{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:29:40Z","timestamp":1772119780703,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:00:00Z","timestamp":1710374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171470"],"award-info":[{"award-number":["62171470"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhongyuan Science and Technology Innovation Leading Talent Project of Henan Province","award":["234200510019"],"award-info":[{"award-number":["234200510019"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04312-1","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T03:47:21Z","timestamp":1710388041000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Quantum audio LSB steganography with entanglement-assisted modulation"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1335-3457","authenticated-orcid":false,"given":"Chaolong","family":"Hao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7989-7089","authenticated-orcid":false,"given":"Xukui","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9093-0142","authenticated-orcid":false,"given":"Quangong","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9917-7794","authenticated-orcid":false,"given":"Dan","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,14]]},"reference":[{"key":"4312_CR1","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielson","year":"2010","unstructured":"Nielson, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010)"},{"key":"4312_CR2","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Computer Society Press, Los Alamitos (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"4312_CR3","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In Proceedings of 28th Annual ACM Symposium on the Theory of Computing, Association for Computing Machinery, New York, NY, USA, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"4312_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computer Systems and Signal Processing, pp. 175\u2013179. IEEE Press, New York (1984)"},{"issue":"1","key":"4312_CR5","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"04237","key":"4312_CR6","first-page":"1","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(04237), 1\u20136 (2003)","journal-title":"Phys. Rev. A"},{"key":"4312_CR7","doi-asserted-by":"crossref","unstructured":"Simmons, G.J. The prisoner\u2019s problem and the subliminal channel. In Proceedings of CRYPTO\u201983, Santa Barbara, pp. 51\u201367 (1983)","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"1","key":"4312_CR8","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s11128-010-0177-y","volume":"10","author":"PQ Le","year":"2011","unstructured":"Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10(1), 63\u201384 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"4312_CR9","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Lu, K., Gao, Y., Wang, M.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12(8), 2833\u20132860 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"4312_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1463-0","volume":"16","author":"J Sang","year":"2017","unstructured":"Sang, J., Wang, S., Li, Q.: A novel quantum representation of color digital images. Quantum Inf. Process. 16(2), 1\u201314 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"4312_CR11","doi-asserted-by":"publisher","first-page":"404","DOI":"10.20965\/jaciii.2013.p0404","volume":"17","author":"B Sun","year":"2013","unstructured":"Sun, B., Iliyasu, A., Yan, F., Dong, F., Hirota, K.: An RGB multi-channel representation for images on quantum computers. J. Adv. Comput. Intell. Intell. Inf. 17(3), 404\u2013417 (2013)","journal-title":"J. Adv. Comput. Intell. Intell. Inf."},{"issue":"3","key":"4312_CR12","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1007\/s10773-015-2800-2","volume":"55","author":"J Wang","year":"2015","unstructured":"Wang, J.: QRDA: quantum representation of digital audio. Int. J. Theor. Phys. 55(3), 1622\u20131641 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"4312_CR13","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.tcs.2017.12.025","volume":"752","author":"F Yan","year":"2018","unstructured":"Yan, F., Iliyasu, A., Guo, Y.M., Yang, H.M.: Flexible representation and manipulation of audio signals on quantum computers. Theoret. Comput. Sci. 752, 71\u201385 (2018)","journal-title":"Theoret. Comput. Sci."