Multi-Layered Security Framework Combining Steganography and DNA Coding
Abstract
:1. Introduction
1.1. Potential Misuse and Ethical Considerations
1.2. Research Motivation and Contribution
- (1)
- Development of a multi-layered security framework. This is done by integrating multiple encryption and encoding mechanisms for enhanced protection.
- (2)
- Balancing security and computational efficiency. This can be evaluated through the trade-off between encryption and strengthened processing overhead.
- (3)
- Experimental validation. This is achieved through performance analysis across various data types.
- Section 2: In this section, we present a literature review with a comparative analysis of existing methodologies.
- Section 3: In this section, we provide the mathematical foundations required for the proposed approach.
- Section 4: In this section, we detail the data embedding and extraction processes.
- Section 5: In this section, we evaluate the proposed framework through experimental results and analysis.
- Section 6: Lastly, the key findings, ethical considerations, and future research directions are provided.
2. Literature Review
3. Mathematical Preliminaries
3.1. Plain Text Representation
3.2. Bitstream Splitting for RGB Channels
3.3. Logistic Map for Key Generation
3.4. Key Generation via Thresholding
3.5. XOR Encryption
4. Proposed Work
4.1. Data-Embedding Process
- Stage 1: XOR encryption
- Stage 2: Data Conversion to QR Code
- Stage 3: DNA Encoding
- Stage 4: LSB Embedding
- Embedding QR Code in LSB:
- Combining RGB Channels:
Algorithm 1 Data encryption and embedding in stego images. |
Stage 1: Data Encryption
Stages 2 and 3: Data Conversion to the QR Code and DNA Encoding
Stage 4: LSB Embedding
|
4.2. Data Extraction Process
- Stage 1: LSB Extraction
- Stage 2: DNA Decoding
- Stage 3: QR Code Decoding
- Stage 4: XOR Decryption
- Step 1: Regenerate the encryption key
- Step 2: XOR decryption
- Step 3: Recombine the bitstreams
Algorithm 2 Extracting and decoding embedded data in the stego image. |
Stage 1: LSB Extraction
Stage 2: DNA Decoding
Stage 3: QR Code Decoding
Stage 4: XOR Decryption
Stage 5: Recombine bitstreams
|
4.3. Robustness Analysis
5. Result and Analysis
5.1. The Impact of Multi-Layered Processing on Media Size
5.2. Comparative Discussion with Traditional Steganographic Methods
5.3. Experimental Result for Text Message
- (1)
- Encryption and decryption times: Figure 2 illustrates that encryption and decryption times grow with the size of the stego image. Larger photos take more processing resources to handle the additional data, therefore, this trend is to be expected. For example, the encryption duration increases from 9.32 milliseconds for a 5 MB cover image to 14.26 milliseconds for a 30 MB cover image. Similarly, decryption time rises from 10.52 to 15.72 milliseconds.
- (2)
- Mean squared error (MSE): The MSE, which quantifies the average squared difference between the original and stego images, is consistently low across varied cover image sizes, as seen in Figure 3. This shows that the distortion caused by embedding the data is negligible. The MSE reduces as the cover picture size grows, implying that larger images preserve image quality more effectively.
- (3)
- PSNR (peak signal-to-noise ratio): PSNR values, which reflect the quality of the stego images relative to the original images, are presented in Figure 4. They rise with the cover image size. For example, the PSNR increases from 73.41 dB for a 5 MB cover image to 87.87 dB for a 30 MB cover image. Higher PSNR values correspond to better image quality and less noticeable distortion.
- (4)
- Signal-to-noise ratio (SNR): SNR values increase with the cover image size, from 81.35 dB for a 5 MB image to 89.53 dB for a 30 MB image, as illustrated in Figure 5. Higher SNR values demonstrate that the stego images maintain excellent quality with minimal noise, allowing for effective data concealment without significantly reducing image fidelity.
5.4. Experimental Result for Text File
- (1)
- Stego image size: The stego image size increases with the secret text file size. For example, embedding a 1 KB text file into a 10 MB cover image results in a 21 MB stego image, while a 10 KB text file leads to a 37 MB stego image. Larger text files require more space, which accounts for the stego image size increase.
