{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T18:23:23Z","timestamp":1774290203617,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":12,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s44443-025-00274-1","type":"journal-article","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:35:51Z","timestamp":1760366151000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum autoencoder implementation of high-dimensional steganographic encoding for arbitrary quantum states"],"prefix":"10.1007","volume":"37","author":[{"given":"Chaolong","family":"Hao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Quangong","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yaqi","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dan","family":"Qu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"274_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801334","volume-title":"An introduction to random matrices","author":"GW Anderson","year":"2009","unstructured":"Anderson GW, Guionnet A, Zeitouni O (2009) An introduction to random matrices. Cambridge University Press, Cambridge, U.K"},{"key":"274_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1088\/1572-9494\/ad8125","volume":"77","author":"C-M Bai","year":"2025","unstructured":"Bai C-M, Wang M-Y, Zhang S-J, Liu L (2025) Masking quantum information in multipartite systems via fourier and hadamard matrices. Commun Theor Phys 77:101\u2013111","journal-title":"Commun Theor Phys"},{"key":"274_CR3","unstructured":"Bennett CH, Brassard G (1984) Quantum cryptography: public key distribution and coin tossing. Proc. IEEE Int. Conf. Comput. Syst. Signal Process, New York, NY, USA, pp 175\u2013179"},{"key":"274_CR4","unstructured":"Bergholm V, Izaac J, Schuld M, Gogolin C, Ahmed S, Ajith V, Alam MS, Alonso-Linaje G, AkashNarayanan B, Asadi A, Arrazola JM, Azad U, Banning S, Blank C, Bromley TR, Cordier BA, Ceroni J, Delgado A, Matteo OD, Dusko A, Garg T, Guala D, Hayes A, Hill R Ijaz A, Isacsson T, Ittah D, Jahangiri S, Jain P, Jiang E, Khandelwal A, Kottmann K, Lang RA, Lee C, Loke T, Lowe A, McKiernan K, Meyer JJ, Monta\u00f1ez-Barrera JA, Moyard R, Niu Z, O\u2019Riordan LJ, Oud S, Panigrahi A, Park C-Y, Polatajko D, Quesada N, Roberts C, S\u00e1 N, Schoch I, Shi B, Shu S, Sim S, Singh A, Strandberg I, Soni J, Sz\u00e1va A, Thabet S, Vargas-Hern\u00e1ndez RA, Vincent T, Vitucci N, Weber M, Wierichs D, Wiersema R, Willmann M, Wong V, Zhang S, Killoran N (2022) PennyLane: automatic differentiation of hybrid quantum-classical computations. https:\/\/arxiv.org\/abs\/1811.04968"},{"key":"274_CR5","doi-asserted-by":"publisher","first-page":"130502","DOI":"10.1103\/PhysRevLett.124.130502","volume":"124","author":"D Bondarenko","year":"2020","unstructured":"Bondarenko D, Feldmann P (2020) Quantum autoencoders to denoise quantum data. Phys Rev Lett 124:130502","journal-title":"Phys Rev Lett"},{"key":"274_CR6","doi-asserted-by":"publisher","first-page":"054012","DOI":"10.1103\/PhysRevApplied.15.054012","volume":"15","author":"C Cao","year":"2021","unstructured":"Cao C, Wang X (2021) Noise-assisted quantum autoencoder. Phys Rev Appl 15:054012","journal-title":"Phys Rev Appl"},{"issue":"3","key":"274_CR7","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"1","key":"274_CR8","doi-asserted-by":"publisher","first-page":"013221","DOI":"10.1103\/PhysRevResearch.7.013221","volume":"7","author":"Y Chen","year":"2025","unstructured":"Chen Y, Hou Y, Wang Z, Wang T, Wu Z, Li Z, Peng X (2025) Enhanced natural parameterized quantum circuit. Phys Rev Res 7(1):013221","journal-title":"Phys Rev