
Citation: Zhiguo Qu, Shengyao Wu, Le Sun, Mingming Wang, Xiaojun Wang. Effects of quantum noises on χ state-based quantum steganography protocol[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4999-5021. doi: 10.3934/mbe.2019252
[1] | Zhiguo Qu, Leiming Jiang, Le Sun, Mingming Wang, Xiaojun Wang . Continuous variable quantum steganography protocol based on quantum identity. Mathematical Biosciences and Engineering, 2019, 16(5): 4182-4195. doi: 10.3934/mbe.2019208 |
[2] | P. Balamanikandan, S. Jeya Bharathi . A mathematical modelling to detect sickle cell anemia using Quantum graph theory and Aquila optimization classifier. Mathematical Biosciences and Engineering, 2022, 19(10): 10060-10077. doi: 10.3934/mbe.2022470 |
[3] | Dingwei Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li . High capacity reversible data hiding in MP3 based on Huffman table transformation. Mathematical Biosciences and Engineering, 2019, 16(4): 3183-3194. doi: 10.3934/mbe.2019158 |
[4] | Jimin Yu, Jiajun Yin, Shangbo Zhou, Saiao Huang, Xianzhong Xie . An image super-resolution reconstruction model based on fractional-order anisotropic diffusion equation. Mathematical Biosciences and Engineering, 2021, 18(5): 6581-6607. doi: 10.3934/mbe.2021326 |
[5] | Martin Bohner, Jaqueline Mesquita, Sabrina Streipert . The Beverton–Hold model on isolated time scales. Mathematical Biosciences and Engineering, 2022, 19(11): 11693-11716. doi: 10.3934/mbe.2022544 |
[6] | Shouming Zhang, Yaling Zhang, Yixiao Liao, Kunkun Pang, Zhiyong Wan, Songbin Zhou . Polyphonic sound event localization and detection based on Multiple Attention Fusion ResNet. Mathematical Biosciences and Engineering, 2024, 21(2): 2004-2023. doi: 10.3934/mbe.2024089 |
[7] | Melanie A. Jensen, Qingzhou Feng, William O. Hancock, Scott A. McKinley . A change point analysis protocol for comparing intracellular transport by different molecular motor combinations. Mathematical Biosciences and Engineering, 2021, 18(6): 8962-8996. doi: 10.3934/mbe.2021442 |
[8] | Yongju Tong, YuLing Liu, Jie Wang, Guojiang Xin . Text steganography on RNN-Generated lyrics. Mathematical Biosciences and Engineering, 2019, 16(5): 5451-5463. doi: 10.3934/mbe.2019271 |
[9] | Zhonghua Lu, Min Tian, Jie Zhou, Xiang Liu . Enhancing sensor duty cycle in environmental wireless sensor networks using Quantum Evolutionary Golden Jackal Optimization Algorithm. Mathematical Biosciences and Engineering, 2023, 20(7): 12298-12319. doi: 10.3934/mbe.2023547 |
[10] | Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei . Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences and Engineering, 2021, 18(5): 5427-5448. doi: 10.3934/mbe.2021275 |
Quantum information technology applies the basic principles of quantum mechanics to the fields of computation, communication, and cryptography, forming three branches of quantum computing [1,2,3], quantum communication [4], and quantum cryptography [5]. As an emerging frontier interdisciplinary subject, quantum secure communication is developed by the combination of quantum mechanics and information technologies [6,7,8,9,10]. As the rapid development of network [11,12], it becomes an urgent need for communication security. In 1993, C.H. Bennett proposed the concept of quantum communication. In the same year, a scheme [13] for realizing quantum teleportation using the combination of classical and quantum information was proposed. The scheme requires that two parties of the communication first share an EPR pair. The sender measures the single qubit state to be transmitted and his EPR particles under the Bell basis, and transmits the measurement result to the receiver through the classical channel. After that, the receiver can recover the target quantum state. Quantum teleportation is not only important in the field of physics to people's understanding and revealing the mysterious laws of nature, but also can use quantum state as information carrier [14,15] to realize the transmission of large-capacity information that cannot be deciphered in principle. Quantum secure communication uses quantum state as information carrier, such as quantum key distribution (QKD) [16], quantum secret sharing (QSS) [17], and quantum identity verification (QIV) [18]. Compared with the classical communication protocol, it shows a better performance in both security and efficiency.
As a member of quantum security communication, quantum information hiding plays a vital role. Based on the design idea of classical information hiding, quantum information hiding realizes the communication of secret message between communicators by establishing hidden quantum channels in quantum public channel. In 2001, Terhal et al. [19,20] proposed a quantum information hiding protocol based on the Bell state. The protocol was the first quantum information hiding protocol proposed at that time, which laid the foundation for the development of quantum information hiding technique later.
