Keywords

1 Introduction

With the advancements in the technology, there is a significant role of information security in our day-to-day life. The advancements in technologies have forced to develop secure mechanism for data communication. So, to provide data security, cryptography and steganography mechanisms are used. Cryptography converts the data from one form to another that is not understood by the intruder [1]. The data sent through this process is in unreadable form so that if any unauthorized user has access to it, it still can’t understand. This mechanism involves encryption and decryption processes.

Steganography is the process in which the user hides the data into text files, audio, video or an image [2].

The intruders can expose the data, alter the data or may distort the data. But steganography or cryptography alone fails to provide security to the data. However, the combination of the two is a more reliable and strong mechanism. So to solve this problem, the cryptography and steganography mechanisms are used in combination. The data is first encrypted using the encryption process and then it is embedded into an image. Figure 1 shows the basic block diagram of the multilevel security mechanism.

Fig. 1
A block diagram of a multilevel security mechanism. At the sender's side, the cover image and the secret message after encryption undergo steganography to obtain a steganographic image. At the receiver's side, this modified image undergoes inverse steganography to obtain the cover image and secret message after decryption.

Basic block diagram of multilevel security mechanism

The combination of the two mechanisms improves the overall security of the system as well as fulfill some desirable features such as memory usage, security and strength for sensitive information transmission across an open channel.

This paper proposes a multilevel security mechanism for data communication by involving both cryptography and steganography mechanisms to incorporate high-level security to the data and for large-area applications. Also, we have incorporated Huffman compression to enhance the security as well as to increase the data embedding capacity. The data is first encrypted using a qubit encryption mechanism. It is then compressed using Huffman compression for embedding in the cover image. The rest of the paper is organized as follows: Sect. 2 gives the literature survey. The proposed mechanism is shown in Sect. 3. Section 4 provides the setup parameters. A thorough analysis of results is done in Sect. 5 followed by conclusion and references.

2 Literature Survey

Table 1 given below provides the literature survey used till date.

Table 1 Literature survey

Table 1 shows that the various multilevel techniques available in the literature use various encryption and steganography mechanisms to enhance the security of the data. But very few techniques use compression techniques in their proposed mechanism. Also, very few researchers have worked on the pseudo random LSB approach to embed the data in an image. Thus, our proposed technique aims not only at increasing the embedding capacity but also at securing the data to great extent.

3 Proposed Mechanism

The proposed mechanism involves three stages: Encryption, Compression and Embedding.

Encryption

Figure 2 shows the detailed encryption process used in the proposed mechanism. It involves substitution, permutation and diffusion processes. Each of them involves the use of a key generated from the quantum logistic map to make the encryption key-dependent process for a highly secured mechanism.

Fig. 2
A block diagram connects the following blocks, original data, substitution process, permutation process, diffusion process, and encrypted data. A block of key generation or quantum logistic map connects with 3 process blocks in between.

Block diagram of encryption process used in proposed security mechanism

The quantum chaotic map with the lowest order quantum corrections is followed [15]. The x(i), y(i) and z(i) values are taken as keys to make the encryption process unique. Even for single bit of change in key or initial conditions makes up a unique encryption process.

The data is passed through the substitution block where the values of the data are replaced with the new values using a dictionary. The dictionary contains a new value for possible values which is dependent on the key. For different keys, the dictionary to be used is unique. Then the substituted data is passed to the permutation block, where the data is shuffled. The unique positions at which data is to be shuffled are generated for the key. Then the shuffled data is further changed in the diffusion block. In this block, the data is XORed with the sequence of key of the same size as of data to get the encrypted data.

A 3-part program code for substitution process, permutation process, and diffusion process. The inputs are in part 1, original and substituted data, in part 2, length and permuted data, and in part 3, i, length, and diffused data.

Compression

Now to further increase the security of the mechanism and also to increase the embedding capacity as faced by other researchers available in the literature, data is compressed. The Huffman compression is used to compress the data as it requires less storage space and its lossless behavior [16].

