Professional Documents
Culture Documents
ABSTRACT The ability of a Mach-Zehnder interferometer to distinguish between a photon with a well-
defined, independent quantum state and one that is part of an entangled pair opens the door for entanglement
to be harnessed as a degree of freedom of the photon and, consequently, to encode information into the
entanglement domain of an elementary particle. In this article, we propose a new idea for a quantum
steganographic technique that exploits the entanglement domain as a secondary way to represent information.
Thus, if photons are used as the physical support for encoding information, the cover data can be encoded
into the polarization domain, while the concealed data is embedded into the entanglement domain. The
scheme has clear advantages compared to previous quantum steganographic attempts in terms of efficiency,
versatility and practicability.
non-determinism, measurements and no-cloning principle, the carrier image is present in our quantum steganographic
which raise the level of security of quantum protocols procedure due to the fact that using a distinct degree of
beyond what classical cryptography can achieve, guarantee- freedom to encode the secret image ensures that the sacrificed
ing unbreakability with the very laws of quantum mechanics. bits are not taken from the cover image representation.
The second major contributor to the success of quantum In terms of the quantum image representation chosen
cryptography is the practical side of its techniques and proto- to support our steganographic procedure, we have opted
cols, most of which can easily be implemented with current for a qubit lattice (or array) representation, in which each
technology and do not have to wait until a full-scale quantum bit in the digital image is encoded into a separate qubit.
computer is built. We have thus avoided more pretentious encoding schemes
Trying to capitalize on the same strengths that proved that only apparently use fewer qubits by speculating on the
essential for the ascension of quantum cryptography, some theoretical advantages of large superposition states. Such
researchers have started to devise steganographic or water- approaches to quantum image steganography, whether they
marking schemes through quantum means [2], [3], [6], [8], are based on Cartesian coordinates for pixels (NEQR [27])
[9], [15]–[17], [21]–[23]. One of the most natural ways to used in [3], [8] or use quantum log-polar image representa-
disguise sensitive information is to take advantage of the tions (QUALPI [28]) to support image steganography [21],
particular characteristics of the communications channel, do not openly acknowledge the problem they have to retrieve
especially the ones that are naturally occurring, like noise. an image from its quantum representation. Precisely because
Indeed, many approaches to quantum steganography exploit the superpositions they employ have as many terms as there
the idea of hiding messages in quantum data by disguising are pixels in the digital image, it would take even more
it as deliberately inserted noise in a codeword of a quantum copies of the quantum representation to be able to retrieve
error-correcting code [2], [16], [17], [23]. Mihara [16], [17] all (or almost all) pixels in the image through measurements
also achieves a separation between the cover data and the (see [19] for a detailed analysis of this issue).
embedded secret message, such that embedding any secret Regardless of the particular way the cover data (be it an
text does not modify the content of cover data. This is a fea- image or not) is represented quantum mechanically, all the
ture that our quantum image steganography technique shares quantum steganographic proposals to date share the following
as well: the same cover image can be used with any embedded characteristic: in order to embed secret information in the
secondary image and a modification in one does not require quantum cover data (image), additional resources (in the form
a change in the other. However, while our protocol is free of of qubits) have to be allocated beside the ones used for
any pre-conditions that need to be satisfied, Mihara requires the public information, or alternatively, some of the qubits
pre-shared entanglement between the communicating parties, intended for the quantum image representation have to be
while other approaches, such as [2] use classical secret keys instead used to encode the secret information, at the expense
to encode the secret data, even if quantum error-correcting of the image quality. In this manuscript, we propose, for the
codes are employed. first time, a steganographic protocol that can reuse the qubits
Although, in general, both the cover data and the concealed that are the physical support of the cover data in order to
data can take any form (text, image, sound, video, etc.), encode the secret information as well. This is possible due to a
most steganographic procedures focus on hiding information double-encoding strategy, in which a primary degree of free-
within images. In this respect, the quantum image represen- dom of some particle (such as polarization of photons or spin
tation needed in a steganographic scheme is either a Qubit of electrons) is exploited together with its entanglement
Lattice [14], [25], [26], which mirrors the structure of a digital degree of freedom in order to encode within the quantum
image, or more economical alternatives that employ expo- state of the same particle a bit of information which is part
nentially fewer qubits by manipulating large superposition of the cover image representation, as well as some amount
states [1], [10]–[13], [24], [27], [28], but which suffer from of secret information. The entanglement degree of freedom
the measurement bottleneck problem [19]. that is central to our novel steganographic idea refers to a
For quantum steganographic approaches specifically particle’s property of being part of an entangled ensemble or
designed to work with digital images, the Least Significant having its own well-defined, independent quantum state. The
Bit (LSB) technique remains the most popular one, even in proposed method is conceptually clean, harnessing different
a quantum context [3], [8], [9]. Our approach also employs domains to separate the carrier data from the secret embedded
a variation of this technique, sacrificing several of the least data, is implementable with current technology, does not
significant bits in the gray level representation of a pixel require additional qubits for the secret information and can be
in order to allocate more resources to the most significant combined with cryptographic techniques to encode the secret
bits and thus, improving the quality of the recovered hidden data, if necessary.
