Quantum Direct Steganography Scheme Based on Modified Generator Projection Directions of Steane Code over a Single-Type Pauli Channel
Abstract
In quantum mechanics, measurements of a quantum state in various directions yield distinct outcomes, a principle that forms the foundation of quantum communication theory. This paper expands upon this concept by introducing a method to modify generator projection directions (MGPD) within quantum stabilizer codes. Employing the Steane code ( code), as a fundamental carrier, we develop a novel scheme for direct quantum steganography across a single-type Pauli channel. The infeasibility of eavesdropping decoding under MGPD is proven. We detail the steganographic encoding and decoding schemes, corresponding quantum circuits, and eavesdropping detection principles. We also use a ’Sudoku’-style strategy to balance steganographic error probabilities and provide the complete steganography protocol. Relative to existing studies, the MGPD method achieves embedding rates approaching and attaining the upper limit of the information capacity for the code within a noise probability range of approximately . It also reduces the consumption of auxiliary keys from to , while enabling eavesdropping detection and steganography of arbitrary quantum states. We investigate its potential applications in quantum communication and assess its benefits in the context of secret information transmission and eavesdropping detection in noisy channels. Although the MGPD method incorporates certain idealized assumptions and limitations, it provides novel perspectives on the concealment of quantum information.
I Introduction
Steganography, the art of embedding information within a carrier to evade detection by unauthorized individuals, has undergone significant evolution. Initially employing ancient invisible inks, the technique has advanced to incorporate modern digital and network-based methods [1]. This technology, along with watermarking, has been widely implemented across various sectors, including military intelligence, copyright protection, and covert communication, due to technological progress [2, 3]. Since the 1980s, the rapid expansion of quantum information science has led to the emergence of technologies like Quantum Key Distribution (QKD) [4, 5, 6, 7] and Quantum Secure Direct Communication (QSDC) [8, 9, 10]. These technologies offer unconditional security, which is superior to that of traditional cryptographic methods. In parallel, research into quantum-based information hiding, utilizing properties such as superposition and entanglement [11], has attracted considerable research interest.
From the standpoint of steganographic carriers, quantum information hiding techniques can be classified into three distinct categories: 1) Channel and Coding Methods: These approaches camouflage secret messages by mimicking the statistical distribution of noise inherent to the physical channel and embed them within Quantum Error Correction Codes (QECC) for secure transmission [12, 13, 14, 15, 16, 17]. 2) State Exchange and Protocol Methods: These techniques involve subtle modifications to communication protocols and exploit methods such as quantum teleportation to create covert communication channels [18, 19, 20, 21]. 3) Media Information Methods: These methods encode images or audio into quantum states and apply classical steganographic techniques such as the Least Significant Bit (LSB) method, further enhancing performance with algorithms like quantum Fourier transforms, random walks, and matrix coding [22, 23, 24, 25, 26, 27, 28]. Among these categories, channel and coding methods serve as the foundational layer. To enhance resistance to noise, some techniques in the latter two categories also integrate QECC [20, 28].
Quantum theory pioneer Werner Heisenberg articulated the observer effect in quantum mechanics with the statement, ’the very act of observing disturbs the system.’ This principle is fundamental to protocols such as Quantum Key Distribution (QKD) and Quantum Secure Direct Communication (QSDC). Eavesdroppers, due to incorrect measurement directions, not only fail to acquire complete and accurate information but also disturb the system, which reveals their eavesdropping activities. Applying this concept to quantum steganography, if Alice and Bob utilize measurement directions that differ from Eve’s, they will perceive the quantum system differently, as illustrated in Fig. 1. By employing specific strategies, Alice and Bob can potentially transmit secret quantum information securely and covertly, thereby complicating Eve’s ability to detect their communication.

Based on the above insights, this paper investigates a quantum steganography scheme a QECC framework. We use the Steane code as the base carrier and modify the projection directions of the encoding generators to directly transmit secret quantum states. The main contributions of this paper are: 1) We prove the theoretical infeasibility of Eve’s error correction and decoding under different projection measurement directions using the necessary and sufficient conditions for stabilizer code correction. 2) For a single-type Pauli channel, we propose the specific implementation of the MGPD method and the corresponding quantum circuits, and introduce a ’Sudoku’-style direction selection strategy to balance channel error probabilities, making the steganographic behavior resistant to Eve’s statistical analysis. 3) We construct the MGPD steganography protocol, which offers advantages over previous quantum steganography schemes based on QECC in terms of embedding rate, auxiliary key consumption, eavesdropping detection capability, and the form of secret information. 4) We explore the potential of our scheme for tasks such as QKD and QSDC, analyzing its advantages in secret information form and eavesdropping detection in noisy channels.
The organization of this paper is outlined as follows: Sect. II presents the foundational concepts of quantum steganography, Pauli channels, and stabilizer codes, and establishes the proposition that misaligned directions preclude Eve from accurately decoding the information. Sect. III elaborates on the execution of the MGPD steganography scheme, encompassing quantum circuit designs, principles of eavesdropping detection, strategies for balancing probabilities, and the overall protocol workflow. Sect. IV conducts an analysis of the MGPD scheme and compares it with existing research in the realms of information concealment and secure communication. Sect. V concludes the paper with a summary of the findings.
II Preliminary
II.1 Basic Formalism of Quantum Steganography
Steganography serves as a principal technique for concealing information, applicable to both spatial and temporal transmissions (e.g., Alice embeds secret information within a quantum register for Bob to retrieve at a later time). The primary objectives of quantum steganography can be summarized as follows: 1) Communication: Alice must be capable of conveying classical or quantum information to Bob. 2) Secrecy: The embedded secret message within the cover data should be effectively concealed, rendering it challenging for Eve to discern. Furthermore, the capacity and robustness are pivotal criteria for assessing the efficacy of steganography schemes. Fig. 2 depicts the general process of quantum steganography, where the area outside the dashed box signifies the standard procedure, and the area within the dashed box highlights the encoding and decoding steps of the direct quantum state steganography method introduced in this paper.