Res"},{"key":"274_CR9","doi-asserted-by":"publisher","unstructured":"Decker T, Gallezot M, Kerstan SF, Paesano A, Ginter A, Wormsbecher W (2025) Quantum key distribution as a quantum machine learning task. npj Quant Inf 11. https:\/\/doi.org\/10.1038\/s41534-025-00709-0","DOI":"10.1038\/s41534-025-00709-0"},{"issue":"16","key":"274_CR10","doi-asserted-by":"publisher","first-page":"24758","DOI":"10.1007\/s11227-024-06332-1","volume":"80","author":"Y Dong","year":"2024","unstructured":"Dong Y, Yan R (2024) A new integrated steganography scheme for quantum color images. J Supercomput 80(16):24758\u201324780","journal-title":"J Supercomput"},{"issue":"5653","key":"274_CR11","doi-asserted-by":"publisher","first-page":"2098","DOI":"10.1126\/science.1090790","volume":"302","author":"J Emerson","year":"2003","unstructured":"Emerson J, Weinstein YS, Saraceno M, Lloyd S, Cory DG (2003) Pseudo-random unitary operators for quantum information processing. Science 302(5653):2098\u20132100","journal-title":"Science"},{"key":"274_CR12","doi-asserted-by":"publisher","first-page":"114958","DOI":"10.1016\/j.chaos.2024.114958","volume":"183","author":"S Gao","year":"2024","unstructured":"Gao S, Iu HH-C, Mou J, Erkan U, Liu J, Wu R, Tang X (2024) Temporal action segmentation for video encryption. Chaos Solitons Fract 183:114958. https:\/\/doi.org\/10.1016\/j.chaos.2024.114958","journal-title":"Chaos Solitons Fract"},{"key":"274_CR13","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","volume":"134","author":"S Gao","year":"2024","unstructured":"Gao S, Liu J, Iu HH-C, Erkan U, Zhou S, Wu R, Tang X (2024) Development of a video encryption algorithm for critical areas using 2d extended Schaffer function map and neural networks. Appl Math Model 134:520\u2013537. https:\/\/doi.org\/10.1016\/j.apm.2024.06.016","journal-title":"Appl Math Model"},{"issue":"7","key":"274_CR14","doi-asserted-by":"publisher","first-page":"073105","DOI":"10.1063\/5.0270220","volume":"35","author":"S Gao","year":"2025","unstructured":"Gao S, Ding S, Iu HH-C, Erkan U, Toktas A, Simsek C, Wu R, Xu X, Cao Y, Mou J (2025) A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos 35(7):073105. https:\/\/doi.org\/10.1063\/5.0270220","journal-title":"Chaos"},{"issue":"11","key":"274_CR15","doi-asserted-by":"publisher","first-page":"18115","DOI":"10.1109\/JIOT.2025.3540097","volume":"12","author":"S Gao","year":"2025","unstructured":"Gao S, Zhang Z, Iu HH-C, Ding S, Mou J, Erkan U, Toktas A, Li Q, Wang C, Cao Y (2025) A parallel color image encryption algorithm based on a 2-d logistic-rulkov neuron map. IEEE Internet Things J 12(11):18115\u201318124. https:\/\/doi.org\/10.1109\/JIOT.2025.3540097","journal-title":"IEEE Internet Things J"},{"key":"274_CR16","doi-asserted-by":"publisher","unstructured":"Gao S, Ho-Ching I, H., Erkan, U., Simsek, C., Toktas, A., Cao, Y., Wu, R., Mou, J., Li, Q., Wang, C. (2025) A 3d memristive cubic map with dual discrete memristors: design, implementation, and application in image encryption. IEEE Trans Circuits Syst Video Technol 35(8):7706\u20137718. https:\/\/doi.org\/10.1109\/TCSVT.2025.3545868","DOI":"10.1109\/TCSVT.2025.3545868"},{"issue":"3","key":"274_CR17","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s11128-024-04312-1","volume":"23","author":"C Hao","year":"2024","unstructured":"Hao C, Yang X, Ma Q, Qu D, Wang R, Zhang T (2024) Quantum audio lsb steganography with entanglement-assisted modulation. Quantum Inf Process 23(3):106","journal-title":"Quantum Inf Process"},{"key":"274_CR18","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1140\/epjqt\/s40507-025-00391-w","volume":"12","author":"C-L