Quantum steganography is an important sub-discipline of quantum information hiding. The secret message is embedded in an ordinary quantum carrier, and the receiver can decode the secret message after the quantum carrier is transmitted. It can achieve the purpose of secretly transmitting the message. In recent years, a variety of quantum steganography protocols have emerged by using different carrier media [21,22,23,24,25,26,27,28]. In 2003, Guo et al. [29] proposed a steganographic method for encoding secret information into an extended Bell state set by using the uncertainty in the preparation of the Bell state. In 2007, K.Matin [30] proposed a new quantum steganography protocol based on the BB84 protocol, which sends secret messages by establishing a hidden channel during the process of key distribution. In 2010, we proposed a protocol for establishing hidden information to convey secret messages in the ordinary information transfer process using Bell state entanglement swapping [31]. In the following year, by using the characteristics of the entanglement swapping, we proposed a χ state based steganographic protocol [32], which has better imperceptibility and large capacity. In 2013, Wei et al. [33] proposed a quantum steganography protocol for embedding secrets into carrier data using POVM measurements, which has good secrecy and security. In 2015, Wei et al. [34] proposed a new quantum image steganography algorithm based on least significant bits. In 2017, Heidari et al. [35] proposed a color image steganography scheme based on Gray code. In 2017, we proposed a robust quantum watermarking algorithm based on the polar representation of quantum images [36]. In the same year, based on the quantum video-based MCQI representation, we proposed a new large-capacity quantum video steganography protocol [37].
Quantum noise has to be taken into consideration in actual communication, as it will seriously disturb a communicating quantum system. For channel noise, the channel coding method is a good way to resist the effects of noise. Channel coding has three types of coding methods: quantum error correcting code, error avoiding code and error proventing code. The quantum error correcting code [38] usually uses a specific encoding method, so that the error detection measurement can correctly detect what kind of error was occurred and recover it. The quantum error avoiding code [39] achieves the effect of overcoming quantum noise by encoding information in a quantum subspace that is unaffected by noise. The basic idea of quantum error-preventing code is to use the quantum Zeno effect [40] to make frequent measurements on the quantum system, so that the quantum system which has been affected by quantum noise can change to initial state after a small change. However, due to the high requirements on hardware facilities, it is still in the theoretical stage. In recent years, some new researches on resistance to quantum noise have emerged [41,42]. In 2010, Alexander N. Korotkov et al. [43] proposed a scheme to overcome decoherence by using quantum non-collapse measurements, which can effectively preserve quantum states. In 2014, Guan et al. [44] analyzed arbitrary two-qubit remote preparation schemes in noisy environments and calculated the effect of quantum noise on protocol efficiency. In 2015, Raphael Fortes et al. [45] analyzed the effects of noise on the quantum teleportation process in detail. The conclusion shows that the joint influence of two noises has some symmetry. In 2017, Wang et al. [46,47,48] performed quantum noise analysis on quantum remote preparation of single-particle, two-particle and multi-particle, and respectively gave the efficiency of the above protocol in noisy environment. In the same year, we studied the relationship between the effects of noise and the use of quantum channels for several arbitrary two-qubit state remote preparation protocols [49]. In addition, for the remote preparation of arbitrary three-qubit state, we analyze the efficiency of the protocol under noise, and propose a scheme to improve the remote preparation efficiency under noisy environment [50] by using the natural characteristic of the mutual restraint of the noise channel. In addition to the remote preparation scheme will be affected by noise, the steganographic protocol is also affected by noise and can seriously affect the usefulness of the protocol. Therefore, this paper will carry out noise analysis on the χ state-based steganography protocol [32] proposed in 2011, and further propose an optimization scheme, which makes it have better practicability in the real environment.
The rest of this paper consists of four parts. In Section 2, four kinds of quantum noises are introduced briefly, which are the four most possible quantum noises encountered in quantum channels. In Section 3, a brief review of the steganographic protocol based on the χ state is given. In Section 4, the noise environment that the steganographic protocol may be subjected to is analyzed, and the fidelity of information is calculated for all possible cases. The efficiency of the protocol is analyzed and the optimization scheme under noise is given. This article will be discussed and summarized in Section 5.
This section describes the four common types of quantum noises in quantum channels, namely amplitude damping, phase damping, bit flip, and depolarizing noises. Quantum noise can be regarded as one specific quantum operation, so that it can be described by the form of operator sum.
Amplitude damping describes the dissipation process of energy, that is, the effect that energy is lost from the quantum system. The operands for amplitude damping are described below.
E0=(100√1−p),E1=(0√p00) | (2.1) |
In which, the noise coefficient p denotes the probability that a quantum system loses a photon.
Phase damping is described as the interfere to quantum information without energy dissipation, often referred to as the "T2" (or spin-spin) relaxation process, the operator-sum formalism can be expressed as
E0=√1−pI,E1=√pσz, | (2.2) |
where the noise coefficient p can be understood as the probability of scattering from a photon without energy loss from the system, σz is Pauli matrix.
Bit flip channel flips the qubit state with a probability p from |0⟩ to |1⟩ (or vice versa), and the operands of its quantum operation are expressed as
E0=√1−pI,E1=√pσx, | (2.3) |
where p is noise coefficient, σx is Pauli matrix.
Another noisy channel is a kind of important quantum noise. The depolarizing channel depolarizes the qubit with a probability of p, i, e, makes it becoming a maximum mixed state I/2. The operands of the depolarized channel can be expressed as
E0=√1−pI,E1=√p3σx,E2=√p3σz,E3=√p3σy, | (2.4) |
where I,σx,σy,σz are four Pauli matrices.
In the original protocol [32], the sender Alice wanted to send a classical information sequence to Bob while carrying 4 bits of secret information. The specific steps of the protocol are as follows.