II.2 Pauli Channels
Pauli operators constitute a fundamental set of operators within quantum theory, comprising unitary Hermitian matrices that satisfy anticommutation relations, as shown in Eq. 1 and 2.
(1) |
(2) |
where {a,b}=.
The bit-flip channel (BC) is a quantum noise model where a qubit has a probability of undergoing a bit-flip error, which changes the state from to or vice versa. Mathematically, the channel can be described as:
(3) |
Similarly, the mathematical descriptions of the phase-flip channel (PC) and the bit-phase flip channel (BPC) are given by Eq. 4 and 5, respectively.
(4) |
(5) |
Quantum channels are not merely mathematical constructs; they also represent actual physical phenomena. For instance, variations in external electromagnetic fields can induce bit-flip errors in superconducting qubits. Minor alterations in temperature and magnetic fields may result in phase-flip errors within ion trap systems. Additionally, high-energy particle collisions can precipitate both bit and phase flip errors in diamond NV center systems.
II.3 Stabilizer Formalism
The stabilizer formalism, introduced by Gottesman [29], has been instrumental in the advancement of quantum error correction theory. Stabilizers are derived from the Pauli group. The Pauli group for a single qubit is defined as . It is clear that is an Abelian group. The Pauli group on n-qubits is defined as .
A stabilizer is defined as a subgroup of , typically expressed in terms of its generators: , satisfying , all mutually commute, i.e. . The vector space is defined as the set of states stabilized by all elements of , meaning that for all .
II.4 Modified Generator Projection Direction Encoding
As discussed in Sect. II.1, the objective of steganography is to enable Alice and Bob to transmit secret information accurately while making it challenging for Eve to detect and extract that information. To accomplish this, we propose to alter the stabilizer encoding by adjusting the generator projection direction, thereby hindering Eve’s ability to correctly detect and perform error correction without knowledge of the specific rule.
Let us now consider the general conditions for quantum error correction (refer to [11], Theorem 10.1). Let be the projector onto a quantum code, and let denote the set of error operators that describe noisy quantum operations. The necessary and sufficient condition for the correctability of errors is that:
(6) |
for some Hermitian matrix of complex numbers.
Within the framework of stabilizer encoding, the projector is represented as: , where denotes the number of generators . We propose to modify by altering the projection direction orthogonally for some of its dimensions, while leaving the other dimensions unaltered. For instance, .
The subsequent proposition demonstrates that in this context, Eve, being uninformed of the modification rule, will be unable to correct errors accurately if she persists in decoding based on the original projection directions. For the sake of simplicity, we consider the modification of a single generator direction; the extension to multiple directions is analogous.
Proposition 1: It is not possible to find a set of errors that the stabilizer code, defined by the projection operator can correct, such that , where , and constitutes a Hermitian matrix.
In this context, can be interpreted as the projection encoding operation following a directional modification, as perceived by Alice and Bob, whereas represents the projection operation in the original direction, which Eve attempts to use for error correction.
Proof:
Let . It is straightforward to see from the expressions of and that:
(7) |
Combining Eq. 6, direct calculation yields:
(8) |
where,
(9) |
For , we discuss the problem in three cases.
Case1: commutes with all the generators . That is, . In this situation,
(10) |
Due to the orthogonality of and , it is clearly shown that there does not exist satisfying the conditions.
Case2: only anticommutes with . That is, , while . In this situation,
(12) |
Then, , indicating that there does not exist .
Case3: anticommutes with at least one generator other than . Without loss of generality, suppose . Due to
(13) |
and , therefore, all three terms of the polynomial on the right-hand side of Eq. 9 are zero, i.e. . Let , the given conditions are satisfied. Combining the above three cases, Proposition 1 is proved.
III Quantum Steganography with MGPD of Steane Code
In the preceding section, we discussed the pertinent concepts of quantum information steganography and established the viability of the steganographic scheme presented in this paper. This section will utilize the Steane code [30] to devise suitable strategies and formulate the steganography protocol, prioritizing the dual goals of communication and secrecy for the steganographic message.
The Steane code is a renowned quantum error-correcting code (QECC) that encodes a single logical qubit into seven physical qubits. It is capable of correcting up to one arbitrary quantum error, which may manifest as a bit-flip error , a phase-flip error , or a combination of both (i.e. ).
Due to its practical implementation advantages, this code is frequently selected for error correction across various channels. The stabilizer generators for the Steane code are detailed in Table 1. During the error correction phase, the syndrome is determined through measurements of the generators, which facilitates the identification of the error and the application of the corresponding operation to restore the logical state.
Name | Operator |
---|---|
III.1 Stego States’ Encoding and Error Correction
We begin with two foundational assumptions: first, that Eve is aware of the generator (the original projection directions) of the code; second, that only single-qubit errors affect the encoded states. These assumptions are justifiable, as the generators of the code can be standardized for computational or communicative purposes. In scenarios where multiple qubits incur errors, concatenated coding can be implemented, re-encoding each qubit using the code. Thus, for our study, considering only single-qubit errors is adequate. Furthermore, our study focuses on single-type error channels (i.e. BC, PC, BPC mentioned above), which will be elaborated in the following.
As presented in Table 1, the interaction—either commutation or anticommutation—between single-qubit error operators and the generators are detailed in Table 2.
