<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1315765</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2023.1315765</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Color watermarking algorithm combining the quantum discrete cosine transform with the sinusoidal&#x2013;tent map</article-title>
<alt-title alt-title-type="left-running-head">Zeng et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fphy.2023.1315765">10.3389/fphy.2023.1315765</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Zeng</surname>
<given-names>Ping-Ping</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2541882/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhou</surname>
<given-names>Xi</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/software/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhong</surname>
<given-names>De-Fei</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/visualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chen</surname>
<given-names>Su-Hua</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Gong</surname>
<given-names>Li-Hua</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>College of Science and Technology</institution>, <institution>Nanchang University</institution>, <addr-line>Jiujiang</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Department of Electronic Information Engineering</institution>, <institution>Nanchang University</institution>, <addr-line>Nanchang</addr-line>, <country>China</country>
</aff>
<aff id="aff3">
<sup>3</sup>
<institution>School of Electronic and Electrical Engineering</institution>, <institution>Shanghai University of Engineering Science</institution>, <addr-line>Shanghai</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1469391/overview">Jesus Manuel Munoz-Pacheco</ext-link>, Benem&#xe9;rita Universidad Aut&#xf3;noma de Puebla, Mexico</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1114317/overview">Gurpreet Kaur</ext-link>, Amity University, India</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2585201/overview">Daniel Clemente-Lopez</ext-link>, National Institute of Astrophysics, Optics and Electronics (INAOE), Mexico</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Ping-Ping Zeng, <email>ppzeng@ncu.edu.cn</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>02</day>
<month>02</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>11</volume>
<elocation-id>1315765</elocation-id>
<history>
<date date-type="received">
<day>10</day>
<month>10</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>22</day>
<month>12</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Zeng, Zhou, Zhong, Chen and Gong.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Zeng, Zhou, Zhong, Chen and Gong</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>To overcome the drawbacks of the existing sinusoidal map and tent map, this paper proposes the design of a sinusoidal&#x2013;tent (ST) map. The test results indicate that the new chaotic system exhibits more significant advantages in chaos control. Compared with the sinusoidal map and tent map, the proposed sinusoidal&#x2013;tent map performs better in terms of bifurcation diagram and Lyapunov exponents. The trajectories of the sinusoidal&#x2013;tent map can occupy all the phase planes over (0,4), while those of the two classic maps only occupy a small phase space, and the Lyapunov exponents of the ST map are all positive within the range of control parameters, higher than those of seed maps. Simultaneously, a novel quantum scrambling operation is devised based on the sinusoidal&#x2013;tent map to avoid the periodicity of the quantum Arnold scrambling method. Initially, two chaotic sequences are generated to scramble the pixel positions of the watermark image, further enhancing the security of the watermarking algorithm. Subsequently, the host image is processed by the quantum discrete cosine transform, and finally, the scrambled watermark image is inserted into the medium-frequency band of the transformed host image, ensuring the invisibility of the watermarking. According to the simulation results, the quantum watermarking algorithm has excellent invisibility and robustness.</p>
</abstract>
<kwd-group>
<kwd>quantum watermarking</kwd>
<kwd>quantum discrete cosine transform</kwd>
<kwd>sinusoidal&#x2013;tent map</kwd>
<kwd>quantum color image representation</kwd>
<kwd>image copyright</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Quantum Engineering and Technology</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Information security is indeed a crucial field in the era of big data. Image information security is one of its significant branches that have witnessed rapid development over the past few decades [<xref ref-type="bibr" rid="B1">1</xref>&#x2013;<xref ref-type="bibr" rid="B5">5</xref>]. Particularly, benefiting from the entanglement characteristics and the powerful parallel computing abilities, quantum computing has the potential to overcome the limitations of classical computation. Quantum computing is a computational model that employs quantum bits, utilizing the principles of quantum mechanics to process information. Traditional computers use bits (0 or 1) as the smallest units for storage and processing, while quantum computers use quantum bits, often referred to as &#x201c;qubits.&#x201d; Qubits can not only represent the states of 0 and 1 but also exist in superstitions of these states, a key aspect of quantum parallelism [<xref ref-type="bibr" rid="B6">6</xref>].</p>
<p>During signal transmission, the computing complexity of quantum operations has been effectively reduced, thereby significantly increasing information security through quantum computing. Beach et al. [<xref ref-type="bibr" rid="B7">7</xref>] highlighted and analyzed the doubts surrounding quantum image processing, demonstrating the true quantum superiority in quantum image classification and recognition. To improve the fault tolerance of quantum circuits, Li et al. [<xref ref-type="bibr" rid="B8">8</xref>] implemented cyclic and complete translations on quantum images through quantum arithmetic operations and realized the scalar matrix multiplication by designing fault-tolerant circuits for these operations with the TR and Peres gates. The mid-point filter, which is an order statistic filter, cannot be directly used in the frequency domain. As a solution, Ali et al. [<xref ref-type="bibr" rid="B9">9</xref>] introduced a new quantum mid-point filter designed specifically for spatial domain applications. This proposed approach maintains the same level of noise suppression as the classical version but significantly reduces the complexity.</p>
<p>For different purposes, various representation models of quantum images have been investigated [<xref ref-type="bibr" rid="B10">10</xref>&#x2013;<xref ref-type="bibr" rid="B14">14</xref>]. The first flexible representation of the quantum image (FRQI) was invented to encode the position information and color information of an image into a single quantum state [<xref ref-type="bibr" rid="B10">10</xref>]. A novel enhanced quantum representation (NEQR) was explored to quadratically speed up the preparation of quantum images and enhance the compression ratio of quantum images [<xref ref-type="bibr" rid="B11">11</xref>]. The radiation energy value of a pixel in infrared images could be stored using the probability of projection measurement [<xref ref-type="bibr" rid="B12">12</xref>]. A quantum scaling-up algorithm for images was proposed using nearest-neighbor interpolation [<xref ref-type="bibr" rid="B14">14</xref>]. In addition, researchers have also developed several models for quantum color image representation, such as NCQI [<xref ref-type="bibr" rid="B15">15</xref>], MQIR [<xref ref-type="bibr" rid="B16">16</xref>], and DQRCI [<xref ref-type="bibr" rid="B17">17</xref>].</p>
<p>Digital watermarking is a technique that embeds specific information within digital media, with the aim of verifying or identifying the authenticity, ownership, or source of digital content. This technology is commonly used in digital media files such as images, audio, and videos [<xref ref-type="bibr" rid="B18">18</xref>]. To address the security issue in copyright protection, various watermarking strategies have been explored [<xref ref-type="bibr" rid="B19">19</xref>, <xref ref-type="bibr" rid="B20">20</xref>]. Gong et al. [<xref ref-type="bibr" rid="B19">19</xref>] proposed a watermarking scheme for double-color images, which involved the use of quaternion fractional-order orthogonal Fourier&#x2013;Mellin moments and geometric correction. Different from classical watermarking algorithms, quantum watermarking algorithms (QWAs) combine principles of quantum computation theory and watermarking strategies [<xref ref-type="bibr" rid="B20">20</xref>, <xref ref-type="bibr" rid="B21">21</xref>]. A quantum watermarking scheme was enhanced by utilizing the novel enhanced quantum representation (NEQR) along with a color scrambling technique and small-scale quantum circuits [<xref ref-type="bibr" rid="B22">22</xref>]. In order to improve the visual quality and embedding capacity, Zeng et al. [<xref ref-type="bibr" rid="B23">23</xref>] proposed a quantum watermarking algorithm by combining the maximal pixel difference with the tent map. A self-recovery QWA was devised with block truncation coding to increase the key space and improve security [<xref ref-type="bibr" rid="B24">24</xref>]. In 2021, Li et al. [<xref ref-type="bibr" rid="B25">25</xref>] proposed a quantum watermarking scheme for the quantum hue, saturation, and lightness (QHSL) image in the spatial domain. The scheme aimed to protect the integrity and ownership of QHSL images against various attacks. A QWA was presented with the quantum Fourier transformation [<xref ref-type="bibr" rid="B26">26</xref>]. Similarly, a quantum image watermarking algorithm was investigated by the quantum Haar wavelet transform [<xref ref-type="bibr" rid="B27">27</xref>]. The discrete cosine transform (DCT) is a Fourier-related transform similar to the discrete Fourier transform but using only <ext-link ext-link-type="uri" xlink:href="https://en.wikipedia.org/wiki/Real_number">real numbers</ext-link> [<xref ref-type="bibr" rid="B28">28</xref>]. The utilization of DCT shifts an image from the time domain to the frequency domain, where most of the signal information is focused on the low-frequency bands situated in the upper-left corner. DCT is frequently employed for lossy compression, as seen in the JPEG compression of digital images and the MP3 compression of digital audio, owing to its robust energy compaction features. Simultaneously, DCT coefficients in the high-frequency bands, located in the lower-right corner, are nearly zero. Building upon the aforementioned characteristics of the DCT, Mohsen et al. [<xref ref-type="bibr" rid="B29">29</xref>] proposed a quantum watermarking algorithm for audio using the quantum discrete cosine transform (QDCT). This algorithm utilizes QDCT, a quantum counterpart of the classical DCT, to achieve enhanced information compression performance inherited from the DCT. Overall, the use of QDCT in audio watermarking offers advantages in terms of imperceptibility and robustness. However, it is important to conduct further research to evaluate the effectiveness and security of QDCT-based QWAs in practical applications and against more sophisticated attacks.</p>
<p>Quantum image scrambling techniques were invented for quantum watermarking due to the superiority of quantum computing models. The quantum Arnold transform is one of the common and available image scrambling methods [<xref ref-type="bibr" rid="B30">30</xref>]. However, the risk from the periodicity of the Arnold transform is unavoidable, as attackers can restore the scrambled image with sufficient computing resources. In order to mitigate this risk, a new quantum image scrambling operation using the sinusoidal&#x2013;tent map is proposed here. This map is a 1D chaotic map which is chosen due to its simple structure and easy implementation. The sinusoidal&#x2013;tent map exhibits more significant advantages in spatiotemporal performance and chaotic characteristics compared to the sinusoidal map and tent map. Additionally, a quantum color watermarking algorithm is studied by integrating the QDCT with the sinusoidal&#x2013;tent map, and a quantum network for the proposed quantum image watermark embedding is also devised.</p>
</sec>
<sec id="s2">
<title>2 Fundamental knowledge</title>
<sec id="s2-1">
<title>2.1 NCQI model</title>
<p>The NCQI model storing a quantum color image <inline-formula id="inf1">
<mml:math id="m1">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> of size <inline-formula id="inf2">
<mml:math id="m2">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> was mathematically defined as Eq. <xref ref-type="disp-formula" rid="e1">1</xref> [<xref ref-type="bibr" rid="B15">15</xref>]<disp-formula id="e1">
