{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:07:28Z","timestamp":1760746048044,"version":"build-2065373602"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04880-w","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T06:21:38Z","timestamp":1755584498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum direct steganography scheme based on modified generator projection directions of steane code over a single-type Pauli channel"],"prefix":"10.1007","volume":"24","author":[{"given":"Chaolong","family":"Hao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Quangong","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dan","family":"Qu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dawei","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xukui","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Buyu","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"4880_CR1","volume-title":"Introduction to Information Hiding (in Chinese)","author":"AJ ZheMingLu","year":"2014","unstructured":"ZheMingLu, A.J., Nie, T.: Introduction to Information Hiding (in Chinese). Publishing House of Electronics Industry, Beijing (2014)"},{"issue":"C","key":"4880_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108908","volume":"206","author":"DRIM Setiadi","year":"2023","unstructured":"Setiadi, D.R.I.M., Rustad, S., Andono, P.N., Shidik, G.F.: Digital image steganography survey and investigation (goal, assessment, method, development, and dataset). Signal Process. 206(C), 108908 (2023). https:\/\/doi.org\/10.1016\/j.sigpro.2022.108908","journal-title":"Signal Process."},{"issue":"2","key":"4880_CR3","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1109\/COMST.2023.3263921","volume":"25","author":"X Chen","year":"2023","unstructured":"Chen, X., An, J., Xiong, Z., Xing, C., Zhao, N., Yu, F.R., Nallanathan, A.: Covert communications: a comprehensive survey. IEEE Commun. Surv. Tutor. 25(2), 1173\u20131198 (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3263921","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4880_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"4880_CR5","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"4880_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12743\/quanta.v6i1.57","volume":"6","author":"A Shenoy-Hejamadi","year":"2017","unstructured":"Shenoy-Hejamadi, A., Pathak, A., Radhakrishna, S.: Quantum cryptography: key distribution and beyond. Quanta 6(1), 1\u201347 (2017). https:\/\/doi.org\/10.12743\/quanta.v6i1.57. arXiv:1802.05517 [quant-ph]","journal-title":"Quanta"},{"issue":"1","key":"4880_CR7","doi-asserted-by":"publisher","DOI":"10.1063\/5.0179566","volume":"11","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., Bian, Y., Li, Z., Yu, S., Guo, H.: Continuous-variable quantum key distribution system: past, present, and future. Appl. Phys. Rev. 11(1), 011318 (2024)","journal-title":"Appl. Phys. Rev."},{"key":"4880_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002). https:\/\/doi.org\/10.1103\/PhysRevA.65.032302","journal-title":"Phys. Rev. A"},{"key":"4880_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003). https:\/\/doi.org\/10.1103\/PhysRevA.68.042317","journal-title":"Phys. Rev. A"},{"issue":"3","key":"4880_CR10","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.1109\/COMST.2024.3367535","volume":"26","author":"D Pan","year":"2024","unstructured":"Pan, D., Long, G.-L., Yin, L., Sheng, Y.-B., Ruan, D., Ng, S.X., Lu, J., Hanzo, L.: The evolution of quantum secure direct communication: On the road to the qinternet. IEEE Commun. Surv. Tutor. 26(3), 1898\u20131949 (2024). https:\/\/doi.org\/10.1109\/COMST.2024.3367535","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4880_CR11","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2010","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010)"},{"issue":"9","key":"4880_CR12","doi-asserted-by":"publisher","first-page":"4531","DOI":"10.1063\/1.1495073","volume":"43","author":"J Gea-Banacloche","year":"2002","unstructured":"Gea-Banacloche, J.: Hiding messages in quantum data. J. Math. Phys. 43(9), 4531\u20134536 (2002)","journal-title":"J. Math. Phys."