+1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | +1 | |||
+1 | +1 | +1 | +1 | +1 | -1 | +1 | +1 | -1 | +1 | +1 | +1 | +1 | +1 | -1 | +1 | +1 | -1 | |||
+1 | +1 | +1 | +1 | -1 | +1 | +1 | -1 | +1 | +1 | +1 | +1 | +1 | -1 | +1 | +1 | -1 | +1 | |||
+1 | +1 | +1 | +1 | -1 | -1 | +1 | -1 | -1 | +1 | +1 | +1 | +1 | -1 | -1 | +1 | -1 | -1 | |||
+1 | +1 | +1 | -1 | +1 | +1 | -1 | +1 | +1 | +1 | +1 | +1 | -1 | +1 | +1 | -1 | +1 | +1 | |||
+1 | +1 | +1 | -1 | +1 | -1 | -1 | +1 | -1 | +1 | +1 | +1 | -1 | +1 | -1 | -1 | +1 | -1 | |||
+1 | +1 | +1 | -1 | -1 | +1 | -1 | -1 | +1 | +1 | +1 | +1 | -1 | -1 | +1 | -1 | -1 | +1 | |||
+1 | +1 | +1 | -1 | -1 | -1 | -1 | -1 | -1 | +1 | +1 | +1 | -1 | -1 | -1 | -1 | -1 | -1 |
Now, let us concentrate on the projection direction along to demonstrate the alterations in the encoding and error correction processes when the projection is altered. At the sender’s end, the standard encoding operator is given by: , while Alice’s modified encoding operator is: . At the receiver’s end, Bob employs the modified generator directions for detection and correction, whereas Eve relies on the original projections. We examine two error scenarios: (i.e. ) and . Since commutes with all generators, it corresponds to Case 1 in Proposition 1. only anticommutes with , corresponding to Case 2. Consequently, neither scenario permits accurate error correction, implying that Eve cannot accurately ascertain the secret information.
The one implementation method of quantum circuits is illustrated in Fig. 3. We adhere to the method outlined in Reference [31] and incorporate error operation modules, determined by commutation relations, into the standard encoding circuit. The key components include the and modules; specifically, the module, enclosed within the dashed box, is used exclusively by Bob during the decoding phase, provided he is cognizant of the protocol. Alice and Bob control the module to modify the direction of , with additional details elaborated in Eqs. 17 to 19 within Sect. III.2.

In Fig. 3, the key modules for encoding and error detection are mathematically represented as follows:
(14) |
During the detection phase, generators are measured in isolation. The measurement outcome is 0 if the error commutes with a generator, and 1 if it anticommutes. By consulting Table 2, the type of error can be identified and subsequently corrected. For instance, if a error occurs, it anticommutes with and , while commuting with the remaining generators, thus:
(15) |
The measurement outcomes 1 for .
The preceding scenario pertains to the use of the original projection direction. However, with Alice’s encoding projection direction now aligned with , the measurement outcome for the error on is the converse of what it was in the original direction (refer to Eq. 16). The measurement of yields 0.
(16) |
Consequently, the syndromes measured by Eve for the generators through shift from 110000 to 010000. Based on Table 2, Eve incorrectly identifies a error rather than the error. Table 3 displays the discrepancy between the actual errors and Eve’s perceived errors. While Eve’s measurements are entirely erroneous, Bob, who is cognizant of the protocol, can use Table 3 to adjust and rectify the errors. This process ensures the accurate transmission of the quantum state from Alice to Bob, fulfilling one of the primary objectives of steganography.
Eve’s syndrome | 100000 | 101000 | 110000 | 111000 | 000000 | 001000 | 010000 | 011000 |
---|---|---|---|---|---|---|---|---|
Real error | ||||||||
Eve’s error |
It is crucial to acknowledge that this steganographic method is effective solely for single-Pauli error channels. Should the channel encounter multiple error types concurrently (e.g., depolarizing channels exhibiting , , and errors), this approach becomes inapplicable. For instance, altering the direction may result in and errors yielding unanticipated syndromes (e.g., 100001, not present in Table 2), prompting Eve to suspect non-single-qubit errors. Consistent occurrence of such events could arouse Eve’s suspicion. Current research on steganographic methods for depolarizing channels predominantly focuses on employing a key to deliberately introduce a small number of errors that encode secret messages into the channel, as elaborated in references [13, 14, 15, 16].
Let us examine a scenario where the eavesdropper, Eve, intercepts and measures the secret quantum state to obtain the error syndrome before resending it to Bob, akin to a measure-resend attack. The question arises whether Bob can detect this interference and still correct the errors. The answer is that while Bob can indeed detect the interference, he cannot successfully complete the error correction.
As depicted in Fig. 2, the encoded quantum state travels from Alice to Eve and then from Eve to Bob, passing through two channels (Channel-1 and Channel-2, both with the same channel parameters). This results in the quantum state being subjected to noise twice. To evade detection, Eve must perform error correction before resending, attempting to make the state appear as though it has only encountered noise once. However, since Alice has applied the MGPD method, Eve’s error correction will not function as expected.
We illustrate this with an example of modifying the direction, as shown in Table 4. From Table 4, it is evident that the quantum state resent by Eve is equivalent to applying a error to the initial encoded state .
Errors in Channel-1 | ||||||||
Eve’s action | ||||||||
Equivalent syndrome error |
Assume the probability of a single physical qubit error in the channel is (Note that within a logical block consisting of 7 qubits, there is assumed to be only a single erroneous assumption). Consequently, the probability of no error occurring is , and the probability of an error occurring is . The possible error scenarios for the quantum state received by Bob are shown in Table 5. Upon conducting a statistical analysis, Bob will observe two discrepancies: 1) The probability of no error ; 2) . These anomalies enable Bob to detect the presence of the eavesdropper, Eve, prompting him to alert Alice to cease communication. Since the two channel errors surpass the error-correcting capacity of the Steane code, Bob is unable to complete the error correction and must discard the compromised quantum states.