<mml:math id="m3">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mo>&#x007C;</mml:mo>
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2297;</mml:mo>
</mml:mrow>
<mml:mo>&#x007C;</mml:mo>
</mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>where <inline-formula id="inf3">
<mml:math id="m4">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> denotes the color value of the associated pixel encoded by a binary sequence <inline-formula id="inf4">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>G</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>B</mml:mi>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:msub>
<mml:mi>B</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and is expressed as the following Eq. <xref ref-type="disp-formula" rid="e2">2</xref>.<disp-formula id="e2">
<mml:math id="m6">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:munder>
<mml:munder>
<mml:mrow>
<mml:msubsup>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="true">&#x23df;</mml:mo>
</mml:munder>
<mml:mtext>Red</mml:mtext>
</mml:munder>
<mml:munder>
<mml:munder>
<mml:mrow>
<mml:msubsup>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>G</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="true">&#x23df;</mml:mo>
</mml:munder>
<mml:mtext>Green</mml:mtext>
</mml:munder>
<mml:munder>
<mml:munder>
<mml:mrow>
<mml:msubsup>
<mml:mi>B</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>B</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msubsup>
</mml:mrow>
<mml:mo stretchy="true">&#x23df;</mml:mo>
</mml:munder>
<mml:mtext>Blue</mml:mtext>
</mml:munder>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
</p>
<p>The grayscale value of each channel <inline-formula id="inf5">
<mml:math id="m7">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>G</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, or <inline-formula id="inf6">
<mml:math id="m8">
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> ranges from 0 to <inline-formula id="inf7">
<mml:math id="m9">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. The NCQI model can store a color image in a normalized quantum superposition state. To represent a pixel, the color information <inline-formula id="inf8">
<mml:math id="m10">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and the vertical and horizontal positions <inline-formula id="inf9">
<mml:math id="m11">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf10">
<mml:math id="m12">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> are involved. As for any <inline-formula id="inf11">
<mml:math id="m13">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> by <inline-formula id="inf12">
<mml:math id="m14">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> color image with channel <inline-formula id="inf13">
<mml:math id="m15">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>G</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, or <inline-formula id="inf14">
<mml:math id="m16">
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> ranging from 0 to <inline-formula id="inf15">
<mml:math id="m17">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, there are <inline-formula id="inf16">
<mml:math id="m18">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>3</mml:mn>
<mml:mi>q</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> qubits involved to store it into an NCQI state.</p>
</sec>
<sec id="s2-2">
<title>2.2 Novel enhanced quantum representation</title>
<p>As a commonly used quantum representation of images, NEQR stores the gray information of each image pixel via the basis state of a qubit sequence, and it performs well because of its accuracy and flexibility. Assume that the gray value of an image pixel ranges from 0 to <inline-formula id="inf17">
<mml:math id="m19">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf18">
<mml:math id="m20">
<mml:mrow>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msubsup>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>1</mml:mn>
</mml:msubsup>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x22ef;</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is a binary sequence encoding the pixel value <inline-formula id="inf19">
<mml:math id="m21">
<mml:mrow>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, then Eq. <xref ref-type="disp-formula" rid="e3">3</xref> is obtained.<disp-formula id="e3">
<mml:math id="m22">
<mml:mrow>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>0</mml:mn>
</mml:msubsup>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>1</mml:mn>
</mml:msubsup>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x22ef;</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:mn>0,1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>A <inline-formula id="inf20">
<mml:math id="m23">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>qubit</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> quantum image of size <inline-formula id="inf21">
<mml:math id="m24">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> could be written as Eq. <xref ref-type="disp-formula" rid="e4">4</xref>.<disp-formula id="e4">
<mml:math id="m25">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mfenced open="&#x232a;" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:munderover>
<mml:mo>&#x2297;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mi>i</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mfenced open="&#x232a;" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>A quantum binary image of size <inline-formula id="inf22">
<mml:math id="m26">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> can be written as Eq. <xref ref-type="disp-formula" rid="e5">5</xref>.<disp-formula id="e5">
<mml:math id="m27">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2297;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>00</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2297;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>01</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2297;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>10</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2297;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>11</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>where <inline-formula id="inf23">
<mml:math id="m28">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf24">
<mml:math id="m29">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> represent black and white, respectively.</p>
<p>The calculation of the absolute value (CAV) of two n-qubit sequences can be implemented by integrating the above RPS and CO modules [<xref ref-type="bibr" rid="B31">31</xref>].</p>
<p>To determine whether two input quantum sequences <inline-formula id="inf25">
<mml:math id="m30">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf26">
<mml:math id="m31">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> are equal, a quantum equal (QE) module was designed by Zhou et al. [<xref ref-type="bibr" rid="B32">32</xref>].</p>
</sec>
<sec id="s2-3">
<title>2.3 Quantum discrete cosine transform</title>
<p>The quantum discrete cosine transform on a <inline-formula id="inf27">
<mml:math id="m32">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> by <inline-formula id="inf28">
<mml:math id="m33">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> image is defined mathematically as Eq. <xref ref-type="disp-formula" rid="e6">6</xref> and Eq. <xref ref-type="disp-formula" rid="e7">7</xref>.<disp-formula id="e6">
<mml:math id="m34">
<mml:mrow>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mtd>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f0;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
</mml:mtable>
</mml:mtd>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f0;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mrow>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
</mml:mtable>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
<disp-formula id="e7">
<mml:math id="m35">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mi>V</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2020;</mml:mo>
</mml:msubsup>
<mml:mtext>&#x2009;</mml:mtext>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:msub>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:msub>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
</p>
<p>Module <inline-formula id="inf29">
<mml:math id="m36">
<mml:mrow>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the quantum Fourier transform on <inline-formula id="inf30">
<mml:math id="m37">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> qubits, and in Eq. <xref ref-type="disp-formula" rid="e8">8</xref>,<disp-formula id="e8">
<mml:math id="m38">
<mml:mrow>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mi>&#x3d6;</mml:mi>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:msup>
<mml:mi>&#x3d6;</mml:mi>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mtd>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi>&#x3d6;</mml:mi>
</mml:mrow>
</mml:mtd>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:msup>
<mml:mi>&#x3d6;</mml:mi>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f0;</mml:mo>
</mml:mtd>
<mml:mtd/>
<mml:mtd>
<mml:msup>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f0;</mml:mo>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mi>&#x3c9;</mml:mi>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
</mml:mtable>
</mml:mtd>
<mml:mtd>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd/>
<mml:mtd>
<mml:mrow>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:msup>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd/>
<mml:mtd>
<mml:mo>&#x22f0;</mml:mo>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mi>&#x3c9;</mml:mi>
</mml:mrow>
</mml:mtd>
<mml:mtd/>
<mml:mtd/>
<mml:mtd/>
</mml:mtr>
</mml:mtable>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
<inline-formula id="inf31">
<mml:math id="m39">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf32">
<mml:math id="m40">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mn>2</mml:mn>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi mathvariant="normal">i</mml:mi>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> are operation matrices extracted from matrices <inline-formula id="inf33">
<mml:math id="m41">
<mml:mrow>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf34">
<mml:math id="m42">
<mml:mrow>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, respectively, where <inline-formula id="inf35">
<mml:math id="m43">
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="normal">i</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. <xref ref-type="fig" rid="F1">Figure 1</xref> illustrates the whole QDCT quantum circuit.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Quantum circuit of QDCT.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="s3">
<title>3 Quantum color image watermarking scheme</title>
<sec id="s3-1">
<title>3.1 Improved quantum module</title>
<sec id="s3-1-1">
<title>3.1.1 Improved reversible half-subtractor</title>
<p>
<xref ref-type="fig" rid="F2">Figure 2</xref> illustrates the quantum circuits and quantum modules of the proposed improved reversible half-subtractor (IRHS) according to [<xref ref-type="bibr" rid="B31">31</xref>]. The IRHS module performs the half-subtraction operation. <inline-formula id="inf36">
<mml:math id="m44">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>&#x2295;</mml:mo>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> represents the difference between single qubits <inline-formula id="inf37">
<mml:math id="m45">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>A</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf38">
<mml:math id="m46">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf39">
<mml:math id="m47">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>A</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> denotes the corresponding borrow bit. The quantum circuit of IRHS shown in <xref ref-type="fig" rid="F2">Figure 2</xref> saves one CNOT gate and one qubit compared with the RHS [<xref ref-type="bibr" rid="B31">31</xref>]. The complexity of <inline-formula id="inf40">
<mml:math id="m48">
<mml:mrow>
<mml:mtext>Controlled</mml:mtext>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>V</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> (<inline-formula id="inf41">
<mml:math id="m49">
<mml:mrow>
<mml:mtext>Controlled</mml:mtext>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>V</mml:mi>
<mml:mo>&#x2020;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>) is 1, and that of the CNOT gate is also 1. Therefore, the complexities of the RHS and IRHS modules are 8 and 7, respectively.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Circuit of IRHS and its quantum module.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g002.tif"/>
</fig>
</sec>
<sec id="s3-1-2">
<title>3.1.2 Improved reversible full-subtractor</title>