},{"unstructured":"Shaw, B.A., Brun, T.A.: Hiding Quantum Information in the Perfect Code (2011). https:\/\/arxiv.org\/abs\/1007.0793","key":"4880_CR13"},{"key":"4880_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.022310","volume":"83","author":"BA Shaw","year":"2011","unstructured":"Shaw, B.A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83, 022310 (2011). https:\/\/doi.org\/10.1103\/PhysRevA.83.022310","journal-title":"Phys. Rev. A"},{"key":"4880_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.052312","volume":"100","author":"C Sutherland","year":"2019","unstructured":"Sutherland, C., Brun, T.A.: Quantum steganography over noisy channels: achievability and bounds. Phys. Rev. A 100, 052312 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.100.052312","journal-title":"Phys. Rev. A"},{"key":"4880_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.052319","volume":"101","author":"C Sutherland","year":"2020","unstructured":"Sutherland, C., Brun, T.A.: Quantum steganography over noiseless channels: achievability and bounds. Phys. Rev. A 101, 052319 (2020). https:\/\/doi.org\/10.1103\/PhysRevA.101.052319","journal-title":"Phys. Rev. A"},{"key":"4880_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.109.032401","volume":"109","author":"B Avritzer","year":"2024","unstructured":"Avritzer, B., Brun, T.A.: Quantum steganography via coherent- and fock-state encoding in an optical medium. Phys. Rev. A 109, 032401 (2024). https:\/\/doi.org\/10.1103\/PhysRevA.109.032401","journal-title":"Phys. Rev. A"},{"key":"4880_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.097905","volume":"89","author":"T Eggeling","year":"2002","unstructured":"Eggeling, T., Werner, R.F.: Hiding classical data in multipartite quantum states. Phys. Rev. Lett. 89, 097905 (2002). https:\/\/doi.org\/10.1103\/PhysRevLett.89.097905","journal-title":"Phys. Rev. Lett."},{"issue":"10","key":"4880_CR19","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1016\/j.jss.2010.04.076","volume":"83","author":"X Liao","year":"2010","unstructured":"Liao, X., Wen, Q.-Y., Sun, Y., Zhang, J.: Multi-party covert communication with steganography and quantum secret sharing. J. Syst. Softw. 83(10), 1801\u20131804 (2010)","journal-title":"J. Syst. Softw."},{"issue":"12\u201313","key":"4880_CR20","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1016\/j.physleta.2015.01.038","volume":"379","author":"T Mihara","year":"2015","unstructured":"Mihara, T.: Quantum steganography using prior entanglement. Phys. Lett. A 379(12\u201313), 952\u2013955 (2015)","journal-title":"Phys. Lett. A"},{"key":"4880_CR21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.109.052418","volume":"109","author":"D Ha","year":"2024","unstructured":"Ha, D., Kim, J.S.: Nonlocal quantum state ensembles and quantum data hiding. Phys. Rev. A 109, 052418 (2024). https:\/\/doi.org\/10.1103\/PhysRevA.109.052418","journal-title":"Phys. Rev. A"},{"issue":"3","key":"4880_CR22","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s11128-024-04312-1","volume":"23","author":"C Hao","year":"2024","unstructured":"Hao, C., Yang, X., Ma, Q., Qu, D., Wang, R., Zhang, T.: Quantum audio LSB steganography with entanglement-assisted modulation. Quantum Inf. Process. 23(3), 106 (2024)","journal-title":"Quantum Inf. Process."},{"key":"4880_CR23","doi-asserted-by":"publisher","first-page":"5181","DOI":"10.1109\/TIFS.2024.3394768","volume":"19","author":"Z Xing","year":"2024","unstructured":"Xing, Z., Lam, C.-T., Yuan, X., Im, S.-K., Machado, P.: MMQW: multi-modal quantum watermarking scheme. IEEE Trans. Inf. Forensics Secur. 19, 5181\u20135195 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3394768","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"4880_CR24","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/s11128-024-04328-7","volume":"23","author":"S Jing-yu","year":"2024","unstructured":"Jing-yu, S., Wan-ting, W., Jun, Z., Shuang, Z., Hao, Z.: Edge detection steganography and quantum circuit design based on a novel fractal chaotic system. Quantum Inf. Process. 23(4), 112 (2024)","journal-title":"Quantum Inf. Process."