- (2)
- Encryption and decryption times: Encryption and decryption times increase with the size of the cover image and text content. For 10 MB cover images, encryption takes 9.06 to 13.46 milliseconds, while for 30 MB images, it takes 10.32 to 13.41 milliseconds. Decryption times range from 13.57 to 47.2 milliseconds, reflecting the greater computational power needed for larger data.
- (3)
- Mean squared error (MSE): MSE scores decrease as the text file size increases for the same cover image size, indicating less distortion in stego images. For instance, with a 30 MB cover image, the MSE drops from 0.0762 for a 1 KB text file to 0.0118, reflecting improved quality with larger cover photos.
- (4)
- Peak signal-to-noise ratio (PSNR): PSNR values increase with the cover picture size. For instance, PSNR goes from 64.43 dB for a 10 KB text in a 10 MB image to 82.45 dB for a 1 KB text in a 30 MB image. Higher PSNR indicates better image quality preservation and more effective text hiding.
- (5)
- Signal-to-noise ratio (SNR): SNR values, like PSNR, increase as the cover image size increases. For example, SNR improves from 71.71 dB for a 10 KB text file in a 30 MB cover image to 85.2 dB for a 1 KB text file in the same cover image. Higher SNR values indicate that the approach can maintain good quality when embedding data.
5.5. Experimental Results for Image
5.5.1. Visual Analysis
5.5.2. Entropy and Standard Deviation
5.5.3. Differential Analysis
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Guo, L.; Yan, B.; Shen, Y. Study on Secure System Architecture of IOT. Inf. Secur. Commun. Priv. 2010, 12, 42. [Google Scholar]
- Raghunandan, K.R.; Ganesh, A.; Surendra, S.; Bhavya, K. Key generation using generalized Pell’s equation in public key cryptography based on the prime fake modulus principle to image encryption and its security analysis. Cybern. Inf. Technol. 2020, 20, 86–101. [Google Scholar] [CrossRef]
- Ramesh, R.K.; Dodmane, R.; Shetty, S.; Aithal, G.; Sahu, M.; Sahu, A.K. A Novel and Secure Fake-Modulus Based Rabin- Cryptosystem. Cryptography 2023, 7, 44. [Google Scholar] [CrossRef]
- Rainie, L.; Kiesler, S.; Kang, R.; Madden, M.; Duggan, M.; Brown, S.; Dabbish, L. Anonymity, Privacy, and Security Online; Pew Research Center: Washington, DC, USA, 2013. [Google Scholar]
- Kothmayr, T.; Schmitt, C.; Hu, W.; Brünig, M.; Carle, G. DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 2013, 11, 2710–2723. [Google Scholar] [CrossRef]
- Sreekutty, M.S.; Baiju, P.S. Security enhancement in image steganography for medical integrity verification system. In Proceedings of the 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Kollam, India, 20–21 April 2017; pp. 1–5. [Google Scholar]
- Al-Saraireh, J.A. Hvm: A Method For Improving The Performance Of Executing Sql-Query Over Encrypted Database. J. Theor. Appl. Inf. Technol. 2017, 95, 3394–3402. [Google Scholar]
- Tirthani, N.; Ganesan, R. Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography. IACR Cryptol. ePrint Arch. 2014. Available online: https://eprint.iacr.org/2014/049 (accessed on 21 April 2025).
