Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Secure Communication without Encryption?
IEEE Security and Privacy
Steganographic communication with quantum information
IH'07 Proceedings of the 9th international conference on Information hiding
Multi-party covert communication with steganography and quantum secret sharing
Journal of Systems and Software
Watermarking and authentication of quantum images based on restricted geometric transformations
Information Sciences: an International Journal
Hi-index | 0.00 |
Recently a quantum steganographic communication protocol based on quantum key distribution (QKD) was proposed, where it is believed that QKD is a kind of suitable cover of a steganographic communication because QKD itself is not deterministic communication. Here we find that, as a special cryptographic application, the procedure of QKD can be used for deterministic secure communication, and consequently it is not suitable for steganography. Due to similar reasons, other quantum cryptographic schemes, including quantum secret sharing and quantum secure direct communication, are not suitable for steganography either.