},{"key":"4880_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128688","volume":"617","author":"J-Y Sun","year":"2023","unstructured":"Sun, J.-Y., Wang, W.-T., Zhang, H., Zhang, J.: Color image quantum steganography scheme and circuit design based on DWT+DCT+SVD. Phys. A 617, 128688 (2023)","journal-title":"Phys. A"},{"issue":"5","key":"4880_CR26","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s11128-022-03513-w","volume":"21","author":"H Sun","year":"2022","unstructured":"Sun, H., Qu, Z., Sun, L., Chen, X., Xu, G.: High-efficiency quantum image steganography protocol based on double-layer matrix coding. Quantum Inf. Process. 21(5), 165 (2022)","journal-title":"Quantum Inf. Process."},{"issue":"20","key":"4880_CR27","doi-asserted-by":"publisher","first-page":"10294","DOI":"10.3390\/app122010294","volume":"12","author":"N Min-Allah","year":"2022","unstructured":"Min-Allah, N., Nagy, N., Aljabri, M., Alkharraa, M., Alqahtani, M., Alghamdi, D., Sabri, R., Alshaikh, R.: Quantum image steganography schemes for data hiding: a survey. Appl. Sci. 12(20), 10294 (2022)","journal-title":"Appl. Sci."},{"issue":"10","key":"4880_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101818","volume":"35","author":"Z Xing","year":"2023","unstructured":"Xing, Z., Lam, C.-T., Yuan, X., Huang, G., Machado, P.: A novel geometrically invariant quantum watermarking scheme utilizing quantum error correction. J. King Saud Univ. Comput. Inf. Sci. 35(10), 101818 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"4880_CR29","volume-title":"Stabilizer Codes and Quantum Error Correction","author":"D Gottesman","year":"1997","unstructured":"Gottesman, D.: Stabilizer Codes and Quantum Error Correction. California Institute of Technology, California (1997)"},{"key":"4880_CR30","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1103\/PhysRevLett.77.793","volume":"77","author":"AM Steane","year":"1996","unstructured":"Steane, A.M.: Error correcting codes in quantum theory. Phys. Rev. Lett. 77, 793\u2013797 (1996). https:\/\/doi.org\/10.1103\/PhysRevLett.77.793","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"4880_CR31","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/76\/7\/076001","volume":"76","author":"SJ Devitt","year":"2013","unstructured":"Devitt, S.J., Munro, W.J., Nemoto, K.: Quantum error correction for beginners. Rep. Prog. Phys. 76(7), 076001 (2013)","journal-title":"Rep. Prog. Phys."},{"issue":"1","key":"4880_CR32","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22(1), 79\u201386 (1951)","journal-title":"Ann. Math. Stat."},{"issue":"3","key":"4880_CR33","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1109\/TNSM.2022.3165202","volume":"19","author":"C Lee","year":"2022","unstructured":"Lee, C., Sohn, I., Lee, W.: Eavesdropping detection in bb84 quantum key distribution protocols. IEEE Trans. Netw. Serv. Manage. 19(3), 2689\u20132701 (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3165202","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"4880_CR34","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1103\/PhysRevLett.77.198","volume":"77","author":"R Laflamme","year":"1996","unstructured":"Laflamme, R., Miquel, C., Paz, J.P., Zurek, W.H.: Perfect quantum error correcting code. Phys. Rev. Lett. 77, 198\u2013201 (1996). https:\/\/doi.org\/10.1103\/PhysRevLett.77.198","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04880-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04880-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04880-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T03:40:35Z","timestamp":1760672435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04880-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":34,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["4880"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04880-w","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"23 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The Author confirms: (1) that the work described has not been published before; (2) that it is not under consideration for publication elsewhere.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"262"}}