image. This is in contrast to the standard LSB technique, The remainder of the paper is organized as follows. Next
in which the quality of the cover image is reduced (even if section provides the details of how a Mach-Zehnder interfer-
imperceptibly to the human eye) by using one or more of the ometer can be used to distinguish between a photon that is
least significant bits to encode the secret data at the expense of part of an entangled pair and a single, standalone photon.
the cover image. No degradation whatsoever in the quality of In Section 3, we show how solving this distinguishability
different from the previous scenario, in which a single photon This quantity can be pushed arbitrarily close to 1, by encoding
entering a Mach-Zehnder interferometer horizontally always one bit over an arbitrary number of particles. For example,
exits the device in the same way (horizontally). assume that if we want to encode a 0, we prepare two inde-
In the case of the two entangled photons, entanglement pendent, standalone photons, while if we want to encode the
acts as some sort of measurement on the position of a pho- value 1 we generate two pairs of entangled photons, and
ton, destroying the interference brought about by the exper- use one photon from each pair to represent the bit 1. In this
imental apparatus. Since it is possible, even theoretically, case, the amount of information carried by the two photons
to obtain information about which path a particular photon increases to:
took through the interferometer by observing the position 3 5 1 1 4 4 5 8
of its ‘‘twin’’, the correlations between the entangled pho- · 1 + (1 − (− log − log )) = 1 + ( − log 5)
8 8 5 5 5 5 8 5
tons amount to a measurement on the position of any of ≈ 0.55 (13)
the two photons, which ultimately leads to non-interference.
However, the difference in behavior between a photon that Note in the above formula that in three out of eight cases
is part of an entangled pair and a single, standalone photon (when the photons are part of entangled pairs and at least
introduces a degree of freedom that can be harnessed for one exits the interferometer vertically) we know the encoded
various purposes. bit is a 1. On the other hand, when both photons emerge
horizontally (event that happens in five out of eight cases),
there is still a 1/5 probability that they encode a 1. In general,
III. CODING IN THE ENTANGLEMENT DOMAIN
when one bit is encoded over a group of n photons, the amount
Turning a photon (or, in general, any particle for which
of information carried becomes:
position-entangled pairs can be generated) into physical sup-
2n − 1 2n + 1 2n
port for encoding and transmitting information can be done
n+1
+ n+1 (1 + n · n − log (2n + 1))
easily by distinguishing between a photon with a well- 2 2 2 +1
n + 1 log (2n + 1)
defined, independent quantum state and a photon whose = − . (14)
quantum state can only be described as part of an entan- 2 2n+1
gled pair. The tool to achieve this distinguishability is a It is easy to check that, for all practical purposes,
Mach-Zehnder interferometer, as we have seen in detail in 9 or10 photons are enough to be able to distinguish between
the previous section, or a similar device that can be used a 0 and a 1 with very high probability. However, what
to achieve interference of other elementary particles used as makes encoding in the entanglement domain appealing is
physical support. Consequently, we can follow the convention the fact that it can be used as a secondary degree of free-
that a single, standalone photon always encodes the bit 0, dom to increase the amount of information that can be
while a photon that was generated through SPDC, for exam- stored/transmitted to more than one bit per particle. This
ple, encodes a 1. Thus, depending on the physical process strategy can be used, for instance, to improve the efficiency
that birthed the photon, we can encode information in the of quantum cryptographic protocols by exploiting the entan-
entanglement domain. glement degree of freedom of a photon together with its
In order to read the value of a bit encoded like this, we need polarization [18]. In the next section, we show how the
to pass the carrier photon through a Mach-Zehnder interfer- same technique of double encoding in the polarization and
ometer and observe which photon detector it will trigger. entanglement domains can be used to create a steganographic
A vertical exit, corresponding to a click registered by D2, algorithm with all the security benefits brought about by
is equivalent to reading a 1 (entangled photon), because non- quantum mechanics.