S1) The sender Alice and the receiver Bob know in advance how to encode the four Pauli operators, that is
σ0↔00,σ1↔01,σ2↔10,σ3↔11. | (3.1) |
S2) Alice prepares a series of entangled four-particle χ state, and the particles of the quantum states sequence is expressed as [P11,P12,P13,P14,P21,P22,...,Pn3,Pn4], the superscript indicates the sequence number of the nth entangled particle pair, and the subscript indicates the four particles of each χ state. All entangled particles are initially in the |χ00⟩3214 state. The ith particle of each entangled pair constitutes the sequence Ci=[P1i,P2i,...,Pni], Alice keeps particle sequence C1 and C3, sends the sequence C2 and C4 to Bob.
S3) Bob randomly selects the particles in the corresponding position from C2 and C4 to start the eavesdropping detection by measuring the particles under BM1 or BM2 basis. He will tell Alice the position and measurement basis of the particles through the classical channel. Then, Alice measures her particle at the corresponding position and at the corresponding basis AM1 or AM2. Finally, Alice and Bob public the measurement results to detect eavesdropping. Since the basis in this step is not used in our work, the corresponding measurement basis is not listed here.
S4) According to the information bit sequence, Alice performs corresponding unitary operation on her particles. Suppose Alice wants to pass the information i1i2i3i4, she will perform σ2i1+i23 and σ2i3+i41 on particle 3 and 1 to encode the information and then send the encoded particles to Bob. After receiving the particles, Bob measures the particle group [Pi3,Pi1,Pi2,Pi4] under the FMB basis (χ state orthogonal basis) to decode information. In this step, Alice can choose whether to enter the secret information hiding mode S5).
S5) Secret information hiding mode: (a) Alice selects the location m of the hidden channel according to the secret information, and the secret information is in one-to-one correspondence with the entangled exchange result set of |χij⟩m−13214 and |χpq⟩m3214, m can be sent to Bob through a classical channel. (b) Alice copies the information carried by |χij⟩m−13214 to |χij⟩m+13214 by performing the same unitary operator σi3σj1 on Pm+13Pm+11. Then |χij⟩m+13214 just as an auxiliary particle to hide the secret and no longer transmits classic messages. (c) Alice achieves entanglement swapping by exchanging the particles [1,4] and [1′,4′] of |χij⟩m3214 and |χij⟩m+13′2′1′4′.
S6) Secret decoding mode: (a) Bob first receives the m sent by Alice. (b) He measures particle groups [Pm3,Pm2,Pm1,Pm4] and [Pm+13,Pm+12,Pm+11,Pm+14] respectively under the CMB basis (cat state measurement basis). (c) Based on the measurement results, Bob can decode the secret message sent by Alice.
Two types of messages are sent in the original protocol, one is a normal information sequence, and the other is a 4-bit secret message. Next, we will start to analyze the impact of these two types of messages after being affected by noise.
From the previous section, it's easy to know that the transmitted information and secret information will be affected by quantum channel noise in the steganographic protocol. In this section, we will analyze the different noise effects on these two types of messages in detail.
In order to facilitate the analysis, we will study the effect of noise on a single χ state that carries transmitted message.
In the step S2, Alice sends the particle sequences C2 and C4 to Bob. During the transmission process, each of the 2, 4 particles will be affected by the quantum noise channel. The initial quantum system can be written as
ρini=|χ00⟩3214⟨χ00|3214=18(|0000⟩−|0011⟩−|0101⟩+|0110⟩+|1001⟩+|1010⟩+|1100⟩+|1111⟩)×(⟨0000|−⟨0011|−⟨0101|+⟨0110|+⟨1001|+⟨1010|+⟨1100|+⟨1111|). | (4.1) |
After the transmission is completed, the quantum system shared by Alice and Bob is affected by the quantum noise becomes
ρ1=∑ijE4iE2jρiniE2j†E4i†. | (4.2) |
Among them, the superscript represents the quantum particle affected by the noise operator. For example, E2j represents the noise operator acting on particle numbered 2 in the χ state. After the eavesdropping detection step S3, Alice performs corresponding unitary operations σ2i1+i23 and σ2i3+i41 on the 1, 3 particles according to the transmission information, and the encoded quantum system becomes
ρ1′=σ2i1+i23σ2i3+i41ρ1σ12i3+i4†σ32i1+i2†. | (4.3) |
Alice then sends the particles 1, 3 to Bob via the quantum noise channel. After the transfer is completed, the quantum system composed of the particles owned by Bob becomes
ρ2=∑ijE3iE1jρ1′E1j†E3i†. | (4.4) |
while the state that Bob should obtain theoretically is
|T⟩=σ2i1+i23σ2i3+i41|χ00⟩3214. | (4.5) |
Fidelity can describe the distance between two quantum states, so fidelity can be used to describe the effect of noise on quantum states. Fidelity is defined as follows
F=⟨T|ρ2|T⟩. | (4.6) |
The values of fidelity range from 0 to 1. The greater the fidelity, the more similar the two quantum states are. A fidelity of 1 indicates that the two quantum states are identical to each other.
For ease of analysis, it is supposed that the classic information transmitted is 0000, then the unitary operation σ2i1+i23σ2i3+i41 Alice performs is σ03σ01.
Considering that Alice's first transmission quantum channel is affected by quantum noise (noise factor pA≠0) and the second transmission quantum channel is not affected by noise (noise factor pB=0). Thus, under the four noisy channels, the fidelity of the transmitted information is
F(AD,∅)=12−12pA+116pA2+14(2−pA)√1−pA | (4.7) |
F(Phs,∅)=1−2pA+pA2 | (4.8) |
F(BF,∅)=1−2pA+pA2 | (4.9) |
F(D,∅)=1−2pA+pA2 | (4.10) |
F(X,Y) indicates the fidelity of the information in the case that Alice's first transmission quantum channel is subjected to X(AD,Phs,BF,D) noise and her second transmission quantum channel is subjected to Y(AD,Phs,BF,D,∅) noise.
