Abstract
Recent advances in processing capabilities of hardware devices and 5 g spectrum availability has not only made the life of users heaven but has also instigated intruders to crack the security mechanism easily. Therefore, it is mandatory for the researcher to enhance the level of security incessantly. This paper focuses on developing a multi-level security mechanism that encrypts the text to be transmitted using Quantum cryptography and then encoding it using Huffman compression comprises two levels of security. The resultant data is than hid into noisy pixels of the cover image using the proposed steganography mechanism, consequently enhancing its security level. Also, this paper identifies a Quality Control Parameter (K) for illustration. The higher value of this parameter results in improved embedding capacity with the reduction in pictorial quality and vice versa. The strategies along with its counterpart are implemented in MATLAB-13, and the result shows that the proposed scheme outperforms others in terms of picture quality, Peak Signal to Noise Ratio by almost 10%.
Similar content being viewed by others
References
Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Common Nonlinear Sci Num Simul, Elsevier: 4653–4661
Alvarez G, Li S (2006) Some basic cryptography requirement for chaos-based cryptosystem. Int J Bifurcation Chaos 16:2129–2151
Bai J et al (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42–51
Chaudhary D, Gupta S, Deswal S (2015) Origin of Hybrid security mechanism and ways of improvement. Int J Big Data Sec Intell: 1–22. doi:https://doi.org/10.21742/ijbdsi.2015.2.2.01.
Chaudhary D, Gupta S, Kumari M (2016) A novel hybrid security mechanism for data communication networks. Int J Inform Privacy Sec Integrity 2(3):2166–2231
Dhall S et al (2016) An Improved Hybrid Mechanism for Secure Data Communication. I J Comput Netw Inform Sec 8:67–78
EI-Latif AAA, Li L, Wang N, Qi H, Niu X (2012) A new approach to chaotic image encryption based on Quantum Chaotic System, exploiting Color spaces. doi:https://doi.org/10.1016/j.sigpro.2013.03.031
Elhoseny M et al (2018) secure medical data transmission model for iot-based healthcare systems. IEEE Access, Special Sect Inform Sec Solutions Telemed Appl 6:20596–20608
Gokul M, Umeshbabu R, Vasudevan SK (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8
Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant steganography and cryptography. IJ Modern Educ Comput Sci 6:27–34
Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and Cryptography. IJ Modern Educ Comp Sci 6:27–34
Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3DR Express. https://doi.org/10.1007/s13319-015-0062-7
Islam MR, Siddiqa A, Uddin MP (2014) An efficient filtering based approach improving LSB image Steganography using status bit along with AES cryptography. Proc 3rd Int Conf Inform Electron Vision: 1–6
Kumari M et al (2017) A survey of image encryption algorithms. 3D Res: 1–35. doi:https://doi.org/10.1007/s13319-017-0148-5
Malik SA (2013) Securing data by using cryptography with steganography. Int J Adv Res Comp Sci Softw Eng: 404–409, ISSN: 2277-128X
Marwah P (2010) Visual cryptography steganography in images. processing of second International conference on Computing, Communication and networking Technologies: 1–6
Masud Karim SM, Rahman MS (2011) A new approach for LSB based image steganography using secret key. Proceedings of 14th international conference on computer and information Technology: 286–291
Mathe R, Atukuri V, Devireddy SK (2012) Securing Information Cryptography and steganography. Int J Comput Sci Inform Technol: 4251–4255
Mohammad A, Yahya A (2010) Public- Key steganography based on matching method. Eur J Sci Res 40(2):223–231
Nivedhita R, Meyyappan T (2012) Image security using Steganography and Cryptography Techniques. Int J Eng Trends Technol: 366–371.
Nivedhitha R, Meyyappan DT, Phil M (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol: 366–371
Padmavathi V, Vardhan BV, Krishna AVN (2016) Quantum cryptography and quantum key distribution protocols: a survey. 2016 IEEE 6th Int Conf Adv Comput. https://doi.org/10.1109/IACC.2016.109
Ritesh B, Shailender Sharma G (2016) An innovative image encryption scheme based on chaotic map and vigenere scheme. Multimed Tools Appl 1–34. doi:https://doi.org/10.1007/s11042-016-3926-9.
Saha B, Sharma S (2012) Steganographic techniques of data hiding using digital images. Def Sci J: 11–18
Shamir A (1979) How to share a secret comm. ACM 22(11):612–613
Sharma G, Gupta S, Dhall S, Nagpal CK (2018) Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6226-8
Shingote Parshuram N, Syed A (2014) Advanced security using Cryptography and LSB matching Steganography. Int J Comp Elec Res 3(2):52–55
Siddiqui B, Goswami S (2017) A survey on image steganography using Lsb substitution technique. Int Res J Eng Technol: 345–349
Tayal N, Bansal R, Dhal S, Gupta S (2016) A novel hybrid security mechanisms for data communication networks. https://doi.org/10.1007/s11042-016-4111-x
Tayal N, Bansal R, Gupta S, Dhall S (2016) Analysis of various cryptography techniques: a survey. Int J Sec Appl 10(8):59–92
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dhall, S., Sharma, R. & Gupta, S. A multi-level steganography mechanism using quantum chaos encryption. Multimed Tools Appl 79, 1987–2012 (2020). https://doi.org/10.1007/s11042-019-08223-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08223-7