entangled photons always exit the apparatus horizontally.
A click registered by D1, on the other hand, cannot be inter- IV. QUANTUM STEGANOGRAPHY SCHEME
preted unambiguously. Assuming that, a priori, the photon Although, in general, both the concealed and the host data
is equally likely to carry a 0 or a 1, when we see the pho- can take any format (text, audio, image, video, etc.), for con-
ton exiting horizontally, there is a 2/3 probability the bit creteness, let us assume throughout this section that we intend
carried is 0 and a 1/3 probability that the photon is part to hide an image B within a host image A. More precisely,
of an entanglement and therefore, it carries a value of 1. we wish to conceal the Lena image (Figure 4) within the
Because a value of 0 cannot always be reliably distinguished image of Figure 3.
from a 1, if the information is encoded in the entanglement Both images are composed of 512 × 512 pixels, with the
domain, it follows that the amount of information carried by gray level of each pixel in the range [0..255] (encoded on
one particle is less than one bit. To be precise, the amount 8 bits). Our quantum steganography scheme uses a qubit
of information that can be encoded by a single photon lattice to represent both images (A and B) at the same time,
is: but using different degrees of freedom. Since each of the
two images can be thought of as a sequence of bits ai ,
1 3 1 1 2 2 1 3 2 respectively bi , with i = 0, 1, 2, . . . , 226 − 1, the quantum
· 1+ (1−(− log − log )) = + (1+ − log 3) image representation will require a sequence of photons φi
4 4 3 3 3 3 4 4 3
≈ 0.31 (12) with the same length. Each photon φi will be responsible of
FIGURE 6. Recovered hidden image using a simple encoding/decoding FIGURE 7. Recovered hidden image using an encoding/decoding scheme
procedure. based on progressive allocation of resources for most significant bits in
the gray level representation.
ended up: in detector D3 or D4. This allows Alice and Bob to image, nothing has to be changed in the way the secret image
determine if a third party (Eve) meddled with the photons in is encoded and viceversa, changing the secret image does not
transit. Once Bob has received all the photons and measured entail modifications in the polarizations encoding the cover
them, the photons belonging to an entangled pair must exit image.
the sender and respectively the receiver’s interferometer both A common method in classical image steganography,
horizontally or both vertically, as detailed in Section 2. Any where each pixel in the digital image is represented either
mismatch points to a possible eavesdropper at work. Alice as a single grayscale value or as three individual values for
and Bob can take advantage of this property and verify a an RGB color image, is to sacrifice the resources allocated
small fraction of the entangled photons if their measurement to represent the Least Significant Bit(s) (LSB) and use them
outcomes coincide. Only then, Alice can disclose the correct to encode the secret information instead. It is only natu-
order of the bits through a classical public communication ral that this idea made its way through to quantum image
channel allowing Bob to correctly reconstruct the hidden steganography as well [3], [8], [9]. We have also adapted
image. it, in the previous section, in order to increase the quality
For each entangled photon disturbed by Eve, there is a 50% of the concealed image. Thus, instead of distributing the
chance of a mismatch between what Alice and Bob observe available resources (photons) uniformly over all bit-planes,
through their interferometers, so the probability of detecting we have devised a progressive allocation scheme that rewards
an eavesdropper (Eve) increases rapidly with each entangled the most significant bits in the pixel value. However, unlike
state collapsed by Eve and tested by Alice and Bob: previous applications of this idea, in our protocol there is
no degradation whatsoever in the quality of the cover image
1
Pdetect = 1 − (15) because of the resources sacrificed from its representation,
2n even if this degradation may seem imperceptible to the human
where n is the number of entangled states tested. The postu- eye.