Errors in Channel-2 | ||||||||
Probability | ||||||||
Overlaid error | ||||||||
Equivalent syndrome error |
III.2 Probability Adjustment Strategies to Resist Statistical Analysis
In the method outlined in the previous subsection, Alice and Bob fulfill their communication objective by consenting to alter the encoding projection direction. This subsection focuses on an additional goal—security—and delves into techniques to bolster the imperceptibility of the steganographic behavior. In the preceding section, Bob could detect eavesdropping based on shifts in error probabilities, and Eve could also potentially conduct steganalysis using statistical channel characteristics. For instance, if the error probability for a particular qubit within a 7-qubit encoded block deviates markedly from the rest, it might arouse Eve’s suspicion of steganographic activity. We will now discuss strategies to counteract Eve’s suspicions.
In specific channel environments, we assume the probability of an error occurring is and the probability of no error occurring is , satisfying . Typically, . However, upon examining Table 3, it becomes evident that, from Eve’s perspective, the probability of no error occurring (denoted as ) is equivalent to the probability of an error occurring, with the exception of the error. The probability of a error stands out as distinct from that of the other qubits. This inconsistency allows Eve to easily detect anomalies through statistical analysis.
To mitigate this issue, we must employ specific strategies to regulate the fluctuations in error probabilities resulting from the MGPD. Taking the code as an example in the context of a phase-flip channel (with analogous methods applicable to bit-flip and bit-phase-flip channels), we can, by referring to Table 3, establish the correlation between the errors perceived by Eve and the actual errors for various potential direction adjustments, as detailed in Table 6.
Modified directions | Errors from Eve’s perspective | |||||||
---|---|---|---|---|---|---|---|---|
Original | ||||||||
Recall Fig. 3 from Sect. III.1, where the operator corresponding to the encoding circuit is (See Ref. [31]):
(17) |
To obtain the correct encoding direction (Eve’s perspective), it is necessary to apply to to Eq. 17 to make the adjustment. For example:
(18) |
By examining the sequence of elements in the first column of Table 6
(i.e., ), the relationship between in and the measurement outcomes can be formulated as follows:
(19) |
The value of in module can be be selected by consulting Table 6 and considering the desired direction of modification.
Furthermore, it is observed that Table 6 is a square matrix, analogous to a ’Sudoku’ puzzle, where , to appear without repetition in each column, and occupies distinct positions in each row, ensuring comprehensive coverage from the original to (from Eve’s perspective). It is evident that Alice can uniformly apply directional modulation encoding, thereby achieving a balance in the probability of error occurrence for each physical qubit, with the exception of no-error scenarios.
Specifically, let us assume that the acceptable probability range for a single qubit to undergo a phase-flip error in the target channel is , where denotes the mean error probability and signifies the permissible deviation. From Eve’s standpoint, this corresponds to a minor alteration in the channel’s characteristics, as illustrated in Eq. 20.
(20) |
This implies that any error probability falling within this interval is regarded as typical and is not likely to be flagged as unusual by Eve. Consequently, we can determine the execution probabilities for the seven modified directions (one execution per encoded block) outlined in Table 6, ensuring they align with the physical behavior of the channel, as demonstrated in Eqs. 21 and 22.
(21) |
In addition to the constraints on the probabilities imposed by . We can get:
(22) |
Once the parameters and have been established in accordance with the aforementioned criteria, the proposed scheme fulfills its fundamental security objectives and effectively counters the issue of resisting statistical analysis , as initially discussed in this subsection.
Expanding on this foundation, we address two pivotal concerns: 1) The selection of modified directions and the associated key consumption. 2) The parameter setting issue.
Regarding the first issue, based on the set of modified direction-probability correspondence pairs , Alice can construct a sequence from the set with frequencies approximating the aforementioned probabilities. The numbers in this sequence correspond to the row numbers in Table 6, indicating the orthogonal adjustments of the respective generator directions. For example, if , then , the sequence could be set as (not unique), such that the frequency of modified directions is , and the frequency of unmodified directions is .
Alice then repeatedly employs this sequence for encoding and communicates it to Bob. With this sequence, Bob can accurately perform error correction and decoding. In this context, unless Eve conducts statistical analysis in frames of 10, it is challenging for her to discern the error pattern. Even if Eve analyzes in frames that are multiples of 10, the subtle probability fluctuations in error occurrences on specific physical qubits, resulting solely from the modification of encoding projection directions, are unlikely to be detected. Consequently, Alice only needs to transmit a constant-sized numerical sequence as the key to Bob, thereby achieving the communication functionality of the steganography scheme.
For the second issue, we examine the embedding rate and security of the steganography scheme. In the scheme previously described, Alice directly embeds the secret message into the code-stream for transmission. Here, the encoded states with modified projection directions are designated as stego states, which Eve cannot accurately obtain, while those without modification are considered normal states, capable of being corrected by Eve and thus not used by Alice to convey secret information. Furthermore, each set of 7-qubits block represents 1 logical qubit of quantum information. If the steganographic embedding rate is defined as the ratio of the secret message’s volume to the number of physical qubits in the carrier, then the embedding rate , indicating a linear positive correlation. The security index is inversely related to the distortion rate, which corresponds to the aforementioned probability deviation ; to enhance s, a smaller is necessary (if modeled with a linear function, it denotes a linearly decreasing relationship). During the implementation of the steganography protocol, a trade-off must be made based on practical conditions, as shown in Eq. 22. By integrating Eqs. 22 and 23, suitable parameters and can be determined.
