), 209 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1345_CR34","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s11128-016-1463-0","volume":"16","author":"J Sang","year":"2017","unstructured":"J. Sang, S. Wang, Q. Li, A novel quantum representation of color digital images. Quantum Inf. Process. 16(2), 42 (2017)","journal-title":"Quantum Inf. Process."},{"key":"1345_CR35","doi-asserted-by":"crossref","unstructured":"M. Schuld, I. Sinayskiy, F. Petruccione, Quantum computing for pattern classification. in Pacific Rim International Conference on Artificial Intelligence 2014 (Springer, 2014), pp. 208\u2013220","DOI":"10.1007\/978-3-319-13560-1_17"},{"key":"1345_CR36","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","volume-title":"Advances in Cryptology","author":"GJ Simmons","year":"1984","unstructured":"G.J. Simmons, The prisoners\u2019 problem and the subliminal channel, in Advances in Cryptology, ed. by D. Chaum (Springer, Boston, 1984), pp. 51\u201367"},{"issue":"3","key":"1345_CR37","doi-asserted-by":"publisher","first-page":"404","DOI":"10.20965\/jaciii.2013.p0404","volume":"17","author":"B Sun","year":"2013","unstructured":"B. Sun, A.M. Iliyasu, F. Yan, F. Dong, K. Hirota, An RGB multi-channel representation for images on quantum computers. J. Adv. Comput. Intell. Intell. Inf. 17(3), 404\u2013417 (2013)","journal-title":"J. Adv. Comput. Intell. Intell. Inf."},{"key":"1345_CR38","unstructured":"A.Z. Tirkel, G. Rankin, R. Van Schyndel, W. Ho, N. Mee, C.F. Osborne, Electronic watermark. in Digital Image Computing, Technology Applications (1993), pp. 666\u2013673"},{"issue":"6","key":"1345_CR39","doi-asserted-by":"publisher","first-page":"067901","DOI":"10.1103\/PhysRevLett.87.067901","volume":"87","author":"CA Trugenberger","year":"2001","unstructured":"C.A. Trugenberger, Probabilistic quantum memories. Phys. Rev. Lett. 87(6), 067901 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1345_CR40","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1103\/PhysRevA.54.147","volume":"54","author":"V Vedral","year":"1996","unstructured":"V. Vedral, A. Barenco, A. Ekert, Quantum networks for elementary arithmetic operations. Phys. Rev. A 54(1), 147 (1996)","journal-title":"Phys. Rev. A"},{"key":"1345_CR41","doi-asserted-by":"crossref","unstructured":"S.E. Venegas-Andraca, S. Bose, Storing, processing, and retrieving an image using quantum mechanics. in Quantum Information and Computation 2003 (International Society for Optics and Photonics, 2003), pp. 137\u2013148","DOI":"10.1117\/12.485960"},{"issue":"1","key":"1345_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-009-0123-z","volume":"9","author":"SE Venegas-Andraca","year":"2010","unstructured":"S.E. Venegas-Andraca, J. Ball, Processing images in entangled quantum systems. Quantum Inf. Process. 9(1), 1\u201311 (2010)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"1345_CR43","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1007\/s10773-015-2800-2","volume":"55","author":"J Wang","year":"2016","unstructured":"J. Wang, QRDA: quantum representation of digital audio. Int. J. Theor. Phys. 55(3), 1622\u20131641 (2016)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"1345_CR44","first-page":"302","volume":"39","author":"D Wang","year":"2012","unstructured":"D. Wang, Z.-H. Liu, W.-N. Zhu, S.-Z. Li, Design of quantum comparator based on extended general Toffoli gates with multiple targets. Comput. Sci. 39(9), 302\u2013306 (2012)","journal-title":"Comput. Sci."},{"key":"1345_CR45","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/j.measurement.2015.05.038","volume":"73","author":"S Wang","year":"2015","unstructured":"S. Wang, J. Sang, X. Song, X. Niu, Least significant qubit (LSQb) information hiding algorithm for quantum image. Measurement 73, 352\u2013359 (2015)","journal-title":"Measurement"},{"key":"1345_CR46","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s40595-018-0115-y","volume":"5","author":"J Wi\u015bniewska","year":"2018","unstructured":"J. Wi\u015bniewska, M. Sawerwain, Recognizing the pattern of binary Hermitian matrices by quantum kNN and SVM methods. Vietnam J. Comput. Sci. 5, 197\u2013204 (2018)","journal-title":"Vietnam J. Comput. Sci."},{"issue":"5886","key":"1345_CR47","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"W.K. Wootters, W.H. Zurek, A single quantum cannot be cloned. Nature 299(5886), 802 (1982)","journal-title":"Nature"},{"key":"1345_CR48","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.tcs.2017.12.025","volume":"752","author":"F Yan","year":"2017","unstructured":"F. Yan, A.M. Iliyasu, Y. Guo, H. Yang, Flexible representation and manipulation of audio signals on quantum computers. Theor. Comput. Sci. 752, 71\u201385 (2017)","journal-title":"Theor. Comput. Sci."},{"issue":"8","key":"1345_CR49","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Y. Zhang, K. Lu, Y. Gao, M. Wang, NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12(8), 2833\u20132860 (2013)","journal-title":"Quantum Inf. Process."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-020-01345-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-020-01345-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-020-01345-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,8]],"date-time":"2021-01-08T01:08:18Z","timestamp":1610068098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-020-01345-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,9]]},"references-count":49,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["1345"],"URL":"https:\/\/doi.org\/10.1007\/s00034-020-01345-6","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,9]]},"assertion":[{"value":"28 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}