Hao","year":"2025","unstructured":"Hao C-L, Ma Q-G, Si N-W, Liu B-Y, Qu D (2025) Neural-enabled quantum information hiding with error-correcting codes: a novel framework for arbitrary quantum state embedding. EPJ Quant Technol 12:88","journal-title":"EPJ Quant Technol"},{"issue":"2","key":"274_CR19","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/BF01007479","volume":"1","author":"CW Helstrom","year":"1969","unstructured":"Helstrom CW (1969) Quantum detection and estimation theory. J Stat Phys 1(2):231\u2013252","journal-title":"J Stat Phys"},{"key":"274_CR20","doi-asserted-by":"publisher","first-page":"032412","DOI":"10.1103\/PhysRevA.102.032412","volume":"102","author":"C-J Huang","year":"2020","unstructured":"Huang C-J, Ma H, Yin Q, Tang J-F, Dong D, Chen C, Xiang G-Y, Li C-F, Guo G-C (2020) Realization of a quantum autoencoder for lossless compression of quantum data. Phys Rev A 102:032412","journal-title":"Phys Rev A"},{"key":"274_CR21","doi-asserted-by":"crossref","unstructured":"Huang Y, Li Q, Hou X, Wu R, Yung M-H, Bayat A, Wang X (2022) Robust resource-efficient quantum variational ansatz through an evolutionary algorithm. Phys Rev A 105(5)","DOI":"10.1103\/PhysRevA.105.052414"},{"key":"274_CR22","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.cose.2016.11.016","volume":"65","author":"H Kandi","year":"2017","unstructured":"Kandi H, Mishra D, Gorthi SRS (2017) Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput Sec 65:247\u2013268","journal-title":"Comput Sec"},{"key":"274_CR23","volume-title":"Information hiding","author":"S Katzenbeisser","year":"2016","unstructured":"Katzenbeisser S, Petitcolas F (2016) Information hiding. Artech House, Norwood, MA"},{"key":"274_CR24","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.120.230501","volume":"120","author":"M Kavan","year":"2018","unstructured":"Kavan M, Kumar AP, Aditi DS, Sen U (2018) Masking quantum information is impossible. Phys Rev Lett 120:230501","journal-title":"Phys Rev Lett"},{"key":"274_CR25","doi-asserted-by":"publisher","unstructured":"Kaye P, Laflamme R, Mosca M (2006) An introduction to quantum computing. Oxford University Press, Oxford, U.K. https:\/\/doi.org\/10.1093\/oso\/9780198570004.001.0001 . Online edition published 12 Nov. 2020, Accessed on 21 Aug 2025","DOI":"10.1093\/oso\/9780198570004.001.0001"},{"key":"274_CR26","unstructured":"Kirchenbauer J, Geiping J, Wen Y, Katz J, Miers I, Goldstein T (2023) A watermark for large language models. In: International conference on machine learning. PMLR, pp 17061\u201317084"},{"key":"274_CR27","doi-asserted-by":"publisher","first-page":"121452","DOI":"10.1016\/j.eswa.2023.121452","volume":"237 Part A","author":"O Kocak","year":"2024","unstructured":"Kocak O, Erkan U, Toktas A, Gao S (2024) Pso-based image encryption scheme using modular integrated logistic exponential map. Exp Syst Appl 237 Part A:121452. https:\/\/doi.org\/10.1016\/j.eswa.2023.121452","journal-title":"Exp Syst Appl"},{"issue":"8","key":"274_CR28","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1109\/TCSVT.2021.3138795","volume":"32","author":"Q Li","year":"2022","unstructured":"Li Q, Wang X, Ma B, Wang X, Wang C, Gao S, Shi Y (2022) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol 32(8):5695\u20135706. https:\/\/doi.org\/10.1109\/TCSVT.2021.3138795","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"274_CR29","doi-asserted-by":"crossref","unstructured":"Li Y, Hao X, Liu G, Shang R, Jiao L (2024) Qea-qcnn: optimization of quantum convolutional neural network architecture based on