(23) |
III.3 Steganography Protocol
Drawing on the methods and strategies outlined in Sections III.1 and III.2, we now provide a comprehensive description of the steganography protocol, as depicted in Fig. 4.

Step1 (Transmitter: Strategy class selection) Alice selects the class of strategy for modifying the projection direction based on the quantum system’s channel environment. As detailed in Sect. III.1, for the bit-flip channel, the strategy class is ; for the phase-flip channel, it is
; and for the bit-phase-flip channel, it is
.
Step2 (Transmitter: Key preparation) Alice employs the method outlined in Sect. III.2, leveraging her knowledge of the channel’s error probability , to determine the distortion parameter , calculate the adjustment probability , and construct the key sequence accordingly.
Step3 (Transmitter: Secret state encoding) Based on the intended secret message, whether classical or an arbitrary quantum state, Alice utilizes the key sequence and the strategy set chosen in Step1 to apply stabilizer encoding with modified generator directions, as shown in Fig. 3. Thus, the code stream carrying the secret information is generated, comprising logical encoded blocks, each consisting of 7 physical qubits.
Step4 (Information transmission) Alice transmits the carrier state stream through the quantum channel to Bob, while the key sequence and strategy set selected in Step1 are sent via a classical secure channel.
Step 5 (Receiver: Syndrome measurement) Upon receiving the erroneous quantum states through the channel, Bob measures them according to the generator projection directions corresponding to the strategy set rules specified by the key to obtain the error syndromes.
Step 6 (Receiver: Eavesdropping detection) Bob integrates the measurement outcomes from Step 5 and, guided by the key sequence , determines an appropriate detection length. He conducts statistical analysis on every -th position within each segment of length in the state stream, (i.e. , corresponding to states subjected to the same MGPD), employing the method outlined in Sect. III.1, to ascertain the presence of eavesdropper Eve.
Step 7 (Receiver: Error correction) Should eavesdropping be detected, Bob alerts Alice to halt any further communication and discards the quantum states received in the current round. If no eavesdropping is detected, errors are rectified using the error correction module illustrated in Fig. 3. After discarding the irrelevant states at non-embeddable positions as indicated by key , the recovered secret states can undergo post-processing and application.
IV Analysis and Comparison with Related Work
The security, imperceptibility, capacity, and robustness of the steganography framework proposed in this paper have been discussed in detail in the previous sections. This subsection provides a concise review of these characteristics and contrasts our scheme with prior steganography efforts based on QECC. Additionally, we juxtapose the protocol framework of our scheme with milestone works in QKD and QSDC from the perspective of confidential communication.
IV.1 Analysis
1) Security: As detailed in Sect. III.1, if Eve intercepts the quantum states encoded with the code that contain the secret information, she can only perceive false syndromes, indicating incorrect error occurrences and locations (refer to Table 3), unless she is aware of the actual generator projection directions modified by Alice. This results in erroneous error correction and post-processing, thereby ensuring the secrecy of the quantum states’ content.
2) Imperceptibility: As outlined in Sect. III.2, Alice and Bob maintain the uniformity of the single physical bit error probability observed by Eve through the prearranged ’Sudoku’ table (Table 6). By managing the frequency of the MGPD with a shared key, they keep the deviation between the physical qubit error rate and the actual channel error rate within a small fluctuation , making it challenging for Eve to discern.
3) Capacity: The capacity of steganography is typically denoted by the steganographic rate , the ratio of the number of secret messages to the number of carriers. As mentioned in Sect. III.2, Alice embeds secret quantum states at positions corresponding to the MGPD with a probability of . For the code, the steganographic rate is . Moreover, capacity and imperceptibility are inversely related.
4) Robustness: The steganography scheme, which relies on stabilizer codes, inherently exhibits robustness against channel noise and errors. As discussed in Sect. III.1, while this scheme is not impervious to measure-resend attacks, it can detect the presence of the eavesdropper Eve, thus ensuring the security of the communication or verifying the reliability of the received quantum state data.
5) Key Consumption: According to the analysis in Sect. III.2, the length of the auxiliary key sequence required for the steganography scheme is a constant , independent of the secret state sequence length, rendering this resource consumption negligible.
IV.2 Comparison
The analysis presented above demonstrates that the steganography scheme outlined in this paper is applicable to both information hiding and quantum communication contexts. We now proceed to compare our scheme with selected prior works. Despite variations in form, framework, and procedure among these methods, we can identify common foundational criteria to facilitate a consistent and fair evaluation.
IV.2.1 Information Hiding Scenarios
In the following, we contrast our MGPD scheme with other schemes as presented in Ref. [12] and in Refs. [13, 14, 15, 16, 17], all of which are predicated on quantum error correction code-based information hiding techniques. As introduced earlier, the core concept of these schemes is to incorporate secret messages into the quantum error correction codes as artificial errors, to be later extracted using a key. Their specific implementations, however, diverge: Ref. [12] employs a random selection of basis states and error directions ( or ), creating superpositions of various physical bit errors to detect any interference by Eve with the data. Differently, the schemes detailed in Refs. [13, 14, 15, 16, 17], embed secret information into the ancillary qubits of the QECC, managing the embedding rate to ensure that the error rate shows only a minor deviation from the channel’s inherent characteristics. In contrast, our MGPD scheme forgoes the artificial embedding of errors corresponding secret message, instead integrating directional control during encoding and probabilistic direction selection adjustments.
Table 7 presents a comparison of the functionalities and performance metrics of the three types of schemes across various aspects. Here, denotes the total length of the carrier qubits, the key consumption rate is defined as the ratio of classical key number to the carrier length , and represents the channel entropy. All other basic settings and symbols are consistent with those previously described.