<p>An improved reversible full-subtractor (IRFS) based on [<xref ref-type="bibr" rid="B31">31</xref>] is redesigned, as shown in <xref ref-type="fig" rid="F3">Figure 3</xref>. Different from the quantum circuit of RFS, the IRFS module economizes a qubit and one CNOT gate. The IRFS module performs a full-subtraction operation, where the outputs <inline-formula id="inf42">
<mml:math id="m50">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>&#x2295;</mml:mo>
<mml:mi>B</mml:mi>
<mml:mo>&#x2295;</mml:mo>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf43">
<mml:math id="m51">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>&#x2295;</mml:mo>
<mml:mi>B</mml:mi>
</mml:mrow>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2295;</mml:mo>
<mml:mover accent="true">
<mml:mi>A</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> denote <inline-formula id="inf44">
<mml:math id="m52">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>B</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and the corresponding borrow bit, respectively. The complexities of quantum circuits of the RFS and IRFS modules are 11 and 10, respectively.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Circuit of IRFS and its quantum module.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g003.tif"/>
</fig>
</sec>
<sec id="s3-1-3">
<title>3.1.3 Improved reversible parallel subtractor</title>
<p>A reversible parallel subtractor (RPS) usually involves RHS and RFS [<xref ref-type="bibr" rid="B31">31</xref>], and thus the improved reversible parallel subtractor (IRPS) for <inline-formula id="inf45">
<mml:math id="m53">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>qubit</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> sequences can be implemented by combining IRHS and IRFS. As shown in <xref ref-type="fig" rid="F4">Figure 4</xref>, the sequence <inline-formula id="inf46">
<mml:math id="m54">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> denotes the difference between sequence <inline-formula id="inf47">
<mml:math id="m55">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>X</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and sequence <inline-formula id="inf48">
<mml:math id="m56">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>Y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>. Obviously, the complexities of the single <inline-formula id="inf49">
<mml:math id="m57">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>qubit</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> IRPS and RPS modules are <inline-formula id="inf50">
<mml:math id="m58">
<mml:mrow>
<mml:mn>10</mml:mn>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf51">
<mml:math id="m59">
<mml:mrow>
<mml:mn>11</mml:mn>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, respectively.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Quantum circuit of IRPS and its quantum module.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g004.tif"/>
</fig>
</sec>
<sec id="s3-1-4">
<title>3.1.4 Improved calculation of the absolute value</title>
<p>The quantum module CAV consists of RPS and CO [<xref ref-type="bibr" rid="B31">31</xref>]. <xref ref-type="fig" rid="F5">Figure 5</xref> shows the proposed improved calculation of the absolute value (ICAV), which consists of CO and IRPS. A <inline-formula id="inf52">
<mml:math id="m60">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>qubit</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> CO module is composed of <inline-formula id="inf53">
<mml:math id="m61">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> CNOT gates, one Toffoli gate, and some <inline-formula id="inf54">
<mml:math id="m62">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>CNOT</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> operation gates.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Quantum module of ICAV.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g005.tif"/>
</fig>
</sec>
</sec>
<sec id="s3-2">
<title>3.2 Sinusoidal&#x2013;tent map</title>
<sec id="s3-2-1">
<title>3.2.1 Sinusoidal map</title>
<p>The sinusoidal map is a common one-dimensional chaotic map [<xref ref-type="bibr" rid="B33">33</xref>] and is defined as Eq. <xref ref-type="disp-formula" rid="e9">9</xref>.<disp-formula id="e9">
<mml:math id="m63">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>u</mml:mi>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>&#x3c0;</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>where <inline-formula id="inf55">
<mml:math id="m64">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf56">
<mml:math id="m65">
<mml:mrow>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the control parameter within the range of <inline-formula id="inf57">
<mml:math id="m66">
<mml:mrow>
<mml:mfenced open="" close="]" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mo>(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>. The bifurcation and Lyapunov exponent plots of the sinusoidal map are shown in <xref ref-type="fig" rid="F6">Figure 6A</xref>; <xref ref-type="fig" rid="F7">Figure 7A</xref>, respectively. The Lyapunov exponents and bifurcation diagram serve as crucial metrics in discerning the chaotic characteristics of systems exhibiting chaos. In the case of a chaotic map, the onset of chaotic behaves when its Lyapunov exponents surpass zero. As illustrated in <xref ref-type="fig" rid="F6">Figure 6A</xref>, the Lyapunov exponents of the sinusoidal map exceed 0 only under specific control parameters <inline-formula id="inf58">
<mml:math id="m67">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mn>2.16</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2.32</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. Furthermore, as depicted in <xref ref-type="fig" rid="F7">Figure 7A</xref>, the values of the chaotic sequence generated by the sinusoidal map are irregularly distributed within the chaotic range <inline-formula id="inf59">
<mml:math id="m68">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mn>2.16</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2.32</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. These observations suggest that the sinusoidal map demonstrates suboptimal chaos behavior, imposing significant limitations on its practical applicability.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Trajectories of different chaotic maps: <bold>(A)</bold> sinusoidal map with parameter <inline-formula id="inf60">
<mml:math id="m69">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <bold>(B)</bold> tent map with <inline-formula id="inf61">
<mml:math id="m70">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <bold>(C)</bold> sinusoidal&#x2013;tent map with parameter <inline-formula id="inf62">
<mml:math id="m71">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g006.tif"/>
</fig>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Lyapunov exponents of different chaotic maps: <bold>(A)</bold> sinusoidal map with parameter <inline-formula id="inf63">
<mml:math id="m72">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <bold>(B)</bold> tent map with parameter <inline-formula id="inf64">
<mml:math id="m73">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <bold>(C)</bold> sinusoidal&#x2013;tent map with parameter <inline-formula id="inf65">
<mml:math id="m74">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g007.tif"/>
</fig>
</sec>
<sec id="s3-2-2">
<title>3.2.2 Tent map</title>
<p>The tent map is a one-dimensional piece-wise linear map [<xref ref-type="bibr" rid="B34">34</xref>] and is defined as Eq. <xref ref-type="disp-formula" rid="e10">10</xref>.<disp-formula id="e10">
<mml:math id="m75">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>/</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>where <inline-formula id="inf66">
<mml:math id="m76">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf67">
<mml:math id="m77">
<mml:mrow>
<mml:mi>v</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the parameter within the range of (0, 4]. The bifurcation and Lyapunov exponent plots of the tent map are shown in <xref ref-type="fig" rid="F6">Figure 6B</xref>; <xref ref-type="fig" rid="F7">Figure 7B</xref>, respectively. When <inline-formula id="inf68">
<mml:math id="m78">
<mml:mrow>
<mml:mi>v</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mn>2,4</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, the tent map is chaotic. Therefore, this mapping also shares the same issues as the sinusoidal mapping technique.</p>
</sec>
<sec id="s3-2-3">
<title>3.2.3 Sinusoidal&#x2013;tent map</title>
<p>By combining the sinusoidal map with the tent map, a sinusoidal&#x2013;tent map as the new chaotic map is designed as Eq. <xref ref-type="disp-formula" rid="e11">11</xref>.<disp-formula id="e11">
<mml:math id="m79">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:msup>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi mathvariant="normal">&#x3c0;</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>50</mml:mn>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20</mml:mn>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:msup>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>sin</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi mathvariant="normal">&#x3c0;</mml:mi>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>50</mml:mn>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>20</mml:mn>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(11)</label>
</disp-formula>where the parameter <inline-formula id="inf69">
<mml:math id="m80">
<mml:mrow>
<mml:mfenced open="" close="]" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mo>(</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf70">
<mml:math id="m81">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the output chaotic sequence. Compared with the sinusoidal and tent maps, the designed sinusoidal&#x2013;tent map performs better in terms of bifurcation diagram and Lyapunov exponents. As shown in <xref ref-type="fig" rid="F6">Figure 6</xref>, the bifurcation of ST is distributed across the entire data range of the plane. This distribution area is significantly larger than the outputs of the sinusoidal map and tent map. By observing <xref ref-type="fig" rid="F7">Figure 7</xref>, it can be noted that the Lyapunov exponents of the ST map are all positive within the range of control parameters, indicating favorable chaotic characteristics.</p>
</sec>
</sec>
<sec id="s3-3">
<title>3.3 Quantum scrambling with the sinusoidal&#x2013;tent map</title>
<p>The Arnold scrambling method is insecure with sufficient computing resources owing to its periodicity. Therefore, we put forward a new irregular scrambling method. The scrambling on a quantum image <inline-formula id="inf71">
<mml:math id="m82">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mi>K</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:munderover>
<mml:mo>&#x2297;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mi>i</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is as follows:</p>
<p>(1) <italic>a</italic> and <italic>b</italic> are chosen as initial parameter values of the sinusoidal&#x2013;tent map. Then, two chaotic sequences <inline-formula id="inf72">
<mml:math id="m83">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf73">
<mml:math id="m84">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> are generated using the sinusoidal&#x2013;tent map, where <italic>j</italic> represents the <italic>j</italic>th iteration. Then, the two chaotic sequences are converted into integer sequences <inline-formula id="inf74">
<mml:math id="m85">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf75">
<mml:math id="m86">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, respectively, which are represented as Eq. <xref ref-type="disp-formula" rid="e12">12</xref> and Eq. <xref ref-type="disp-formula" rid="e13">13</xref>.<disp-formula id="e12">
<mml:math id="m87">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>floor</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(12)</label>
</disp-formula>
<disp-formula id="e13">
<mml:math id="m88">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>floor</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(13)</label>
</disp-formula>
</p>
<p>(2) The original image is then scrambled via the element values of <inline-formula id="inf76">
<mml:math id="m89">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf77">
<mml:math id="m90">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf78">
<mml:math id="m91">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf79">
<mml:math id="m92">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> express the quantum states of sequences <inline-formula id="inf80">
<mml:math id="m93">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf81">
<mml:math id="m94">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, respectively. The quantum image position scrambling operation is denoted as <inline-formula id="inf82">
<mml:math id="m95">