The compressed data is now to be embedded in the cover image.

Embedding

Figure 3 shows the detailed embedding process used in the proposed mechanism.

Fig. 3
A block diagram connects blocks in the following format, cover image, edge detection, pseudo-random L S B, and stego image. The key generation block is connected to the pseudo-random L S B block.

Block diagram of embedding process used in proposed security mechanism

Now for the embedding process first the edges present in the image are detected. This is due to the fact that the change in data of the edges cannot be visually detected. The edges are detected using the canny edge detection filter. This improves the anti-noise ability and keeps the edge image more clearly [17].

The position of edges is detected where the data in the LSB of the pixels need to be embedded. The positions are scrambled using the quantum map to make the data scrambled and increase the security of data. The data is then embedded in the LSB positions of the edges randomly.

The process to retrieve the data at the receiver’s end is just the reverse of the encryption process.

A program code for the embedding process has inputs of compressed data, and edge positions in the R, G, and B channels of the cover image. It uses conditions such as for, if, and else if loops to produce the output.

4 Setup Parameters

Table 2 provides simulation setup parameters used, while performing different experiments using the proposed mechanism.

Table 2 Simulation setup parameters

5 Result

The MATLAB version R2014a software is used to simulate all the results. The simulation results of the proposed mechanism demonstrated below are the average for 10 different images for the below-mentioned performance matrices:

Visual Perceptibility Analysis

For the desired multilevel security mechanism, the distortions introduced in the cover image because of the data embedding process must not be recognized by human eyes as shown in Fig. 4.

Fig. 4
Two parts of the original and stego images have no perceivable changes. Both have several irregularly shaped pebble-like structures that are closely arranged without any gaps.

Visual perceptibility of the proposed technique

It can be observed from Fig. 4 that the proposed technique does not show a perceivable change in the image.

Quantitative Analysis

The embedding process introduces distortion and noise in the cover image. It is essential to measure quantitative measures related to the quality.

Bit Error Rate (BER): For desirable mechanism, BER must be low [15]. Table 3 provides the BER of the proposed technique to the other techniques available in the literature.

Table 3 BER of the proposed technique to the other techniques available in the literature

Mean Square Error (MSE): For a desirable mechanism, MSE value must be low [15]. Table 4 provides the MSE of the proposed technique to the other techniques available in the literature.

Table 4 MSE of the proposed technique to the other techniques available in the literature

Peak Signal to Noise Ratio (PSNR): For a desirable mechanism, PSNR must be high [15]. Table 5 provides the PSNR of the proposed technique to the other techniques available in the literature.

Table 5 PSNR of the proposed technique to the other techniques available in the literature

Universal Image Quality Index (UIQI): For a desirable mechanism, UIQI must be close to 1 showing similarity in the cover image and corresponding stego image [15]. Table 6 provides the UIQI of the proposed technique to the other techniques available in the literature.

Table 6 UIQI of the proposed technique to the other techniques available in the literature

Structural Similarity Index Metric (SSIM): For a desirable mechanism, SSIM must be close to 1 showing similarity in the cover image and corresponding stego image [15]. Table 7 provides the SSIM of the proposed technique to the other techniques available in the literature.

Table 7 SSIM of the proposed technique to the other techniques available in the literature

6 Conclusion

In the proposed model, we have incorporated an encryption process which involves key-dependent substitution, permutation and diffusion blocks. This makes the mechanism more secured. Also, we have enhanced the embedding capacity of the model by involving the Huffman compression mechanism which is lossless in nature. Hence, the data can be completely restored. Also, the LSB steganography technique involved in the proposed model is not only randomized in nature but also the embedding is done in the edges present in the cover image. This helps in the visual perceptibility of the data that cannot be seen by the human eye. Experimental results depict that the proposed model shows the best results in BER, UIQI, SSIM and visually as compared to other latest techniques available in the literature. Our model shows comparable results in terms of PSNR and MSE.