Scheme | Function | Channel form | Secret message form | Imperceptibility |
---|---|---|---|---|
MGPD | Steganography | Single type of BC /PC /B-PC | Arbitrary quantum state/ Classical message | Strong |
Refs. [13, 14, 15, 16, 17] | Steganography | Arbitrary type of BC/ PC /B-PC/ DC | Fixed form of quantum state/ Classical message | Strong |
Refs. [12] | Watermarking | Arbitrary type of BC/ PC /B-PC/ DC | Quantum superposition state | Weak |
Scheme | Resistance to channel noise | Eavesdropping Detection | Secret message embedding rate / Protected quantum data ratio | Key consumption |
MGPD | ||||
Refs. [13, 14, 15, 16, 17] | ||||
Refs. [12] |
For the scheme presented in Refs. [13, 14, 15, 16, 17], the key consumption . This represents a theoretical value, as the computation of such a combinatorial index and the retrieval of an element of length from a large dataset are, in practice, exceedingly demanding tasks. In the scheme in Ref. [12], . For large block size and carrier length , the secret message embedding rate , and the key consumption rate tends toward . Moreover, Reference [12] proposes a theoretical method for data and message reversal, potentially increasing the ratio of protected quantum data to . (Note: Due to the unification of basic conditions, some computational results differ in form from those in the original literature, but the methods remain consistent with the original sources.)
Examination of Table 7 reveals that, aside from its limitation to addressing single-type Pauli channel errors, our MGPD scheme exhibits several advantages. These include the ability to transmit arbitrary quantum states, a high degree of imperceptibility, and the capability for eavesdropping detection.
Significantly, the MGPD scheme necessitates only a constant-level key sequence, which, in comparison to the other two schemes, reduces key consumption from to (refer to Fig. 5). This reduction decreases the overhead associated with auxiliary channels for key transmission and bolsters overall security. Since both schemes presented in Refs. [13, 14, 15, 16, 17] and Ref. [12] require the insertion of artificial errors to embed secret messages, compelling Alice and Bob to utilize random keys of comparable length to designate the positions and types of these embedded errors; otherwise, they would be vulnerable to detection and decryption by Eve. In contrast, the key in the MGPD scheme serves solely to align Alice and Bob on the encoding-measurement directions and does not involve the embedding of artificial errors. Errors within the channel occur randomly and are independent of the key, preventing Eve from making direct correlations.

Regarding the embedding rate, the MGPD scheme surpasses the methods presented in Refs. [13, 14, 15, 16, 17] for , as shown in Fig. 6. Moreover, from Fig. 6, it can be observed that near , the embedding rate of the MGPD scheme approaches and attains the upper limit of the information-carrying capacity of the Steane code. This situation corresponds to the channel error probability being almost equal to the error-free probability (i.e., ). At this juncture, it becomes challenging for Eve to discern the statistical variations induced by the steganography, thereby achieving the maximum embedding rate. It should be noted that is not within the basic setting of the MGPD scheme described in this paper, and thus the embedding rate is set to zero under such conditions. Furthermore, as discussed at the end of Sect. III.2, an increased deviation setting for leads to a higher embedding rate, a phenomenon also illustrated in Fig. 6.

IV.2.2 Secure Communication Scenarios
As previously discussed, the MGPD scheme is capable of transmitting messages in arbitrary quantum state form and offers features such as eavesdropping detection, resistance to Eve’s analysis, and robustness against channel noise. A pertinent question emerges: Is this scheme applicable to QKD and QSDC scenarios? In this sections, we will engage in theoretical explorations and compare our scheme with seminal works in the fields of QKD and QSDC. Seminal works in QKD include the BB84 protocol [4] and its entangled counterpart, the BBM92 protocol [5]. These protocols capitalize on the uncertainty principle and the no-cloning theorem of quantum mechanics, exploiting Eve’s lack of knowledge about the measurement bases and interactions over classical public channels to generate secure keys across quantum channels. In contrast, QSDC schemes [8, 9] do not necessitate the establishment of a shared key between the communicating parties. They encode messages onto non-local entangled states, necessitating only a minimal amount of classical information for eavesdropping detection or parameter estimation, thereby facilitating the direct transmission of secret messages over quantum channels.
In the task of quantum communication, there are several key performance metrics: 1) Key (or secret message) generation rate : This metric denotes the average amount of final secure information produced per initial qubit, with higher signifying greater efficiency. 2) The classical bit consumption rate : This indicates the average quantity of auxiliary classical information needed to process one qubit, where a lower suggests enhanced efficiency and security. 3) Entanglement resources: This metric gauges the practical difficulty of implementing the scheme, with higher entanglement resource demands posing greater challenges for practical application. 4) KL Divergence before and after eavesdropping: This quantifies the alteration in error probability distribution due to eavesdropping, computed as [32]. A higher denotes a more robust eavesdropping detection capability. 5) The capacity to transmit the form of Q-messages: In scenarios necessitating the direct presentation of quantum state data, the quantum state form of secret information holds significant potential for applications in information security.
In the majority of studies within the realms of QKD and QSDC, a thorough analysis of channel noise has not been conducted. In the following section, we present a comparison of the functionalities and performance metrics of the three classes of schemes under a channel noise probability , as depicted in Table 8. Here signifies the proportion of qubits dedicated to the eavesdropping detection process, which can be quite minimal. In experiments from [33], achieved good detection results at 3% and nearly 100% accuracy at 20%. Other settings remain consistent with the previous discussion.