<mml:mrow>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, and the <inline-formula id="inf83">
<mml:math id="m96">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> scrambled image <inline-formula id="inf84">
<mml:math id="m97">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>K</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is represented as Eq. <xref ref-type="disp-formula" rid="e14">14</xref>.<disp-formula id="e14">
<mml:math id="m98">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>K</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>K</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:munderover>
<mml:mo>&#x2297;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mi>i</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x232a;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
</mml:mstyle>
<mml:munderover>
<mml:mo>&#x2297;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:munderover>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mi>i</mml:mi>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mfenced open="&#x232a;" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
<label>(14)</label>
</disp-formula>where <inline-formula id="inf85">
<mml:math id="m99">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>S</mml:mi>
</mml:msub>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf86">
<mml:math id="m100">
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mo>&#x2a;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> represents the absolute value operation. The quantum module of this scrambling operation is shown in <xref ref-type="fig" rid="F8">Figure 8</xref>.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>Circuit of the quantum scrambling operation.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g008.tif"/>
</fig>
</sec>
<sec id="s3-4">
<title>3.4 Watermark embedding procedure</title>
<p>During the watermark embedding process, the color image <inline-formula id="inf87">
<mml:math id="m101">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is watermarked with a binary watermark <inline-formula id="inf88">
<mml:math id="m102">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. <xref ref-type="fig" rid="F9">Figure 9</xref> shows the embedding procedure of the quantum color image watermarking algorithm, and the detailed embedding process is given below.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>Embedding procedure of the quantum watermarking algorithm.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g009.tif"/>
</fig>
<p>
<statement content-type="step" id="Step_1">
<label>Step 1</label>
<p>The classical image <inline-formula id="inf89">
<mml:math id="m103">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> of size <inline-formula id="inf90">
<mml:math id="m104">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is transformed into a quantum image <inline-formula id="inf91">
<mml:math id="m105">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> by the NCQI.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_2">
<label>Step 2</label>
<p>With the initial parameter value <italic>a</italic> of the sinusoidal&#x2013;tent map, one chaotic sequence <inline-formula id="inf92">
<mml:math id="m106">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is produced using the sinusoidal&#x2013;tent chaotic map. The chaotic sequence <inline-formula id="inf93">
<mml:math id="m107">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is changed to an integer sequence <inline-formula id="inf94">
<mml:math id="m108">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>:<disp-formula id="e15">
<mml:math id="m109">
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>floor</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>mod</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>10</mml:mn>
<mml:mn>15</mml:mn>
</mml:msup>
<mml:mo>,</mml:mo>
<mml:mn>256</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(15)</label>
</disp-formula>
<disp-formula id="e16">
<mml:math id="m110">
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2033;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>mod</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(16)</label>
</disp-formula>
</p>
<p>According to Eq. <xref ref-type="disp-formula" rid="e16">16</xref>, if <inline-formula id="inf95">
<mml:math id="m111">
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2033;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> equals to 0, 1, or 2, then R, G, or B channel of the quantum image <inline-formula id="inf96">
<mml:math id="m112">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is chosen to embed the watermarking image, i.e., <inline-formula id="inf97">
<mml:math id="m113">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_3">
<label>Step 3</label>
<p>The original watermark <inline-formula id="inf98">
<mml:math id="m114">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> of size <inline-formula id="inf99">
<mml:math id="m115">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is transformed into a quantum image <inline-formula id="inf100">
<mml:math id="m116">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> by the NEQR. Then, a scrambled quantum watermarked image <inline-formula id="inf101">
<mml:math id="m117">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is yielded by executing the quantum scrambling operation <italic>S</italic> on <inline-formula id="inf102">
<mml:math id="m118">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>. The quantum scrambling circuit is shown in <xref ref-type="fig" rid="F8">Figure 8</xref>.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_4">
<label>Step 4</label>
<p>Image <inline-formula id="inf103">
<mml:math id="m119">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is translated into the frequency domain by the QDCT operation. The energy of the QDCT coefficients is mainly congregated in the upper-left corner of the sub-block, which is the low-frequency part of an image, and most of the remaining coefficients are very close to zero. Therefore, the medium-frequency part is a better area to embed the watermark compared with the low-frequency part. <inline-formula id="inf104">
<mml:math id="m120">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is an image transformed using the QDCT operation.</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_5">
<label>Step 5</label>
<p>The medium-frequency QDCT coefficients of every sub-block are selected randomly and embedded with a quantum image <inline-formula id="inf105">
<mml:math id="m121">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> multiplied by a coefficient <inline-formula id="inf106">
<mml:math id="m122">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> to obtain <inline-formula id="inf107">
<mml:math id="m123">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> by Eq. <xref ref-type="disp-formula" rid="e17">17</xref>:<disp-formula id="e17">
<mml:math id="m124">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(17)</label>
</disp-formula>
</p>
</statement>
</p>
<p>
<statement content-type="step" id="Step_6">
<label>Step 6</label>
<p>After executing the inverse QDCT on <inline-formula id="inf108">
<mml:math id="m125">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> to obtain <inline-formula id="inf109">
<mml:math id="m126">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2033;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, the final color image <inline-formula id="inf110">
<mml:math id="m127">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>I</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> inserted with a secret message can be yielded from the reconstructed <inline-formula id="inf111">
<mml:math id="m128">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2033;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and other channels.</p>
<p>A quantum watermark embedding network is shown in <xref ref-type="fig" rid="F10">Figure 10</xref>, where <inline-formula id="inf112">
<mml:math id="m129">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mi>Y</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>.</mml:mo>
<mml:mo>.</mml:mo>
<mml:mo>.</mml:mo>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf113">
<mml:math id="m130">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>.</mml:mo>
<mml:mo>.</mml:mo>
<mml:mo>.</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>. <italic>E</italic>(<italic>k</italic>) denotes the scrambled quantum watermarked image <inline-formula id="inf114">
<mml:math id="m131">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> multiplied by the watermark embedding coefficient <inline-formula id="inf115">
<mml:math id="m132">
<mml:mrow>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>Quantum watermark embedding network.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g010.tif"/>
</fig>
</sec>
<sec id="s3-5">
<title>3.5 Watermark extraction</title>
<p>The watermark image is extracted from a watermarked quantum color image with the help of the color host image and the keys to choose the embedded channel and scramble the watermark image. <xref ref-type="fig" rid="F11">Figure 11</xref> shows the extraction of the designed quantum color image watermarking algorithm, and the extraction process is detailed below.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption>
<p>Extraction procedure of the quantum watermarking algorithm.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g011.tif"/>
</fig>
<p>
<statement content-type="step" id="STEP_1">
<label>Step 1</label>
<p>First, in order to extract the watermark image from the host image, the classical watermarked image <inline-formula id="inf116">
<mml:math id="m133">
<mml:mrow>
<mml:msup>
<mml:mi>I</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> should be transformed into the corresponding quantum state <inline-formula id="inf117">
<mml:math id="m134">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>I</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> by the NCQI.</p>
</statement>
</p>
<p>
<statement content-type="step" id="STEP_2">
<label>Step 2</label>
<p>The chaotic sequence <inline-formula id="inf118">
<mml:math id="m135">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is generated by the sinusoidal&#x2013;tent map with the same initial parameter <italic>a</italic>. According to Eq. <xref ref-type="disp-formula" rid="e15">15</xref> and Eq. <xref ref-type="disp-formula" rid="e16">16</xref>, the random sequence <inline-formula id="inf119">
<mml:math id="m136">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is converted into the random integer sequence <inline-formula id="inf120">
<mml:math id="m137">
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2033;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>. In the following, if <inline-formula id="inf121">
<mml:math id="m138">
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mi>i</mml:mi>
</mml:mrow>
<mml:mo>&#x2033;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> equals to 0, 1, or 2, the corresponding R, G, or B channel <inline-formula id="inf122">
<mml:math id="m139">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2033;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> with a watermark image can be easily chosen from the final color image <inline-formula id="inf123">
<mml:math id="m140">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>I</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<p>
<statement content-type="step" id="STEP_3">
<label>Step 3</label>
<p>This step is only to perform QDCT on the watermarked image <inline-formula id="inf124">
<mml:math id="m141">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2033;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> in order to recover the quantum image <inline-formula id="inf125">
<mml:math id="m142">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</statement>
</p>
<p>
<statement content-type="step" id="STEP_4">
<label>Step 4 </label>
<p>
<inline-formula id="inf126">
<mml:math id="m143">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> can be obtained by performing the QDCT operation on image <inline-formula id="inf127">
<mml:math id="m144">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>P</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>. According to the corresponding medium-frequency embedding position, the scrambled watermark image <inline-formula id="inf128">
<mml:math id="m145">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> could be obtained as Eq. <xref ref-type="disp-formula" rid="e18">18</xref>.<disp-formula id="e18">
<mml:math id="m146">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msup>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:msup>
<mml:mi>P</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mi>k</mml:mi>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(18)</label>
</disp-formula>
</p>
</statement>
</p>
<p>
<statement content-type="step" id="STEP_5">
<label>Step 5</label>
