{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:07Z","timestamp":1775745307971,"version":"3.50.1"},"reference-count":38,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T00:00:00Z","timestamp":1678147200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772295"],"award-info":[{"award-number":["61772295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZR2021MF049"],"award-info":[{"award-number":["ZR2021MF049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZR2019YQ01"],"award-info":[{"award-number":["ZR2019YQ01"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["ZR202108020011"],"award-info":[{"award-number":["ZR202108020011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["61772295"],"award-info":[{"award-number":["61772295"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2021MF049"],"award-info":[{"award-number":["ZR2021MF049"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019YQ01"],"award-info":[{"award-number":["ZR2019YQ01"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR202108020011"],"award-info":[{"award-number":["ZR202108020011"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Engineering"],"published-print":{"date-parts":[[2023,3,7]]},"abstract":"<jats:p>In order to boost the security and confidentiality of information in quantum images, on the foundation of the NEQR model, a novel quantum watermarking scheme combining quantum Hilbert scrambling with steganography based on the Moir\u00e9 fringe is designed in this paper. First of all, for carrier image, and watermark image, the color information and position information are denoted, respectively, by the NEQR model. Next, the watermark image is converted to a disordered image by quantum Hilbert scrambling, and the message of the original watermark image cannot be gained from the disordered image. At last, the watermark image after scrambling is embedded into the carrier image through the steganography of the Moir\u00e9 fringe, obtaining the watermarked image. Due to the unitary image of the quantum gate, quantum Hilbert inverse scrambling is the opposite process of quantum Hilbert scrambling. In addition, the watermark image can be completely extracted from the watermarked image. What\u2019s more, the experimental simulation and performance analysis of the scheme are done. The experimental simulation proves the feasibility of this algorithm. Visually, there is no difference between the carrier image and the watermarked image. The PSNR between the watermarked image and the carrier image is measured, which quantitatively shows the high similarity. In addition, the time complexity of the quantum circuit is lower than some other quantum image watermarking schemes, which proves the simplicity of this scheme.<\/jats:p>","DOI":"10.1155\/2023\/3746357","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:05:07Z","timestamp":1678233907000},"page":"1-12","source":"Crossref","is-referenced-by-count":8,"title":["A Quantum Image Watermarking Scheme Based on Quantum Hilbert Scrambling and Steganography about the Moir\u00e9 Fringe"],"prefix":"10.1155","volume":"2023","author":[{"given":"Jian-Wei","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Information and Control Engineering, Qingdao University of Technology, Qingdao, China"}]},{"given":"Tian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information and Control Engineering, Qingdao University of Technology, Qingdao, China"}]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Control Engineering, Qingdao University of Technology, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1899-5945","authenticated-orcid":true,"given":"Shu-Mei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Science, Qingdao University of Technology, Qingdao, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-012-1087-9"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.09.028"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-014-0912-x"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1260-9"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-021-04909-7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1364\/oe.431945"},{"issue":"23","key":"7","article-title":"Color image encryption algorithm based on DNA code and alternating quantum random walk","volume":"70","author":"W. Yi-Nuo","year":"2021","journal-title":"Acta Physica Sinica"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/27\/3\/030502"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/abda35"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ac11e3"},{"issue":"1","key":"11","first-page":"1","article-title":"Information hiding method based on quantum image by using Bell states","volume":"19","author":"C. F. Su","year":"2020","journal-title":"Quantum Information Processing"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1364\/oe.386283"},{"issue":"3","key":"13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10773-022-05032-x","article-title":"Quantum confidentiality query protocol based on bell state identity","volume":"61","author":"J. Song","year":"2022","journal-title":"International Journal of Theoretical Physics"},{"key":"14","article-title":"Image compression and entanglement","author":"J. I. Latorre","year":"2005"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-009-0123-z"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-010-0177-y"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0567-z"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2016.09.123"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.20965\/jaciii.2013.p0404"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0612-y"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0561-5"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0629-2"},{"key":"23","article-title":"Research on image watermarking algorithm based on quantum haar wavelet transform","volume":"61","author":"Q. Mou","year":"2015","journal-title":"International Journal of Theoretical Physics"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1142\/s0217979220500095"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08987-3"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-012-0423-6"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2937390"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-015-2640-0"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2015.05.038"},{"issue":"9","key":"30","first-page":"1","article-title":"Quantum watermarking scheme through Arnold scrambling and LSB steganography","volume":"16","author":"R. G. Zhou","year":"2017","journal-title":"Quantum Information Processing"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-016-3046-3"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2017.10.063"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-014-2294-3"},{"issue":"10","key":"34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-017-1694-8","article-title":"A novel quantum LSB-based steganography method using the Gray code for colored quantum images","volume":"16","author":"S. Heidari","year":"2017","journal-title":"Quantum Information Processing"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-014-2046-4"},{"issue":"1","key":"36","first-page":"1","article-title":"LSBs-based quantum color images watermarking algorithm in edge region","volume":"18","author":"W. W. Hu","year":"2019","journal-title":"Quantum Information Processing"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1142\/s021974991850020x"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2075-7"}],"container-title":["Quantum Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/que\/2023\/3746357.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/que\/2023\/3746357.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/que\/2023\/3746357.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:05:24Z","timestamp":1678233924000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/que\/2023\/3746357\/"}},"subtitle":[],"editor":[{"given":"Yubo","family":"Sheng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,3,7]]},"references-count":38,"alternative-id":["3746357","3746357"],"URL":"https:\/\/doi.org\/10.1155\/2023\/3746357","relation":{},"ISSN":["2577-0470"],"issn-type":[{"value":"2577-0470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,7]]}}}