Scheme | Form of secret messages | Key generation rate | Classical bit consumption rate | Entanglement resources required | KL Divergence before and after eavesdropping |
MGPD | arbitrary qubits or classical bits | QECC, short-distance | |||
BB84 [4] | 0,1 bits | don’t require | |||
Two-step QSDC [9] | 0,1 bits or Bell states | EPR pairs, long-distance | 1st detection: same as BB84; 2nd detection: |
As shown in Table 8, both the QSDC and MGPD schemes exhibit low auxiliary classical bit consumption rates, underscoring the benefits of ’direct’ communication via quantum channels. Regarding entanglement resources, the BB84 protocol is the most straightforward to implement, as it does not necessitate entanglement. The MGPD protocol relies on local entanglement within QECC blocks, posing a moderate implementation challenge. Conversely, the QSDC protocol involves the distribution of entangled particles over extended distances, which is most prone to decoherence and incurs the highest implementation costs. In terms of the form of secret information, the MGPD scheme is capable of transmitting arbitrary quantum states, including classical 0- and 1-bits represented by basis states, thus offering a wider range of potential applications compared to the other two schemes.
Figure 7 illustrates the key generation rate as a function of the channel noise probability . It is observable that the MGPD scheme does not possess a capacity advantage when the channel error probability is exceedingly low. Within the range , its capacity approximates and attains the upper limit of the information capacity of the Steane code, showing no significant difference from the BB84 protocol.

Regarding KL divergence, in the context of the BB84 protocol, Eve’s intercept-resend attack results in qubits being subjected to the effects of eavesdropping measurements as well as two rounds of channel noise errors. The total error rate is depicted in Figure 8. By integrating this with the error rate in the absence of eavesdropping, we can derive the results presented in Table 8.

In the Two-Step QSDC scheme, the first eavesdropping detection adheres to the principle analogous to that of the BB84 protocol, yielding an identical . In the second detection phase, Eve’s intercept-resend attack disrupts the EPR pairs shared between Alice and Bob, causing Bob to receive a maximally mixed state . Consequently, Bob’s measurement outcomes will be one of the four Bell states with equal likelihood, resulting in an error probability of . This accounts for the results detailed in Table 8.
The KL divergence of the three schemes as a function of the noise probability is shown in Fig. 9. It can be seen that at , the MGPD scheme has the strongest eavesdropping detection capability. At , it also performs overall better than the BB84 scheme. Of course, as explained at the end of Sect. III.2, there is a trade-off between the two indicators of security and capacity with the variation of .

In summary, we have investigated the potential applications of the MGPD scheme in the realm of quantum secure communication. While the concept is idealized, the scheme’s capacity to transmit arbitrary quantum states, coupled with its eavesdropping detection and immediate error correction capabilities, holds potential promise in specific applications, such as quantum state-based key distribution, sharing, and the establishment of quantum networks.
V Conclusion
This study presents a quantum steganography method designed for the direct transmission of secret quantum states. Distinct from quantum cryptography, quantum steganography utilizes the intrinsic properties of quantum channels and quantum information encoding to ensure that eavesdroppers cannot discern the presence of covert information. Though this domain is nascent, it possesses substantial potential for future quantum communication and networking, especially in covert communication, identity authentication, and tamper detection. Moreover, it can be integrated with quantum cryptography to construct more robust information security frameworks.
We introduce a steganographic encoding method based on the Steane code, which involves modifying the projection directions of the generators. We theoretically demonstrate that an eavesdropper is incapable of correctly decoding the information. We develop detailed encoding and decoding schemes, quantum circuits, and principles for eavesdropping detection, employing a ’Sudoku’-style strategy to balance error probabilities, and present the comprehensive steganography protocol. Compared to related research on quantum information hiding based on QECC, the MGPD scheme offers benefits in terms of secret information form, stealth, security, and capacity, notably by reducing auxiliary key consumption from to . We also explore the MGPD scheme’s potential for applications such as QKD and QSDC, underscoring its strengths in secret information form and eavesdropping detection within noisy channels.
The limitations of our work are primarily twofold: 1) We made idealized assumptions, focusing solely on single-type Pauli noise, which may not be applicable in scenarios involving multiple Pauli noises or depolarizing channels. 2) In contrast to QKD, which employs classical post-processing for error correction, QECC incurs higher quantum resource costs, leading to a lower secret information generation rate (with an upper bound of for the Steane code).
Moving forward, we aim to enhance the scheme’s applicability to various noise channels and to improve the secret information generation rate. The quantum code, also known as the Laflamme code [34], is a promising QECC candidate for tackling these challenges. Additionally, investigating which stabilizer codes can be adapted for information steganography using the MGPD method presents an intriguing theoretical question.
Acknowledgements.
This work is supported by the National Natural Science Foundation of China under Grant No. 62171470, Henan Province Central Plains Science and Technology Innovation Leading Talent Project (No. 234200510019), Natural Science Foundation of Henan Province (No. 232300421240) and Laboratory for Advanced Computing and Intelligence Engineering Fund.References
- ZheMing Lu [2014] A. J. ZheMing Lu, Tingyuan Nie, Introduction to Information Hiding (in Chinese) (Publishing House of Electronics Industry, 2014).
- Setiadi et al. [2023] D. R. I. M. Setiadi, S. Rustad, P. N. Andono, and G. F. Shidik, Digital image steganography survey and investigation (goal, assessment, method, development, and dataset), Signal Process. 206, 10.1016/j.sigpro.2022.108908 (2023).
- Chen et al. [2023] X. Chen, J. An, Z. Xiong, C. Xing, N. Zhao, F. R. Yu, and A. Nallanathan, Covert communications: A comprehensive survey, IEEE Communications Surveys and Tutorials 25, 1173 (2023).
- Bennett and Brassard [2014] C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Theoretical computer science 560, 7 (2014).
- Bennett [1992] C. H. Bennett, Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett. 68, 3121 (1992).