<p>The sequences <inline-formula id="inf129">
<mml:math id="m147">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf130">
<mml:math id="m148">
<mml:mrow>
<mml:mfenced open="{" close="}" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
<mml:mo>&#x7c;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0,1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> are then generated using the sinusoidal&#x2013;tent map controlled by the initial parameters <italic>a</italic> and <italic>b</italic>, respectively. By recalling <inline-formula id="inf131">
<mml:math id="m149">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf132">
<mml:math id="m150">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2a;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, the extracted watermark image <inline-formula id="inf133">
<mml:math id="m151">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is acquired by executing the inverse scrambling operation <inline-formula id="inf134">
<mml:math id="m152">
<mml:mrow>
<mml:msup>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> shown in Eq. <xref ref-type="disp-formula" rid="e19">19</xref>:<disp-formula id="e19">
<mml:math id="m153">
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>W</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msup>
<mml:mo>&#x232a;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(19)</label>
</disp-formula>
</p>
</statement>
</p>
<p>
<statement content-type="step" id="STEP_6">
<label>Step 6</label>
<p>After quantum measurement, the quantum watermark image <inline-formula id="inf135">
<mml:math id="m154">
<mml:mrow>
<mml:mfenced open="" close="&#x232a;" separators="|">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="|" close="" separators="|">
<mml:mrow>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula> is eventually translated into a classical image.</p>
</statement>
</p>
</sec>
</sec>
<sec id="s4">
<title>4 Numerical simulation and discussion</title>
<p>The numerical simulations are carried out under the MATLAB R2017b platform on a classical PC. Ten host color images of size <inline-formula id="inf136">
<mml:math id="m155">
<mml:mrow>
<mml:mn>512</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>512</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> taken for the test are shown in <xref ref-type="fig" rid="F12">Figure 12</xref>. Two binary watermark images of sizes <inline-formula id="inf137">
<mml:math id="m156">
<mml:mrow>
<mml:mn>128</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>128</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf138">
<mml:math id="m157">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> are shown in <xref ref-type="fig" rid="F13">Figure 13</xref>. The initial values <italic>a</italic> and <italic>b</italic> and the control parameter <italic>r</italic> of the sinusoidal&#x2013;tent map are set to 0.325, 0.333, and 0.1, respectively, and the embedding coefficient <italic>k</italic> of the proposed color image QWA is set at 0.01.</p>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption>
<p>Ten selected test images of size <inline-formula id="inf139">
<mml:math id="m158">
<mml:mrow>
<mml:mn>512</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>512</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>: <bold>(A)</bold> &#x201c;Boat,&#x201d; <bold>(B)</bold> &#x201c;White house,&#x201d; <bold>(C)</bold> &#x201c;Villa,&#x201d; <bold>(D)</bold> &#x201c;Parrot,&#x201d; <bold>(E)</bold> &#x201c;Building,&#x201d; <bold>(F)</bold> &#x201c;Hats,&#x201d; <bold>(G)</bold> &#x201c;Motorbike,&#x201d; <bold>(H)</bold> &#x201c;Flower,&#x201d; <bold>(I)</bold> &#x201c;Yacht,&#x201d; and <bold>(J)</bold> &#x201c;Beacon.&#x201d; Adapted with permission from [<xref ref-type="bibr" rid="B37">37</xref>], licensed by Eastman Kodak Company.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g012.tif"/>
</fig>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption>
<p>Watermark images: <bold>(A)</bold> &#x201c;Camera&#x201d; of size <inline-formula id="inf140">
<mml:math id="m159">
<mml:mrow>
<mml:mn>128</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>128</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. <bold>(B)</bold> &#x201c;Cat&#x201d; of size <inline-formula id="inf141">
<mml:math id="m160">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. Adapted with permission from [<xref ref-type="bibr" rid="B37">37</xref>], licensed by Eastman Kodak Company.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g013.tif"/>
</fig>
<p>The scrambling operation <italic>S</italic> is executed on the watermark image &#x201c;Camera&#x201d; and &#x201c;Cat,&#x201d; and <xref ref-type="fig" rid="F14">Figures 14A, B</xref> show the corresponding scrambled watermark images. As shown in <xref ref-type="fig" rid="F14">Figure 14</xref>, the proposed scrambling operation has an acceptable scrambling performance.</p>
<fig id="F14" position="float">
<label>FIGURE 14</label>
<caption>
<p>Scrambled watermark images: <bold>(A)</bold> &#x201c;Camera.&#x201d; <bold>(B)</bold> &#x201c;Cat.&#x201d;</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g014.tif"/>
</fig>
<sec id="s4-1">
<title>4.1 Watermark evaluation exponents</title>
<p>The peak signal-to-noise ratio (PSNR) is expressed as Eq. <xref ref-type="disp-formula" rid="e20">20</xref>.<disp-formula id="e20">
<mml:math id="m161">
<mml:mrow>
<mml:mtext>PSNR</mml:mtext>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>20</mml:mn>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>lg</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mtext>MSE</mml:mtext>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(20)</label>
</disp-formula>where <inline-formula id="inf142">
<mml:math id="m162">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> is the maximal image grayscale value, <inline-formula id="inf143">
<mml:math id="m163">
<mml:mrow>
<mml:mtext>MSE</mml:mtext>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:munder>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>Z</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> is the mean-squared error between the host image <inline-formula id="inf144">
<mml:math id="m164">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and its associated watermarked image <inline-formula id="inf145">
<mml:math id="m165">
<mml:mrow>
<mml:mi>Z</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf146">
<mml:math id="m166">
<mml:mrow>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the number of pixels in an image.</p>
<p>The structural similarity exponent matrix (SSIM) can assess the distortion of an image or the similarity of two images according to Eq. <xref ref-type="disp-formula" rid="e21">21</xref>:<disp-formula id="e21">
<mml:math id="m167">
<mml:mrow>
<mml:mtext>SSIM</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>y</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msubsup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>y</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(21)</label>
</disp-formula>where <inline-formula id="inf147">
<mml:math id="m168">
<mml:mrow>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf148">
<mml:math id="m169">
<mml:mrow>
<mml:msub>
<mml:mi>c</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are constants, <inline-formula id="inf149">
<mml:math id="m170">
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf150">
<mml:math id="m171">
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> are the variance value and the mean value, respectively, and <inline-formula id="inf151">
<mml:math id="m172">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c3;</mml:mi>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the covariance value of <italic>x</italic> and <italic>y</italic>.</p>
<p>Normalized cross-correlation (NCC) is another important exponent to assess the similarity of two images and is usually employed to measure the robustness of watermarking algorithms against different attacks, which is expressed as Eq. <xref ref-type="disp-formula" rid="e22">22</xref>.<disp-formula id="e22">
<mml:math id="m173">
<mml:mrow>
<mml:mtext>NCC</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>Z</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>M</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>I</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>Z</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>Z</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>M</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>I</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:msqrt>
<mml:msqrt>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>M</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mi>Z</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>Z</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:mfrac>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(22)</label>
</disp-formula>
</p>
<p>Here, <inline-formula id="inf152">
<mml:math id="m174">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the image size. <inline-formula id="inf153">
<mml:math id="m175">
<mml:mrow>
<mml:mi>I</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf154">
<mml:math id="m176">
<mml:mrow>
<mml:mi>Z</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represent the pixel values of images <inline-formula id="inf155">
<mml:math id="m177">
<mml:mrow>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf156">
<mml:math id="m178">
<mml:mrow>
<mml:mi>Z</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> at the position <inline-formula id="inf157">
<mml:math id="m179">
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>, respectively. The NCC value is in the range of <inline-formula id="inf158">
<mml:math id="m180">
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1,1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
</inline-formula>. The closer the NCC value is to 1, the more similar the two images are.</p>
</sec>
<sec id="s4-2">
<title>4.2 Imperceptibility analysis</title>
<p>
<xref ref-type="fig" rid="F15">Figures 15A&#x2013;E</xref> show the watermarked color images with the watermark image &#x201c;Camera,&#x201d; while <xref ref-type="fig" rid="F15">Figures 15F&#x2013;I</xref> show the watermarked images with the watermark image &#x201c;Cat.&#x201d; By observing and comparing <xref ref-type="fig" rid="F12">Figure 12</xref>; <xref ref-type="fig" rid="F15">Figure 15</xref>, it can be observed that there is no significant difference between the watermarked image and the original host image.</p>
<fig id="F15" position="float">
<label>FIGURE 15</label>
<caption>
<p>Watermarked image with &#x201c;Camera&#x201d;: <bold>(A)</bold> &#x201c;Boat,&#x201d; <bold>(B)</bold> &#x201c;White house,&#x201d; <bold>(C)</bold> &#x201c;Villa,&#x201d; <bold>(D)</bold> &#x201c;Parrot,&#x201d; and <bold>(E)</bold> &#x201c;Building.&#x201d; Watermarked image with &#x201c;Cat&#x201d;: <bold>(F)</bold> &#x201c;Hats,&#x201d; <bold>(G)</bold> &#x201c;Motorbike,&#x201d; <bold>(H)</bold> &#x201c;Flower,&#x201d; <bold>(I)</bold> &#x201c;Yacht,&#x201d; and <bold>(J)</bold> &#x201c;Beacon.&#x201d; Adapted with permission from [<xref ref-type="bibr" rid="B37">37</xref>], licensed by Eastman Kodak Company.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g015.tif"/>
</fig>
<p>The values listed in <xref ref-type="table" rid="T1">Table 1</xref> represent the PSNR and SSIM for the watermark image with two different sizes. The PSNR is mainly used for the evaluation and comparison of image and video compression algorithms and can help measure the impact of different compression algorithms on the quality of images or videos. The higher the value of the PSNR, the smaller the difference between two images, indicating higher quality. Generally, if the PSNR value is greater than 30&#xa0;dB, it is hard to differentiate between the original host image and the watermarked image. If the PSNR value is greater than 40&#xa0;dB, then the invisibility of the image watermark algorithm can be ensured. As for the watermark images &#x201c;Camera&#x201d; and &#x201c;Cat,&#x201d; the average PSNR values of the host image and the watermarked image with the proposed QWA are 46.76&#xa0;dB and 52.60 dB, respectively. It indicates that the quality of the watermarked image and the corresponding original host image are very close. In addition, the SSIM values of the host image and the watermarked one approach 1. The SSIM value ranges from 0 to 1, where 1 indicates that the two images are identical and 0 indicates that the two images are completely different. A higher SSIM value indicates that the two images are more similar. Therefore, the proposed color image watermark algorithm has good invisibility.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>PSNR and SSIM values with the proposed QWA.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Watermark image</th>
<th align="left">Host image</th>
<th align="left">PSNR</th>