- Hasib, A.A.; Haque, A.A.M.M. A comparative study of the performance and security issues of AES and RSA cryptography. In Proceedings of the Third International Conference on Convergence and Hybrid Information Technology (ICCIT’08), Busan, Republic of Korea, 11–13 November 2008; Volume 2, pp. 505–510. [Google Scholar]
- Inzunza-González, E.; Cruz-Hernández, C.; López-Gutiérrez, R.; García-Guerrero, E.; Cardoza-Avendaño, L.; Serrano-Guerrero, H. Software to Encrypt Messages Using Public-Key Cryptography. World Acad. Sci. Eng. Technol. 2009, 54, 1616–1620. [Google Scholar]
- Goshwe, N.Y. Data Encryption and Decryption Using RSA Algorithm in a Network Environment. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 2013, 13, 10. [Google Scholar]
- Chang, C.C.; Lee, C.Y. A Smart Card-based Authentication Scheme Using User Identify Cryptography. IJ Netw. Secur. 2013, 15, 139–147. [Google Scholar]
- Dhillon, J. Symmetric and Asymmetric Cryptography Algorithm for Improving Data Security. Int. J. Sci. Eng. Technol. 2014, 3, 1123–1125. [Google Scholar]
- Adale, D.A. Hybrid Information Security Models: Crypto-Steg And Steg-Crypto Systems. Ph.D. Thesis, Howard University, Washington, DC, USA, 2011. [Google Scholar]
- Rahim, R.; Nurdiyanto, H.; Hidayat, R.; Ahmar, A.S.; Siregar, D.; Siahaan, A.P.U.; Zamsuri, A. Combination Base64 Algorithm and EOF Technique for Steganography. J. Phys. Conf. Ser. 2018, 1007, 012003. [Google Scholar] [CrossRef]
- Abood, M.H. An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms. In Proceedings of the 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, Iraq, 7–9 March 2017; pp. 86–90. [Google Scholar]
- Parah, S.A.; Sheikh, J.A.; Akhoon, J.A.; Loan, N.A.; Bhat, G.M. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection. Multimed. Tools Appl. 2018, 77, 185–207. [Google Scholar] [CrossRef]
- Saraireh, S.S.; Saraireh, M.S.; Saraireh, S.S.; Saraireh, M.S. Filter Bank Block Cipher and LSB Based Steganography for Secure Data Exchange. Int. J. Commun. Antenna Propag. 2017, 7, 1. [Google Scholar] [CrossRef]
- Altameem, A.; P, P.; Poonia, R.C.; Saudagar, A.K.J. A hybrid AES with a chaotic map-based biometric authentication framework for IoT and industry 4.0. Systems 2023, 11, 28. [Google Scholar] [CrossRef]
- Wu, Y.; Xie, X.; Zhu, J.; Guan, L.; Li, M. Overview and Prospects of DNA Sequence Visualization. Int. J. Mol. Sci. 2025, 26, 477. [Google Scholar] [CrossRef]
- Zhu, Y.; Wang, C.; Sun, J.; Yu, F. A chaotic image encryption method based on the artificial fish swarms algorithm and the DNA coding. Mathematics 2023, 11, 767. [Google Scholar] [CrossRef]
- Gabr, M.; Younis, H.; Ibrahim, M.; Alajmy, S.; Khalid, I.; Azab, E.; Elias, R.; Alexan, W. Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem. Symmetry 2022, 14, 2559. [Google Scholar] [CrossRef]
- Mawla, N.A.; Khafaji, H.K. Enhancing data security: A cutting-edge approach utilizing protein chains in cryptography and steganography. Computers 2023, 12, 166. [Google Scholar] [CrossRef]
- Balaram, A.; Kannan, K.N.; Čepová, L.; Kumar M, K.; Rani B, S.; Schindlerova, V. Artificial Intelligence for Media Ecological Integration and Knowledge Management. Systems 2023, 11, 222. [Google Scholar] [CrossRef]
- Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
- Taha, M.S.; Mohd Rahim, M.S.; Lafta, S.A.; Hashim, M.M.; Alzuabidi, H.M. Combination of Steganography and Cryptography: A short Survey. IOP Conf. Ser. Mater. Sci. Eng. 2019, 518, 052003. [Google Scholar] [CrossRef]
