Content deleted Content added
→Background: First reference Tags: Mobile edit Mobile web edit Advanced mobile edit |
→Quantum image manipulations: Format Tags: Mobile edit Mobile web edit Advanced mobile edit |
||
Line 17:
==Quantum image manipulations==
A lot of the effort in QIMP has been focused on designing algorithms to manipulate the position and color information encoded using
To illustrate the feasibility and capability of QIMP algorithms and application, researchers always prefer to simulate the digital image processing tasks on the basis of the QIRs that we already have. By using the basic quantum gates and the aforementioned operations, so far, researchers have contributed to quantum image feature extraction,<ref name="Zhang Local 2015">{{cite journal |title= Local feature point extraction for quantum images |journal= Quantum Information Processing |volume=14 |issue=5 |pages=1573–1588 |year=2015 |last1=Zhang |first1=Y. |last2=Lu |first2=K. |last3= Xu |first3=K. |last4= Gao |first4=Y. |last5= Wilson |first5=R. |doi= 10.1007/s11128-014-0842-7 |bibcode= 2015QuIP...14.1573Z |s2cid= 20213446 }}</ref> quantum image segmentation,<ref name="Caraiman Histogram 2014">{{cite journal |title= Histogram-based segmentation of quantum images |journal= Theoretical Computer Science |volume=529 |pages=46–60 |year=2014 |last1=Caraiman |first1=S. |last2=Manta |first2=V. |doi= 10.1016/j.tcs.2013.08.005 |doi-access=free }}</ref> quantum image morphology,<ref name="Yuan Quantum 2015">{{cite journal |title= Quantum morphology operations based on quantum representation model |journal= Quantum Information Processing |volume=14 |issue=5 |pages=1625–1645 |year=2015 |last1=Yuan |first1=S. |last2=Mao |first2=X. |last3= Li |first3=T. |last4= Xue |first4=Y. |last5= Chen |first5=L. |last6= Xiong |first6=Q.|doi= 10.1007/s11128-014-0862-3 |bibcode= 2015QuIP...14.1625Y |s2cid= 44828546 }}</ref> quantum image comparison,<ref name="Yan A 2013">{{cite journal |title= A parallel comparison of multiple pairs of images on quantum computers |journal= International Journal of Innovative Computing and Applications |volume=5 |issue=4 |pages=199–212 |year=2013 |last1=Yan |first1=F. |last2=Iliyasu |first2=A. |last3= Le |first3=P. |last4= Sun |first4=B. |last5= Dong |first5=F. |last6= Hirota |first6=K.|doi= 10.1504/IJICA.2013.062955 }}</ref> quantum image filtering,<ref name="Caraiman Quantum 2013">{{cite journal |title= Quantum image filtering in the frequency ___domain |journal= Advances in Electrical and Computer Engineering |volume=13 |issue=3 |pages=77–84 |year=2013 |last1=Caraiman |first1=S. |last2=Manta |first2=V. |doi= 10.4316/AECE.2013.03013 |doi-access=free }}</ref> quantum image classification,<ref name="Ruan Quantum 2016">{{cite journal |title= Quantum computation for large-scale image classification |journal= Quantum Information Processing |volume=15 |issue=10|pages=4049–4069 |year=2016 |last1=Ruan |first1=Y. |last2=Chen |first2=H. |last3= Tan |first3=J. |url=https://www.researchgate.net/publication/305644388|doi= 10.1007/s11128-016-1391-z |bibcode= 2016QuIP...15.4049R |s2cid= 27476075 }}</ref> quantum image stabilization,<ref name="Yan Strategy 2016">{{cite journal |title= Strategy for quantum image stabilization |journal= Science China Information Sciences |volume=59 |issue= 5 |pages=052102 |year=2016 |last1=Yan |first1=F. |last2=Iliyasu |first2=A. |last3= Yang |first3=H. |last4= Hirota |first4=K. |doi= 10.1007/s11432-016-5541-9 |doi-access=free }}</ref> among others. In particular, QIMP-based security technologies have attracted extensive interest of researchers as presented in the ensuing discussions. Similarly, these advancements have led to many applications in the areas of watermarking,<ref name="Iliyasu Watermarking 2012">{{cite journal |title= Watermarking and authentication of quantum images based on restricted geometric transformations |journal= Information Sciences |volume=186 |issue=1|pages=126–149 |year=2012 |last1=Iliyasu |first1=A. |last2=Le |first2=P. |last3= Dong |first3=F. |last4= Hirota |first4=K. |doi= 10.1016/j.ins.2011.09.028 }}</ref><ref name="Heidari Watermarking 2016">{{cite journal |title= A Novel Lsb based Quantum Watermarking |journal= International Journal of Theoretical Physics |volume= 55 |issue=10 |pages=4205–4218 |year=2016|last1=Heidari |first1=S. |last2=Naseri |first2=M. |doi= 10.1007/s10773-016-3046-3 |bibcode= 2016IJTP...55.4205H |s2cid= 124870364 }}</ref><ref>{{cite journal |title= A quantum watermark protocol |journal= International Journal of Theoretical Physics |volume=52 |issue=2|pages=504–513 |year=2013 |last1=Zhang |first1=W. |last2=Gao |first2=F. |last3= Liu |first3=B. |last4= Jia |first4=H. |bibcode=2013IJTP...52..504Z |doi=10.1007/s10773-012-1354-9 |s2cid= 122413780 }}</ref> encryption,<ref name="Zhou Quantum 2013">{{cite journal |title= Quantum image encryption and decryption algorithms based on quantum image geometric transformations. International |journal= Journal of Theoretical Physics |volume=52 |issue=6|pages=1802–1817 |year=2013 |last1=Zhou |first1=R. |last2=Wu |first2=Q. |last3= Zhang |first3=M. |last4= Shen |first4=C. |doi= 10.1007/s10773-012-1274-8 |s2cid= 121269114 }}</ref> and [[steganography]]<ref name="Jiang Lsb 2015">{{cite journal |title= Lsb based quantum image steganography algorithm |journal= International Journal of Theoretical Physics |volume=55 |issue=1|pages=107–123 |year=2015 |last1=Jiang |first1=N. |last2=Zhao |first2=N. |last3= Wang |first3=L. |doi= 10.1007/s10773-015-2640-0 |s2cid= 120009979 }}</ref> etc., which form the core security technologies highlighted in this area.
|