},{"issue":"4","key":"4312_CR14","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1007\/s10773-018-3841-0","volume":"57","author":"P Li","year":"2018","unstructured":"Li, P., Wang, B., Xiao, H., Liu, X.: Quantum representation and basic operations of digital signals. Int. J. Theor. Phys. 57(4), 3242\u20133270 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"7","key":"4312_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2317-3","volume":"18","author":"E Sahin","year":"2019","unstructured":"Sahin, E., Yilmaz, I.: QRMA: quantum representation of multichannel audio. Quant. Inf. Process. 18(7), 1\u201330 (2019)","journal-title":"Quant. Inf. Process."},{"issue":"3","key":"4312_CR16","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s11128-022-03435-7","volume":"21","author":"F Yan","year":"2022","unstructured":"Yan, F., Gao, S., Iliyasu, A.M., Chen, K.: Probability amplitude-encoded multichannel representation for quantum audio signals. Quantum Inf. Process. 21(3), 95 (2022)","journal-title":"Quantum Inf. Process."},{"key":"4312_CR17","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/j.measurement.2015.05.038","volume":"73","author":"S Wang","year":"2015","unstructured":"Wang, S., Sang, J.Z., Song, X.H., Niu, X.M.: Least significant qubit (LSQB) information hiding algorithm for quantum image. Measurement 73, 352\u2013359 (2015)","journal-title":"Measurement"},{"issue":"2","key":"4312_CR18","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/s10773-017-3580-7","volume":"57","author":"K Chen","year":"2018","unstructured":"Chen, K., Yan, F., Iliyasu, A.M., Zhao, J.: Exploring the implementation of steganography protocols on quantum audio signals. Int. J. Theor. Phys. 57(2), 476\u2013494 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"8","key":"4312_CR19","first-page":"3925","volume":"36","author":"C Javad","year":"2020","unstructured":"Javad, C., Mohammad, M., Saeed, R.: A novel quantum audio steganography\u2013steganalysis approach using LSFQ-based embedding and QKNN-based classifier. Circuits Syst. Signal Process 36(8), 3925\u20133957 (2020)","journal-title":"Circuits Syst. Signal Process"},{"issue":"6","key":"4312_CR20","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1007\/s10773-018-3710-x","volume":"57","author":"RG Zhou","year":"2018","unstructured":"Zhou, R.G., Luo, J., Liu, X.A., Zhu, C.M., Wei, L., Zhang, X.F.: A novel quantum image steganography scheme based on LSB. Int. J. Theor. Phys. 57(6), 1848\u20131863 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"4312_CR21","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/s10773-018-3950-9","volume":"58","author":"KH Chen","year":"2019","unstructured":"Chen, K.H., Yan, F., Iliyasu, A.M., Zhao, J.P.: Dual quantum audio watermarking schemes based on quantum discrete cosine transform. Int. J. Theor. Phys. 58(2), 502\u2013521 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"4312_CR22","doi-asserted-by":"publisher","first-page":"1850020","DOI":"10.1142\/S021974991850020X","volume":"16","author":"P Li","year":"2018","unstructured":"Li, P., Liu, X.: A novel quantum steganography scheme for color images. Int. J. Quantum Inf 16(2), 1850020 (2018)","journal-title":"Int. J. Quantum Inf"},{"key":"4312_CR23","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/s11128-022-03494-w","volume":"21","author":"MX Wang","year":"2022","unstructured":"Wang, M.X., Yang, H.M., Jiang, D.H., Yan, B., Pan, J.S., Liu, T.: A novel quantum color image steganography algorithm based on turtle shell and LSB. Quant. Inf. Process. 21, 148 (2022)","journal-title":"Quant. Inf. Process."},{"key":"4312_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123687","volume":"541","author":"AAA El-Latif","year":"2019","unstructured":"El-Latif, A.A.A., Abd-El-Atty, B., Elseuofi, S., Khalifa, H.S., Alghamdi, Ah.S., Polat, K., Amin, M.: Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Phys. A 541, 123687 (2019)","journal-title":"Phys. A"},{"key":"4312_CR25","doi-asserted-by":"publisher","first-page":"50849","DOI":"10.1109\/ACCESS.2019.2909906","volume":"7","author":"ZG Qu","year":"2019","unstructured":"Qu, Z.G., Li, Z.Y., Xu, G., Wu, S.Y., Wang, X.J.: Quantum image steganography protocol based on quantum image expansion and Grover search algorithm. IEEE Access 7, 50849\u201350857 (2019)","journal-title":"IEEE Access"},{"issue":"10","key":"4312_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02882-4","volume":"19","author":"ZG Qu","year":"2020","unstructured":"Qu, Z.G., Chen, S.Y., Wang, X.J.: A secure controlled quantum image steganography algorithm. Quant. Inf. Process. 