- Douglas, M.; Bailey, K.; Leeney, M.; Curran, K. An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 2018, 77, 17333–17373. [Google Scholar] [CrossRef]
- AL-Shaaby, A.; AlKharobi, T. Cryptography and Steganography: New Approach. Trans. Netw. Commun. 2017, 5, 25–38. [Google Scholar] [CrossRef]
- Arya, A.; Soni, S. A Literature Review on Various Recent Steganography Techniques. Int. J. Future Revolut. Comput. Sci. Commun. Eng. 2018, 4, 143–149. [Google Scholar]
- Kasapbas, M.; Elmasry, W. New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check. Sådhanå 2018, 43, 68. [Google Scholar] [CrossRef]
- Pelosi, M.; Poudel, N.; Lamichhane, P.; Soomro, D. Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer. Adv. Sci. Technol. Eng. Syst. J. 2018, 3, 271–282. [Google Scholar] [CrossRef]
- Rahmani, K.; Arora, K.; Pal, N. A Crypto-Steganography: A Survey. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2014, 5, 149–155. [Google Scholar]
- Aung, P.P.; Naing, T.M. A novel secure combination technique of steganography and cryptography. Int. J. Inf. Technol. Model. Comput. (IJITMC) 2014, 2, 55–62. [Google Scholar] [CrossRef]
- Das, R.; Das, I. Secure Data Transfer in IoT environment: Adopting both Cryptography and Steganography techniques. In Proceedings of the IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), Kolkata, India, 23–25 September 2016. [Google Scholar]
- Alsamaraee, S.; Ali, A.S. A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system. Bull. Electr. Eng. Inform. 2022, 11, 3539–3550. [Google Scholar] [CrossRef]
- Gambhir, A.; Khara, S. Integrating RSA Cryptography & Audio Steganography. In Proceedings of the IEEE ICCCA, Greater Noida, India, 29–30 April 2016. [Google Scholar]
- Mukhedkar, M.; Powar, P.; Gaikwad, P. Secure non real time image encryption algorithm development using cryptography & Steganography. In Proceedings of the IEEE INDICON, New Delhi, India, 17–20 December 2015. [Google Scholar]
- Pratama, I. Increasing the Security of MP3 Steganography Using AES Encryption and MD5 Hash Function. In Proceedings of the International Conference on Science and Technology-Computer (ICST), Yogyakarta, Indonesia, 27–28 October 2016. [Google Scholar]
- Al-Otaibi, N.A.; Gutub, A.A. 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers. Lect. Notes Inf. Theory 2014, 2, 151–157. [Google Scholar] [CrossRef]
- Gawanda, S.H.; Pawar, P.Y. M-Commerce Security Using random LSB Steganography and Cryptography. Int. J. Mach. Learn. Comput. 2012, 2, 427. [Google Scholar]
- Al-Kateeb, Z.N.; Jader, M. Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA. Multimed. Tools Appl. 2024, 84, 1211–1237. [Google Scholar]
- Osman, O.M.; Kanona, M.E.A.; Hassan, M.K.; Elkhair, A.A.E.; Mohamed, K.S. Hybrid multistage framework for data manipulation by combining cryptography and steganography. Bull. Electr. Eng. Inform. 2022, 11, 327–335. [Google Scholar] [CrossRef]
- Gu, G.; Han, G. An enhanced chaos based image encryption algorithm. In Proceedings of the First International Conference on Innovative Computing, Information and Control—Volume I (ICICIC’06), Beijing, China, 30 August–1 September 2006; Volume 1, pp. 492–495. [Google Scholar]
- Wani, M.A.; Sultan, B. Deep learning based image steganography: A review. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2023, 13, e1481. [Google Scholar] [CrossRef]