<th align="left">SSIM</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="10" align="left">Camera 128&#x00D7;128 <inline-graphic xlink:href="FPHY_fphy-2023-1315765_wc_tfx1.tif"/>
</td>
<td align="left">Boat</td>
<td align="left">48.24</td>
<td align="left">0.9974</td>
</tr>
<tr>
<td align="left">House</td>
<td align="left">46.11</td>
<td align="left">0.9965</td>
</tr>
<tr>
<td align="left">Villa</td>
<td align="left">46.78</td>
<td align="left">0.9967</td>
</tr>
<tr>
<td align="left">Parrot</td>
<td align="left">46.06</td>
<td align="left">0.9980</td>
</tr>
<tr>
<td align="left">Building</td>
<td align="left">45.94</td>
<td align="left">0.9987</td>
</tr>
<tr>
<td align="left">Hats</td>
<td align="left">46.73</td>
<td align="left">0.9976</td>
</tr>
<tr>
<td align="left">Motorbike</td>
<td align="left">48.39</td>
<td align="left">0.9992</td>
</tr>
<tr>
<td align="left">Flower</td>
<td align="left">46.38</td>
<td align="left">0.9976</td>
</tr>
<tr>
<td align="left">Yacht</td>
<td align="left">45.68</td>
<td align="left">0.9919</td>
</tr>
<tr>
<td align="left">Beacon</td>
<td align="left">47.26</td>
<td align="left">0.9978</td>
</tr>
<tr>
<td rowspan="10" align="left">Cat 64&#x00D7;64 <inline-graphic xlink:href="FPHY_fphy-2023-1315765_wc_tfx2.tif"/>
</td>
<td align="left">Boat</td>
<td align="left">54.18</td>
<td align="left">0.9995</td>
</tr>
<tr>
<td align="left">House</td>
<td align="left">51.80</td>
<td align="left">0.9992</td>
</tr>
<tr>
<td align="left">Villa</td>
<td align="left">52.32</td>
<td align="left">0.9990</td>
</tr>
<tr>
<td align="left">Parrot</td>
<td align="left">51.87</td>
<td align="left">0.9995</td>
</tr>
<tr>
<td align="left">Building</td>
<td align="left">51.56</td>
<td align="left">0.9996</td>
</tr>
<tr>
<td align="left">Hats</td>
<td align="left">52.56</td>
<td align="left">0.9994</td>
</tr>
<tr>
<td align="left">Motorbike</td>
<td align="left">53.90</td>
<td align="left">0.9998</td>
</tr>
<tr>
<td align="left">Flower</td>
<td align="left">52.58</td>
<td align="left">0.9995</td>
</tr>
<tr>
<td align="left">Yacht</td>
<td align="left">51.83</td>
<td align="left">0.9985</td>
</tr>
<tr>
<td align="left">Beacon</td>
<td align="left">53.44</td>
<td align="left">0.9996</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In image processing, histograms are valuable tools for analyzing various image features, such as contrast, brightness, and color distribution. By comparing histograms of different images, we can determine their similarities or differences. For instance, if the histograms of two images are closely matched, it suggests that they may have comparable color distributions, indicating their similarity. In <xref ref-type="fig" rid="F16">Figure 16</xref>, the histogram of the watermarked image is similar to the histogram of the original carrier image. This implies that the pixel intensity distributions of the two images may be similar. This can be considered evidence that the watermark image has been successfully embedded into the original carrier image without significantly altering the pixel distribution characteristics of the images. <xref ref-type="fig" rid="F16">Figures 16A&#x2013;C</xref> show the histograms of three selected host images: &#x201c;Boat,&#x201d; &#x201c;Villa,&#x201d; and &#x201c;Hats,&#x201d; respectively. <xref ref-type="fig" rid="F16">Figures 16D&#x2013;F</xref> show the histograms of the associated watermarked images. In <xref ref-type="fig" rid="F16">Figure 16</xref>, the histogram of the watermarked image closely resembles that of the original carrier images. This similarity implies that the pixel intensity distributions of the two images may be comparable. Thus, this similarity serves as evidence that the watermark image has been successfully embedded into the original carrier image without significantly altering its pixel distribution characteristics.</p>
<fig id="F16" position="float">
<label>FIGURE 16</label>
<caption>
<p>
<bold>(A&#x2013;C)</bold> Histograms of host images &#x201c;Boat,&#x201d; &#x201c;Villa,&#x201d; and &#x201c;Hats,&#x201d; respectively; <bold>(D&#x2013;F)</bold> histograms of the corresponding watermarked host images.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g016.tif"/>
</fig>
</sec>
<sec id="s4-3">
<title>4.3 Robustness analysis</title>
<p>The image &#x201c;Cat&#x201d; of size <inline-formula id="inf159">
<mml:math id="m181">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> and image &#x201c;Boat&#x201d; of size <inline-formula id="inf160">
<mml:math id="m182">
<mml:mrow>
<mml:mn>512</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>512</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> are treated as the watermark image and host image, respectively. As shown in <xref ref-type="fig" rid="F17">Figure 17</xref>, there are no significant difference between the watermarked image and the original host image and no significant distinction between the extracted watermark image and the original watermark image. Noise attack, JPEG compression attack, and filtering attack are used to test the robustness of this algorithm.</p>
<fig id="F17" position="float">
<label>FIGURE 17</label>
<caption>
<p>
<bold>(A)</bold> Watermark image &#x201c;Cat,&#x201d; <bold>(B)</bold> host image &#x201c;Boat,&#x201d; <bold>(C)</bold> watermarked image, and <bold>(D)</bold> extracted watermark image. Adapted with permission from [<xref ref-type="bibr" rid="B37">37</xref>], licensed by Eastman Kodak Company.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g017.tif"/>
</fig>
<sec id="s4-3-1">
<title>4.3.1 Noise attack</title>
<p>Noise attack is a common method used to test the robustness of algorithms against the addition of noise in images. By conducting noise attack tests, the robustness of image processing algorithms against different intensities and types of noise can be evaluated. Salt-and-pepper noise with densities of 0.01, 0.03, and 0.05 was added to the watermarked image &#x201c;Boat.&#x201d; The watermarked images, along with the corresponding extracted watermark images containing the respective noises, are shown in <xref ref-type="fig" rid="F18">Figure 18</xref>. The NCC values of the extracted watermark images with the added noises are shown in <xref ref-type="table" rid="T2">Table 2</xref>. From <xref ref-type="table" rid="T2">Table 2</xref>, it can be observed that the proposed QWA performs well in terms of withstanding noise attacks.</p>
<fig id="F18" position="float">
<label>FIGURE 18</label>
<caption>
<p>Test result of salt-and-pepper noise attack (intensity 0.05). Adapted with permission from [<xref ref-type="bibr" rid="B37">37</xref>], licensed by Eastman Kodak Company.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g018.tif"/>
</fig>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Test results of salt-and-pepper noise attack.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">Salt-and-pepper noise intensity</th>
<th colspan="3" align="left">NCC value</th>
</tr>
<tr>
<th align="left">Boat</th>
<th align="left">House</th>
<th align="left">Villa</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">0.01</td>
<td align="left">0.9787</td>
<td align="left">0.9720</td>
<td align="left">0.9854</td>
</tr>
<tr>
<td align="left">0.03</td>
<td align="left">0.9640</td>
<td align="left">0.9612</td>
<td align="left">0.9679</td>
</tr>
<tr>
<td align="left">0.05</td>
<td align="left">0.9498</td>
<td align="left">0.9432</td>
<td align="left">0.9613</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-3-2">
<title>4.3.2 JPEG compression attack</title>
<p>A JPEG compression attack refers to applying different intensities of JPEG compression to an image with an embedded watermark and evaluating the watermark extraction effectiveness in the compressed image. The experimental results of JPEG compression attacks are shown in <xref ref-type="table" rid="T3">Table 3</xref>. Quality factor parameters used for JPEG compression in the experiment are set to 90, 70, and 50, respectively. <xref ref-type="fig" rid="F19">Figure 19</xref> shows the watermarked images subjected to different intensities of JPEG compression attacks, along with the corresponding extracted watermark images. Notably, even when the quality factor parameter was set to 50, the extracted watermark images remained complete and clear, with all corresponding NCC values exceeding 0.98. As a result, the presented quantum color image watermarking algorithm demonstrates resistance against JPEG compression attacks.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Test results of JPEG compression attack.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">JPEG compression</th>
<th colspan="3" align="left">NCC value</th>
</tr>
<tr>
<th align="left">Boat</th>
<th align="left">House</th>
<th align="left">Villa</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">QF &#x3d; 90</td>
<td align="left">0.9987</td>
<td align="left">0.9952</td>
<td align="left">0.9959</td>
</tr>
<tr>
<td align="left">QF &#x3d; 70</td>
<td align="left">0.9950</td>
<td align="left">0.9912</td>
<td align="left">0.9915</td>
</tr>
<tr>
<td align="left">QF &#x3d; 50</td>
<td align="left">0.9921</td>
<td align="left">0.9884</td>
<td align="left">0.9873</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F19" position="float">
<label>FIGURE 19</label>
<caption>
<p>Result of JPEG compression attack (QF &#x3d; 50). Adapted with permission from [<xref ref-type="bibr" rid="B37">37</xref>], licensed by Eastman Kodak Company.</p>
</caption>
<graphic xlink:href="fphy-11-1315765-g019.tif"/>
</fig>
</sec>
<sec id="s4-3-3">
<title>4.3.3 Filtering attack</title>
<p>A filtering attack refers to a type of cyber-attack in which an attacker tries to block or filter out certain information or content from reaching its intended recipient. The median filtering with a filtering window <inline-formula id="inf161">
<mml:math id="m183">
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> is exploited to interfere with the watermarked image. <xref ref-type="table" rid="T4">Table 4</xref> shows the watermark images extracted from the host images under filtering attack and the corresponding NCC values. The NCC values corresponding to the extracted watermark image are all above 0.99. As a result, the proposed color image QWA can resist filtering attacks.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Test results of filtering attack.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Watermark image</th>
<th align="left">Boat</th>
<th align="left">House</th>
<th align="left">Villa</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Extracted watermark</td>
<td align="left">
<inline-graphic xlink:href="FPHY_fphy-2023-1315765_wc_tfx3.tif"/>
</td>
<td align="left">
<inline-graphic xlink:href="FPHY_fphy-2023-1315765_wc_tfx4.tif"/>
</td>
<td align="left">
<inline-graphic xlink:href="FPHY_fphy-2023-1315765_wc_tfx5.tif"/>
</td>
</tr>
<tr>
<td align="left">NCC value</td>
<td align="left">0.9945</td>
<td align="left">0.9918</td>
<td align="left">0.9901</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s4-4">
<title>4.4 Comparative analysis</title>
<p>The imperceptibility of the proposed QWA compared with other typical algorithms [<xref ref-type="bibr" rid="B21">21</xref>, <xref ref-type="bibr" rid="B35">35</xref>, <xref ref-type="bibr" rid="B36">36</xref>] is shown in <xref ref-type="table" rid="T5">Tables 5</xref>, <xref ref-type="table" rid="T6">6</xref>. Notably, the QWA exhibits superior performance with PSNR and SSIM values when compared to the algorithms referenced in [<xref ref-type="bibr" rid="B21">21</xref>, <xref ref-type="bibr" rid="B35">35</xref>, <xref ref-type="bibr" rid="B36">36</xref>]. This enhancement in imperceptibility within the proposed algorithm is attributed to the strategic embedding of the watermark into the medium-frequency component of the transformed host image. By focusing on this frequency range, the QWA achieves a balance between robust watermark insertion and minimizing perceptual impact, thereby ensuring an improved level of invisibility compared to the referenced algorithms. The utilization of the medium-frequency component allows the proposed QWA to maintain the visual quality of the watermarked image while successfully concealing the embedded information.</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>PSNR values calculated using the proposed scheme and previous works.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Host image</th>
<th align="center">[21]</th>
<th align="center">[35]</th>
<th align="center">[36]</th>
<th align="left">Proposed scheme</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">Strength <italic>k</italic>
</td>
<td align="center">0.01</td>
<td align="center">1</td>
<td align="center">0.01</td>
<td align="center">0.01</td>
</tr>
<tr>
<td align="left">Watermark size</td>
<td align="left">
<inline-formula id="inf162">
<mml:math id="m184">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">
<inline-formula id="inf163">
<mml:math id="m185">
<mml:mrow>
