Volume 20 No 13 (2022)
Download PDF
Novel Text Steganography Approach Using Quantum Key Distribution: Survey Paper
Surya Prakash Yalla , Senapathi Hemanth , Sigatapu Tharun Kumar , Shaik Moulali , Sasapu Dileep
Abstract
As technology advances, maintaining the security of the information in the communication channel from the
intruders has become a greater challenge. To overcome this challenge steganography has been introduced which
makes the shared data unavailable to the intruders. The process of steganography involves encoding a secret
message in a suitable carrier message, such as text, a picture, audio, a video, a file, etc. Quantum steganography
embeds the steganographic data into quantum circuit and transmit through the quantum channel. In this paper, a
secured communication model is proposed through text steganography using quantum channels. The Global English
language has been used to construct a text steganography procedure in this article. Text steganography is a process
of hiding the secret message with the covered message or data and transmitting over a channel. This process
involves Bernstein Vazirani algorithm and BB84 protocol. The data is integrated into a quantum circuit using the
Bernstein Vazirani technique. BB84 protocol is used to obtain a secret key. An attacker or a hacker can’t find out the
actual quantum message without getting the access of the protocol. Finally, this paper provides a secure
communication between the users using the quantum channels.
Keywords
BB84 Protocol, Bernstein vazirani Algorithm, Quantum Channel, Quantum Steganography
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.