{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T22:46:21Z","timestamp":1770417981156,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Quantum steganography is an advanced method of hiding information within quantum systems, leveraging the unique properties of quantum mechanics-such as superposition, entanglement, and the no-cloning theorem-to achieve unbreakable secrecy. Quantum steganography provides perfect secrecy against both classical and quantum hacking, making it a cutting-edge technology in cybersecurity. This paper introduces a quantum steganography technique that builds on the advantages of of Novel Enhanced Quantum Representation (NEQR) of digital imaging and integrates quantum-resistant solutions for secure (biometric) transmission, anti-spoofing, and privacy-preserving authentication. Our analysis and experiments have shown that our approach is robust against several types of attacks, and offers protection against both current and future threats while maintaining the steganographic property of imperceptibility and capacity, making it one of the best options for secret information transmission.<\/jats:p>","DOI":"10.1186\/s42400-025-00529-4","type":"journal-article","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T10:58:47Z","timestamp":1770375527000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum steganography for secure data transmission"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0679-0811","authenticated-orcid":false,"given":"Gabriela","family":"Mogos","sequence":"first","affiliation":[]},{"given":"Ho-Pun","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,6]]},"reference":[{"issue":"3","key":"529_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht MR, Player R, Scott S (2015) On the concrete hardness of Learning with Errors. J Math Cryptol 9(3):169\u2013203. https:\/\/doi.org\/10.1515\/jmc-2015-0016","journal-title":"J Math Cryptol"},{"key":"529_CR2","doi-asserted-by":"publisher","unstructured":"Ambainis A, et al (2000) Private quantum channels. In: Proceedings 41st Annual Symposium on Foundations of Computer Science , pp.\u00a0547\u2013553. https:\/\/doi.org\/10.1109\/SFCS.2000.892142","DOI":"10.1109\/SFCS.2000.892142"},{"key":"529_CR3","doi-asserted-by":"publisher","unstructured":"Arumugam A, et al (2025) Quantum-Integrated Steganography for Secure Communication using QKD and LSB Techniques. In: 2025 International Conference on Electronics and Renewable Systems. ICEARS 2025, pp.\u00a0977\u2013983. https:\/\/doi.org\/10.1109\/ICEARS64219.2025.10940779","DOI":"10.1109\/ICEARS64219.2025.10940779"},{"key":"529_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104272","volume":"150","author":"Y Baseri","year":"2025","unstructured":"Baseri Y et al (2025) Evaluation framework for quantum security risk assessment: a comprehensive strategy for quantum-safe transition. Comput Secur 150:104272","journal-title":"Comput Secur"},{"key":"529_CR5","doi-asserted-by":"publisher","unstructured":"Bennett CH,Brassard G(1984) Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing. pp.\u00a0175\u2013179. https:\/\/doi.org\/10.1016\/j.tcs.2014.05.025. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397514004241","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"529_CR6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin PO, Roychowdhury V (2003) Optimal encryption of quantum bits. Phys Rev A 67:042317. https:\/\/doi.org\/10.1103\/PhysRevA.67.042317","journal-title":"Phys Rev A"},{"key":"529_CR7","doi-asserted-by":"publisher","unstructured":"Calude CS, Calude (2020) The Road to Quantum Computational Supremacy. In: Proceedings in Mathematics and Statistics, pp.\u00a0349\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-36568-4_22","DOI":"10.1007\/978-3-030-36568-4_22"},{"issue":"1\u20132","key":"529_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"41","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inform Sci. 41(1\u20132):123\u2013138. https:\/\/doi.org\/10.1016\/S0020-0255(01)00194-3","journal-title":"Inform Sci."},{"key":"529_CR9","volume-title":"Applied Cryptography and Network Security","author":"J Ding","year":"2005","unstructured":"Ding J, Schmidt D (2005) Rainbow, a New Multivariable Polynomial Signature Scheme. In: John I, Angelos K, Moti Y (eds) Applied Cryptography and Network Security. Springer, Berlin Heidelberg, Berlin"},{"issue":"16","key":"529_CR10","doi-asserted-by":"publisher","first-page":"24758","DOI":"10.1007\/s11227-024-06332-1","volume":"80","author":"Y Dong","year":"2024","unstructured":"Dong Y, Ya R (2024) A new integrated steganography scheme for quantum color images. J Supercomput 80(16):24758\u201324780. https:\/\/doi.org\/10.1007\/s11227-024-06332-1","journal-title":"J Supercomput"},{"key":"529_CR11","unstructured":"European Union. The Quantum Flagship. 