- Kavitha, V.; Sruthi, G.S.; Thoshinny, B.; Riduvarshini, S.R. Stagchain—A steganography based application working on a blockchain environment. In Proceedings of the 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 17–19 August 2022; pp. 674–681. [Google Scholar]
- Rao, S.; Pandey, V. Enhancing Steganographic Techniques with Artificial Intelligence. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 97–104. [Google Scholar]
- Kumar, R.; Kumar, H. Secure Communication Protocol Using Elliptic Curve Cryptography and Image Steganography. Int. J. Comput. Appl. 2019, 182, 25–32. [Google Scholar]
- Dhar, S.; Sahu, A.K. Digital to quantum watermarking: A journey from past to present and into the future. Comput. Sci. Rev. 2024, 54, 100679. [Google Scholar] [CrossRef]
- Gupta, P.; Sharma, M. Homomorphic Encryption and Audio Steganography for Secure Data Transmission. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1283–1293. [Google Scholar]
- Abd, A.; Hussein, E. Design secure multi-level communication system based on duffing chaotic map and steganography. Indones. J. Electr. Eng. Comput. Sci. 2022, 25, 238–246. [Google Scholar] [CrossRef]
- Khudhair, K.S.; Sahu, M.; Raghunandan, K.R.; Sahu, A.K. Secure Reversible Data Hiding Using Block-Wise Histogram Shifting. Electronics 2023, 12, 1222. [Google Scholar] [CrossRef]
- Saini, P.; Kumar, R. DNA Cryptography and Image Steganography for Secure Data Transmission. J. Syst. Softw. 2020, 160, 110482. [Google Scholar]
- Gupta, A.; Sharma, D. Attribute-Based Encryption and Steganography for Secure Cloud Storage. IEEE Cloud Comput. 2021, 8, 45–54. [Google Scholar]
- Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
- Chu, L.; Su, Y.; Yao, X.; Xu, P.; Liu, W. A Review of DNA Cryptography. Intell. Comput. 2025, 4, 0106. [Google Scholar] [CrossRef]
- Fetteha, M.A.; Sayed, W.S.; Said, L.A. A lightweight image encryption scheme using dna coding and chaos. Electronics 2023, 12, 4895. [Google Scholar] [CrossRef]
- Gehani, A.; LaBean, T.; Reif, J. DNA-based cryptography. In Aspects of Molecular Computing: Essays Dedicated to Tom Head, on the Occasion of His 70th Birthday; Springer: Berlin/Heidelberg, Germany, 2004; pp. 167–188. [Google Scholar]
- Turab, N.M.; Abu-Alhaija, M.; Owida, H.A.; Al-Nabulsi, J.I. A Survey On Dna Cryptographic Techniques, Challenges and Future Trends. Webology 2022, 19, 7178–7194. [Google Scholar]
- Chen, L.; Li, C.; Li, C. Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent. 2022, 83, 103424. [Google Scholar] [CrossRef]
- Patel, N.; Meena, S. LSB Based Image Steganography Using Dynamic Key Cryptography. In Proceedings of the International Conference on Emerging Trends in Communication Technologies (ETCT), Dehradun, India, 18–19 November 2016. [Google Scholar]
- Garg, N.; Verma, S. Secure Image Transmission Using AES and Frequency Domain Steganography. Multimed. Tools Appl. 2019, 78, 27645–27658. [Google Scholar]
- ISO/IEC 18004:2000; Information Technology—Automatic Identification and Data Capture Techniques—Bar Code Symbology—QR Code. International Organization for Standardization and International Electrotechnical Commission: Geneva, Switzerland, 2000. Available online: https://cdn.standards.iteh.ai/samples/30789/795f08fcf6c444eba142f8036ada6f8d/ISO-IEC-18004-2000.pdf (accessed on 21 April 2025).