From the calculation results, we can see that phase damping, bit flip and depolarizing noise have the same effect on the transmitted information. In Figure 1, we plot the equations 4.7 to 4.10 for the fidelity as a function of the noise factor pA. It can be seen that the amplitude damping noise has less influence on the transmitted information than the other three kinds of quantum noises. As the quantum noise factor pA increases, the fidelity of the information transmitted under the four kinds of noises respectively gradually decreases. When pA increases to 1, each fidelity under phase damping, bit flip or depolarizing noise is reduced to zero, the fidelity at amplitude damping reaches a minimum of 0.0625.
Next, we analyze the situation when both Alice's first and second transmission quantum channels are disturbed by quantum noise (pA≠0, pB≠0).
At first, let assume that Alice's first transmission quantum channel is subject to amplitude damping noise and her second transmission quantum channel is affected by four different quantum noises. The fidelities of the system in these cases are
F(AD,AD)=12(1−pA−pB)+18pA2pB2−18pApB(pA+pB)+58pApB+116(pA2+pB2)+[12−14(pA+pB)+18pApB]√(1−pA)(1−pB) | (4.11) |
F(AD,Phs)=12−12pA−pB−pApB2+pApB+116pA2+pB2+14(2−pA)(1−2pB)√(1−pA) | (4.12) |
F(AD,BF)=12−12pA−pB+14pA2pB2−34pApB2−14pA2pB+54pApB+116pA2+12pB2+14(2−pA)(1−pB)2√(1−pA) | (4.13) |
F(AD,D)=12−12pA−pB+136pA2pB2−59pApB2−112pA2pB+pApB+116pA2+59pB2+14(1+89pB2−2pB)(2−pA)√(1−pA) | (4.14) |
Figure 2 shows the variation of fidelities with noise factor pB in the four cases. For ease of analysis, only the images that the value of pA is 0.1, 0.3, 0.7, and 0.9 respectively are listed here. Through the calculation results, we found that when pB is less than about 0.6, as the pA value increases, the fidelity of the transmitted information gradually decreases. If pB is greater than about 0.6, with the increases of pA the fidelity of the transmission information will go down first and then increase, while the Alice's second transmission channel is subjected to phase damping noise, this change is especially obvious when pB=1. With the value of pA grows, F(AD,AD) increases from 0.0625 to 0.1250, F(AD,Phs) increases from 0 to 0.0625, F(AD,BF) increases from 0 to 0.0625, F(AD,D) increases from 0 to 0.0069. Although this change is very small, we can see that there is a kind of mutual restraint effect after the combination of quantum noise. And when pA is small (pA≤0.3), the effects of phase damping, bit flip and depolarizing noise are almost the same. With the increase of pA, the influence of bit flip noise is gradually less than phase damping, and the effect of phase flip noise is less than depolarizing noise. In addition, in this case, both Alice's first and second transmission channels are subject to noise fidelity less than if only Alice's first transmission channel is subject to noise.
The other case is that Alice's first transmission quantum channel is subjected to phase damping and her second transmission quantum channel is affected by four different quantum noises. In this case, the fidelity of the system is
F(Phs,AD)=12−12pB−pA−pBpA2+pApB+116pB2+pA2+14(2−pB)(1−2pA)√(1−pB) | (4.15) |
F(Phs,Phs)=1−2(pA+pB)+2pA2pB2−2pA2pB−2pApB2+4pApB+pA2+pB2 | (4.16) |
F(Phs,BF)=1−2(pA+pB)−pApB2−2pA2pB+4pApB+pA2+pB2 | (4.17) |
F(Phs,D)=1−2(pA+pB)+89pA2pB2−169pApB2−2pA2pB+4pApB+pA2+pB2 | (4.18) |
In this case, the fidelity as a function of the noise factor is shown in Figure 3. When pB=0, the fidelity of all the four quantum noises decreases with the increase of pA. When pA is small, the influence of phase damping on the transmitted information is smaller than that of the other three kinds of quantum noises. With the increase of pB, the fidelity under bit flip noise is gradually greater than the fidelity under amplitude damping. As the pA increases, the fidelity of the phase damping noise will gradually increase. When pA=0.5, the fidelity of the phase damping noise will be equal to the fidelity under the bit flip. At the same time, the phase damping and bit flip noise will be the same when pA=0.5,pB=1 and pA=0.5,pB=0. As pA continues to increase, the fidelity of phase damping noise will gradually exceed the bit flip noise, and then the black solid line which represents that only Alice's channel is subject to noise. This means that we can increase the fidelity of the transmitted information by using the appropriate pB according to the value of pA. When pA=1, pB is the intensity factor of the phase damping noise and the pB reach the value of 1 can maximize the fidelity of the transmitted information. This means that, in this case, the phase damping can be completely offset by the phase damping noise.