lates of quantum mechanics, such as measurements collapse Some quantum steganographic protocols impose pre-
the quantum state or the no-cloning theorem, which are very conditions that must be met in order for the procedure to
useful in quantum cryptography in general, also guarantee the unfold successfully. These pre-conditions usually take the
security of the modified protocol above. form of some shared resource, such as a classical secret
key or an entangled state, between the parties that want to
VI. DISCUSSION communicate secret information disguised within innocent-
Having described our main idea for quantum steganography looking data [17], [22], [23]. These shared resources are
and some ways to optimize its applicability or enhance its either used as part of the steganographic procedure to hide
security, we proceed in this section to an enumeration of its the secret information within the structure of the public
advantages, discussed in the context of existing techniques data or they are used to encrypt the secret information prior
proposed in this area. Undoubtedly, the main advantages to being embedded into the carrier data, as a precautionary
of our scheme stem from the double encoding technique measure, in case the hiding technique fails.
employed, namely, working with two different and com- Ensuring that both the sender and the intended receiver
pletely independent degrees of freedom of a photon: its polar- share some resources prior to the execution of the stegano-
ization and its ability to be entangled with another photon. graphic protocol raises problems of its own and our stegano-
Being able to encode the pixel values making up the graphic scheme is not relying on any such pre-conditions
secret image within the same particles that constitute the being satisfied. It is true that, in our scheme, the hidden
physical support for representing the non-secret or cover data is not normally encrypted in any way, but, if neces-
image positively impacts the efficiency of our scheme, as no sary, encryption of the secret data could be achieved without
additional resources (taking the form of qubits, at a generic any supplementary resources or requirements. The sender
level, or photons, at a practical level) are required for embed- can, as we have described in detail in the previous section,
ding the secret information. This one-to-one correspondence scramble the order of the pixels in the concealed image and
between the number of photons employed in the quantum only reveal the correct order to the intended receiver through
image representation and the number of bits the cover image a public channel, after the photons have been received
is composed of also avoids raising suspicions about possible and measured, provided that no eavesdropping activity is
secret information hidden within the representation, as each detected.
photon may be interpreted as the physical embodiment of a As another point we wish to make in regard to our
bit in the public image and nothing more. steganography technique, we mention its general applicabil-
At the same time, the complete independence between the ity and versatility. We have exemplified our novel idea on
two encoding domains, the fact that if a photon is spatially the particular case of concealing a digital image by encoding
entangled or not has no consequence whatsoever on the polar- it on the same physical support as another digital image,
ization state of that photon, also helps keep the two image playing the role of a carrier or cover data. However, nothing
representations fully independent. What this means is that, precludes the technique described herein to be applied to
if we want to make any modification to the public, carrier any other form of digital information (that is, information
represented as a sequence of bits), in the case of both the No such degradation in the quality of the cover data is present
hidden information or the public, cover data. This comprises in our procedure.
audio files, text and digital video formats among others. The Although the technique we propose is easily imple-
protocol can also be applied as a watermarking technique by mentable with current photon technology, its versatility
replacing the hidden image with a logo or a copyright note. makes it adaptable to other physical support for which the
Removing it would amount to reconstructing the whole image entanglement degree of freedom can be exploited (such as
from scratch, bit by bit. electrons, for example) or other data formats besides images
Finally, the physical embodiment of a qubit throughout (such as text, audio, video, etc.). In case it is crucial that the
our protocol description is a photon, since a photon’s polar- secret information, once discovered, does not get decoded
ization and entanglement degrees of freedom are relatively by an unauthorized third party, the protocol can be extended
easy to manipulate with current technology. More specif- such that only the intended recipient can decode the secret
ically, single-photon interferometry, which is the corner- information, with the help of the sender, after eavesdropping
stone of harnessing the entanglement domain of a photon has been ruled out.