quantum evolution. Memetic Comput 16(3):233\u2013254","DOI":"10.1007\/s12293-024-00417-3"},{"issue":"1","key":"274_CR30","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TCSII.2023.3300330","volume":"71","author":"Q Li","year":"2024","unstructured":"Li Q, Ma B, Wang X, Wang C, Gao S (2024) Image steganography in color conversion. IEEE Trans Circuits Syst II Express Briefs 71(1):106\u2013110. https:\/\/doi.org\/10.1109\/TCSII.2023.3300330","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"274_CR31","doi-asserted-by":"publisher","first-page":"124891","DOI":"10.1016\/j.eswa.2024.124891","volume":"257","author":"Y Lin","year":"2024","unstructured":"Lin Y, Xie Z, Chen T, Cheng X, Wen H (2024) Image privacy protection scheme based on high-quality reconstruction dct compression and nonlinear dynamics. Expert Syst Appl 257:124891. https:\/\/doi.org\/10.1016\/j.eswa.2024.124891","journal-title":"Expert Syst Appl"},{"issue":"2","key":"274_CR32","first-page":"1","volume":"57","author":"A Liu","year":"2024","unstructured":"Liu A, Pan L, Lu Y, Li J, Hu X, Zhang X, Wen L, King I, Xiong H, Yu P (2024) A survey of text watermarking in the era of large language models. ACM Comput Surv 57(2):1\u201336","journal-title":"ACM Comput Surv"},{"issue":"2","key":"274_CR33","first-page":"1","volume":"57","author":"A Liu","year":"2024","unstructured":"Liu A, Pan L, Lu Y, Li J, Hu X, Zhang X, Wen L, King I, Xiong H, Yu P (2024) A survey of text watermarking in the era of large language models. ACM Comput Surv 57(2):1\u201336","journal-title":"ACM Comput Surv"},{"key":"274_CR34","doi-asserted-by":"publisher","first-page":"942","DOI":"10.22331\/q-2023-03-09-942","volume":"7","author":"DF Locher","year":"2023","unstructured":"Locher DF, Cardarelli L, M\u00fcller M (2023) Quantum error correction with quantum autoencoders. Quantum 7:942","journal-title":"Quantum"},{"key":"274_CR35","doi-asserted-by":"publisher","first-page":"110659","DOI":"10.1016\/j.automatica.2022.110659","volume":"147","author":"H Ma","year":"2023","unstructured":"Ma H, Huang C-J, Chen C, Dong D, Wang Y, Wu R-B, Xiang G-Y (2023) On compression rate of quantum autoencoders: control design, numerical and experimental realization. Automatica 147:110659","journal-title":"Automatica"},{"key":"274_CR36","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1140\/epjqt\/s40507-024-00265-7","volume":"11","author":"Q-G Ma","year":"2024","unstructured":"Ma Q-G, Hao C-L, Yang X-K, Qian L-L, Zhang H, Si N-W, Xu M-C, Qu D (2024) Continuous evolution for efficient quantum architecture search. EPJ Quant Technol 11:54","journal-title":"EPJ Quant Technol"},{"key":"274_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1140\/epjqt\/s40507-024-00304-3","volume":"12","author":"Q Ma","year":"2025","unstructured":"Ma Q, Hao C, Si N, Chen G, Zhang J, Qu D (2025) Quantum adversarial generation of high-resolution images. EPJ Quantum Technol 12:3","journal-title":"EPJ Quantum Technol"},{"key":"274_CR38","doi-asserted-by":"crossref","unstructured":"Ma F, Huang H-Y (2025) How to construct random unitaries. In: Proceedings of the 57th Annual ACM symposium on theory of computing. pp 806\u2013809","DOI":"10.1145\/3717823.3718254"},{"issue":"21","key":"274_CR39","doi-asserted-by":"publisher","first-page":"2829","DOI":"10.3390\/math9212829","volume":"9","author":"MA Majeed","year":"2021","unstructured":"Majeed MA, Sulaiman R, Shukur Z, Hasan MK (2021) A review on text steganography techniques. Mathematics 9(21):2829","journal-title":"Mathematics"},{"issue":"3","key":"274_CR40","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P