A multi-level steganography mechanism using quantum chaos encryption

  • Sangeeta Dhall
  • Rinku Sharma
  • Shailender GuptaEmail author


Recent advances in processing capabilities of hardware devices and 5 g spectrum availability has not only made the life of users heaven but has also instigated intruders to crack the security mechanism easily. Therefore, it is mandatory for the researcher to enhance the level of security incessantly. This paper focuses on developing a multi-level security mechanism that encrypts the text to be transmitted using Quantum cryptography and then encoding it using Huffman compression comprises two levels of security. The resultant data is than hid into noisy pixels of the cover image using the proposed steganography mechanism, consequently enhancing its security level. Also, this paper identifies a Quality Control Parameter (K) for illustration. The higher value of this parameter results in improved embedding capacity with the reduction in pictorial quality and vice versa. The strategies along with its counterpart are implemented in MATLAB-13, and the result shows that the proposed scheme outperforms others in terms of picture quality, Peak Signal to Noise Ratio by almost 10%.


Quality control parameter Quantum chaos encryption Steganography 



  1. 1.
    Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Common Nonlinear Sci Num Simul, Elsevier: 4653–4661Google Scholar
  2. 2.
    Alvarez G, Li S (2006) Some basic cryptography requirement for chaos-based cryptosystem. Int J Bifurcation Chaos 16:2129–2151CrossRefGoogle Scholar
  3. 3.
    Bai J et al (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42–51CrossRefGoogle Scholar
  4. 4.
    Chaudhary D, Gupta S, Deswal S (2015) Origin of Hybrid security mechanism and ways of improvement. Int J Big Data Sec Intell: 1–22. doi: Scholar
  5. 5.
    Chaudhary D, Gupta S, Kumari M (2016) A novel hybrid security mechanism for data communication networks. Int J Inform Privacy Sec Integrity 2(3):2166–2231Google Scholar
  6. 6.
    Dhall S et al (2016) An Improved Hybrid Mechanism for Secure Data Communication. I J Comput Netw Inform Sec 8:67–78Google Scholar
  7. 7.
    EI-Latif AAA, Li L, Wang N, Qi H, Niu X (2012) A new approach to chaotic image encryption based on Quantum Chaotic System, exploiting Color spaces. doi: CrossRefGoogle Scholar
  8. 8.
    Elhoseny M et al (2018) secure medical data transmission model for iot-based healthcare systems. IEEE Access, Special Sect Inform Sec Solutions Telemed Appl 6:20596–20608Google Scholar
  9. 9.
    Gokul M, Umeshbabu R, Vasudevan SK (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8Google Scholar
  10. 10.
    Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant steganography and cryptography. IJ Modern Educ Comput Sci 6:27–34CrossRefGoogle Scholar
  11. 11.
    Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and Cryptography. IJ Modern Educ Comp Sci 6:27–34CrossRefGoogle Scholar
  12. 12.
    Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3DR Express.
  13. 13.
    Islam MR, Siddiqa A, Uddin MP (2014) An efficient filtering based approach improving LSB image Steganography using status bit along with AES cryptography. Proc 3rd Int Conf Inform Electron Vision: 1–6Google Scholar
  14. 14.
    Kumari M et al (2017) A survey of image encryption algorithms. 3D Res: 1–35. doi:
  15. 15.
    Malik SA (2013) Securing data by using cryptography with steganography. Int J Adv Res Comp Sci Softw Eng: 404–409, ISSN: 2277-128XGoogle Scholar
  16. 16.
    Marwah P (2010) Visual cryptography steganography in images. processing of second International conference on Computing, Communication and networking Technologies: 1–6Google Scholar
  17. 17.
    Masud Karim SM, Rahman MS (2011) A new approach for LSB based image steganography using secret key. Proceedings of 14th international conference on computer and information Technology: 286–291Google Scholar
  18. 18.
    Mathe R, Atukuri V, Devireddy SK (2012) Securing Information Cryptography and steganography. Int J Comput Sci Inform Technol: 4251–4255Google Scholar
  19. 19.
    Mohammad A, Yahya A (2010) Public- Key steganography based on matching method. Eur J Sci Res 40(2):223–231Google Scholar
  20. 20.
    Nivedhita R, Meyyappan T (2012) Image security using Steganography and Cryptography Techniques. Int J Eng Trends Technol: 366–371.Google Scholar
  21. 21.
    Nivedhitha R, Meyyappan DT, Phil M (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol: 366–371Google Scholar
  22. 22.
    Padmavathi V, Vardhan BV, Krishna AVN (2016) Quantum cryptography and quantum key distribution protocols: a survey. 2016 IEEE 6th Int Conf Adv Comput.
  23. 23.
    Ritesh B, Shailender Sharma G (2016) An innovative image encryption scheme based on chaotic map and vigenere scheme. Multimed Tools Appl 1–34. doi: Scholar
  24. 24.
    Saha B, Sharma S (2012) Steganographic techniques of data hiding using digital images. Def Sci J: 11–18Google Scholar
  25. 25.
    Shamir A (1979) How to share a secret comm. ACM 22(11):612–613MathSciNetCrossRefGoogle Scholar
  26. 26.
    Sharma G, Gupta S, Dhall S, Nagpal CK (2018) Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing. Multimed Tools Appl. CrossRefGoogle Scholar
  27. 27.
    Shingote Parshuram N, Syed A (2014) Advanced security using Cryptography and LSB matching Steganography. Int J Comp Elec Res 3(2):52–55Google Scholar
  28. 28.
    Siddiqui B, Goswami S (2017) A survey on image steganography using Lsb substitution technique. Int Res J Eng Technol: 345–349Google Scholar
  29. 29.
    Tayal N, Bansal R, Dhal S, Gupta S (2016) A novel hybrid security mechanisms for data communication networks. CrossRefGoogle Scholar
  30. 30.
    Tayal N, Bansal R, Gupta S, Dhall S (2016) Analysis of various cryptography techniques: a survey. Int J Sec Appl 10(8):59–92Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Sangeeta Dhall
    • 1
  • Rinku Sharma
    • 1
  • Shailender Gupta
    • 1
    Email author
  1. 1.YMCA University of Science and TechnologyFaridabadIndia

Personalised recommendations