in order to encode information, is easy to bring about using For all the reasons enumerated above, we assert that our
a Mach-Zehnder interferometer. But the same underlying quantum steganography technique by harnessing entangle-
idea can be implemented with other elementary particles, ment as a degree of freedom has clear advantages over previ-
as long as some basic physical property of the particle can ous approaches in terms of efficiency of resource utilization,
be exploited for encoding information along with the ability security, versatility, extendability, adaptability and last, but
of the particle to interfere with itself and be entangled with not least, its implementability with current technology.
another entity. One such alternative is an electron, with its
spin serving as the primary degree of freedom for encod- REFERENCES
[1] S. Caraiman and V. Manta, ‘‘Image processing using quantum comput-
ing bits. As for electron interferometry, there exists devices ing,’’ in Proc. 16th Int. Conf. Syst. Theory, Control Comput. (ICSTCC),
similar to a Mach-Zehnder interferometer that can allow an Oct. 2012, pp. 1–6.
electron to interfere with itself [7]. [2] J. Gea-Banacloche, ‘‘Hiding messages in quantum data,’’ J. Math. Phys.,
vol. 43, no. 9, pp. 4531–4536, Sep. 2002, doi: 10.1063/1.1495073.
[3] S. Heidari, M. R. Pourarian, R. Gheibi, M. Naseri, and M. Houshmand,
VII. CONCLUSION ‘‘Quantum red–green–blue image steganography,’’ Int. J. Quantum Inf.,
The evidence presented in the paper supports the conclusion vol. 15, no. 5, 2017, Art. no. 1750039, doi: 10.1142/S0219749917500393.
[4] J. Horgan, ‘‘Quantum philosophy,’’ Sci. Amer., vol. 267, no. 1, pp. 94–105,
that harnessing entanglement as a degree of freedom is a 1992. [Online]. Available: http://www.jstor.org/stable/24939143
powerful and versatile tool for enhancing information encod- [5] J. C. Howell, R. S. Bennink, S. J. Bentley, and R. W. Boyd, ‘‘Realization
ing, when coupled with another way of representing infor- of the Einstein-Podolsky-Rosen paradox using Momentum- and position-
entangled photons from spontaneous parametric down conversion,’’ Phys.
mation, and it is a good choice for quantum steganography, Rev. Lett., vol. 92, no. 21, May 2004, Art. no. 210403. [Online]. Available:
in particular. https://link.aps.org/doi/10.1103/PhysRevLett.92.210403
The ease of manipulating photon polarizations makes it a [6] A. M. Iliyasu, P. Q. Le, F. Dong, and K. Hirota, ‘‘Watermarking
and authentication of quantum images based on restricted geometric
prime candidate for practical implementations of quantum transformations,’’ Inf. Sci., vol. 186, no. 1, pp. 126–149, Mar. 2012,
cryptographic protocols. Because everyone expects that a doi: 10.1016/j.ins.2011.09.028.
photon carries information encoded in its polarization state, [7] Y. Ji, Y. Chung, D. Sprinzak, M. Heiblum, D. Mahalu, and H. Shtrik-
man, ‘‘An electronic Mach–Zehnder interferometer,’’ Nature, vol. 422,
it also makes polarization as the ideal candidate for encod- pp. 415–418, Mar. 2003, doi: 10.1038/nature01503.
ing the public (non-secret) information in a steganographic [8] N. Jiang, N. Zhao, and L. Wang, ‘‘LSB based quantum image steganogra-
approach, thus deflecting attention from the more elusive phy algorithm,’’ Int. J. Theor. Phys., vol. 55, no. 1, pp. 107–123, Jan. 2016.