Next, Alice's first transmission quantum channel is affected by bit flip and the second transmission quantum channel is affected by four different quantum noises. The fidelity of quantum systems in these four cases is
F(BF,AD)=12−12pB−pA+14pB2pA2−34pA2pB−14pApB2+54pBpA+116pB2+12pA2+14(2−pB)(1−pA)2√(1−pB) | (4.19) |
F(BF,Phs)=1−2(pA+pB)−pBpA2−2pB2pA+4pApB+pA2+pB2 | (4.20) |
F(BF,BF)=1−2(pA+pB)+2pA2pB2−3pApB2−3pA2pB+5pApB+pA2+pB2 | (4.21) |
F(BF,D)=1−2(pA+pB)+89pA2pB2−209pApB2−2pA2pB+133pApB+pA2+pB2 | (4.22) |
In this case, the fidelities of the transmitted information under the four kinds of noises vary with pA and pB are shown in Figure 4. When pA is small, the fidelity under amplitude damping noise is greater than that of the other three quantum channels. As the pA increases, the fidelity under phase damping noise is gradually greater than that of the other three quantum noises. When pA≥0.6, the fidelity under phase damping will gradually be greater than that of noise-free in the second transmission channel. And in this case, the maximum fidelity is taken at pA=1,pB=0.5, which is 0.25. It can be found that adding extra noise can increase the fidelity of the system when pA is large. When pA is small, the reduction effect is not obvious.
In another case, Alice's first transmission quantum channel is subject to the depolarizing noise, and the second transmission quantum channel is subject to four different quantum noises. The fidelity of the system is
F(D,AD)=12−12pB−pA+136pB2pA2−59pA2pB−112pApB2+pBpA+116pB2+59pA2+14(1+89pA2−2pA)(2−pB)√(1−pB) | (4.23) |
F(D,Phs)=1−2(pA+pB)+89pA2pB2−169pBpA2−2pB2pA+4pApB+pA2+pB2 | (4.24) |
F(D,BF)=1−2(pA+pB)+89pA2pB2−209pA2pB−2pApB2+133pApB+pA2+pB2 | (4.25) |
F(D,D)=1−2(pA+pB)+2827pA2pB2−5027pA2pB−5027pApB2+4pApB+pA2+pB2 | (4.26) |
Figure 5 plots the fidelities vary with pA and pB under the situation that Alice's first channel under depolarizing and her second channel under four different quantum noises. Similarly, when pA is small, the effect of amplitude damping is also small. As the pA increases, the fidelity that the second transmission channel under depolarizing noise gradually increases. When pA≈0.6, the fidelity of the information that the second channel under depolarizing noise is gradually greater than that of noise-free channel. When pA≥0.6, the maximum fidelity can be obtained at the situation that pA=1,pB=1, and the maximum fidelity was 0.33.
In addition, according to the equations 4.11 to 4.26, it can be found that the influence of quantum noise on the transmitted information has excellent symmetry. That is F(M,N)=F(N,M) (M,N∈{AD,Phs,BF,D} ∩M≠N). This symmetry effectively simplifies our analysis of the effects of noise and the connection between different noises.
This section will analyze the impact of quantum noise on secret information. According to the protocol reviewed in Section 3, we know that the secret information is based on the transmission information carrier, two χ states. And the secret information is encoded by the characteristics of the transmitted information carriers, which is essentially the transmission of information carrier. It should be noted that Alice performs an entanglement swapping on the two χ states which carries the secret information. Taking the two χ states that is encoded secret information as an example, transmission process of the normal transmission information and the transmission process of secret information are shown in Figure 6.
As can be seen from Figure 6, when the secret information is transmitted, although the entanglement swapping operation is performed, the particles transmitted actually are exactly the same as the particles that carry transmission information. This means that the effect of quantum noise on the two χ states of secret information is the same as the effect of the same two χ states of ordinary transmission information. Therefore, the influence of quantum noise on secret information is the same as that of transmitted information, and has the same conclusion on how to improve the fidelity under noise.
To be specific, it's supposed that the secret message is 0000, there are 16 possible two χ states combinations for Alice to choose. For the convenience of studying, assuming Alice chooses |χ00⟩⊗|χ00⟩, the quantum system contains secret message will be
ρini=|χ00⟩3214⊗|χ00⟩3′2′1′4′⟨χ00|3214⊗⟨χ00|3′2′1′4′. | (4.27) |
Alice performs the entanglement swapping by exchanging the particles [1,4] and [1′,4′], then the system will become
ρini′=|χ00⟩321′4′⊗|χ00⟩3′2′14⟨χ00|321′4′⊗⟨χ00|3′2′14. | (4.28) |
Alice transmits the particles [2,4′] and [2′,4] to Bob. It's supposed that Alice's every transmission using the same quantum channel, which means that the four particles will suffer the same quantum noise in the noisy channel. After the transmission is completed, the quantum system will be
ρ′=∑i,j,k,lE2iE4′jE2′kE4lρini′E4†lE2′†kE4′†jE2†i. | (4.29) |
Then Alice sends the particles [3,1′] and [3′,1] to Bob, the quantum system that Bob receives is
ρ″=∑i,j,k,lE3iE1′jE3′kE1lρ′E1†lE3′†kE1′†jE3†i. | (4.30) |
Bob measures the particles [3,1′,2,4′] and [3′,1,2′,4] on the CMB basis to deduce the two χ states which performed entanglement swapping, then Bob can decode the secret message. Let measure the effect of noise on the secret message by calculating the fidelity of quantum system Bob finally received. The fidelity can be defined as
F=⟨T|ρ″|T⟩, | (4.31) |
in which,
|T⟩=|χ00⟩321′4′⊗|χ00⟩3′2′14. | (4.32) |
A simple calculation shows that the fidelity of secret information is the square of the fidelity of an ordinary information.