- Chao, W.; Wenhui, W.; Jiahan, D.; Guangxin, G. Research on Network Intrusion Detection Technology Based on DCGAN. In Proceedings of the 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 12–14 March 2021; pp. 1418–1422. [Google Scholar] [CrossRef]
- Deng, X.; Zhang, F.; Jin, H. Data Anonymization for Big Crowdsourcing Data. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France, 29 April–2 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Rao, T.; Rajasekhar, N.; Rajinikanth, T.V.; Sundar, S.K. Classification of remote sensed data using linear kernel based support vector machines. In Proceedings of the 2013 International Conference on Control Communication and Computing (ICCC), Thiruvananthapuram, India, 13–15 December 2013; pp. 22–27. [Google Scholar] [CrossRef]
- Raghunandan, K.R.; Aithal, G.; Shetty, S.; Bhavya, K. Image encryption scheme in public key cryptography based on cubic Pells quadratic case. Indones. J. Electr. Eng. Comput. Sci. 2020, 20, 385–394. [Google Scholar] [CrossRef]
- Raghunandan, K.R.; Dodmane, R.; Bhavya, K.; Rao, N.S.K.; Sahu, A.K. Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing. IEEE Access 2023, 11, 3545–3554. [Google Scholar] [CrossRef]
- Raghunandan, K.R.; Nireshwalya, S.N.; Sudhir, S.; Bhat, M.S.; Tanvi, H.M. Securing Media Information Using Hybrid Transposition Using Fisher Yates Algorithm and RSA Public Key Algorithm Using Pell’s Cubic Equation. In Advances in Artificial Intelligence and Data Engineering; Springer: Singapore, 2021. [Google Scholar]
Work by (With Citations) | Method Used | Steganography Method | Cryptography Method | Limitation/Remarks |
---|---|---|---|---|
Riya Das et al. [34] | Secure data transmission protocol combining cryptography and steganography for IoT devices | LSB embedding | Hash function-based, general cryptography | Dual-layer security for IoT and home/cloud servers; improves data authenticity |
Ankit Gambhir et al. [36] | RSA cryptography with audiovisual steganography; embeds encrypted data in LSB of audio-visual signals | LSB in audiovisual media | RSA encryption | Limited to audiovisual media |
Moresh Mukhedkar et al. [37] | Transformation of lead-acid battery industry data using Blowfish algorithm; image embedded in the ELSB matrix | Enhanced LSB (ELSB) embedding | Blowfish encryption | Secure encapsulation method for data storage and transmission |
Irfan Pratama et al. [38] | AES encryption on MP3 files, protected with the MD5 hash function | Not specified | AES encryption, MD5 hashing | Protects data from tampering but limited to MP3 files |
Nikhil Patel, Shweta Mein, et al. [60] | Secret communication using space domain steganography and glyph-based hidden channel | Glyph-based space domain | None | Provides secure, unintelligible communication without size alteration |
S. H. Gawanda et al. [40] | AES-based security for e-commerce and m-commerce with LSB approach | LSB embedding | AES encryption | Limited to 16-bit and 128-bit keys; fends off DoS attacks |
Nouf A. Al-Otaibi et al. [39] | LSB steganography combined with DES encryption for dual-layer security | LSB embedding | DES encryption | DES has some security limitations but increases hiding capacity |
Samar Kamil et al. [51] | Reversible data hiding based on cover image pixel distribution | RDH based on peak/zero pixel distribution | None | Limits applicability to reversible data hiding scenarios |
Moresh Mukhedkar et al. [37] | Hybrid encryption with Blowfish algorithm and LSB embedding for image security | LSB embedding | Blowfish encryption | Dual-layer security improves resistance to tampering |
Suman Chatterjee et al. [43] | Chaotic map-based key generation for enhancing encryption unpredictability | None | Chaotic sequence-based cryptography | Strengthens encryption resistance but complex to implement |