[9] J. Sang, S. Wang, and Q. Li, ‘‘Least significant qubit algorithm for quan-
hidden information encoded into the entanglement degree of tum images,’’ Quantum Inf. Process., vol. 15, no. 11, pp. 4441–4460,
freedom of the photon. The paper describes in detail how the Nov. 2016.
secret information can be retrieved using a Mach-Zehnder [10] R. A. Khan, ‘‘An improved flexible representation of quantum
images,’’ Quantum Inf. Process., vol. 18, no. 7, p. 201, Jul. 2019,
interferometer, while the cover data can be ‘‘read’’ easily doi: 10.1007/s11128-019-2306-6.
through a polarizer beam splitter. [11] P. Q. Le, F. Dong, and K. Hirota, ‘‘A flexible representation of quantum
The double-encoding idea supporting our approach to images for polynomial preparation, image compression, and processing
operations,’’ Quantum Inf. Process., vol. 10, no. 1, pp. 63–84, Feb. 2011,
steganography not only reduces the number of photons doi: 10.1007/s11128-010-0177-y.
required to implement the procedure, but because there are [12] H.-S. Li, Z. Qingxin, S. Lan, C.-Y. Shen, R. Zhou, and J. Mo, ‘‘Image
no additional photons used to embed the hidden data (the storage, retrieval, compression and segmentation in a quantum system,’’
Quantum Inf. Process., vol. 12, no. 6, pp. 2269–2290, Jun. 2013.
secret information is still encoded on the same photons that [13] H.-S. Li, Q. Zhu, R.-G. Zhou, L. Song, and X.-J. Yang, ‘‘Multi-dimensional
are used for the cover data), it makes the whole repre- color image storage and retrieval for a normal arbitrary quantum superposi-
sentation less suspicious to carry secret information. This tion state,’’ Quantum Inf. Process., vol. 13, no. 4, pp. 991–1011, Apr. 2014.
[14] X. Liu and R.-G. Zhou, ‘‘Color image storage and retrieval using quantum
is an important departure from all previous steganographic mechanics,’’ Quantum Inf. Process., vol. 18, no. 5, p. 132, May 2019,
attempts (whether classical or quantum), in which some of doi: 10.1007/s11128-019-2248-z.
the physical resources that are supposed to embody the public [15] K. Martin, ‘‘Steganographic communication with quantum information,’’
in Information Hiding (Lecture Notes in Computer Science), vol. 4567,
data are actually used to encode secret information, to the T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Berlin, Germany: Springer,
detriment of the quality of the cover data representation. 2007, pp. 32–49.
[16] T. Mihara, ‘‘Quantum steganography embedded any secret text without MARIUS NAGY received the B.Sc. degree in com-
changing the content of cover data,’’ J. Quantum Inf. Sci., vol. 2, no. 1, puter science from the Technical University of
pp. 10–14, 2012. Cluj-Napoca, Romania, in 1993, and the M.Sc. and
[17] T. Mihara, ‘‘Quantum steganography using prior entanglement,’’ Ph.D. degrees in computer science from Queen’s
Phys. Lett. A, vol. 379, nos. 12–13, pp. 952–955, Jun. 2015. University, Kingston, ON, in 2001 and 2007,
[Online]. Available: http://www.sciencedirect.com/science/article/pii/ respectively. His Ph.D. thesis focuses on novel
S0375960115000997 applications of quantum mechanics into informa-
[18] M. Nagy and N. Nagy, ‘‘Coding in the entanglement domain,’’ Quantum
tion processing and data security.
Inf. Process., vol. 19, no. 4, Apr. 2020, doi: 10.1007/s11128-020-02632-6.
He has worked as a Software Developer in
[19] M. Nagy and N. Nagy, ‘‘Image processing: Why quantum?’’ Quan-
tum Inf. Comput., vol. 20, nos. 7–8, pp. 616–626, 2020, doi: 10.26421/ Romania, until 1999, when he moved to Canada
QIC20.7-8. to pursue an academic career. He continued as a Postdoctoral Fellow
[20] J. W. Pan, Z. B. Chen, C. Y. Lu, H. Weinfurter, A. Zeilinger, and with the School of Computing, Queen’s University, until the end of 2008.
