Abstract
Data security is very important aspect of security to protect the information from being tampered and unauthorized use. Data can be protected in both ways whether data is placed at one place or during transmission of information. There are two ways to protect the data, i.e., Cryptography and Quantum Steganography. For the security and privacy of sensitive information on the internet, current information security techniques basically depend on the classical cryptography techniques. Recent advancements in Quantum Steganography methods challenge the classical cryptographic systems. In Quantum Steganography technique media or characters are hided in other Medias like image in other image, text in an image, sound in image, image in a video, etc. This paper give a review of many research papers which presents how secure communication can be achieved by using quantum image steganography technique for data hiding, by highlighting objective, methodology, analysis, findings and limitations of the papers on that area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Marwaha P, Marwaha P (2010) Visual cryptographic steganography in images. In: Second international conference on computing, communication and networking technologies, 978-1-4244-6589-7/10. IEEE
Deng FG, Li XH, Long GL (2016) Quantum secure direct communication. J Beijing Normal Univ Natural Sci 52(6):790–799
Du J et al. (2002) Experimental realization of quantum games on a quantum computer. Phys Rev Lett 88(13). Art. no. 137902
Li J, Chen XB, Xu G, Yang YX, Li ZP (2015) Perfect quantum network coding independent of classical network solutions. IEEE Commun Lett 19(2):115–118
Chen XB, Dou Z, Xu G, Wang C, Yang YX (2014) A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf Process 13(1):85–100
Xu G, Chen XB, Duo Z, Yang YX, Li Z (2015) A novel protocol for multiparty quantum key management. Quantum Inf Process 14(8):2959–2980
Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun 13(7):108–116
Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Continua 54(2):197–207
Meng R, Rice SG, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster R-CNN. Comput Mater Continua 55(1):1–16
Nie Q, Xu X, Feng B, Zhang LY (2018) Defining embedding distortion for intra prediction mode-based video steganography. Comput Mater Continua 55(1):59–70
Mihara T (2012) Quantum steganography embedded any secret text without changing the content of cover data. J Quantum Inf Sci 2(1):10–14
Wei ZH, Chen XB, Niu XX, Yang YX (2015) The quantum steganography protocol via quantum noisy channels. Int J Theor Phys 54(8):2505–2515
Mukherjee N, Paul G, Saha SK Burman D (2020) A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimedia Tools Appl 79(1):13449–13479
Qu Z, Li Z, Xu G, Wu S, Wang X (2019) Quantum image steganography protocol based on quantum image expansion and grover search algorithm special section on recent advances in video coding and security. IEEE 7:50849–50857
Wang S, Sang J, Song X, Niu X (2015) Least significant qubit (LSQb) information hiding algorithm for quantum image. Measurement 73(9):352–359
Qu Z, Cheng Z, Luo M, Liu W (2017) A robust quantum watermark algorithm based on quantum log-polar images. Int J Theor Phys 56(11):3460–3476
Liu WJ, Xu Y, Yang CN, Gao PP, Yu WB (2018) An efficient and secure arbitrary N-party quantum key agreement protocol using bell states. Int J Theor Phys 57(1):195–207
Abd-El-Latif AA, Abd-El-Atty B, HossainMS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing special section on information security solutions for telemedicine applications. IEEE 6:21075–21083
Qu Z, Liu W, Wang X, Cheng Z (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimedia Tools Appl 78(8):7981–8001
Mukherjee N (Ganguly), Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimedia Tools Appl 77(3):18451–18481
Liao X, Wen QY, Sun Y, Zhang J (2010) Multi-party covert communication with steganography and quantum secret sharing. J Syst Softw 83(10):1801–1804
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thind, S., Shukla, A.K. (2023). A Review on Analysis and Development of Quantum Image Steganography Technique for Data Hiding. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Piuri, V. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 491. Springer, Singapore. https://doi.org/10.1007/978-981-19-4193-1_65
Download citation
DOI: https://doi.org/10.1007/978-981-19-4193-1_65
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-4192-4
Online ISBN: 978-981-19-4193-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)