Then, in the situation that Alice's first transmission suffers four types of noises (pA≠0) and her second transmission is not affected by noise (pB=0), the fidelities are as follows, respectively.
F(AD,∅)=(12−34pA+516pA2−132pA3)√1−pA−pA+58pA2−18pA3+1256pA4+12 | (4.33) |
F(Phs,∅)=pA4−4pA3+6pA2−4pA+1 | (4.34) |
F(BF,∅)=pA4−4pA3+6pA2−4pA+1 | (4.35) |
F(D,∅)=pA4−4pA3+6pA2−4pA+1 | (4.36) |
The curves of fidelity as a function of noise factor are plotted in Figure 7. We can see that the effects of noise on secret message are similar to that on ordinary information, the difference is that the fidelity of a single secret message is lower than an ordinary information. The other possible situations will not be analyzed in detail due to it has the same conclusion as the ordinary information, the fidelity curves will be given in Supplementary.
This paper analyzes the performance of a steganographic protocol based on the χ state under quantum noise. When Alice's first transmission channel is affected by quantum noise, and the second transmission channel is not affected by the quantum noise, the performance of the protocol under amplitude damping noise is better than that of the other three kinds of quantum noises. When Alice's first channel is affected by quantum noise and her second quantum channel is also affected by quantum noise, if Alice can adjust the corresponding second noise channel according to her first transmission channel noise intensity, then she can select the appropriate noise channel, so that the fidelity of the transmitted information can increase under the quantum noise, and the anti-noise performance of the protocol is improved. Specifically, when Alice's first channel is subjected to phase damping, bit flip, and depolarization noise, she can increase the fidelity of the transmitted information by adjusting the coefficient of the noise. When Alice's first channel is affected by amplitude damping noise, this method cannot be used to improve the performance of the protocol. Under some certain conditions, the fidelity of information under phase damping and bit flip can be increased by adding phase damping noise. The fidelity of information under depolarizing can be increased by adding depolarizing noise. The method proposed in this paper has a better improvement effect on strong noises especially. Therefore, when the protocol needs to work in a strong noise environment, the method proposed in this paper can be a good option to improve the performance of the protocol.
This work was supported by the National Natural Science Foundation of China (No. 61373131, 61601358, 61501247, 61672290, 61303039, 61232016), the Six Talent Peaks Project of Jiangsu Province (Grant No. 2015-XXRJ-013), Natural Science Foundation of Jiangsu Province (Grant No. BK20171458), the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province (China under Grant No.16KJB520030), Sichuan Youth Science and Technique Foundation (No.2017JQ0048), NUIST Research Foundation for Talented Scholars (2015r014), PAPD and CICAEET funds.
The authors declare that there are no conflicts of interest.
Symbols | Description |
AD | Amplitude damping noise |
Phs | Phase damping noise |
BF | Bit flip noise |
D | Depolarizing noise |
Ei,i∈0,..,3 | Operators of quantum noise |
Eni,n∈1,...,4 | Quantum noise operator operated on particle n |
p | Quantum noise intensity |
pA | Quantum noise intensity of Alice's first transmission |
pB | Quantum noise intensity of Alice's second transmission |
σ0 | Pauli matrix, σ0≡I≡(1001) |
σ1 | Pauli matrix, σ1≡σx≡(0110) |
σ2 | Pauli matrix, σ2≡σy≡(0−ii0) |
σ3 | Pauli matrix, σ3≡σz≡(100−1) |
|T⟩ | The quantum state Bob received in ideal environment |
F | Fidelity of quantum state Bob received in noisy environment |
χ state | |χ00⟩3214=12√2(|0000⟩−|0011⟩−|0101⟩+|0110⟩+|1001⟩ |
+|1010⟩+|1100⟩+|1111⟩)3214 | |
F(X,Y),X,Y∈{AD,Phs,BF,D,∅} | Fidelity of quantum state Bob received in the situation that Alice's first transmission suffered X noise and her second transmission suffered Y noise |
[1] | W. J. Liu, P. P. Gao, W. B. Yu, et al., Quantum Relief algorithm, Quantum Inf. Process., 17 (2018), 280. |
[2] | W. J. Liu, H. B. Wang, G. L. Yuan, et al., Multiparty quantum sealed-bid auction using single photons as message carrier, Quantum Inf. Process., 15 (2016), 869–879. |
[3] | W. J. Liu, Z. Y. Chen, J. S. Liu, et al., Full-blind delegating private quantum computation, CMC-Comput. Mater. Con., 56 (2018), 211–223. |
[4] | W. J. Liu, Y. Xu, C. N. Yang, et al., An efficient and secure arbitrary n-party quantum key agreement protocol using Bell states, Int. J. Theor. Phys., 57 (2018), 195–207. |
