Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Enhancing quantum audio watermarking security through joint verification and certification
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 17 January 2026

Enhancing quantum audio watermarking security through joint verification and certification

  • Zheng Xing1,
  • Chan-Tong Lam2 na1 &
  • Xiaochen Yuan2 na1 

Scientific Reports , Article number:  (2026) Cite this article

  • 485 Accesses

  • 1 Altmetric

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Current quantum audio watermarking schemes prioritize robustness but often overlook critical security vulnerabilities, leaving systems exposed to impersonation and unauthorized use. To address this gap, we propose a dual-security mechanism that synergistically integrates joint verification and certification of watermarks, inspired by the paging seal principle. Our framework incorporates Quantum Error Correction (QEC) coding to enhance resilience against qubit errors and malicious tampering. Experimental results show improved performance: the watermark maintains high imperceptible with SNR> 46 dB under increased embedding rates, and achieves a 62.5% reduction in average BER compared to several state-of-the-art methods at a qubit error probability of 0.10. These results suggest that the proposed approach offers enhanced security and robustness, representing a promising direction for secure quantum audio watermarking.

Similar content being viewed by others

Evaluation of digital watermarking on subjective speech quality

Article Open access 12 October 2021

An efficient watermarking algorithm for digital audio data in security applications

Article Open access 27 October 2023

Experimental demonstration of confidential communication with quantum security monitoring

Article Open access 04 November 2021

Data availibility

The watermark image (MPU logo) is provided in Supplementary Figure S1. All simulation-generated data (processed audio and performance metrics) are included within this article and its supplementary materials. The MATLAB implementation code and original digital audio files used in experiments are permanently archived in Zenodo (DOI: 10.5281/zenodo.18072766).

References

  1. Khan, T. M. & Robles-Kelly, A. Machine learning: Quantum vs classical. IEEE Access8, 219275–219294 (2020).

    Google Scholar 

  2. Maheshwari, D., Garcia-Zapirain, B. & Sierra-Sosa, D. Quantum machine learning applications in the biomedical domain: A systematic review. IEEE Access10, 80463–80484 (2022).

    Google Scholar 

  3. Fallahi, S. & Taghadosi, M. Quantum-behaved particle swarm optimization based on solitons. Sci. Rep.12, 13977 (2022).

    Google Scholar 

  4. Allende, M. et al. Quantum-resistance in blockchain networks. Sci. Rep.13, 5664 (2023).

    Google Scholar 

  5. Wang, Q., Wang, D., Cheng, C. & He, D. Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Trans. Depend. Secur. Comput.20(1), 193–208 (2021).

    Google Scholar 

  6. Oliveiray, D. et al. A systematic methodology to compute the quantum vulnerability factors for quantum circuits. IEEE Trans. Depend. Secur. Comput.21(4), 2631–2644 (2023).

    Google Scholar 

  7. Yuan, X.-C., Pun, C.-M. & Chen, C. P. Robust mel-frequency cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking. Inf. Sci.298, 159–179 (2015).

    Google Scholar 

  8. Alzahrani, A. & Memon, N. A. Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images. IEEE Access9, 113714–113734 (2021).

    Google Scholar 

  9. Shao, S. et al. Wfb: watermarking-based copyright protection framework for federated learning model via blockchain. Sci. Rep.14, 19453 (2024).

    Google Scholar 

  10. He, M., Wang, H., Zhang, F., Abdullahi, S. M. & Yang, L. Robust blind video watermarking against geometric deformations and online video sharing platform processing. IEEE Trans. Depend. Secur. Comput.20(6), 4702–4718 (2022).

    Google Scholar 

  11. Anand, A. & Singh, A. K. Dual watermarking for security of COVID-19 patient record. IEEE Trans. Depend. Secur. Comput.20, 859–866 (2022).

    Google Scholar 

  12. Wang, J. Qrda: quantum representation of digital audio. Int. J. Theor. Phys.55, 1622–1641 (2016).

    Google Scholar 

  13. Yan, F., Iliyasu, A. M., Guo, Y. & Yang, H. Flexible representation and manipulation of audio signals on quantum computers. Theor. Comput. Sci.752, 71–85 (2018).

    Google Scholar 

  14. Le, P. Q., Dong, F. & Hirota, K. A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process.10, 63–84 (2011).

    Google Scholar 

  15. Chen, K., Yan, F., Iliyasu, A. M. & Zhao, J. Exploring the implementation of steganography protocols on quantum audio signals. Int. J. Theor. Phys57, 476–494 (2018).

    Google Scholar 

  16. Qu, Z.-G., He, H.-X. & Li, T. Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio. Chin. Phys. B27, 010306 (2018).

    Google Scholar 

  17. Chen, K., Yan, F., Iliyasu, A. M. & Zhao, J. Dual quantum audio watermarking schemes based on quantum discrete cosine transform. Int. J. Theor. Phys.58, 502–521 (2019).

    Google Scholar 

  18. Chaharlang, J., Mosleh, M. & Rasouli-Heikalabad, S. A novel quantum steganography-steganalysis system for audio signals. Multimed. Tools Appl.79, 17551–17577 (2020).

    Google Scholar 

  19. Nejad, M. Y., Mosleh, M. & Heikalabad, S. R. A blind quantum audio watermarking based on quantum discrete cosine transform. J. Inf. Secur. Appl.55, 102495 (2020).