<mml:mn>32</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>32</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="left">
<inline-formula id="inf164">
<mml:math id="m186">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">
<inline-formula id="inf165">
<mml:math id="m187">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="center">Average value</td>
<td align="center">51.466</td>
<td align="center">37.2960</td>
<td align="center">30.4624</td>
<td align="center">52.3460</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>SSIM values calculated using the proposed scheme and previous works.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Host image</th>
<th align="center">[21]</th>
<th align="center">[35]</th>
<th align="center">[36]</th>
<th align="center">Proposed scheme</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">Strength <italic>k</italic>
</td>
<td align="center">0.01</td>
<td align="center">1</td>
<td align="center">0.01</td>
<td align="center">0.01</td>
</tr>
<tr>
<td align="center">Watermark size</td>
<td align="center">
<inline-formula id="inf166">
<mml:math id="m188">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">
<inline-formula id="inf167">
<mml:math id="m189">
<mml:mrow>
<mml:mn>32</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>32</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">
<inline-formula id="inf168">
<mml:math id="m190">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">
<inline-formula id="inf169">
<mml:math id="m191">
<mml:mrow>
<mml:mn>64</mml:mn>
<mml:mo>&#xd7;</mml:mo>
<mml:mn>64</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="center">Average value</td>
<td align="center">0.9800</td>
<td align="center">0.9432</td>
<td align="center">0.9371</td>
<td align="center">0.9994</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4-5">
<title>4.5 Quantum circuit complexity analysis</title>
<p>The complexity of our proposed color image QWA is mainly related to the quantum scrambling operation and the QDCT. The presented quantum scrambling operation can be realized with two ICAV modules, one QE module, two PA modules, and two PS-MOD modules. For an image of size <inline-formula id="inf170">
<mml:math id="m192">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, the complexity of a <inline-formula id="inf171">
<mml:math id="m193">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>qubit</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> ICAV module is <inline-formula id="inf172">
<mml:math id="m194">
<mml:mrow>
<mml:mn>12</mml:mn>
<mml:msup>
<mml:mi>q</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>45</mml:mn>
<mml:mi>q</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>28</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. The QE module involves <inline-formula id="inf173">
<mml:math id="m195">
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mi>q</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> CNOT gates and a <inline-formula id="inf174">
<mml:math id="m196">
<mml:mrow>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mtext>CNOT</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula> gate, so its complexity is <inline-formula id="inf175">
<mml:math id="m197">
<mml:mrow>
<mml:mn>6</mml:mn>
<mml:mi>q</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. The complexity of PA and PS-MOD is <inline-formula id="inf176">
<mml:math id="m198">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>q</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. Apparently, the complexity of the scrambling operation is <inline-formula id="inf177">
<mml:math id="m199">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mi>q</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. For an image of size <inline-formula id="inf178">
<mml:math id="m200">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
<mml:mo>&#xd7;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, the computing complexity of the QDCT is <inline-formula id="inf179">
<mml:math id="m201">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. To sum up, the complexity of the proposed color image QWA is <inline-formula id="inf180">
<mml:math id="m202">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>n</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
</sec>
<sec id="s5">
<title>5 Conclusion and future challenges and directions</title>
<sec id="s5-1">
<title>5.1 Conclusion</title>
<p>A one-dimensional chaotic map, i.e., a sinusoidal&#x2013;tent map, is devised by combining the sinusoidal map with the tent map. Depending on the random sequence generated using the sinusoidal&#x2013;tent map, a new position scrambling operation on a quantum image together with the associated quantum circuit is devised. The original quantum circuits of some existing quantum modules are improved to reduce their complexities. The security of QWA is enhanced by using the sinusoidal&#x2013;tent map to scramble the watermark image. After the quantum discrete cosine transform, most of the signal energy is concentrated on the low-frequency part; thus, choosing the medium-frequency component to embed watermark can enhance the invisibility and robustness of the algorithm. The experimental results illustrate that the QWA has good invisibility and high robustness against noise attack, JPEG compression attack, and filtering attack.</p>
</sec>
<sec id="s5-2">
<title>5.2 Potential future challenges and directions</title>
<p>Currently, the quantum watermark technology is generally implemented by simulating quantum theory on classical computers, and there are no well-developed quantum devices available for testing. Therefore, future challenges lie in continuously adjusting the direction of quantum watermark algorithms to cater to the development of quantum computers. This will require proposing algorithms that are better suited for quantum computer applications. Therefore, the future research directions for quantum watermarking will focus on algorithm development, physical implementation, robustness analysis, and application expansion. By exploring these areas, we can create more opportunities and face new challenges in protecting digital content, enhancing information security, and advancing quantum technology.</p>
</sec>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>The datasets presented in this article are not readily available. The data and implementation code for MATLAB are available upon request. Requests to access the datasets should be directed to <email>ppzeng@ncu.edu.cn</email>.</p>
</sec>
<sec id="s7">
<title>Author contributions</title>
<p>P-PZ: conceptualization, funding acquisition, investigation, methodology, validation, and writing&#x2013;original draft. XZ: formal analysis, software, and writing&#x2013;original draft. D-FZ: data curation, visualization, and writing&#x2013;review and editing. S-HC: data curation, validation, and writing&#x2013;review and editing. L-HG: project administration, supervision, validation, and writing&#x2013;review and editing.</p>
</sec>
<sec sec-type="funding-information" id="s8">
<title>Funding</title>
<p>The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This work was supported by the National Natural Science Foundation of China (Grant Nos 62202252 and 61861029), the Science and Technology Planning Project of Shanghai (Grant No. 23010501800), the Science and Technology Research Project of Jiangxi Education Department (GJJ2203915), and the Higher Education Reformation Project of Jiangxi Province (JXJG-22-30-5).</p>
</sec>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Velayatipour</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Mosleh</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Nejad</surname>
<given-names>MY</given-names>
</name>
<name>
<surname>Kheyrandish</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Quantum reversible circuits for audio watermarking based on echo hiding technique</article-title>. <source>Quan Inf Process</source> (<year>2022</year>) <volume>21</volume>(<issue>9</issue>):<fpage>316</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-022-03657-9</pub-id>
</citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>CX</given-names>
</name>
</person-group>. <article-title>A new one-dimensional chaotic map for image encryption scheme based on random dna coding</article-title>. <source>Opt Laser Technol</source> (<year>2023</year>) <volume>160</volume>:<fpage>109033</fpage>. <pub-id pub-id-type="doi">10.1016/j.optlastec.2022.109033</pub-id>
</citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>NR</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>LL</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>ZW</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>MM</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>GS</given-names>
</name>
</person-group>. <article-title>Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm</article-title>. <source>Expert Syst Appl</source> (<year>2023</year>) <volume>238</volume>:<fpage>122052</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2023.122052</pub-id>
</citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>ZW</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>NR</given-names>
</name>
</person-group>. <article-title>Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion</article-title>. <source>Opt Laser Technol</source> (<year>2022</year>) <volume>149</volume>:<fpage>107879</fpage>. <pub-id pub-id-type="doi">10.1016/j.optlastec.2022.107879</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>NR</given-names>
</name>
<name>
<surname>Tong</surname>
<given-names>LJ</given-names>
</name>
<name>
<surname>Zou</surname>
<given-names>WP</given-names>
</name>
</person-group>. <article-title>Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation</article-title>. <source>Signal Process.</source> (<year>2023</year>) <volume>211</volume>:<fpage>109107</fpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2023.109107</pub-id>
</citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Leong</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Sung</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>What business managers should know about quantum computing?</article-title> <source>J Interdiscip Sci</source> (<year>2022</year>) <volume>6</volume>(<issue>2</issue>):<fpage>42</fpage>&#x2013;<lpage>52</lpage>.</citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Beach</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Lomont</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Cohen</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Quantum image processing (QuIP)</article-title>. In: <conf-name>32nd Applied Imagery Pattern Recognition Workshop</conf-name>; <conf-date>15-17 October 2003</conf-date>; <conf-loc>Washington, DC, USA</conf-loc> (<year>2003</year>). p. <fpage>39</fpage>&#x2013;<lpage>44</lpage>.</citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>HS</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Xia</surname>
<given-names>HY</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Long</surname>
<given-names>GL</given-names>
</name>
</person-group>. <article-title>Efficient quantum arithmetic operation circuits for quantum image processing</article-title>. <source>Sci China: Phys Mech Astron</source> (<year>2020</year>) <volume>63</volume>(<issue>8</issue>):<fpage>280311</fpage>. <pub-id pub-id-type="doi">10.1007/s11433-020-1582-8</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ali</surname>
<given-names>AE</given-names>
</name>
<name>
<surname>Abdel-Galil</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Mohamed</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Quantum image mid-point filter</article-title>. <source>Quan Inf Process</source> (<year>2020</year>) <volume>19</volume>(<issue>8</issue>):<fpage>238</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-020-02738-x</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Le</surname>
<given-names>PQ</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>FY</given-names>
</name>
<name>
<surname>Hirota</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>A flexible representation of quantum images for polynomial preparation, image compression, and processing operations</article-title>. <source>Quan Inf Process</source> (<year>2011</year>) <volume>10</volume>(<issue>1</issue>):<fpage>63</fpage>&#x2013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.1007/s11128-010-0177-y</pub-id>
</citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>YH</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>NEQR: a novel enhanced quantum representation of digital images</article-title>. <source>Quan Inf Process</source> (<year>2013</year>) <volume>12</volume>(<issue>8</issue>):<fpage>2833</fpage>&#x2013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1007/s11128-013-0567-z</pub-id>
</citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yuan</surname>
<given-names>SZ</given-names>
</name>
<name>
