Volume 20 No 13 (2022)
 Download PDF
Novel Text Steganography Approach Using Quantum Key Distribution: Survey Paper
Surya Prakash Yalla , Senapathi Hemanth , Sigatapu Tharun Kumar , Shaik Moulali , Sasapu Dileep
Abstract
As technology advances, maintaining the security of the information in the communication channel from the intruders has become a greater challenge. To overcome this challenge steganography has been introduced which makes the shared data unavailable to the intruders. The process of steganography involves encoding a secret message in a suitable carrier message, such as text, a picture, audio, a video, a file, etc. Quantum steganography embeds the steganographic data into quantum circuit and transmit through the quantum channel. In this paper, a secured communication model is proposed through text steganography using quantum channels. The Global English language has been used to construct a text steganography procedure in this article. Text steganography is a process of hiding the secret message with the covered message or data and transmitting over a channel. This process involves Bernstein Vazirani algorithm and BB84 protocol. The data is integrated into a quantum circuit using the Bernstein Vazirani technique. BB84 protocol is used to obtain a secret key. An attacker or a hacker can’t find out the actual quantum message without getting the access of the protocol. Finally, this paper provides a secure communication between the users using the quantum channels.
Keywords
BB84 Protocol, Bernstein vazirani Algorithm, Quantum Channel, Quantum Steganography
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.