19(10), 1\u201325 (2020)","journal-title":"Quant. Inf. Process."},{"key":"4312_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3294240","author":"ZH Li","year":"2023","unstructured":"Li, Z.H., Xue, K.P., Li, J., Chen, L.T., Li, R.D., Wang, Z.Y., Yu, N.H., Wei, D.S.L., Sun, Q.B., Lu, J.: Entanglement-assisted quantum networks: mechanics, enabling technologies, challenges, and research directions. IEEE Commun. Surv. Tutor (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3294240","journal-title":"IEEE Commun. Surv. Tutor"},{"issue":"3\/4","key":"4312_CR28","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3\/4), 313\u2013336 (1996)","journal-title":"IBM Syst. J."},{"key":"4312_CR29","volume-title":"Principles and Techniques of Steganography","author":"XF Zhao","year":"2018","unstructured":"Zhao, X.F., Zhang, H.: Principles and Techniques of Steganography. Science Press, Beijing (2018)"},{"issue":"C","key":"4312_CR30","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.ins.2021.06.077","volume":"577","author":"F Yan","year":"2021","unstructured":"Yan, F., Li, N., Hirota, K.: QHSL: A quantum hue, saturation, and lightness color model. Inf. Sci. 577(C), 196\u2013213 (2021)","journal-title":"Inf. Sci."},{"key":"4312_CR31","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.ins.2014.03.035","volume":"273","author":"HS Li","year":"2014","unstructured":"Li, H.S., Zhu, Q.X., Zhou, R.G., Li, M.C., Song, L., Ian, H.: Multidimensional color image storage, retrieval, and compression based on quantum amplitudes and phases. Inf. Sci. 273, 212\u2013232 (2014)","journal-title":"Inf. Sci."},{"key":"4312_CR32","doi-asserted-by":"publisher","first-page":"35684","DOI":"10.1109\/ACCESS.2019.2894295","volume":"7","author":"ZG Qu","year":"2019","unstructured":"Qu, Z.G., Cheng, Z.W., Wang, X.J.: Matrix coding-based quantum image steganography algorithm. IEEE Access 7, 35684\u201335698 (2019)","journal-title":"IEEE Access"},{"key":"4312_CR33","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s11128-017-1694-8","volume":"16","author":"S Heidari","year":"2017","unstructured":"Heidari, S., Farzadnia, E.: A novel quantum LSB-based steganography method using the Gray code for colored quantum images. Quant. Inf. Process. 16, 242 (2017)","journal-title":"Quant. Inf. Process."},{"key":"4312_CR34","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1007\/s10773-014-2024-x","volume":"53","author":"XW Guan","year":"2014","unstructured":"Guan, X.W., Chen, X.B., Wang, L.C., Yang, Y.X.: Joint remote preparation of an arbitrary two-qubit state in noisy environments. Int. J. Theor. Phys. 53, 2236\u20132245 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"4312_CR35","doi-asserted-by":"crossref","unstructured":"Westfeld, A.: F5-A steganographic algorithm. In International Workshop on Information Hiding, vol. 2137, pp. 289-302. Springer, Berlin, Heidelberg (2001)","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"10","key":"4312_CR36","doi-asserted-by":"publisher","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on wet paper. IEEE Trans. Signal Process. 53(10), 3923\u20133935 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"4312_CR37","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filter","year":"2011","unstructured":"Filter, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04312-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04312-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04312-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T03:20:57Z","timestamp":1731554457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04312-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,14]]},"references-count":37,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["4312"],"URL":"https:\/\/doi.org\/10.1007\/s11128-024-04312-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3366077\/v1","asserted-by":"object"}]},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,14]]},"assertion":[{"value":"18 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"106"}}