Moulin","year":"2003","unstructured":"Moulin P, O\u2019Sullivan JA (2003) Information-theoretic analysis of information hiding. IEEE Trans Inf Theory 49(3):563\u2013593. https:\/\/doi.org\/10.1109\/TIT.2002.808134","journal-title":"IEEE Trans Inf Theory"},{"key":"274_CR41","volume-title":"Quantum computation and quantum information, 10th anniversary","author":"MA Nielson","year":"2010","unstructured":"Nielson MA, Chuang IL (2010) Quantum computation and quantum information, 10th anniversary, edition. Cambridge University Press, Cambridge, U.K","edition":"edition"},{"key":"274_CR42","doi-asserted-by":"publisher","first-page":"127356","DOI":"10.1016\/j.neucom.2024.127356","volume":"576","author":"NM Oliveira","year":"2024","unstructured":"Oliveira NM, Park DK, Araujo IF, Silva AJ (2024) Quantum variational distance-based centroid classifier. Neurocomputing 576:127356","journal-title":"Neurocomputing"},{"key":"274_CR43","doi-asserted-by":"publisher","unstructured":"Pasupuleti MK (2024) Quantum cryptography: combining quantum computing with machine learning algorithm. https:\/\/doi.org\/10.62311\/nesx\/rb978-81-978755-9-5","DOI":"10.62311\/nesx\/rb978-81-978755-9-5"},{"key":"274_CR44","volume-title":"PyTorch: an imperative style, high-performance deep learning library","author":"A Paszke","year":"2019","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L, Desmaison A, K\u00f6pf A, Yang E, DeVito Z, Raison M, Tejani A, Chilamkurthy S, Steiner B, Fang L, Bai J, Chintala S (2019) PyTorch: an imperative style, high-performance deep learning library. Curran Associates Inc., Red Hook, NY, USA"},{"key":"274_CR45","doi-asserted-by":"publisher","first-page":"060501","DOI":"10.1103\/PhysRevLett.122.060501","volume":"122","author":"A Pepper","year":"2019","unstructured":"Pepper A, Tischler N, Pryde GJ (2019) Experimental realization of a quantum autoencoder: the compression of qutrits via machine learning. Phys Rev Lett 122:060501","journal-title":"Phys Rev Lett"},{"issue":"7","key":"274_CR46","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FAP Petitcolas","year":"1999","unstructured":"Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062\u20131078. https:\/\/doi.org\/10.1109\/5.771065","journal-title":"Proc IEEE"},{"key":"274_CR47","doi-asserted-by":"publisher","unstructured":"Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. In: INDIN \u201905. 2005 3rd IEEE international conference on industrial informatics, 2005. pp 709\u2013716. https:\/\/doi.org\/10.1109\/INDIN.2005.1560462","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"274_CR48","doi-asserted-by":"publisher","unstructured":"Purohit K, Vyas AK (2025) Quantum key distribution through quantum machine learning: a research review. Front Quantum Sci Technol 4. https:\/\/doi.org\/10.3389\/frqst.2025.1575498","DOI":"10.3389\/frqst.2025.1575498"},{"issue":"4","key":"274_CR49","doi-asserted-by":"publisher","first-page":"045001","DOI":"10.1088\/2058-9565\/aa8072","volume":"2","author":"J Romero","year":"2017","unstructured":"Romero J, Olson JP, Aspuru-Guzik A (2017) Quantum autoencoders for efficient compression of quantum data. Quant Sci Technol 2(4):045001","journal-title":"Quant Sci Technol"},{"key":"274_CR50","first-page":"128503","volume":"612","author":"Y Shen","year":"2023","unstructured":"Shen Y, Zhang F-L, Chen Y-Z, Zhou C-C (2023) Masking quantum information in the Kitaev Abelian Anyons. XXPhys A 612:128503","journal-title":"XXPhys A"},{"key":"274_CR51","doi-asserted-by":"crossref","first-page":"062346","DOI":"10.1103\/PhysRevA.98.052343","volume":"98","author":"ML