We present experimental results of the use of continuous adaptive feedback in quantum optical measurement of phase of the sidebands on continuous-wave (cw) coherent light, consistent with theoretical predictions [1]. ...
详细信息
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jum...
详细信息
We present a text watermarking scheme that embeds a bit-stream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph...
详细信息
ISBN:
(纸本)1595932720
We present a text watermarking scheme that embeds a bit-stream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences' cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks. Copyright 2006 ACM.
In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ σ are vital for t...
We introduce electron field coherent states that exhibit full coherence. We employ these states in developing a theory of phase-sensitive homodyne detection and measuring the current noise benchmarked against the stan...
详细信息
We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The ...
Bipartite operations underpin both classical communication and entanglement generation. Using a superposition of classical messages, we show that the capacity of a two-qubit operation for error-free entanglement-assis...
详细信息
Bipartite operations underpin both classical communication and entanglement generation. Using a superposition of classical messages, we show that the capacity of a two-qubit operation for error-free entanglement-assisted bidirectional classical communication cannot exceed twice the entanglement capability. In addition, we show that any bipartite two-qubit operation can increase the communication that may be performed using an ensemble by twice the entanglement capability.
Two-qubit operations may be characterized by their capacities for communication, both with and without free entanglement, and their capacity for creating entanglement. We establish a set of inequalities that give an o...
详细信息
Two-qubit operations may be characterized by their capacities for communication, both with and without free entanglement, and their capacity for creating entanglement. We establish a set of inequalities that give an ordering to the capacities of two-qubit unitary operations. Specifically, we show that the capacities for entanglement creation and bidirectional communication without entanglement assistance are at least as great as half the bidirectional communication capacity with entanglement assistance. In addition, we show that the bidirectional communication that can be performed using an ensemble may be increased via a two-qubit unitary operation by twice the operation’s capacity for entanglement.
We prove that it is possible to remotely prepare an ensemble of noncommuting mixed states using communication equal to the Holevo information for this ensemble. This remote preparation scheme may be used to convert be...
详细信息
We prove that it is possible to remotely prepare an ensemble of noncommuting mixed states using communication equal to the Holevo information for this ensemble. This remote preparation scheme may be used to convert between different ensembles of mixed states in an asymptotically lossless way, analogous to concentration and dilution for entanglement.
We develop a sufficiency criterion for quantum separability, valid for arbitrary states of two arbitrary systems. Our criterion confirms spin entanglement of two macroscopic atomic samples in experiments by Julsgaard,...
详细信息
暂无评论