Dual-Layered Quantum-Secure Concealing: Steganography over Quantum Key Distribution

Document Type : Research Article

Authors

1 Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan, Iran.

2 Faculty of Electrical and Computer Engineering, Malek-Ashtar University of Technology, Tehran, Iran.

10.22042/isecure.2026.240529
Abstract
In the quantum computing era, classical encryption faces unprecedented vulnerabilities, while Quantum Key Distribution (QKD) alone remains insufficient for top-secret data transmission due to practical hardware flaws. In this paper, a novel dual-layered framework that integrates steganography with QKD is proposed to enhance security and concealment. The proposed protocol embeds encrypted messages within QKD keys during post-processing, leveraging existing infrastructure without requiring hardware modifications. The message is first compressed, encoded, and encrypted using a pre-shared QKD key via one-time-pad encryption. A block-based search mechanism then hides message bits within the sifted key while preserving statistical randomness. Crucially, this approach provides two-layer security: information-theoretic encryption via QKD and undetectable message existence. Evaluations confirm ultra-low failure probabilities of embedding (below 10−12 for 1000-bit messages) and minimal deviations in sifted key length (under 1% for typical blocks). The solution enables eavesdropper detection, maintaining full compatibility with standard QKD post-processing. By unifying steganographic stealth with QKD’s theoretical security, this work establishes a practical solution for transmitting top-secret data against evolving quantum threats.

Keywords


[1] Peter W Shor. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science, pages 124–134. IEEE, 1994.
[2] Pramode K Verma, Mayssaa El Rifai, and Kam Wai Clifford Chan. Multi-photon Quantum Secure Communication. Springer, 2019.
[3] Charles H Bennett and Gilles Brassard. Quantum cryptography: public key distribution and coin tossing. In Conf. on Computers, Systems and Signal Processing ,(Bangalore) India, volume 175, 1984.
[4] RamonaWolf. Quantum key distribution,volume 988. Springer, 2021.
[5] Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J Cerf, Miloslav Dušek, Norbert Lütkenhaus, and Momtchil Peev. The security of practical quantum key distribution. Reviews of modern physics, 81(3):1301–1350, 2009.
[6] Feihu Xu, Xiongfeng Ma, Qiang Zhang, HoiKwong Lo, and Jian-Wei Pan. Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2):025002, 2020.
[7] Stefano Pirandola, Ulrik L Andersen, Leonardo Banchi, Mario Berta, Darius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo, Carlo Ottaviani, et al. Advances in quantum cryptography. Advances in optics and photonics, 12(4):1012–1236, 2020.
[8] Hoi-Kwong Lo, Marcos Curty, and Bing Qi. Measurement-device-independent quantum key distribution. Physical review letters, 108(13): 130503, 2012.
[9] Marco Lucamarini, Zhiliang L Yuan, James F Dynes, and Andrew J Shields. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature, 557(7705): 400–403, 2018.
[10] Frank Y Shih. Digital watermarking and steganography: fundamentals and techniques. CRC press, 2017.
[11] Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V Ravi, and Korhan Cengiz. Multidisciplinary approach to modern digital Steganography. IGI Global, 2021.
[12] Alexandru-Gabriel Tudorache, Vasile Manta, and Simona Caraiman. Quantum steganography based on the b92 quantum protocol. Mathematics, 10(16):2870, 2022.
[13] Sujit Biswas, Rajat Subhra Goswami, and K Hemant Kumar Reddy. Advancing quantum steganography: a secure iot communication with reversible decoding and customized encryption technique for smart cities. Cluster Computing, 27(7):9395–9414, 2024.
[14] Adhavan Arumugam, Bibin Eswaran, Logavasigaran Ramesh, and C Nallusamy. Quantumintegrated steganography for secure communication using qkd and lsb techniques. In 2025 International Conference on Electronics and Renewable Systems (ICEARS), pages 977–983. IEEE, 2025.
[15] Ivan B Djordjevic. Covert/stealth/lowprobabilityofdetectioncommunicationsandqkd. In Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography, pages 507–540. Springer, 2025.
[16] Arman Sykot, Md Shawmoon Azad, Wahida Rahman Tanha, BM Monjur Morshed, Syed Emad Uddin Shubha, and MRC Mahdy. Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security. Alexandria Engineering Journal, 121:167–182, 2025.
[17] Gaofeng Luo, Ri-Gui Zhou, and WenWen Hu. Efficient quantum steganography scheme using inverted pattern approach. Quantum Information Processing, 18(7), 2019.
[18] RS Randhawa, Amey R Hasabnis, and Sanghmitra Rai. Quantum-based colour image steganography. In 2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), volume 10, pages 1447–1452. IEEE, 2023.
[19] Aksaj Kumar Bharatwaj and Amey R Hasabnis. Steganography in the quantum era. In 2024 International Conference on Emerging Smart Computing and Informatics (ESCI), pages 1–5. IEEE, 2024.
[20] Hao-Ming Dang, Hong-Mei Yang, Dong-Huan Jiang, Bin Yan, Jia-Hao Huang, Xiao-Tong Sun, and Xiang-Hao Yang. A lsb quantum steganography algorithm based on hash encryption. Quantum Information Processing, 24(7):1–26, 2025.
[21] Zhi-Guo Qu, Xiu-Bo Chen, Xin-Jie Zhou, XinXin Niu, and Yi-Xian Yang. Novel quantum steganography with large payload. Optics Communications, 283(23):4782–4786, 2010.
[22] Ahmed A Abd El-Latif, Bassem Abd-El-Atty, M Shamim Hossain, Samir Elmougy, and Ahmed Ghoneim. Secure quantum steganography protocol for fog cloud internet of things. IEEE access, 6:10332–10340, 2018.
[23] Arome Junior Gabriel, Boniface Kayode Alese, Adebayo O Adetunmbi, and Olumide S Adewale. Post-quantumcrystography:acombination of post-quantum cryptography and steganography. In 8th International Conference for Internet Technology and Secured Transactions (ICITST2013), pages 449–452. IEEE, 2013.
[24] Aykut Karakaya and Ahmet Ulu. A survey on post-quantum based approaches for edge computing security. Wiley Interdisciplinary Reviews: Computational Statistics, 16(1):e1644, 2024.
[25] Yi Luo, Xi Cheng, Hao-Kun Mao, and Qiong Li. An overview of postprocessing in quantum key distribution. Mathematics (2227-7390), 12(14), 2024.
[26] XiongfengMa,BingQi,YiZhao,andHoi-Kwong Lo. Practical decoy state for quantum key distribution. Physical Review A, 72(1):012326, 2005.
[27] Priya Sharma, Vrinda Gupta, and Sandeep Kumar Sood. Post-quantum cryptography research landscape: A scientometric perspective. Journal of Computer Information Systems,65(1):119– 140, 2025.
[28] Dong Pan, Gui-Lu Long, Liuguo Yin, Yu-Bo Sheng, Dong Ruan, Soon Xin Ng, Jianhua Lu, and Lajos Hanzo. The evolution of quantum secure direct communication: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 26(3):1898–1949, 2024.

Articles in Press, Accepted Manuscript
Available Online from 12 February 2026