Z. M. Zfiukowski, ‘‘Multiphoton entanglement and interferometry,’’ In 2009, he took a position as a Sessional Instructor with the Department
Rev. Mod. Phys., vol. 84, pp. 777–838, May 2012. [Online]. Available: of Mathematics and Computer Science, Royal Military College of Canada.
https://link.aps.org/doi/10.1103/RevModPhys.84.777 In February 2010, he was appointed as an Assistant Professor with the
[21] Z. Qu, Z. Li, G. Xu, S. Wu, and X. Wang, ‘‘Quantum image steganography College of Computer Engineering and Science, Prince Mohammad Bin Fahd
protocol based on quantum image expansion and grover search algorithm,’’ University, Al Khobar, Saudi Arabia. His research interests include quan-
IEEE Access, vol. 7, pp. 50849–50857, 2019. tum information processing, particularly with applications to cryptography,
[22] Z.-G. Qu, X.-B. Chen, X.-J. Zhou, X.-X. Niu, and Y.-X. Yang, parallel, and unconventional models of computation and algorithms. His
‘‘Novel quantum steganography with large payload,’’ Opt. Commun., publication record includes several book chapters and more than 40 journal
vol. 283, no. 23, pp. 4782–4786, Dec. 2010. [Online]. Available: and conference papers.
http://www.sciencedirect.com/science/article/pii/ S0030401810006954 Dr. Nagy was awarded the Distinguished Thesis Award for the best
[23] B. A. Shaw and T. A. Brun, ‘‘Quantum steganography with noisy
M.Sc. thesis in the Department of Computing and Information Science,
quantum channels,’’ Phys. Rev. A, Gen. Phys., vol. 83, no. 2, Feb. 2011.
in 2001, while pursuing his graduate studies at Queen’s University. He
[Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.83.
022310 was also a recipient of the National Science and Engineering Research
[24] B. Sun, D. of Computational Intelligence, J. Systems ScienceTokyo Insti- Council (NSERC) Post Graduate Scholarship from September 2002 to
tute of TechnologyG3-494259 NagatsutaMidori-kuYokohama 226-8502, August 2004 and two Ontario Graduate Scholarships from Septem-
A. M. Iliyasu, F. Yan, F. Dong, and K. Hirota, ‘‘An RGB multi-channel ber 2004 to August 2006. He was the Queen’s University’s Nominee for
representation for images on quantum computers,’’ J. Adv. Comput. Intell. the 2008 NSERC Doctoral Prize in the engineering and computer sciences
Intell. Informat., vol. 17, no. 3, pp. 404–417, May 2013. category.
[25] S. E. Venegas-Andraca and S. Bose, ‘‘Storing, processing, and retrieving an
image using quantum mechanics,’’ in Quantum Information and Computa- NAYA NAGY received the Ph.D. degree in the
tion (International Society for Optics and Photonics), vol. 5105, E. Donkor, field of quantum cryptography from Queen’s
A. R. Pirich, and H. E. Brandt, Eds. Bellingham, WA, USA: SPIE, 2003,
University, Canada, in 2010. She is currently
pp. 137–147, doi: 10.1117/12.485960.
an Assistant Professor with Imam Abdulrahman
[26] S. Yuan, X. Mao, Y. Xue, L. Chen, Q. Xiong, and A. Compare, ‘‘SQR: A
simple quantum representation of infrared images,’’ Quantum Inf. Process., Bin Faisal University, Saudi Arabia. She has
vol. 13, no. 6, pp. 1353–1379, Jun. 2014. published more than 15 peer reviewed journal
[27] Y. Zhang, K. Lu, Y. Gao, and M. Wang, ‘‘NEQR: A novel enhanced articles. Her research interests include quantum
quantum representation of digital images,’’ Quantum Inf. Process., vol. 12, computation, cryptography, security, parallel and
no. 8, pp. 2833–2860, Aug. 2013. distributed algorithms, and recently bioinformat-
[28] Y. Zhang, K. Lu, Y. Gao, and K. Xu, ‘‘A novel quantum representation for ics. Her professional experience stems from ten
log-polar images,’’ Quantum Inf. Process., vol. 12, no. 9, pp. 3103–3126, years of teaching courses and supervising projects in computer science.
Sep. 2013, doi: 10.1007/s11128-013-0587-8.