<surname>Mao</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>YL</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Compare</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>SQR: a simple quantum representation of infrared images</article-title>. <source>Quan Inf Process</source> (<year>2014</year>) <volume>13</volume>(<issue>6</issue>):<fpage>1353</fpage>&#x2013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1007/s11128-014-0733-y</pub-id>
</citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yan</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Iliyasu</surname>
<given-names>AM</given-names>
</name>
<name>
<surname>Venegas-Andraca</surname>
<given-names>SE</given-names>
</name>
</person-group>. <article-title>A survey of quantum image representations</article-title>. <source>Quan Inf Process</source> (<year>2016</year>) <volume>15</volume>(<issue>1</issue>):<fpage>21</fpage>&#x2013;<lpage>35</lpage>. <pub-id pub-id-type="doi">10.1007/s11128-015-1195-6</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jiang</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Mu</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio</article-title>. <source>Quan Inf Process</source> (<year>2015</year>) <volume>14</volume>(<issue>11</issue>):<fpage>4001</fpage>&#x2013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.1007/s11128-015-1099-5</pub-id>
</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sang</surname>
<given-names>JZ</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q</given-names>
</name>
</person-group>. <article-title>A novel quantum representation of color digital images</article-title>. <source>Quan Inf Process</source> (<year>2017</year>) <volume>16</volume>(<issue>2</issue>):<fpage>42</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-016-1463-0</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>HH</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>XB</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>YX</given-names>
</name>
</person-group>. <article-title>A multimode quantum image representation and its encryption scheme</article-title>. <source>Quan Inf Process</source> (<year>2021</year>) <volume>20</volume>(<issue>9</issue>):<fpage>315</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-021-03255-1</pub-id>
</citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Ran</surname>
<given-names>QW</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Double quantum color images encryption scheme based on DQRCI</article-title>. <source>Multimedia Tools Appl</source> (<year>2020</year>) <volume>79</volume>(<issue>9</issue>):<fpage>6661</fpage>&#x2013;<lpage>87</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-019-08514-z</pub-id>
</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Sencar</surname>
<given-names>HT</given-names>
</name>
<name>
<surname>Ramkumar</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Akansu</surname>
<given-names>AN</given-names>
</name>
</person-group>. <source>Data hiding fundamentals and applications: content security in digital multimedia</source>. <publisher-loc>San Diego, CA, USA</publisher-loc>: <publisher-name>Academic Press</publisher-name> (<year>2004</year>).</citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gong</surname>
<given-names>LH</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>HX</given-names>
</name>
</person-group>. <article-title>Dual color images watermarking scheme with geometric correction based on quaternion FrOOFMMs and LS-SVR</article-title>. <source>Opt Laser Technol</source> (<year>2023</year>) <volume>167</volume>:<fpage>109665</fpage>. <pub-id pub-id-type="doi">10.1016/j.optlastec.2023.109665</pub-id>
</citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>NR</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>AW</given-names>
</name>
<name>
<surname>Zou</surname>
<given-names>WP</given-names>
</name>
</person-group>. <article-title>Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm</article-title>. <source>Multimedia Tools Appl</source> (<year>2019</year>) <volume>78</volume>:<fpage>2507</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-018-6322-9</pub-id>
</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>MX</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>HM</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>DH</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>JS</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>T</given-names>
</name>
</person-group>. <article-title>A novel quantum image watermarking scheme for tamper localization and self-recovery</article-title>. <source>Quan Inf Process</source> (<year>2022</year>) <volume>21</volume>(<issue>8</issue>):<fpage>277</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-022-03619-1</pub-id>
</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>PC</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>An improved quantum watermarking scheme using small-scale quantum circuits and color scrambling</article-title>. <source>Quan Inf Process</source> (<year>2017</year>) <volume>16</volume>(<issue>5</issue>):<fpage>127</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-017-1577-z</pub-id>
</citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zeng</surname>
<given-names>QW</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>ZY</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>JF</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>NR</given-names>
</name>
</person-group>. <article-title>Quantum watermark algorithm based on maximum pixel difference and tent map</article-title>. <source>Int J Theor Phys</source> (<year>2021</year>) <volume>60</volume>(<issue>9</issue>):<fpage>3306</fpage>&#x2013;<lpage>33</lpage>. <pub-id pub-id-type="doi">10.1007/s10773-021-04909-7</pub-id>
</citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hemida</surname>
<given-names>O</given-names>
</name>
<name>
<surname>He</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>A self-recovery watermarking scheme based on block truncation coding and quantum chaos map</article-title>. <source>Multimed Tools Appl</source> (<year>2020</year>) <volume>79</volume>(<issue>25</issue>):<fpage>18695</fpage>&#x2013;<lpage>725</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-020-08727-7</pub-id>
</citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>NQ</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Hirota</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Quantum watermarking schemes for QHSL images in spatial domain. 2021 8th international conference on soft computing and machine intelligence (ISCMI)</article-title>. <source>Cario, Egypt</source> (<year>2021</year>) <fpage>225</fpage>&#x2013;<lpage>30</lpage>. <pub-id pub-id-type="doi">10.1109/ISCMI53840.2021.9654956</pub-id>
</citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>WW</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>QY</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>A watermark strategy for quantum images based on quantum Fourier transform</article-title>. <source>Quan Inf Process</source> (<year>2013</year>) <volume>12</volume>(<issue>2</issue>):<fpage>793</fpage>&#x2013;<lpage>803</lpage>. <pub-id pub-id-type="doi">10.1007/s11128-012-0423-6</pub-id>
</citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zeng</surname>
<given-names>QW</given-names>
</name>
<name>
<surname>Ge</surname>
<given-names>HY</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>JF</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Zou</surname>
<given-names>W</given-names>
</name>
</person-group>. <article-title>Quantum watermarking algorithm based on quantum Haar wavelet transform and Henon map</article-title>. <source>Int J Theor Phys</source> (<year>2022</year>) <volume>61</volume>(<issue>6</issue>):<fpage>167</fpage>. <pub-id pub-id-type="doi">10.1007/s10773-022-04998-y</pub-id>
</citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ahmed</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Natarajan</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Rao</surname>
<given-names>KR</given-names>
</name>
</person-group>. <article-title>Discrete cosine transform</article-title>. <source>IEEE Trans Comput</source> (<year>1974</year>) <volume>C-23</volume>(<issue>1</issue>):<fpage>90</fpage>&#x2013;<lpage>3</lpage>. <pub-id pub-id-type="doi">10.1109/t-c.1974.223784</pub-id>
</citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mohsen</surname>
<given-names>YN</given-names>
</name>
<name>
<surname>Mohammad</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Saeed</surname>
<given-names>RH</given-names>
</name>
</person-group>. <article-title>A blind quantum audio watermarking based on quantum discrete cosine transform</article-title>. <source>J Inf Security Appl</source> (<year>2020</year>) <volume>55</volume>:<fpage>102495</fpage>. <pub-id pub-id-type="doi">10.1016/j.jisa.2020.102495</pub-id>
</citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>XB</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Three-level quantum image encryption based on Arnold transform and logistic map</article-title>. <source>Quan Inf Process</source> (<year>2021</year>) <volume>20</volume>(<issue>1</issue>):<fpage>23</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-020-02952-7</pub-id>
</citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>RG</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>WW</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>GF</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>Quantum realization of the nearest neighbor value interpolation method for INEQR</article-title>. <source>Quan Inf Process</source> (<year>2018</year>) <volume>17</volume>(<issue>7</issue>):<fpage>166</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-018-1921-y</pub-id>
</citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>RG</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>WW</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>Quantum watermarking scheme through Arnold scrambling and LSB steganography</article-title>. <source>Quan Inf Process</source> (<year>2017</year>) <volume>16</volume>(<issue>9</issue>):<fpage>212</fpage>. <pub-id pub-id-type="doi">10.1007/s11128-017-1640-9</pub-id>
</citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ahmed</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Sridevi</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Hayder</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Ahmadi</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Rajagopal</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Jafari</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>A novel multi-stable sinusoidal chaotic map with spectacular behaviors</article-title>. <source>Commun Theor Phys</source> (<year>2023</year>) <volume>75</volume>:<fpage>115001</fpage>. <pub-id pub-id-type="doi">10.1088/1572-9494/acf307</pub-id>
</citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>YC</given-names>
</name>
<name>
<surname>Long</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>CL</given-names>
</name>
</person-group>. <article-title>A new 1D chaotic system for image encryption</article-title>. <source>Signal Process.</source> (<year>2014</year>) <volume>97</volume>:<fpage>172</fpage>&#x2013;<lpage>82</lpage>. <pub-id pub-id-type="doi">10.1016/j.sigpro.2013.10.034</pub-id>
</citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Su</surname>
<given-names>QT</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>DC</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>ZH</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>B</given-names>
</name>
<etal/>
</person-group> <article-title>New rapid and robust color image watermarking technique in spatial domain</article-title>. <source>IEEE Access</source> (<year>2019</year>) <volume>7</volume>(<issue>3</issue>):<fpage>30398</fpage>&#x2013;<lpage>409</lpage>. <pub-id pub-id-type="doi">10.1109/access.2019.2895062</pub-id>
</citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>JY</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>WL</given-names>
</name>
<name>
<surname>Xia-Hou</surname>
<given-names>WM</given-names>
</name>
<name>
<surname>Zou</surname>
<given-names>WP</given-names>
</name>
<name>
<surname>Gong</surname>
<given-names>LH</given-names>
</name>
</person-group>. <article-title>Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition</article-title>. <source>Multimedia Tools Appl</source> (<year>2020</year>) <volume>79</volume>:<fpage>22727</fpage>&#x2013;<lpage>47</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-020-08987-3</pub-id>
</citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<collab>Eastman Kodak Company</collab>. <article-title>Kodak lossless true color image suite&#x2014;Photo CD PCD0992</article-title>. <comment>Available online: <ext-link ext-link-type="uri" xlink:href="http://r0k.us/graphics/kodak/index.html">http://r0k.us/graphics/kodak/index.html</ext-link> (accessed on 26 April 2021)</comment>.</citation>
</ref>
</ref-list>
</back>
</article>