[5] | X. B. Chen, X. Tang, G. Xu, et al., Cryptanalysis of secret sharing with a single d-level quantum system, Quantum Inf. Process., 17 (2018), 225. |
[6] | J. W. Wang, T. Li, X. Y. Luo, et al., Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain, IEEE T. Circ. Syst. Vid., (2018), 1. |
[7] | Y. Zhang, C. Qin, W. M. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, Signal Process., 146 (2018), 99–111. |
[8] | X. Y. Luo, X. F. Song, X. L. Li, et al., Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes, Multimed. Tools Appl., 75 (2016), 13557–13583. |
[9] | T. Qiao, R. Shi, X. Y. Luo, et al., Statistical model-based detector via texture weight map: application in re-sampling authentication, IEEE T. Multimedia, 21 (2019), 1077–1092. |
[10] | Y. Y. Ma, X. Y. Luo, X. L. Li, et al., Selection of rich model steganalysis features based on decision rough set -positive region reduction, IEEE T. Circ. Syst. Vid., 29 (2019), 336–350. |
[11] | Z. G. Qu, J. Keeney, S. Robitzsch, et al., Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks, China Commun., 13 (2016), 106–116. |
[12] | G. Xu, X. B. Chen and J. Li, Network coding for quantum cooperative multicast, Quantum Inf. Process., 14 (2015), 4297–4322. |
[13] | C. H. Bennett, G. Brassard, C. Crepeau, et al., Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, Phys. Rev. Lett., 70 (1993), 1895–1899. |
[14] | X. B. Chen, Y. R. Sun, G. Xu, et al., Controlled bidirectional remote preparation of three-qubit state, Quantum Inf. Process., 16 (2017), 244. |
[15] | M. M. Wang, C. Yang and R. Mousoli, Controlled cyclic remote state preparation of arbitrary qubit states, CMC-Comput. Mater. Con., 55 (2018), 321–329. |
[16] | C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Theor. Comput. Sci., 560 (2014), 7–11. |
[17] | M. Hillery, V. Buzek and A. Berthiaume, Quantum secret sharing, Phys. Rev. A, 59 (1999), 1829–1834. |
[18] | M. Curty and D. J. Santos, Quantum authentication of classical messages, Phys. Rev. A, 64 (2012), 168–1. |
[19] | B. M. Terhal, D. P. Divincenzo and D. W. Leung, Hiding bits in Bell states, Phys. Rev. Lett., 86 (2001), 5807–5810. |
[20] | D. P. Divincenzo, D. W. Leung and B. M. Terhal, Quantum data hiding, IEEE T. Inform. Theory, 48 (2001), 580–598. |
[21] | B. A. Shaw and T. A. Brun, Quantum steganography with noisy quantum channels, Phys. Rev. A, 83 (2011), 498–503. |
[22] | B. A. Shaw and T. A. Brun, Hiding quantum information in the perfect code, preprint, arXiv:1007.0793. |
[23] | T. Mihara, Quantum steganography embedded any secret text without changing the content of cover data, J. Quantum Inf. Sci., 2 (2012), 10–14. |
[24] | Z. H. Wei, X. B. Chen, X. X. Niu, et al., The quantum steganography protocol via quantum noisy channels, Int. J. Theor. Phys., 54 (2015), 2505–2515. |
[25] | T. Mihara, Quantum steganography using prior entanglement, Phys. Lett. A, 379 (2015), 952–955. |
[26] | Z. G. Qu, T. C. Zhu and J. W. Wang, A novel quantum steganography based on Brown states, CMC-Comput. Mater. Con., 1 (2018), 47–59. |
[27] | Z. G. Qu, Z. W. Cheng, W. J. Liu, et al., A novel quantum image steganography algorithm based on exploiting modification direction, Multimed. Tools Appl., 78 (2019), 7981–8001. |
[28] | Z. G. Qu, Z. W. Chen, W. B. Yu, et al., Matrix coding-based quantum image steganography algorithm, IEEE Access, 1 (2019), 99–114. |
[29] | G. C. Guo and G. P. Guo, Quantum data hiding with spontaneous parameter down-conversion, Phys. Rev. A, 68 (2003), 044303. |
[30] | K. Martin, Steganographic communication with quantum information, Lecture Notes in Computer Science(LNCS), 4567 (2007), 32–49. |
[31] | Z. G. Qu, X. B. Chen, X. J. Zhou, et al., Novel quantum steganography with large payload, Opt. Commun., 283 (2010), 4782–4786. |
[32] | Z. G. Qu, X. B. Chen, M. X. Luo, et al., Quantum steganography with large payload based on entanglement swapping of χ-type entangled states, Opt. Commun., 284 (2011), 2075–2082. |
[33] | Z. H. Wei, X. B. Chen, X. X. Niu, et al., A novel quantum steganography protocol based on probability measurements, Int. J. Quantum Inf., 11 (2013), 1350068. |
[34] | Z. H. Wei, X. B. Chen, X. X. Niu, et al., Least significant qubit (LSQb) information hiding algorithm for quantum image, Int. J. Theor. Phys., 54 (2015), 32–38. |
[35] | S. Heidari and E. Farzadnia, A novel quantum lsb-based steganography method using the gray code for colored quantum images, Quantum Inf. Process., 16 (2017), 242. |
[36] | Z. G. Qu, Z. W. Cheng, M. X. Luo, et al., A robust quantum watermark algorithm based on quantum log-polar images, Int. J. Theor. Phys., 56 (2017), 3460–3476. |
