Skip to main content

A Review on Analysis and Development of Quantum Image Steganography Technique for Data Hiding

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 491))

  • 723 Accesses

Abstract

Data security is very important aspect of security to protect the information from being tampered and unauthorized use. Data can be protected in both ways whether data is placed at one place or during transmission of information. There are two ways to protect the data, i.e., Cryptography and Quantum Steganography. For the security and privacy of sensitive information on the internet, current information security techniques basically depend on the classical cryptography techniques. Recent advancements in Quantum Steganography methods challenge the classical cryptographic systems. In Quantum Steganography technique media or characters are hided in other Medias like image in other image, text in an image, sound in image, image in a video, etc. This paper give a review of many research papers which presents how secure communication can be achieved by using quantum image steganography technique for data hiding, by highlighting objective, methodology, analysis, findings and limitations of the papers on that area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Marwaha P, Marwaha P (2010) Visual cryptographic steganography in images. In: Second international conference on computing, communication and networking technologies, 978-1-4244-6589-7/10. IEEE

    Google Scholar 

  2. Deng FG, Li XH, Long GL (2016) Quantum secure direct communication. J Beijing Normal Univ Natural Sci 52(6):790–799

    Google Scholar 

  3. Du J et al. (2002) Experimental realization of quantum games on a quantum computer. Phys Rev Lett 88(13). Art. no. 137902

    Google Scholar 

  4. Li J, Chen XB, Xu G, Yang YX, Li ZP (2015) Perfect quantum network coding independent of classical network solutions. IEEE Commun Lett 19(2):115–118

    Google Scholar 

  5. Chen XB, Dou Z, Xu G, Wang C, Yang YX (2014) A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf Process 13(1):85–100

    Google Scholar 

  6. Xu G, Chen XB, Duo Z, Yang YX, Li Z (2015) A novel protocol for multiparty quantum key management. Quantum Inf Process 14(8):2959–2980

    Google Scholar 

  7. Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks. China Commun 13(7):108–116

    Google Scholar 

  8. Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Continua 54(2):197–207

    Google Scholar 

  9. Meng R, Rice SG, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster R-CNN. Comput Mater Continua 55(1):1–16

    Google Scholar 

  10. Nie Q, Xu X, Feng B, Zhang LY (2018) Defining embedding distortion for intra prediction mode-based video steganography. Comput Mater Continua 55(1):59–70

    Google Scholar 

  11. Mihara T (2012) Quantum steganography embedded any secret text without changing the content of cover data. J Quantum Inf Sci 2(1):10–14

    Google Scholar 

  12. Wei ZH, Chen XB, Niu XX, Yang YX (2015) The quantum steganography protocol via quantum noisy channels. Int J Theor Phys 54(8):2505–2515

    Google Scholar 

  13. Mukherjee N, Paul G, Saha SK Burman D (2020) A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimedia Tools Appl 79(1):13449–13479

    Google Scholar 

  14. Qu Z, Li Z, Xu G, Wu S, Wang X (2019) Quantum image steganography protocol based on quantum image expansion and grover search algorithm special section on recent advances in video coding and security. IEEE 7:50849–50857

    Google Scholar 

  15. Wang S, Sang J, Song X, Niu X (2015) Least significant qubit (LSQb) information hiding algorithm for quantum image. Measurement 73(9):352–359

    Google Scholar 

  16. Qu Z, Cheng Z, Luo M, Liu W (2017) A robust quantum watermark algorithm based on quantum log-polar images. Int J Theor Phys 56(11):3460–3476

    Google Scholar 

  17. Liu WJ, Xu Y, Yang CN, Gao PP, Yu WB (2018) An efficient and secure arbitrary N-party quantum key agreement protocol using bell states. Int J Theor Phys 57(1):195–207

    Google Scholar 

  18. Abd-El-Latif AA, Abd-El-Atty B, HossainMS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing special section on information security solutions for telemedicine applications. IEEE 6:21075–21083

    Google Scholar 

  19. Qu Z, Liu W, Wang X, Cheng Z (2019) A novel quantum image steganography algorithm based on exploiting modification direction. Multimedia Tools Appl 78(8):7981–8001

    Google Scholar 

  20. Mukherjee N (Ganguly), Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimedia Tools Appl 77(3):18451–18481

    Google Scholar 

  21. Liao X, Wen QY, Sun Y, Zhang J (2010) Multi-party covert communication with steganography and quantum secret sharing. J Syst Softw 83(10):1801–1804

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonia Thind .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thind, S., Shukla, A.K. (2023). A Review on Analysis and Development of Quantum Image Steganography Technique for Data Hiding. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Piuri, V. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 491. Springer, Singapore. https://doi.org/10.1007/978-981-19-4193-1_65

Download citation

Publish with us

Policies and ethics