2018. https:\/\/qt.eu"},{"key":"529_CR12","unstructured":"Giacomo Pope(2024) ML-KEM \/ CRYSTALS-Kyber Python Implementation. Online: https:\/\/github.com\/GiacomoPope\/kyber-py. [last accessed: 20 April 2025]"},{"key":"529_CR13","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin N et al (2002) Quantum cryptography. Rev Modern Phys 74:145\u2013195","journal-title":"Rev Modern Phys"},{"key":"529_CR14","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover LK (1997) Quantum mechanics helps in searching for a needle in a Haystack. Phys Rev Lett 79:325\u2013328. https:\/\/doi.org\/10.1103\/PhysRevLett.79.325","journal-title":"Phys Rev Lett"},{"key":"529_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.150502","volume":"103","author":"AW Harrow","year":"2009","unstructured":"Harrow AW, Hassidim A, Lloyd S (2009) Quantum algorithm for linear systems of equations. Phys Rev Lett 103:150502. https:\/\/doi.org\/10.1103\/PhysRevLett.103.150502","journal-title":"Phys Rev Lett"},{"issue":"20","key":"529_CR16","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1080\/09500340.2016.1148212.","volume":"63","author":"K Heshami","year":"2016","unstructured":"Heshami K et al (2016) Quantum memories: emerging applications and recent advances. J Modern Opt 63(20):2005\u20132028. https:\/\/doi.org\/10.1080\/09500340.2016.1148212. (PMID: 27695198)","journal-title":"J Modern Opt"},{"issue":"6","key":"529_CR17","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/s11128-022-03530-9","volume":"21","author":"S Iranmanesh","year":"2022","unstructured":"Iranmanesh S, Atta R, Ghanbari M (2022) Implementation of a quantum image watermarking scheme using NEQR on IBM quantum experience. Quant Inform Process 21(6):192\u2013233. https:\/\/doi.org\/10.1007\/s11128-022-03530-9","journal-title":"Quant Inform Process"},{"key":"529_CR18","unstructured":"Javadi-Abhari A, et al (2024) Quantum Computing with Qiskit. Online: https:\/\/www.ibm.com\/quantum\/qiskit. arXiv:2405.08810"},{"key":"529_CR19","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.cjph.2023.06.016","volume":"85","author":"M Khan","year":"2023","unstructured":"Khan M, Rasheed A (2023) A high-capacity and robust steganography algorithm for quantum images. Chin J Phys 85:89\u2013103. https:\/\/doi.org\/10.1016\/j.cjph.2023.06.016","journal-title":"Chin J Phys"},{"key":"529_CR20","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lars","year":"2010","unstructured":"Lars L et al (2010) Hacking commercial quantum cryptography systems by tailored bright illumination. Nat Photon 4:686\u2013689","journal-title":"Nat Photon"},{"key":"529_CR21","doi-asserted-by":"publisher","DOI":"10.1140\/epjd\/e20020020","author":"D Mayers","year":"2002","unstructured":"Mayers D (2002) Shor and Preskill\u2019s and Mayers\u2019s security proof for the BB84 quantum key distribution protocol. Eur Phys J D. https:\/\/doi.org\/10.1140\/epjd\/e20020020","journal-title":"Eur Phys J D"},{"key":"529_CR22","doi-asserted-by":"publisher","unstructured":"Mehta D, Joshi SK (2022) Hiding Information in images using LSBSteganography technique. In: International Conference on Cyber Resilience (ICCR) 2022:1\u20134. https:\/\/doi.org\/10.1109\/ICCR56254.2022.9995757","DOI":"10.1109\/ICCR56254.2022.9995757"},{"key":"529_CR23","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. Online: https:\/\/doi.org\/10.6028\/NIST.FIPS.203. [last accessed: 01 October 2025]. 2024. https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final","DOI":"10.6028\/NIST.FIPS.203"},{"key":"529_CR24","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology. Module-Lattice-Based Key-Encapsulation Mechanism Standard. [last accessed: 24 April 2025]. 2024. https:\/\/doi.org\/10.6028\/NIST.FIPS.203https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final","DOI":"10.6028\/NIST.FIPS.203"},{"key":"529_CR25","unstructured":"National Institute of Standards and Technology. Quantum memory and Repeaters. Online: https:\/\/www.nist.gov\/pml\/quantum-networks-nist\/technologies-quantum-networks\/quantum-memory-and-repeaters. [last accessed: 20 April 2025]. 2022"},{"key":"529_CR26","unstructured":"Nielsen MA Chuang IL (2010) Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press,"},{"key":"529_CR27","unstructured":"Pednault E, et al (2024) Breaking the 49-Qubit Barrier in the Simulation of Quantum Circuits. Cornell University , p.