[1]王育民.信息隐藏[M].北京:清华大学出版社,2006.
[2]钮心忻.信息隐藏与数字水印的研究及发展[J].计算机教育,2005,1(1):22-24.
[3]曹卫兵,戴冠中,夏煜,等.基于文本的信息隐藏技术[J].计算机应用研究,2003,20(10):39-41.
[4]刘宇,杨百龙,赵文强,等.基于矩阵编码的大容量密文域可逆信息隐藏算法[J].计算机工程,2018,44(10):215-220.
[5]HILLERY M,BUZEK V,BERTHIAUME A.Quantum secret sharing[J].Physical Review A,2017,59(3):1825-1829.
[6]GOTTESMAN D.Theory of quantum secret sharing[J].Physical Review A,2000,61(4):192-193.
[7]EGGELING T,WERNER R F.Hiding classical data in multipartite quantum states[J].Physical Review Letters,2002,89(9):097905.
[8]许春香,魏仕民,肖国镇.定期更新防欺诈的秘密共享方案[J].计算机学报,2002,25(6):657-660.
[9]张建中,肖国镇.可防止欺诈的动态秘密分享方案[J].通信学报,2000,21(5):81-83.
[10]许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689.
[11]BANACLOCHE J G.Quantum error correcting code[J].Physical Review Letters,2009,29(1):810-813.
[12]MARTIN K.Steganographic communication with quantum information[C]//Proceedings of International Conference on Information Hiding.Berlin,Germany:Springer,2007:32-49.
[13]MOGOS G.Stego quantum algorithm[C]//Proceedings of International Symposium on Computer Science and ITS Appl-ications.Washington D.C.,USA:IEEE Computer Society,2008:187-190.
[14]NATORI S.Why quantum steganography can be stronger than classical steganography[J].Topics in Applied Physics,2006,10(2):235-240.
[15]QU Z G,CHEN X B,ZHOU X J,et al.Novel quantum steganography with large payload[J].Optics Commu-nications,2010,283(23):4782-4786.
[16]QU Z G,CHEN X B,LUO M X,et al.Quantum steganography with large payload based on entanglement swapping of χ-type entangled states[J].Optics Communications,2011,284(7):2075-2082.
[17]GEABANACLOCHE J.Hiding messages in quantum data[J].Journal of Mathematical Physics,2002,43(9):4531-4536.
[18]MIHARA T.Quantum steganography using prior entanglement[J].Physics Letters A,2015,379(12):952-955.
[19]CAI Q Y,LI B W.Improving the capacity of the Bostrm-Felbinger protocol[J].Physical Review A,2004,69(5):521-524.
[20]BOSTR M K,FELBINGER T.Secure direct communica-tion using entanglement[J].Physical Review Letters,2002,89(18).
[21]CAI Q Y.The “ping-pong” protocol can be attacked without eavesdropping[J].Physical Review Letters,2003,90(10).
[22]ANTONI W.Eavesdropping on the “ping-pong” quantum communication protocol[J].Physical Review Letters,2003,90(15).
[23]BENNETT C H,WIESNER S J.Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states[J].Physical Review Letters,1992,69(20):2881-2884. |