Rakesh and Harish Kumar [47] | ECC with image steganography for secure communication protocol | Image-based steganography | ECC | ECC requires smaller key sizes; suitable for lightweight secure systems |
Amit Kumar Singh et al. [48] | Quantum cryptography combined with digital watermarking for unbreakable encryption | Digital watermarking | Quantum encryption | Quantum cryptography is resource-intensive |
Rohan Mehta et al. [45] | Blockchain with multimedia steganography for secure data storage | Multimedia-based steganography | Blockchain | Steganography and blockchain require high storage; suitable for secure data management |
Sneha Rao and Vishal Pandey [46] | AI-driven steganographic embedding optimized for multimedia | AI-optimized steganography | None | Balances data hiding and imperceptibility |
Kartik Shah et al. [44] | Neural network-based steganography and cryptography for enhanced security | AI-driven steganography | AI-based cryptography | Deep learning improves robustness but requires training on large datasets |
Naveen Garg and Saurabh Verma [61] | AES with frequency domain steganography for secure image transmission | Frequency domain embedding | AES encryption | Effective but complex implementation due to frequency domain methods |
Pooja Saini and Rajeev Kumar [52] | DNA cryptography with image steganography for secure data transmission | Image-based steganography | DNA cryptography | Complex encoding due to DNA structure; unique biological encryption approach |
Alok Gupta and Deepak Sharma [53] | ABE with steganography for secure cloud storage | Multimedia steganography | Attribute-based encryption (ABE) | Limited to authorized users; access control improves security |
Osman et al. [42] | Hybrid multi-stage framework with OTP encryption and LSB steganography | Sequential and pseudo-random LSB embedding | OTP encryption | Balances efficiency and security, no effect on image resolution |
Abd et al. [50] | Image steganography with chaotic Duffing map for robust data concealment | LSB embedding with chaotic Duffing map | None | High PSNR and low MSE ensure imperceptibility |
Alsamaraee et al. [35] | Crypto-steganography using HAC and Bézier curve-based ECC with BIGM and IPM for IoT | Bit Interchange (BIGM) and Image Partitioning (IPM) | HAC (hybrid additive cryptography) with ECC | Enhanced imperceptibility but computationally intensive for IoT |
Kateeb et al. [41] | Multistage encryption with Caesar and Vigenère Ciphers, Morse code, and LSB embedding | LSB embedding for Morse code | Caesar and Vigenère ciphers | Multilayer approach enhances security but adds complexity |
Factor | Description |
---|---|
Security | XOR encryption with a chaotic key strengthens protection. |
Robustness | QR codes enable error correction for minor distortions. |
Efficiency | Fast processing with lightweight decryption operations. |
Accuracy | Ensures perfect message recovery if the image remains unaltered. |
Confidentiality | Multi-layer encoding enhances data protection. |
Sr. No | Cover Image Size in MB | Stego Image Size in MB | Secret Test Message | Encryption Time in Millisecond | Decryption Time in Millisecond | MSE | PSNR in db | SNR in db |
---|---|---|---|---|---|---|---|---|
1 | 5 | 21 | Hello | 9.32 | 10.52 | 9.02 | 73.41 | 81.35 |
2 | 10 | 33 | 10.14 | 11.30 | 8.87 | 74.38 | 84.66 | |
3 | 15 | 43 | 11.66 | 12.81 | 4.75 | 81.08 | 86.33 | |
4 | 20 | 57 | 12.49 | 13.06 | 3.54 | 83.17 | 88.36 | |
5 | 25 | 78 | 12.89 | 13.89 | 2.11 | 87.71 | 88.69 | |
6 | 30 | 82 | 14.26 | 15.72 | 2.72 | 87.87 | 89.53 |