- Shenoy-Hejamadi et al. [2017] A. Shenoy-Hejamadi, A. Pathak, and S. Radhakrishna, Quantum Cryptography: Key Distribution and Beyond, Quanta 6, 1 (2017), arXiv:1802.05517 [quant-ph] .
- Zhang et al. [2024] Y. Zhang, Y. Bian, Z. Li, S. Yu, and H. Guo, Continuous-variable quantum key distribution system: Past, present, and future, Applied Physics Reviews 11 (2024).
- Long and Liu [2002] G. L. Long and X. S. Liu, Theoretically efficient high-capacity quantum-key-distribution scheme, Phys. Rev. A 65, 032302 (2002).
- Deng et al. [2003] F.-G. Deng, G. L. Long, and X.-S. Liu, Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block, Phys. Rev. A 68, 042317 (2003).
- Pan et al. [2024] D. Pan, G.-L. Long, L. Yin, Y.-B. Sheng, D. Ruan, S. X. Ng, J. Lu, and L. Hanzo, The evolution of quantum secure direct communication: On the road to the qinternet, IEEE Communications Surveys and Tutorials 26, 1898 (2024).
- Nielsen and Chuang [2010] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information (Cambridge university press, 2010).
- Gea-Banacloche [2002] J. Gea-Banacloche, Hiding messages in quantum data, Journal of Mathematical Physics 43, 4531 (2002).
- Shaw and Brun [2011a] B. A. Shaw and T. A. Brun, Hiding quantum information in the perfect code (2011a), arXiv:1007.0793 [quant-ph] .
- Shaw and Brun [2011b] B. A. Shaw and T. A. Brun, Quantum steganography with noisy quantum channels, Phys. Rev. A 83, 022310 (2011b).
- Sutherland and Brun [2019] C. Sutherland and T. A. Brun, Quantum steganography over noisy channels: Achievability and bounds, Phys. Rev. A 100, 052312 (2019).
- Sutherland and Brun [2020] C. Sutherland and T. A. Brun, Quantum steganography over noiseless channels: Achievability and bounds, Phys. Rev. A 101, 052319 (2020).
- Avritzer and Brun [2024] B. Avritzer and T. A. Brun, Quantum steganography via coherent- and fock-state encoding in an optical medium, Phys. Rev. A 109, 032401 (2024).
- Eggeling and Werner [2002] T. Eggeling and R. F. Werner, Hiding classical data in multipartite quantum states, Phys. Rev. Lett. 89, 097905 (2002).
- Liao et al. [2010] X. Liao, Q.-y. Wen, Y. Sun, and J. Zhang, Multi-party covert communication with steganography and quantum secret sharing, Journal of Systems and Software 83, 1801 (2010).
- Mihara [2015] T. Mihara, Quantum steganography using prior entanglement, Physics Letters A 379, 952 (2015).
- Ha and Kim [2024] D. Ha and J. S. Kim, Nonlocal quantum state ensembles and quantum data hiding, Phys. Rev. A 109, 052418 (2024).
- Hao et al. [2024] C. Hao, X. Yang, Q. Ma, D. Qu, R. Wang, and T. Zhang, Quantum audio lsb steganography with entanglement-assisted modulation, Quantum Information Processing 23, 106 (2024).
- Xing et al. [2024] Z. Xing, C.-T. Lam, X. Yuan, S.-K. Im, and P. Machado, Mmqw: Multi-modal quantum watermarking scheme, IEEE Transactions on Information Forensics and Security 19, 5181 (2024).
- Jing-yu et al. [2024] S. Jing-yu, W. Wan-ting, Z. Jun, Z. Shuang, and Z. Hao, Edge detection steganography and quantum circuit design based on a novel fractal chaotic system, Quantum Information Processing 23, 112 (2024).
- Sun et al. [2023] J.-y. Sun, W.-t. Wang, H. Zhang, and J. Zhang, Color image quantum steganography scheme and circuit design based on dwt+ dct+ svd, Physica A: Statistical Mechanics and its Applications 617, 128688 (2023).
- Sun et al. [2022] H. Sun, Z. Qu, L. Sun, X. Chen, and G. Xu, High-efficiency quantum image steganography protocol based on double-layer matrix coding, Quantum Information Processing 21, 165 (2022).
- Min-Allah et al. [2022] N. Min-Allah, N. Nagy, M. Aljabri, M. Alkharraa, M. Alqahtani, D. Alghamdi, R. Sabri, and R. Alshaikh, Quantum image steganography schemes for data hiding: A survey, Applied Sciences 12, 10294 (2022).
- Xing et al. [2023] Z. Xing, C.-T. Lam, X. Yuan, G. Huang, and P. Machado, A novel geometrically invariant quantum watermarking scheme utilizing quantum error correction, Journal of King Saud University-Computer and Information Sciences 35, 101818 (2023).
- Gottesman [1997] D. Gottesman, Stabilizer codes and quantum error correction (California Institute of Technology, 1997).
- Steane [1996] A. M. Steane, Error correcting codes in quantum theory, Phys. Rev. Lett. 77, 793 (1996).
- Devitt et al. [2013] S. J. Devitt, W. J. Munro, and K. Nemoto, Quantum error correction for beginners, Reports on Progress in Physics 76, 076001 (2013).
- Kullback and Leibler [1951] S. Kullback and R. A. Leibler, On information and sufficiency, The annals of mathematical statistics 22, 79 (1951).
- Lee et al. [2022] C. Lee, I. Sohn, and W. Lee, Eavesdropping detection in bb84 quantum key distribution protocols, IEEE Transactions on Network and Service Management 19, 2689 (2022).
- Laflamme et al. [1996] R. Laflamme, C. Miquel, J. P. Paz, and W. H. Zurek, Perfect quantum error correcting code, Phys. Rev. Lett. 77, 198 (1996).