PREREQUISITES FOR THE ESTABLISHMENT OF A QUANTUM STEGANOGRAPHY COMMUNICATION
DOI:
https://doi.org/10.17770/etr2025vol5.8485Keywords:
Quantum Key Distribution, Quantum Steganography, Qubits, SecurityAbstract
Several approaches and techniques exist to make communication via the internet secure, one of these approaches is steganography. Computer steganography can be defined as a method of hiding data in cover media so that others are not aware of its existence. Quantum computers, built on the principles of quantum physics, have introduced new possibilities for researchers in security and computer science. This paper explores the fundamentals of quantum computing, its achievements, and the challenges and future prospects it presents in the field of cryptography and steganography. Quantum computers give us a new approach to different kinds of complicated problems in security fields by creating multi-state computing spaces. The article deals with the steganography system which hides text inside images and after that realize quantum communication. The secret message is hidden in the cover image using Least Significant Bit (LSB) algorithm. The paper proposes an information transmission scheme with a quantum channel enabled. Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics.
References
M. Imanparast, “The prospect of cryptography and computing with quantum computers”, 8th International Conference on Combinatorics, Cryptography, Computer Science and Computation, pp.379-384, 2023.
N. Subramanian, S. Al-maadeed, A. Bouridane, “Image Steganography: A Review of the Recent Advances”, IEEE Access, vol. 9, 2021, pp.23409-23423, doi:10.1109/ACCESS.2021.3053998.
P. Mandal, I. Mukherjee, G. Paul, B. Chatterji, “Digital image steganography A literature survey”, Information Sciences, Elsevier Inc, volume 609, 2021, pp. 1451–1488, ISSN: 0020-0255, [Online]. Available: doi.org/10.1016/j.ins.2022.07.120
D. Artz, “Digital steganography: hiding data within data”, in IEEE Internet Computing, vol. 5, no. 3, pp. 75-80, 2001, doi: 10.1109/4236.935180
V. Stoyanova, “Research of the characteristics of a steganography algorithm in images when using different alphabet” Environment. Technologies. Resources. Proceedings of the International Scientific and Practical Conference. Vol. 4. 2024, https://doi.org/10.17770/etr2024vol4.8236.
A. Agrawal, R. Soni, and A. Tomar, “Perspective Chapter: Quantum Steganography – Encoding Secrets in the Quantum Domain” in Steganography - The Art of Hiding Information. IntechOpen, Apr. 19, 2024, doi: 10.5772/intechopen.1004597.
B. A. Shaw, T. A. Brun, “Quantum Steganography”, arXiv:1006.1934, 10 Jun 2010, https://doi.org/10.48550/arXiv.1006.1934
N. Min-Allah, N. Nagy, M. Aljabri, M. Alkharraa, M. Alqahtani, D. Alghamdi, R. Sabri and R. Alshaikh, “Quantum Image Steganography Schemes for Data Hiding: A Survey”, Applied Sciences, 12(20), 2022, 10294. https://doi.org/10.3390/app122010294
Ts.Tsankov, L.Staneva, I.Vardeva and D.Iliev, “Generalized net model of a communication network using the Port Knocking method”, Scientific Conference with international participation MATTEH 2022, Conference proceeding, Vol. 2, Shumen, 2022, ISSN 1314-3921, pp. 29-34
Ts.Tsankov, T.Trifonov and L.Staneva, “A survey of phase manipulated signals with high structural complexity and small loses after processing with mismatched filters”, Konstantin Preslavski University Of Shumen, Jornal Scientific and applid reserch, 2013, https://jsar.ftn.shu.bg › jsar › article › download, [Accessed Yan 24, 2025].
V.Stoyanova, “Steganography System Using LSB Methods”, Proceedings of the ENTRENOVA. ENTerprise REsearch InNOVAtion Conference, Split. Croatia, IRENET – Society for Advancing Innovation and Research in Economy, Zagreb. 6–8 .09.2018. Vol. 4. P. 381–387
M.Al-Shatnawi, “A New Method in Image Steganography with Improved Image Quality”, Applied Mathematical Sciences, vol. 6, no. 79, pp. 3907 – 3915, 2012.
C. K.Chan and L. M.Cheng, “Hiding data in images by simple LSB substitution”, Pattern Recognition, vol. 37, pp. 469-474, 2004.
C. C. Chang, J. Y. Hsiao and C. S. Chan, “Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy”, Pattern Recognition, vol. 36, pp. 1583-1595, 2003.
C. H.Yang and S.-J.Wang, “Transforming LSB Substitution for Image-based Steganography in Matching Algorithms”, Journal of Information Science and Engineering, vol. 26, pp. 1199-1212, 2010. [Online]. Available: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=fe144037adc9e934a44cb1f31aaee4ed5cb4cd2e, [Accessed Yan 24, 2025].
G. A. Kozarev and St. H. Parvanov, “Research opportunities for using steganographic methods in the field of defense”, Proceedings of International Scientific Conference-Defense Technologies‖ DefTech 2024, Shumen, pp.637-642, ISSN 2367-7902.
R.G.Zhou, J.Luo, X.Liu, C.Zhu, L.Wei and X.Zhang, “A novel quantum image steganography scheme based on LSB”, International Journal of Theoretical Physics, June 2018, 57, 1848–1863, DOI: 10.1007/s10773-018-3710-x.
A.G.Tudorache, V.Manta and S.Caraiman, “Quantum Steganography Using Two Hidden Thresholds”, Adv. Electr. Comput. Eng. 2021, 21, 79–88.
E. Şahin, I.Yilmaz ”QRMW:Quantum representation of multi wavelength images”, Turk. J. Electr. Eng. Comput. Sci., 7, 2018, pp.68–779.
Y. Zhang, K. Lu, Y. Gao, and K. Xu, “A novel quantum representation for log-polar images,'' Quantum Inf. Process., vol. 12, no. 9, pp. 3103_3126, Sep. 2013.
V. Martin, M.J.Martinez and M.Peev, “Introduction to Quantum Key Distribution”, 2016, http://www.gcc.fi.upm.es/publications/qkd_intro.pdf
M. Tahmasbi and M. R. Bloch, “Steganography protocols for quantum channels”, Journal of Mathematical Physics, vol.61, issue 8, August 2020;082201. https://doi.org/10.1063/5.0004731
V. Petrova, “The Hierarchical Decision Model of cybersecurity risk assessment”, 12th National Conference with International Participation (Electronica), vol. 1, 2021, pp. 1-4, doi:10.1109/ELECTRONICA52725.2021.9513722. 978-1-66544061-5.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Veselka Stoyanova

This work is licensed under a Creative Commons Attribution 4.0 International License.