[37] | Z. G. Qu, S. Y. Chen and S. Ji, A novel quantum video steganography protocol with large payload based on mcqi quantum video, Int. J. Theor. Phys., 56 (2017), 1–19. |
[38] | R. Laflamme, C. Miquel, J. P. Paz, et al., Perfect quantum error correcting code, Phys. Rev. Lett., 77 (1996), 198–201. |
[39] | L. M. Duan and G. C. Guo, Preserving coherence in quantum computation by pairing quantum bits, Physics, 79 (1998), 1953–1956. |
[40] | H. Zheng, S. Y. Zhu and M. S. Zubairy, Quantum zeno and anti-zeno effects: without the rotating- wave approximation, Phys. Rev. Lett., 101 (2008), 200404. |
[41] | Z. G. Qu, S. Y. Chen, S. Ji, et al., Anti-noise bidirectional quantum steganography qrotocol with large payload, Int. J. Theor. Phys., 57 (2018), 1–25. |
[42] | Z. G. Qu, S. Y. Wu, W. J. Liu, et al., Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment, CMC-Comput. Mater. Con., 59 (2019), 607–624. |
[43] | N. K. Alexander and K. Kyle, Decoherence suppression by quantum measurement reversal, Phys. Rev. A, 81 (2010), 040103. |
[44] | X. W. Guan, X. B. Chen and L. C. Wang, Joint remote preparation of an arbitrary two-qubit state in noisy environments, Int. J. Theor. Phys., 53 (2014), 2236–2245. |
[45] | F. Raphael and R. Gustavo, Fighting noise with noise in realistic quantum teleportation, Phys. Rev. A, 92 (2015), 012338. |
[46] | M. M. Wang and Z. G. Qu, Effect of quantum noise on deterministic joint remote state preparation of a qubit state via a GHZ channel, Quantum Inf. Process., 15 (2016), 4805–4818. |
[47] | M. M. Wang, Z. G. Qu and W. Wang, Effect of noise on deterministic joint remote preparation of an arbitrary two-qubit state, Quantum Inf. Process., 16 (2017), 140. |
[48] | M. M. Wang, Z. G. Qu, W. Wang, et al., Effect of noise on joint remote preparation of multi-qubit state, Int. J. Quantum Inf., 15 (2017), 1750012. |
[49] | Z. G. Qu, S. Y. Wu, M. M. Wang, et al., Effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via various quantum entangled channels, Quantum Inf. Process., 16 (2017), 306–331. |
[50] | L. Sun, S. Y. Wu, Z. G. Qu, et al., The effect of quantum noise on two different deterministic remote state preparation of an arbitrary three-particle state protocols, Quantum Inf. Process., 17 (2018), 283–301. |
1. | Nasro Min-Allah, Naya Nagy, Malak Aljabri, Mariam Alkharraa, Mashael Alqahtani, Dana Alghamdi, Razan Sabri, Rana Alshaikh, Quantum Image Steganography Schemes for Data Hiding: A Survey, 2022, 12, 2076-3417, 10294, 10.3390/app122010294 | |
2. | Nur Shahirah Binti Azahari, Nur Ziadah Binti Harun, Zuriati Binti Ahmad Zulkarnain, Quantum identity authentication for non-entanglement multiparty communication: A review, state of art and future directions, 2023, 24059595, 10.1016/j.icte.2023.02.010 |
Symbols | Description |
AD | Amplitude damping noise |
Phs | Phase damping noise |
BF | Bit flip noise |
D | Depolarizing noise |
Ei,i∈0,..,3 | Operators of quantum noise |
Eni,n∈1,...,4 | Quantum noise operator operated on particle n |
p | Quantum noise intensity |
pA | Quantum noise intensity of Alice's first transmission |
pB | Quantum noise intensity of Alice's second transmission |
σ0 | Pauli matrix, σ0≡I≡(1001) |
σ1 | Pauli matrix, σ1≡σx≡(0110) |
σ2 | Pauli matrix, σ2≡σy≡(0−ii0) |
σ3 | Pauli matrix, σ3≡σz≡(100−1) |
|T⟩ | The quantum state Bob received in ideal environment |
F | Fidelity of quantum state Bob received in noisy environment |
χ state | |χ00⟩3214=12√2(|0000⟩−|0011⟩−|0101⟩+|0110⟩+|1001⟩ |
+|1010⟩+|1100⟩+|1111⟩)3214 | |
F(X,Y),X,Y∈{AD,Phs,BF,D,∅} | Fidelity of quantum state Bob received in the situation that Alice's first transmission suffered X noise and her second transmission suffered Y noise |
Symbols | Description |
AD | Amplitude damping noise |
Phs | Phase damping noise |
BF | Bit flip noise |
D | Depolarizing noise |
Ei,i∈0,..,3 | Operators of quantum noise |
Eni,n∈1,...,4 | Quantum noise operator operated on particle n |
p | Quantum noise intensity |
pA | Quantum noise intensity of Alice's first transmission |
pB | Quantum noise intensity of Alice's second transmission |
σ0 | Pauli matrix, σ0≡I≡(1001) |
σ1 | Pauli matrix, σ1≡σx≡(0110) |
σ2 | Pauli matrix, σ2≡σy≡(0−ii0) |
σ3 | Pauli matrix, σ3≡σz≡(100−1) |
|T⟩ | The quantum state Bob received in ideal environment |
F | Fidelity of quantum state Bob received in noisy environment |
χ state | |χ00⟩3214=12√2(|0000⟩−|0011⟩−|0101⟩+|0110⟩+|1001⟩ |
+|1010⟩+|1100⟩+|1111⟩)3214 | |
F(X,Y),X,Y∈{AD,Phs,BF,D,∅} | Fidelity of quantum state Bob received in the situation that Alice's first transmission suffered X noise and her second transmission suffered Y noise |