Open access peer-reviewed chapter - ONLINE FIRST

Perspective Chapter: Quantum Steganography – Encoding Secrets in the Quantum Domain

Written By

Arun Agrawal, Rishi Soni and Archana Tomar

Submitted: 05 February 2024 Reviewed: 09 February 2024 Published: 19 April 2024

DOI: 10.5772/intechopen.1004597

Steganography - The Art of Hiding Information IntechOpen
Steganography - The Art of Hiding Information Edited by Joceli Mayer

From the Edited Volume

Steganography - The Art of Hiding Information [Working Title]

Prof. Joceli Mayer

Chapter metrics overview

12 Chapter Downloads

View Full Metrics

Abstract

The chapter provides a comprehensive overview of the evolving field of quantum steganography, highlighting its potential impact on information security in the age of quantum computing. Steganography, rooted in ancient practices, has traditionally concealed data within classical computing systems, but the emergence of quantum computing poses new challenges. Quantum steganography adapts classical principles to leverage the unique properties of quantum mechanics, employing quantum bits (qubits), superposition, and entanglement for secure data concealment. The abstract delves into the conceptual framework of a quantum steganography algorithm, emphasizing its complexity and the integration of quantum key distribution for enhanced security. The applications span secure communication, medical records, financial transactions, military defense, intellectual property protection, and more. Despite promising prospects, quantum steganography faces challenges such as quantum state fragility and hardware constraints, requiring ongoing research to unlock its full potential in safeguarding sensitive information.

Keywords

  • quantum steganography
  • quantum computing
  • qubits
  • superposition
  • entanglement

1. Introduction

In the rapidly evolving landscape of digital communication and data security, one field has long remained instrumental in the concealment and safeguarding of sensitive information: steganography [1]. This artful practice, originating from the ancient Greeks who used it for hiding secret messages, revolves around embedding data within seemingly unremarkable files or transmissions to obfuscate their true nature. Steganography is a potent tool for ensuring the confidentiality and integrity of data in various contexts, such as protecting intellectual property, confidential government documents, and personal information [2].

Traditionally, steganography has been confined to the realm of classical computing and communication systems. Its techniques have been predominantly applied to hide information within images, audio files, or text [3]. The modus operandi of classical steganography involves making subtle modifications to the host data that are imperceptible to the human eye or ear. While these techniques have been effective in securing data from casual eavesdroppers or attackers, they are not immune to advanced cryptanalysis methods.

The emergence of quantum computing and quantum information theory has opened up new horizons for steganography [4]. Quantum computing, with its revolutionary processing power and cryptographic implications, introduces an intriguing challenge and opportunity for data security [5]. In this quantum frontier, quantum steganography is born.

Quantum steganography adapts the principles of classical steganography to the unique properties of quantum systems [6]. In the quantum realm, information can exist in superposition and become entangled, allowing for novel ways to hide and retrieve data. Quantum steganography leverages these quantum phenomena to encode information within quantum states, making it potentially more secure and robust against quantum adversaries who possess powerful quantum computers [7].

In the field of quantum steganography, the basic principles revolve around using qubits as transmitters of hidden information. By cleverly manipulating the inherent quantum state of a qubit, information is embedded in a way that is particularly difficult to detect or decipher. Quantum steganography adds another layer of security by exploiting the phenomenon of quantum entanglement, in which the properties of one qubit depend on the state of another qubit. Modifications of the state of entangled qubits facilitate data encoding; any effort to intercept or manipulate the information destroys this delicate entanglement. This disruption is a clear indicator of intrusion and enhances the security of hidden information in the complex field of quantum steganography [8].

The potential avenues for quantum steganography are vast and promising. Especially in the field of quantum communications, it has the potential to improve the security of quantum key distribution protocols and ensure the confidentiality of keys exchanged between entities. Furthermore, the field of quantum steganography extends its scope of protection to sensitive data stored in quantum databases or transmitted through quantum channels [9]. This versatility makes it a powerful defense against a range of threats, whether classical or emerging from the quantum realm. Quantum steganography has become a powerful guardian with its many applications, ushering in a new era of security in the field of complex quantum communication and data transmission.

Despite its potential, practical applications of quantum steganography are still in the early stages of development. Researchers are actively studying the complexities, limitations, and best practices associated with quantum steganography. Challenges such as noise in quantum systems, the urgent need for error correction, and the development of effective detection methods for quantum steganographic payloads constitute obstacles that need to be thoroughly explored and addressed in this emerging field [10].

Advertisement

2. Understanding steganography

Steganography as a concept has a rich history that predates the digital era. This includes techniques that hide information or messages behind a seemingly innocuous cover, such as a physical object, text, or even a digital file. This technique has been employed by individuals and organizations for centuries to protect sensitive information and communicate discreetly while avoiding prying eyes and potential adversaries. With the dawn of the digital era, steganography seamlessly transitioned into the realm of digital data, paving the way for the development of classic steganography techniques [11].

Classic steganography in digital form revolves around the concept of embedding data within a host medium such as an image, audio file, or text. One of the most common methods used in this field is to manipulate the least significant bits of digital files [12]. For example, in an image, the color of individual pixels can be slightly changed to encode hidden information as shown in Figure 1. The human eye typically cannot discern these subtle changes, making it a suitable medium for secret data transmission.

Figure 1.

Inserting the text bits into the image.

In audio files, the least significant bits of an audio sample can be adjusted to convey hidden data that is similarly indiscernible to the human ear. Text files can also be used for steganographic purposes, allowing hidden messages to be hidden within the text itself or by using certain encoding techniques as shown in Figure 2.

Figure 2.

Embedding secret message in audio.

Classic steganography is widely used for a variety of purposes, including protecting intellectual property, sensitive government documents, and confidential communications [11]. However, they are not immune to detection and decryption efforts, and rapid advances in computing power and algorithms are making it increasingly difficult to ensure the security of information hidden in classical steganography systems.

The advent of quantum computing ushered in a new era, bringing new challenges and exciting opportunities to the field of steganography. Quantum computing, with its unparalleled processing power, threatens traditional encryption methods and offers the potential to more easily crack steganography systems. However, it also provides a unique platform for quantum steganography to evolve and flourish.

In the field of quantum information security, quantum steganography cleverly adapts the principles of classical steganography to the complex realm of quantum systems. This innovative approach takes advantage of the unique properties of quantum bits (qubits) to hide information in a way that goes beyond the scope of classical steganography. Unlike its classical counterpart, quantum steganography exploits the concept of superposition, allowing qubits to exist in multiple states simultaneously [13]. This is an ideal feature for secret embedding of data. Furthermore, an additional layer of security is added by incorporating quantum entanglement, a phenomenon in which the states of interconnected qubits intertwine [14]. Any attempt to intercept information disrupts this complex entanglement and increases the protection of data hidden within the delicate context of quantum steganography.

Advertisement

3. Quantum steganography: principles and techniques

Quantum steganography is at the forefront of secure communications and data hiding, leveraging the unique principles of quantum mechanics to encode and hide information in a way that classical steganography cannot replicate. At its core, quantum steganography relies on three fundamental concepts: quantum superposition, quantum entanglement, and quantum key distribution (QKD) [15]. Each of these principles plays a vital role in ensuring the security and integrity of information transmitted in the complex realm of quantum mechanics.

The concept of quantum superposition is a cornerstone of quantum mechanics and provides unique advantages in the field of quantum steganography [16]. In classical computing, bits are limited to existing as either 0 or 1. However, due to the phenomenon of quantum superposition, qubits, or qubits, can exist in multiple states at the same time. This property allows expert manipulation of quantum states, enabling the embedding of hidden information in qubits [17]. The information remains hidden until it is accurately measured, at which point the qubit collapses into one of its potential states, specifically revealing the hidden data to the intended recipient. This inherent property makes quantum steganography exceptionally secure, as it poses a significant challenge to unauthorized entities attempting to intercept or decrypt without the necessary measurement and decryption technology [18].

Quantum entanglement is another fascinating phenomenon in quantum mechanics that adds an extra layer of security to quantum steganography. This property involves the interconnection of two or more qubits, regardless of the physical distance between them. In the context of quantum steganography, this interconnection creates a level of connection between sender and receiver that is highly resistant to destruction or tampering by eavesdroppers. Any attempt to intercept the communication will destroy the subtle entanglement and become an obvious sign of intrusion. Quantum entanglement therefore provides a unique form of security beyond classical encryption methods, making quantum steganography a promising avenue to facilitate secure communication and discreet hiding of information [19].

Quantum Key Distribution (QKD) emerged as an important component of quantum steganography, operating on the principles of quantum mechanics within the broader field of quantum cryptography. QKD facilitates the secure exchange of encryption keys between senders and receivers and is the cornerstone of establishing secure communication channels. The use of quantum encryption keys allows mutual authentication between communicating parties, thereby creating an enhanced environment for the exchange of steganographic information [20]. Notably, QKD ensures that the key exchange is interception-proof, as any eavesdropping attempt will destroy the quantum properties of the key, thus promptly alerting interested parties of a potential security breach. The combination of QKD therefore adds an additional layer of security, making quantum steganography a reliable method of protecting sensitive information [21].

Essentially, quantum steganography exploits the unique properties of quantum superposition, quantum entanglement, and QKD to provide an extremely secure method of encoding and hiding information within quantum states. Together, these quantum properties provide unparalleled security, making it extremely challenging for unauthorized parties to intercept, decipher, or tamper with hidden data. As we enter the era of quantum computing and traditional encryption methods face increasing vulnerabilities, quantum steganography emerges as an innovative and promising method to ensure the confidentiality and integrity of sensitive information.

The complex dance of quantum superposition allows for the secret embedding of information in quantum states, while the strong security provided by quantum entanglement creates a communication channel that is highly resistant to external interference. Using QKD as a basis ensures the secure exchange of encryption keys, further enhancing the overall security of quantum steganography. As a result, quantum steganography becomes a powerful tool in the field of secure communication and data hiding, paving the way for new possibilities in the evolving field of quantum information processing.

Advertisement

4. Conceptual framework for a quantum steganography algorithm

Designing a specific quantum steganography algorithm involves intricate quantum operations and encoding techniques to hide data within quantum states [22, 23]. Below, a simplified conceptual algorithm to give an idea of how quantum steganography might work is shown in Figure 3:

  • Initialization: Generate two entangled qubits: Qubit_A and Qubit_B, such that their states are correlated. Prepare Qubit_A in a superposition state that will represent the hidden information. The specific state preparation depends on the encoding method chosen.

  • Encoding: Embed the data you want to hide in the quantum superposition of Qubit_A. The exact encoding method will depend on the chosen strategy. For example, you might perform quantum gates, phase shifts, or other quantum operations to represent the hidden information within the superposition.

  • Transmission: Share Qubit_B, which remains entangled with Qubit_A, with the intended receiver through a secure quantum communication channel.

  • Decoding: The receiver measures Qubit_B. This measurement can reveal the state of Qubit_A due to their entanglement.

  • Data extraction: Apply a quantum decoder to recover the hidden information from the state of Qubit_A. The decoder should understand the encoding method used in the encoding step.

  • Verification: Verify the integrity and authenticity of the received data, ensuring it has not been tampered with during transmission. This can be done through error-checking codes or other cryptographic methods.

  • Security measures: Enhance the security of the quantum steganography process by integrating quantum key distribution (QKD) protocols to protect the encryption keys used for encoding and decoding. This ensures that the keys remain secret and unobservable to potential eavesdroppers.

Figure 3.

Flowchart of simplified conceptual algorithm.

It’s essential to note that this is a simplified conceptual overview of a quantum steganography algorithm. In practice, the details can become significantly more complex, and the choice of encoding and decoding methods, as well as the integration of quantum cryptographic protocols, will depend on the specific requirements and security considerations of the application. Quantum steganography is still an emerging field, and ongoing research is exploring more advanced techniques and practical implementations.

Advertisement

5. Simulators used in quantum steganography

A Quantum Steganography simulator combines quantum computing, secrecy, and simulation, allowing users to explore the fusion of quantum principles with covert communication. This innovative tool facilitates the understanding and experimentation of hiding information within quantum states. By blending elements of quantum mechanics with steganographic techniques, the simulator provides a virtual environment for studying the security implications and applications of quantum-secured communication [24]. Here are some Simulators:

  • QuantumSecSim

  • StegaSimQ

  • CryptoQuantaSim

  • QubitConceal

  • SimuSecQuant

  • EnigmaQuantSim

  • QuantumCloakSim

  • SimuCryptQuant

  • StealthQuantSim

  • CipherQuantumSim

Here, we discuss about the environment of QuantumSecSim simulator [25].

The QuantumSecSim simulator environment is a cutting-edge platform that combines the fields of quantum computing, cryptography, and steganography to provide comprehensive tools for understanding and exploring secure communications in the quantum world. The simulator is designed to provide users with an interactive and educational experience that allows them to delve into the complexities of quantum secure communications and quantum steganography.

  • Quantum computing simulation: At the heart of QuantumSecSim is a powerful quantum computing simulation module. Users can experiment with quantum bits (qubits), quantum gates, and build complex quantum circuits [26]. The simulator provides a realistic environment for simulating quantum operations and algorithms, allowing users to gain practical experience with quantum principles.

  • Cryptography module: QuantumSecSim contains dedicated cryptographic modules emphasizing the Quantum Key Distribution (QKD) protocol. Users can simulate and analyze the behavior of the QKD algorithm, which is the cornerstone of secure communications in the quantum realm. The module also introduces users to quantum-safe cryptography to prepare them for the post-quantum era [27].

  • Steganography features: The simulator pushes the boundaries by integrating steganography technology that exploits quantum properties. Users can explore how quantum states and their unique capabilities, such as superposition and entanglement, can be exploited to securely hide classical information. QuantumSecSim provides a canvas for experimenting with various quantum steganography methods and understanding their applications in hiding quantum state information [28].

  • Security analysis tools: Understanding the robustness and vulnerability of quantum-safe communications is critical. QuantumSecSim provides users with advanced security analysis tools for evaluating the ability of quantum steganography methods to withstand potential attacks [29]. Users can explore different threat scenarios, helping them gain insights into the strengths and weaknesses of quantum security systems.

  • User interface (UI): The simulator has an intuitive and user-friendly interface, ensuring that both beginners and experienced users can use it. The UI facilitates the creation, execution, and analysis of simulations. Visual tools help users understand complex quantum states, encryption protocols, and steganographic processes [30], thereby enhancing the overall learning experience.

  • Educational resources: To support users on their quantum journey, QuantumSecSim offers a wide range of educational resources. It includes tutorials, documentation, and example scenarios to guide users through basic concepts and practical applications [31]. The purpose of this simulator is not only to simulate quantum phenomena, but also to educate and empower users in the quantum realm.

  • Customization and extensibility: Recognizing the dynamic nature of quantum technology, QuantumSecSim is designed to be customizable and scalable. Users can customize simulation parameters to suit specific scenarios and experiment with emerging quantum algorithms, encryption protocols, and steganography techniques. The platform’s adaptability ensures it remains at the forefront of quantum research and development.

  • Simulation output and analysis: QuantumSecSim provides detailed output and analysis tools that enable users to effectively interpret simulation results. Users can evaluate the performance, security, and efficiency of quantum secure communication methods to gain a deeper understanding of the impact and potential applications of quantum steganography.

The QuantumSecSim simulator environment serves as a gateway to the quantum-secured future, offering an immersive and educational experience. By seamlessly integrating quantum computing, cryptography, and steganography, QuantumSecSim empowers users to unlock the secrets of secure communication in the quantum era. This innovative platform not only simulates quantum phenomena but also educates and inspires the next generation of quantum enthusiasts and researchers.

Advertisement

6. Applications of quantum steganography

Quantum steganography is an emerging field with diverse applications in the realm of secure communication and data protection. Here are ten potential applications of quantum steganography:

  • Secure communication: Quantum steganography can provide a highly secure means of communication, where sensitive information is hidden within quantum states, making it extremely difficult for unauthorized parties to intercept or decipher the data [32].

  • Quantum key distribution (QKD): Quantum steganography can enhance QKD by concealing cryptographic keys within quantum states. This ensures that the keys remain secret and protected from eavesdroppers, bolstering the security of quantum communication [33].

  • Quantum internet: As the development of quantum internet progresses, quantum steganography can be used to secure data transmission and communication over long-distance quantum networks [34].

  • Medical records: Concealing sensitive patient data within quantum states can enhance the privacy and security of electronic health records, protecting personal information from unauthorized access [35].

  • Financial transactions: Quantum steganography can be applied to secure financial transactions and data, making it more difficult for cybercriminals to intercept or manipulate sensitive financial information [32].

  • Military and defense: Quantum steganography can be employed for secure communication within military and defense organizations, protecting classified information from adversaries [36].

  • Intellectual property protection: Companies can use quantum steganography to protect their intellectual property by concealing critical data within quantum states, reducing the risk of industrial espionage [32].

  • Secure cloud storage: Quantum steganography can be applied to encrypt and hide data stored in the cloud, adding an extra layer of security to cloud-based storage solutions [36].

  • Government communications: Government agencies can use quantum steganography to secure classified and sensitive communications, safeguarding national security interests [37].

  • Protecting sensitive research: Researchers working on cutting-edge scientific projects can employ quantum steganography to secure their findings and intellectual property, preventing unauthorized access or theft [32, 35].

  • Smart grid security: In the context of the smart grid, quantum steganography can help protect critical infrastructure and ensure secure communication within the energy distribution network, reducing the risk of cyberattacks [36].

  • Supply chain security: Quantum steganography can be applied to secure information related to the supply chain, ensuring the confidentiality and integrity of data, such as shipping schedules and product designs [13, 22, 29].

  • Law enforcement and criminal investigations: Law enforcement agencies can use quantum steganography to safeguard sensitive investigative information and protect the identities of undercover officers and informants [38].

  • Secure voting systems: Quantum steganography can enhance the security of electronic voting systems by concealing and protecting voter data, making it more resistant to tampering or hacking [39].

  • Blockchain security: Quantum steganography can bolster the security of blockchain technology by concealing private keys and transaction details, safeguarding cryptocurrency assets and transaction history [35].

These applications highlight the potential of quantum steganography to address various security and privacy challenges in the modern world, making it a valuable tool for securing information in the quantum age.

Advertisement

7. Challenges and future prospects

Quantum steganography is an emerging field in information security that is grappling with the challenges of standing out in the world of covert communications. The main obstacle is the fragility of quantum states, which are highly susceptible to external disturbances. Unlike traditional steganography, which hides information in classical bits of data, quantum steganography operates in the complex quantum realm and requires nuanced hiding methods [40].

One of the unique challenges of quantum steganography comes from the fragility of quantum states. Quantum superposition is a key concept in quantum mechanics, which allows quantum particles to exist in multiple states at the same time. While this property facilitates the encoding of hidden information within quantum states, it also makes these states highly sensitive. External interference or measurements may corrupt the superposition, potentially revealing hidden information. This delicate balance poses the challenge of designing robust quantum steganography techniques that can withstand potential interference and ensure secure transmission of information.

Unlike classical steganography, which hides information within classical data bits, quantum steganography operates according to the principles of quantum mechanics. This shift introduces a paradigm where the rules of classical information hiding do not directly apply. The challenge is to develop methods that exploit the unique properties of quantum mechanics to effectively hide information. As mentioned earlier, quantum superposition and entanglement become critical in this endeavor, allowing the creation of secure communication channels and hiding information that is inherently resistant to unauthorized access.

Additionally, the infancy of quantum computing technology adds additional complexity to the implementation of quantum steganography. Successful execution requires advanced quantum hardware and precise error correction mechanisms. Theoretical concepts must be seamlessly integrated with practical hardware constraints, highlighting the complex interplay between the theoretical foundations of quantum steganography and the capabilities of emerging quantum technologies [16].

To illustrate this point, consider the application of quantum steganography in quantum key distribution (QKD). QKD leverages the principles of quantum mechanics to enable secure communication by exchanging quantum keys between the sender and receiver. Quantum steganography can enhance the security of QKD by hiding information within the quantum states exchanged during key distribution. This additional hidden layer ensures that even if an adversary intercepts the quantum key exchange, deciphering the hidden information remains a difficult challenge.

Despite these challenges, the potential of quantum steganography to enhance information security remains promising. Researchers and experts actively explore this uncharted territory, developing applications, describing limitations, and refining strategies to improve efficiency and reliability. As quantum technology matures, the unique capabilities of quantum steganography may lead to novel solutions for protecting sensitive information.

Quantum steganography represents an emerging frontier in information security, characterized by the unique challenges posed by the delicate nature of quantum states and the nascent stages of quantum computing technology. While these challenges are significant, they also highlight the uniqueness of quantum steganography in protecting information in ways that classical methods cannot achieve. As researchers continue to explore this complex field, the potential of quantum steganography to revolutionize secure communications remains promising, marking a unique chapter in the evolution of information security.

Advertisement

8. Conclusion

Quantum steganography, a cutting-edge realm in information security, utilizes the distinctive features of quantum mechanics to revolutionize digital communication and data storage security in the era of quantum computing. Unlike classical steganography, which hides information in plain sight, quantum steganography leverages quantum entanglement and superposition to encode data in quantum states, making it exceptionally resistant to unauthorized interception or decryption.

As quantum technologies progress, the role of quantum steganography is poised to expand, offering unparalleled protection for sensitive information. Its capacity to operate within the quantum realm aligns with the escalating demand for robust data security measures. In the evolving landscape of information protection, quantum steganography emerges as a promising safeguard, ensuring confidentiality and integrity amidst the increasing challenges posed by sophisticated cyber threats and the impending era of quantum computing.

References

  1. 1. Danezis G, Domingo-Ferrer J, Hansen M, Hoepman J-H, Le Metayer D, Tirtea R, et al. Privacy and data protection by design: From policy to engineering (report). Retrieved from the Publications Office of the European Union Website. 2014. DOI: 10.2824/38623
  2. 2. Mawla NA, Khafaji HK. Enhancing data security: A cutting-edge approach utilizing protein chains in cryptography and steganography. Computers. 2023;12(8):166
  3. 3. Sinha N, Bhowmick A, Kishore B. Encrypted information hiding using audio steganography and audio cryptography. International Journal of Computer Applications. 2015;112(5):49-53
  4. 4. Pathak A. Elements of Quantum Computation and Quantum Communication. Boca Raton, FL: CRC Press, Taylor & Francis Group; 2013
  5. 5. Li S, Chen Y, Chen L, Liao J, Kuang C, Li K, et al. Post-quantum security: Opportunities and challenges. Sensors. 2023;23(21):8744
  6. 6. Chaharlang J, Mosleh M, Rasouli-Heikalabad S. A novel quantum steganography-steganalysis system for audio signals. Multimedia Tools and Applications. 2020;79(25-26):17551-17577
  7. 7. Krenn M, Malik M, Scheidl T, Ursin R, Zeilinger A. Quantum communication with photons. Optics in Our Time. 2016;18:455
  8. 8. Singh S, Bharathi V. Quantum cryptography research over the past two decades–review, research implications, and future directions. In: AIP Conference Proceedings. Vol. 2869, No. 1. AIP Publishing; 2023. pp. 106-119
  9. 9. Maurya S, Nandu N, Patel T, Reddy VD, Tiwari S, Morampudi MK. A discrete cosine transform-based intelligent image steganography scheme using quantum substitution box. Quantum Information Processing. 2023;22(5):206
  10. 10. Qu Z, Huang Y, Zheng M. A novel coherence-based quantum steganalysis protocol. Quantum Information Processing. 2020;19:1-19
  11. 11. Wayner P. Disappearing Cryptography: Information Hiding: Steganography and Watermarking. 3rd ed. Boston, MA: Morgan Kaufmann; 2009
  12. 12. Artz D. Digital steganography: Hiding data within data. IEEE Internet Computing. 2001;5(3):75-80
  13. 13. Moyou Metcheka L, Ndoundam R. Distributed data hiding in multi-cloud storage environment. Journal of Cloud Computing. 2020;9(1):68
  14. 14. Awschalom D, Berggren KK, Bernien H, Bhave S, Carr LD, Davids P, et al. Development of quantum interconnects (quics) for next-generation information technologies. PRX Quantum. 2021;2(1):017002
  15. 15. Tudorache AG, Manta V, Caraiman S. Quantum steganography based on the B92 quantum protocol. Mathematics. 2022;10(16):2870
  16. 16. Shaw BA. Quantum Steganography and Quantum Error-Correction [Doctoral dissertation]. University of Southern California, USC Digital Library; 2010
  17. 17. Ruan S, Yuan R, Guan Q , Lin Y, Mao Y, Jiang W, et al. Venus: A geometrical representation for quantum state visualization. Computer Graphics Forum. 2023;42(3):247-258
  18. 18. Gea-Banacloche J. Hiding messages in quantum data. Journal of Mathematical Physics. 2002;43(9):4531-4536
  19. 19. Mihara T. Quantum steganography using prior entanglement. Physics Letters A. 2015;379(12-13):952-955
  20. 20. Kumar A, Garhwal S. State-of-the-art survey of quantum cryptography. Archives of Computational Methods in Engineering. 2021;28:3831-3868
  21. 21. Alléaume R, Branciard C, Bouda J, Debuisschert T, Dianati M, Gisin N, et al. Using quantum key distribution for cryptographic purposes: A survey. Theoretical Computer Science. 2014;560:62-81
  22. 22. Bahaddad AA, Almarhabi KA, Abdel-Khalek S. Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption. Alexandria Engineering Journal. 2023;75:41-54
  23. 23. Harun NZ, Ahmad Zukarnain Z, Hanapi ZM, Ahmad I. Multi-stage quantum secure direct communication using secure shared authentication key. Symmetry. 2020;12(9):1481
  24. 24. Ur Rasool R, Ahmad HF, Rafique W, Qayyum A, Qadir J, Anwar Z. Quantum computing for healthcare: A review. Future Internet. 2023;15(3):94
  25. 25. Giraldo-Carvajal A, Jaramillo- Villegas JA. QuantumSkynet: A high dimensional quantum computing simulator. In: Laser Science (JW6A.25). Optica Publishing Group; 2020. DOI: 10.1364/LS.2020.JW6A.25
  26. 26. Georgopoulos K, Emary C, Zuliani P. Quantum computer benchmarking via quantum algorithms. 2021. ArXiv, art. 2112.09457v1. Available from: https://arxiv.org/pdf/2112.09457.pdf [Accessed: September 20, 2023]
  27. 27. Dragone S. How We Quantum-Proofed IBM z16. IBM Research Blog; 11 October 2022. Available from: https://research.ibm.com/blog/z16-quantum-safe-migration
  28. 28. Min-Allah N, Nagy N, Aljabri M, Alkharraa M, Alqahtani M, Alghamdi D, et al. Quantum image steganography schemes for data hiding: A survey. Applied Sciences. 2022;12(20):10294
  29. 29. Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA. A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors. 2020;20(11):3108
  30. 30. Sathananthavathi V, Ganesh Kumar K, Sathish Kumar M. Secure visual communication with advanced cryptographic and image processing techniques. Multimedia Tools and Applications. 2023;82:1-23. DOI: 10.1007/s11042-023-14481-8
  31. 31. Paudel HP, Syamlal M, Crawford SE, Lee YL, Shugayev RA, Lu P, et al. Quantum computing and simulations for energy applications: Review and perspective. ACS Engineering Au. 2022;2(3):151-196
  32. 32. Kumar M, Gupta A, Shah K, Saurabh A, Saxena P, Tiwari VK. Data security using Stegnography and quantum cryptography. Network and Complex Systems. 2012;2(2):46-55
  33. 33. Sasikumar S, Sundar K, Jayakumar C, Obaidat MS, Stephan T, Hsiao KF. Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment. Simulation Modelling Practice and Theory. 2022;121:102651
  34. 34. Rozenman GG, Kundu NK, Liu R, Zhang L, Maslennikov A, Reches Y, et al. The quantum internet: A synergy of quantum information technologies and 6G networks. IET Quantum Communication. 2023;4(4):147-166
  35. 35. Qu Z, Zhang Z, Zheng M. A quantum blockchain-enabled framework for secure private electronic medical records in internet of medical things. Information Sciences. 2022;612:942-958
  36. 36. Ralegankar VK, Bagul J, Thakkar B, Gupta R, Tanwar S, Sharma G, et al. Quantum cryptography-as-a-service for secure UAV communication: Applications, challenges, and case study. IEEE Access. 2021;10:1475-1492
  37. 37. Patil BP, Kharade KG, Kharade SK, Kamat RK. Significant study of data encryption and steganography. Recent Advances in Mathematical Research and Computer Science. 2021;1:79-91
  38. 38. Aguirre B. Steganography in contemporary cyberattacks and the link to child pornography [Doctoral dissertation]. Utica College, Utica College Library; 2020
  39. 39. Junior Gabriel A, Alese BK, Adetunmbi AO, Adewale OS, Sarumi OA. Post-quantum crystography system for secure electronic voting. Open Computer Science. 2019;9(1):292-298
  40. 40. Laishram D, Tuithung T. A survey on digital image steganography: Current trends and challenges. In: Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT). Jaipur, India: Malaviya National Institute of Technology; 26-27 March 2018. pp. 26-27

Written By

Arun Agrawal, Rishi Soni and Archana Tomar

Submitted: 05 February 2024 Reviewed: 09 February 2024 Published: 19 April 2024