    Google Scholar 

  20. Nejad, M. Y., Mosleh, M. & Heikalabad, S. R. An lsb-based quantum audio watermarking using msb as arbiter. Int. J. Theor. Phys.58, 3828–3851 (2019).

    Google Scholar 

  21. Nejad, M. Y., Mosleh, M. & Heikalabad, S. R. An enhanced lsb-based quantum audio watermarking scheme for nano communication networks. Multimed. Tools Appl.79, 26489–26515 (2020).

    Google Scholar 

  22. Velayatipour, M., Mosleh, M., Nejad, M. Y. & Kheyrandish, M. Quantum reversible circuits for audio watermarking based on echo hiding technique. Quantum Inf. Process.21, 316 (2022).

    Google Scholar 

  23. Li, P., Wang, B., Xiao, H. & Liu, X. Quantum representation and basic operations of digital signals. Int. J. Theor. Phys.57, 3242–3270 (2018).

    Google Scholar 

  24. Jiang, N. & Wang, L. Quantum image scaling using nearest neighbor interpolation. Quantum Inf. Process.14, 1559–1571 (2015).

    Google Scholar 

  25. Sivak, V. et al. Real-time quantum error correction beyond break-even. Nature616, 50–55 (2023).

    Google Scholar 

  26. Bombin, H. et al. Logical blocks for fault-tolerant topological quantum computation. PRX Quantum4, 020303 (2023).

    Google Scholar 

  27. Chiaverini, J. et al. Realization of quantum error correction. Nature432, 602–605 (2004).

    Google Scholar 

  28. Devitt, S. J., Munro, W. J. & Nemoto, K. Quantum error correction for beginners. Rep. Prog. Phys.76, 076001 (2013).

    Google Scholar 

  29. Zhou, R.-G., Hu, W. & Fan, P. Quantum watermarking scheme through Arnold scrambling and lsb steganography. Quantum Inf. Process.16, 1–21 (2017).

    Google Scholar 

  30. Barenco, A. et al. Elementary gates for quantum computation. Phys. Rev. A52, 3457 (1995).

    Google Scholar 

  31. Nielsen, M. A. & Chuang, I. L. Quantum computation and quantum information. Phys. Today54, 60 (2001).

    Google Scholar 

  32. Yang, L., Yang, Y., Hasna, M. O. & Alouini, M.-S. Coverage, probability of snr gain, and dor analysis of ris-aided communication systems. IEEE Wirel. Commun. Lett.9, 1268–1272 (2020).

    Google Scholar 

  33. Nazar, A. W., Hassan, S. A., Jung, H., Mahmood, A. & Gidlund, M. Ber analysis of a backscatter communication system with non-orthogonal multiple access. IEEE Trans. Green Commun. Netw.5, 574–586 (2021).

    Google Scholar 

  34. Probst, D. Aiming beyond slight increases in accuracy. Nat. Rev. Chem.7, 227–228 (2023).

    Google Scholar 

  35. Hou, F. et al. Improved mask r-cnn with distance guided intersection over union for gpr signature detection and segmentation. Autom. Constr.121, 103414 (2021).

    Google Scholar 

  36. Weber, A. G. The usc-sipi image database: Version 5. http://sipi.usc.edu/database/ (2006).

  37. Fisher, K. A. et al. Quantum computing on encrypted data. Nat. Commun.5, 3074 (2014).

    Google Scholar 

  38. Kuang, R. & Perepechaenko, M. Quantum encryption with quantum permutation pad in ibmq systems. EPJ Quantum Technol.9, 26 (2022).

    Google Scholar 

  39. Perepechaenko, M. & Kuang, R. Quantum encryption of superposition states with quantum permutation pad in ibm quantum computers. EPJ Quantum Technol.10, 7 (2023).

    Google Scholar 

  40. Xu, D. et al. Nested hash access with post quantum encryption for mission-critical iot communications. IEEE Internet Things J.10, 12204–12218 (2023).

    Google Scholar 

Download references

Acknowledgements

This work was supported by the Project of Guangdong University Engineering Technology Center (No. 2022GCZX013), and Macao Polytechnic University under grant RP/FCA-04/2024.

Author information

Author notes
  1. These authors contributed equally: Chan-Tong Lam and Xiaochen Yuan.

Authors and Affiliations

  1. School of Computer Science, South China Business College, Guangdong University of Foreign Studies, Guangzhou, 510545, Guangdong, China

    Zheng Xing

  2. Faculty of Applied Sciences, Macao Polytechnic University, Macao, 999078, S.A.R, China

    Chan-Tong Lam & Xiaochen Yuan

Authors
  1. Zheng Xing
    View author publications

    Search author on:PubMed Google Scholar

  2. Chan-Tong Lam
    View author publications

    Search author on:PubMed Google Scholar

  3. Xiaochen Yuan
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Z.X. conceived the methods and experiments, Z.X. and X.Y. conducted the experiments, Z.X. and CT.L. analysed the results. All authors wrote and reviewed the manuscript.

Corresponding author

Correspondence to Zheng Xing.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xing, Z., Lam, CT. & Yuan, X. Enhancing quantum audio watermarking security through joint verification and certification. Sci Rep (2026). https://doi.org/10.1038/s41598-026-36535-w

Download citation

  • Received: 20 September 2025

  • Accepted: 13 January 2026

  • Published: 17 January 2026

  • DOI: https://doi.org/10.1038/s41598-026-36535-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on Twitter
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics