Skip to main content
Log in

A multi-level steganography mechanism using quantum chaos encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recent advances in processing capabilities of hardware devices and 5 g spectrum availability has not only made the life of users heaven but has also instigated intruders to crack the security mechanism easily. Therefore, it is mandatory for the researcher to enhance the level of security incessantly. This paper focuses on developing a multi-level security mechanism that encrypts the text to be transmitted using Quantum cryptography and then encoding it using Huffman compression comprises two levels of security. The resultant data is than hid into noisy pixels of the cover image using the proposed steganography mechanism, consequently enhancing its security level. Also, this paper identifies a Quality Control Parameter (K) for illustration. The higher value of this parameter results in improved embedding capacity with the reduction in pictorial quality and vice versa. The strategies along with its counterpart are implemented in MATLAB-13, and the result shows that the proposed scheme outperforms others in terms of picture quality, Peak Signal to Noise Ratio by almost 10%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Common Nonlinear Sci Num Simul, Elsevier: 4653–4661

  2. Alvarez G, Li S (2006) Some basic cryptography requirement for chaos-based cryptosystem. Int J Bifurcation Chaos 16:2129–2151

    Article  Google Scholar 

  3. Bai J et al (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42–51

    Article  Google Scholar 

  4. Chaudhary D, Gupta S, Deswal S (2015) Origin of Hybrid security mechanism and ways of improvement. Int J Big Data Sec Intell: 1–22. doi:https://doi.org/10.21742/ijbdsi.2015.2.2.01.

    Article  Google Scholar 

  5. Chaudhary D, Gupta S, Kumari M (2016) A novel hybrid security mechanism for data communication networks. Int J Inform Privacy Sec Integrity 2(3):2166–2231

    Google Scholar 

  6. Dhall S et al (2016) An Improved Hybrid Mechanism for Secure Data Communication. I J Comput Netw Inform Sec 8:67–78

    Google Scholar 

  7. EI-Latif AAA, Li L, Wang N, Qi H, Niu X (2012) A new approach to chaotic image encryption based on Quantum Chaotic System, exploiting Color spaces. doi:https://doi.org/10.1016/j.sigpro.2013.03.031

    Article  Google Scholar 

  8. Elhoseny M et al (2018) secure medical data transmission model for iot-based healthcare systems. IEEE Access, Special Sect Inform Sec Solutions Telemed Appl 6:20596–20608

    Google Scholar 

  9. Gokul M, Umeshbabu R, Vasudevan SK (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8

    Google Scholar 

  10. Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant steganography and cryptography. IJ Modern Educ Comput Sci 6:27–34

    Article  Google Scholar 

  11. Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and Cryptography. IJ Modern Educ Comp Sci 6:27–34

    Article  Google Scholar 

  12. Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3DR Express. https://doi.org/10.1007/s13319-015-0062-7

  13. Islam MR, Siddiqa A, Uddin MP (2014) An efficient filtering based approach improving LSB image Steganography using status bit along with AES cryptography. Proc 3rd Int Conf Inform Electron Vision: 1–6

  14. Kumari M et al (2017) A survey of image encryption algorithms. 3D Res: 1–35. doi:https://doi.org/10.1007/s13319-017-0148-5

  15. Malik SA (2013) Securing data by using cryptography with steganography. Int J Adv Res Comp Sci Softw Eng: 404–409, ISSN: 2277-128X

  16. Marwah P (2010) Visual cryptography steganography in images. processing of second International conference on Computing, Communication and networking Technologies: 1–6

  17. Masud Karim SM, Rahman MS (2011) A new approach for LSB based image steganography using secret key. Proceedings of 14th international conference on computer and information Technology: 286–291

  18. Mathe R, Atukuri V, Devireddy SK (2012) Securing Information Cryptography and steganography. Int J Comput Sci Inform Technol: 4251–4255

  19. Mohammad A, Yahya A (2010) Public- Key steganography based on matching method. Eur J Sci Res 40(2):223–231

    Google Scholar 

  20. Nivedhita R, Meyyappan T (2012) Image security using Steganography and Cryptography Techniques. Int J Eng Trends Technol: 366–371.

  21. Nivedhitha R, Meyyappan DT, Phil M (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol: 366–371

  22. Padmavathi V, Vardhan BV, Krishna AVN (2016) Quantum cryptography and quantum key distribution protocols: a survey. 2016 IEEE 6th Int Conf Adv Comput. https://doi.org/10.1109/IACC.2016.109

  23. Ritesh B, Shailender Sharma G (2016) An innovative image encryption scheme based on chaotic map and vigenere scheme. Multimed Tools Appl 1–34. doi:https://doi.org/10.1007/s11042-016-3926-9.

    Article  Google Scholar 

  24. Saha B, Sharma S (2012) Steganographic techniques of data hiding using digital images. Def Sci J: 11–18

  25. Shamir A (1979) How to share a secret comm. ACM 22(11):612–613

    Article  MathSciNet  Google Scholar 

  26. Sharma G, Gupta S, Dhall S, Nagpal CK (2018) Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6226-8

    Article  Google Scholar 

  27. Shingote Parshuram N, Syed A (2014) Advanced security using Cryptography and LSB matching Steganography. Int J Comp Elec Res 3(2):52–55

    Google Scholar 

  28. Siddiqui B, Goswami S (2017) A survey on image steganography using Lsb substitution technique. Int Res J Eng Technol: 345–349

  29. Tayal N, Bansal R, Dhal S, Gupta S (2016) A novel hybrid security mechanisms for data communication networks. https://doi.org/10.1007/s11042-016-4111-x

    Article  Google Scholar 

  30. Tayal N, Bansal R, Gupta S, Dhall S (2016) Analysis of various cryptography techniques: a survey. Int J Sec Appl 10(8):59–92

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shailender Gupta.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhall, S., Sharma, R. & Gupta, S. A multi-level steganography mechanism using quantum chaos encryption. Multimed Tools Appl 79, 1987–2012 (2020). https://doi.org/10.1007/s11042-019-08223-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08223-7

Keywords

Navigation