Sheng","year":"2018","unstructured":"Sheng ML, Ling YW (2018) Masking quantum information in multipartite scenario. Phys Rev A 98:062346","journal-title":"Phys Rev A"},{"key":"274_CR52","doi-asserted-by":"publisher","first-page":"032418","DOI":"10.1103\/PhysRevA.104.032601","volume":"104","author":"F Shi","year":"2021","unstructured":"Shi F, Li M-S, Chen L, Zhang X (2021) k-uniform quantum information masking. Phys Rev A 104:032418","journal-title":"Phys Rev A"},{"key":"274_CR53","doi-asserted-by":"publisher","unstructured":"Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. pp 124\u2013134. https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"274_CR54","doi-asserted-by":"publisher","first-page":"1900070","DOI":"10.1002\/qute.201900070","volume":"2","author":"S Sim","year":"2019","unstructured":"Sim S, Johnson PD, Aspuru-Guzik A (2019) Expressibility and entangling capability of parameterized quantum circuits for hybrid quantum-classical algorithms. Adv Quantum Technol 2:1900070","journal-title":"Adv Quantum Technol"},{"issue":"13","key":"274_CR55","doi-asserted-by":"publisher","first-page":"17177","DOI":"10.1007\/s11071-025-11001-w","volume":"113","author":"C \u015eim\u015fek","year":"2025","unstructured":"\u015eim\u015fek C, Erkan U, Tokta\u015f A, Lai Q, Gao S (2025) Hexadecimal permutation and 2d cumulative diffusion image encryption using hyperchaotic sinusoidal exponential memristive system. Nonlinear Dyn 113(13):17177\u201317208. https:\/\/doi.org\/10.1007\/s11071-025-11001-w","journal-title":"Nonlinear Dyn"},{"key":"274_CR56","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95\u2013113","journal-title":"Comput Sci Rev"},{"issue":"5","key":"274_CR57","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s11128-022-03513-w","volume":"21","author":"H Sun","year":"2022","unstructured":"Sun H, Qu Z, Sun L, Chen X, Xu G (2022) High-efficiency quantum image steganography protocol based on double-layer matrix coding. Quantum Inf Process 21(5):165","journal-title":"Quantum Inf Process"},{"key":"274_CR58","doi-asserted-by":"publisher","first-page":"128688","DOI":"10.1016\/j.physa.2023.128688","volume":"617","author":"J-Y Sun","year":"2023","unstructured":"Sun J-Y, Wang W-T, Zhang H, Zhang J (2023) Color image quantum steganography scheme and circuit design based on dwt+ dct+ svd. Physica A Stat Mech Appl 617:128688","journal-title":"Physica A Stat Mech Appl"},{"issue":"6","key":"274_CR59","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TCSS.2023.3268950","volume":"10","author":"Z Wang","year":"2023","unstructured":"Wang Z, Byrnes O, Wang H, Sun R, Ma C, Chen H, Wu Q, Xue M (2023) Data hiding with deep learning: a survey unifying digital watermarking and steganography. IEEE Trans Comput Soc Syst 10(6):2985\u20132999. https:\/\/doi.org\/10.1109\/TCSS.2023.3268950","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"274_CR60","doi-asserted-by":"publisher","unstructured":"Wang H, Cheng X, Wu H, Luo X, Ma B, Zong H, Zhang J, Wang J (2025) A gan-based anti-forensics method by modifying the quantization table in jpeg header file. J Vis Commun Image Rep 110:104462. https:\/\/doi.org\/10.1016\/j.jvcir.2025.104462","DOI":"10.1016\/j.jvcir.2025.104462"},{"issue":"4","key":"274_CR61","doi-asserted-by":"publisher","first-page":"042416","DOI":"10.1103\/PhysRevA.111.042416","volume":"111","author":"G Wang","year":"2025","unstructured":"Wang G, Warrell J, Emani PS, Gerstein M (2025) Quantum variational autoencoder utilizing regularized mixed-state latent representations. Phys Rev A 111(4):042416","journal-title":"Phys Rev