Sr. No | Cover Image Size in MB | Secret Text File in KB | Stego Image Size in MB | Encryption Time in Millisecond | Decryption Time in Millisecond | MSE | PSNR in db | SNR in db |
---|---|---|---|---|---|---|---|---|
1 | 10 | 1 | 21 | 13.46 | 13.57 | 0.0762 | 76.15 | 82.06 |
2 | 2 | 21 | 11.2 | 34.45 | 0.0412 | 73.11 | 80.27 | |
3 | 5 | 21 | 10.72 | 31.7 | 0.0242 | 67.85 | 72.81 | |
4 | 10 | 21 | 9.73 | 41.52 | 0.0393 | 64.43 | 73.51 | |
5 | 20 | 1 | 37 | 11.22 | 19.59 | 0.0228 | 79.51 | 81.65 |
6 | 2 | 37 | 12.34 | 35.4 | 0.0157 | 76.52 | 79.49 | |
7 | 5 | 37 | 10.04 | 42.45 | 0.0522 | 71.25 | 75.32 | |
8 | 10 | 37 | 9.06 | 47.2 | 0.0442 | 67.83 | 71.8 | |
9 | 30 | 1 | 64 | 13.41 | 16.94 | 0.0118 | 82.45 | 85.2 |
10 | 2 | 64 | 12.42 | 27.22 | 0.0336 | 73.49 | 84.43 | |
11 | 5 | 64 | 11.86 | 30.52 | 0.112 | 69.17 | 72.12 | |
12 | 10 | 64 | 10.32 | 37.26 | 0.0227 | 77.74 | 71.71 |
Images | Entropy | Standard Deviation | ||||
---|---|---|---|---|---|---|
Cover Image | Stego Image | Change | Cover Image | Stego Image | Change | |
Airplane | 7.56 | 7.45 | −0.11 | 12.80 | 14.30 | +1.50 |
Aerial | 7.35 | 7.24 | −0.09 | 14.20 | 16.07 | +1.87 |
Baboon | 7.49 | 7.38 | −0.11 | 20.40 | 21.73 | +1.33 |
Image | Method | Entropy Change | STD DEV Change |
---|---|---|---|
Airplane | Proposed Scheme | −0.11 | +1.50 |
Enhanced LSB (ELSB) | −0.19 | +2.07 | |
Least significant bit matching (LSBM) | −0.11 | +1.97 | |
Adaptive LSB | −0.24 | +1.93 | |
Discrete cosine transform (DCT)-based steganography | −0.29 | +12.21 | |
Aerial | Proposed scheme | −0.09 | +1.87 |
Enhanced LSB (ELSB) | −0.22 | +2.51 | |
Least significant bit matching (LSBM) | −0.12 | +2.21 | |
Adaptive LSB | −0.19 | +2.01 | |
Discrete cosine transform (DCT)-based steganography | −0.17 | +2.03 | |
Baboon | Proposed scheme | −0.11 | +1.33 |
Enhanced LSB (ELSB) | −0.24 | +2.89 | |
Least significant bit matching (LSBM) | −0.18 | +2.41 | |
Adaptive LSB | −0.21 | +2.57 | |
Discrete cosine transform (DCT)-based steganography | −0.19 | +2.71 |
Method | Images | NPCR | UACI |
---|---|---|---|
Proposed Scheme | Airplane | 99.5784 | 33.5873 |
Aerial | 99.4292 | 33.4749 | |
Baboon | 99.5784 | 33.3745 | |
Enhanced LSB (ELSB) | Airplane | 99.0152 | 33.7425 |
Aerial | 99.1245 | 33.4985 | |
Baboon | 99.2144 | 33.4354 | |
Least significant bit matching (LSBM) | Airplane | 99.1147 | 33.6741 |
Aerial | 99.0541 | 33.4802 | |
Baboon | 99.0974 | 33.4287 | |
Adaptive LSB | Airplane | 99.3571 | 33.6412 |
Aerial | 99.1597 | 33.4788 | |
Baboon | 99.1648 | 33.4274 | |
Discrete cosine transform (DCT)-based steganography | Airplane | 98.9415 | 33.5411 |
Aerial | 99.1156 | 33.4878 | |
Baboon | 99.4254 | 33.4225 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kallapu, B.; Janardhan, A.N.; Hejamadi, R.M.; Shrinivas, K.R.N.; Saritha; Ramesh, R.K.; Gabralla, L.A. Multi-Layered Security Framework Combining Steganography and DNA Coding. Systems 2025, 13, 341. https://doi.org/10.3390/systems13050341
Kallapu B, Janardhan AN, Hejamadi RM, Shrinivas KRN, Saritha, Ramesh RK, Gabralla LA. Multi-Layered Security Framework Combining Steganography and DNA Coding. Systems. 2025; 13(5):341. https://doi.org/10.3390/systems13050341
Chicago/Turabian StyleKallapu, Bhavya, Avinash Nanda Janardhan, Rama Moorthy Hejamadi, Krishnaraj Rao Nandikoor Shrinivas, Saritha, Raghunandan Kemmannu Ramesh, and Lubna A. Gabralla. 2025. "Multi-Layered Security Framework Combining Steganography and DNA Coding" Systems 13, no. 5: 341. https://doi.org/10.3390/systems13050341
APA StyleKallapu, B., Janardhan, A. N., Hejamadi, R. M., Shrinivas, K. R. N., Saritha, Ramesh, R. K., & Gabralla, L. A. (2025). Multi-Layered Security Framework Combining Steganography and DNA Coding. Systems, 13(5), 341. https://doi.org/10.3390/systems13050341