Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ferjanimy/quantum_steganography
Implementation of Text based Quantum Stagenography using Qiskit
https://github.com/ferjanimy/quantum_steganography
encryption qchack qchack2021 qchack21 qiskit quantum-computing quantum-cryptography quantum-steganography steganography
Last synced: 5 days ago
JSON representation
Implementation of Text based Quantum Stagenography using Qiskit
- Host: GitHub
- URL: https://github.com/ferjanimy/quantum_steganography
- Owner: FerjaniMY
- Created: 2021-04-16T14:14:17.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-04-25T03:30:49.000Z (over 3 years ago)
- Last Synced: 2023-10-05T21:34:19.191Z (about 1 year ago)
- Topics: encryption, qchack, qchack2021, qchack21, qiskit, quantum-computing, quantum-cryptography, quantum-steganography, steganography
- Language: Jupyter Notebook
- Homepage:
- Size: 95.7 KB
- Stars: 2
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## Quantum_Steganography
- ![image](./images/4-Figure2-1.png)# Introduction
Steganography is a technique hiding secret information within innocent-looking information (e.g., text, audio, image, video, and so on). In this project, we propose a quantum steganography protocol using plain text as innocent-looking in-formation called cover data.
The data is encoded to the quantum circuit using Breinstein Vazirani Algorithm.
Stego data is constructed by modifying cover data, i.e., stego data is made by embedding a secret message to cover data. To encode/decode the data, we use symmetric encryption, here we used XOR operation (we can replace it by a more complex hash functions).
The communication channel is secured using BB84 protocol, that can prevent the attacker to decode the hidden message without knowing the key.
# Advantages over cryptographySteganography is distinct from cryptography, but using both together can help improve the security of the protected information and prevent detection of the secret communication. If steganographically-hidden data is also encrypted, the data may still be safe from detection -- though the channel will no longer be safe from detection. There are advantages to using steganography combined with encryption over encryption-only communication.
The primary advantage of using steganography to hide data over encryption is that it helps obscure the fact that there is sensitive data hidden in the file or other content carrying the hidden text. Whereas an encrypted file, message or network packet payload is clearly marked and identifiable as such, using steganographic techniques helps to obscure the presence of the secure channel.
# QC Hack
- This project was submitted to the QCHack Hackthon, we won the Grand prize for the IBM Creative Challenge.
- [Presentation](https://www.canva.com/design/DAEbXXyw0fU/view)# Deployed Application
https://qc-hacks.herokuapp.com