A"},{"key":"274_CR62","unstructured":"Wang S, Shi J, Yu S, Wu M (2004) Linear models (in Chinese). University Mathematics Series No. 3, p. 308. Science Press, Beijing"},{"key":"274_CR63","doi-asserted-by":"publisher","unstructured":"Watrous J (2018) The theory of quantum information. Cambridge University Press, Cambridge, U.K. https:\/\/doi.org\/10.1017\/9781316848142","DOI":"10.1017\/9781316848142"},{"key":"274_CR64","doi-asserted-by":"publisher","first-page":"042303","DOI":"10.1103\/PhysRevA.92.042303","volume":"92","author":"D Wecker","year":"2015","unstructured":"Wecker D, Hastings MB, Troyer M (2015) Progress towards practical quantum variational algorithms. Phys Rev A 92:042303. https:\/\/doi.org\/10.1103\/PhysRevA.92.042303","journal-title":"Phys Rev A"},{"key":"274_CR65","doi-asserted-by":"crossref","unstructured":"Wu J, Fu H, Zhu M, Zhang H, Xie W, Li X-Y (2024) Quantum circuit autoencoder. Phys Rev A 109(3)","DOI":"10.1103\/PhysRevA.109.032623"},{"key":"274_CR66","doi-asserted-by":"crossref","unstructured":"Wu S, Song Y, Li R, Qin S, Wen Q, Gao F (2025) Resource-efficient adaptive variational quantum algorithm for combinatorial optimization problems. Adv Quantum Technol","DOI":"10.1002\/qute.202400484"},{"key":"274_CR67","doi-asserted-by":"publisher","first-page":"5181","DOI":"10.1109\/TIFS.2024.3394768","volume":"19","author":"Z Xing","year":"2024","unstructured":"Xing Z, Lam C-T, Yuan X, Im S-K, Machado P (2024) Mmqw: multi-modal quantum watermarking scheme. IEEE Trans Inf Forensics Secur 19:5181\u20135195. https:\/\/doi.org\/10.1109\/TIFS.2024.3394768","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"274_CR68","doi-asserted-by":"publisher","first-page":"110691","DOI":"10.1016\/j.patcog.2024.110691","volume":"155","author":"X Zeng","year":"2024","unstructured":"Zeng X, Feng B, Xia Z, Peng Z, Qin T, Lu W (2024) Robust image hiding network with frequency and spatial attentions. Pattern Recogn 155:110691","journal-title":"Pattern Recogn"},{"key":"274_CR69","doi-asserted-by":"publisher","first-page":"040403","DOI":"10.1103\/PhysRevA.103.L040403","volume":"103","author":"X-M Zhang","year":"2021","unstructured":"Zhang X-M, Kong W, Farooq MU, Yung M-H, Guo G, Wang X (2021) Generic detection-based error mitigation using quantum autoencoders. Phys Rev A 103:040403","journal-title":"Phys Rev A"},{"key":"274_CR70","doi-asserted-by":"crossref","unstructured":"Zhang Y, Cincio L, Negre CFA, Czarnik P, Coles PJ, Anisimov PM, Mniszewski SM, Tretiak S, Dub PA (2022) Variational quantum Eigensolver with reduced circuit complexity. NPJ Quantum Infor 8(1)","DOI":"10.1038\/s41534-022-00599-z"},{"key":"274_CR71","doi-asserted-by":"crossref","unstructured":"Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV). pp 657\u2013672","DOI":"10.1007\/978-3-030-01267-0_40"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00274-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00274-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00274-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T15:39:41Z","timestamp":1761752381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00274-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":71,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["274"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00274-1","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"21 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The Author confirms: (1) that the work described has not been published before; (2) that it is not under consideration for publication elsewhere.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"247"}}