\u00a024. https:\/\/https:\/\/arxiv.org\/pdf\/1710.05867v1"},{"key":"529_CR28","doi-asserted-by":"publisher","unstructured":"Qu ZG et al (2011) Quantum steganography with large payload based on entanglement swapping of $$\\chi$$-type entangled states. Optics Communications 284(7):2075\u20132082. https:\/\/doi.org\/10.1016\/j.optcom.2010.12.031 (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030401810013635) issn: 0030-4018","DOI":"10.1016\/j.optcom.2010.12.031"},{"key":"529_CR29","doi-asserted-by":"publisher","first-page":"50849","DOI":"10.1109\/ACCESS.2019.2909906","volume":"7","author":"Z Qu","year":"2019","unstructured":"Qu Z et al (2019) Quantum image steganography protocol based on quantum image expansion and Grover search algorithm. IEEE Access 7:50849\u201350857. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909906. (issn: 2169-3536.)","journal-title":"IEEE Access"},{"issue":"10","key":"529_CR30","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/s11128-020-02868-2","volume":"19","author":"Z Qu","year":"2020","unstructured":"Qu Z, Huang Y, Zheng M (2020) A novel coherence-based quantum steganalysis protocol. Quant Inform Process 19(10):362. https:\/\/doi.org\/10.1007\/s11128-020-02868-2. (issn: 1573-1332.)","journal-title":"Quant Inform Process"},{"key":"529_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104221","volume":"94","author":"H Salahov","year":"2025","unstructured":"Salahov H et al (2025) A nano-design of image masking and steganography structure based on quantum technology. J Inform Secur Appl 94:104221. https:\/\/doi.org\/10.1016\/j.jisa.2025.104221","journal-title":"J Inform Secur Appl"},{"key":"529_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96424-9","volume-title":"Supervised Learning with Quantum Computers","author":"M Schuld","year":"2018","unstructured":"Schuld M, Petruccione F (2018) Supervised Learning with Quantum Computers. Springer"},{"key":"529_CR33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.022310","volume":"83","author":"BA Shaw","year":"2011","unstructured":"Shaw BA, Brun TA (2011) Quantum steganography with noisy quantum channels. Phys Rev A 83:022310. https:\/\/doi.org\/10.1103\/PhysRevA.83.022310","journal-title":"Phys Rev A"},{"key":"529_CR34","doi-asserted-by":"publisher","unstructured":"Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science. pp.\u00a0124\u2013134. https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"529_CR35","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441\u2013444. https:\/\/doi.org\/10.1103\/PhysRevLett.85.441","journal-title":"Phys Rev Lett"},{"key":"529_CR36","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.aej.2025.02.056","volume":"121","author":"A Sykot","year":"2025","unstructured":"Sykot A et al (2025) Multi-layered security system: integrating quantum key distribution with classical cryptography to enhance steganographic securitys. Alex Eng J 121:167\u2013182. https:\/\/doi.org\/10.1016\/j.aej.2025.02.056","journal-title":"Alex Eng J"},{"key":"529_CR37","unstructured":"University of Science and Technolog of China. Micius Satellite for Quantum Science Experiments. Online: https:\/\/quantum.ustc.edu.cn\/web\/en\/node\/351. [last accessed: 20 April 2025]"},{"key":"529_CR38","doi-asserted-by":"publisher","unstructured":"Vignesh et al (2025) Quantum Cipher Exchange with BB84 Protocol and Cryptography Using the One-Time Pad Algorithm. In: 2025 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics. IITCEE 2025, pp.\u00a01\u20136. https:\/\/doi.org\/10.1109\/IITCEE64140.2025.10915391","DOI":"10.1109\/IITCEE64140.2025.10915391"},{"key":"529_CR39","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.92.025002","volume":"92","author":"F Xu","year":"2020","unstructured":"Xu F et al (2020) Secure quantum key distribution with realistic devices. Rev Mod Phys 92:025002. https:\/\/doi.org\/10.1103\/RevModPhys.92.025002","journal-title":"Rev Mod Phys"},{"issue":"8","key":"529_CR40","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z.","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang Y et al (2013) NEQR: a novel enhanced quantum representation of digital images. Quant Inform Process 12(8):2833\u20132860. https:\/\/doi.org\/10.1007\/s11128-013-0567-z. (( issn: 1573-1332.))","journal-title":"Quant Inform Process"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00529-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00529-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00529-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T10:58:49Z","timestamp":1770375529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00529-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,6]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["529"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00529-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,6]]},"assertion":[{"value":"18 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"118"}}