Author:
Agrawal Arun,Soni Rishi,Tomar Archana
Abstract
The chapter provides a comprehensive overview of the evolving field of quantum steganography, highlighting its potential impact on information security in the age of quantum computing. Steganography, rooted in ancient practices, has traditionally concealed data within classical computing systems, but the emergence of quantum computing poses new challenges. Quantum steganography adapts classical principles to leverage the unique properties of quantum mechanics, employing quantum bits (qubits), superposition, and entanglement for secure data concealment. The abstract delves into the conceptual framework of a quantum steganography algorithm, emphasizing its complexity and the integration of quantum key distribution for enhanced security. The applications span secure communication, medical records, financial transactions, military defense, intellectual property protection, and more. Despite promising prospects, quantum steganography faces challenges such as quantum state fragility and hardware constraints, requiring ongoing research to unlock its full potential in safeguarding sensitive information.
Reference40 articles.
1. Danezis G, Domingo-Ferrer J, Hansen M, Hoepman J-H, Le Metayer D, Tirtea R, et al. Privacy and data protection by design: From policy to engineering (report). Retrieved from the Publications Office of the European Union Website. 2014. DOI: 10.2824/38623
2. Mawla NA, Khafaji HK. Enhancing data security: A cutting-edge approach utilizing protein chains in cryptography and steganography. Computers. 2023;(8):166
3. Sinha N, Bhowmick A, Kishore B. Encrypted information hiding using audio steganography and audio cryptography. International Journal of Computer Applications. 2015;(5):49-53
4. Pathak A. Elements of Quantum Computation and Quantum Communication. Boca Raton, FL: CRC Press, Taylor & Francis Group; 2013
5. Li S, Chen Y, Chen L, Liao J, Kuang C, Li K, et al. Post-quantum security: Opportunities and challenges. Sensors. 2023;(21):8744