Skip to main content
Log in

Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Securing confidential data is imperative in the modern digital era, where the escalating challenges in data security underscore the urgency to provide a secure and efficient approach to confidential text data protection, This paper proposes an innovative three-pronged model integrating encryption, padding, and steganography to robustly protect sensitive text documents. The encryption process unfolds in two stages for heightened security. First, it employs the classical DNA encryption method, followed by a second step utilizing a DNA-complemented method. To increase complexity, the Rabinovich Hyperchaotic system generates pseudo-random sequences, that are based directly on the original data. Using this pseudo-random sequence, determine the DNA that, will be strategically inserted into the encrypted message, and the positions of this insertion. Thereafter, a novel steganography algorithm conceals the encrypted content within a cover image. This approach fuses the Least Significant Bit insertion method with inverse DNA encryption driven, again, by the chaotic system. Distinct initializations produce three unique pseudo-random sequences serving specialized purposes—identifying pixels to embed data, determining hidden layers, and maintaining randomness to frustrate statistical attacks. Through experiments, quantitative steganalysis measures like Mean Square Error, Correlation were obtained from those experiments, which were (0.999994796746295, 0.001096121973284) in addition to the measures, Signal-to-Noise, and Peak Signal-to-Noise Ratios which were good, ensured robust hidden communication. Additionally, Bit Error Rate = 0, following decryption reveals precise data reconstruction—no losses permeate the encryption layers. This makes the proposed encryption system an integrated encryption-steganography system that harnesses DNA cryptography and chaos theory to provide confidentiality, integrity, and secrecy for sensitive text transmission. The erroneous-free decryption and statistical invisibility highlight the immense promise of this approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Awadh WA, Alasady AS, Hamoud AK (2022) Hybrid information security system via combination of compression, cryptography, and image steganography. Int J Electr Comput Eng 12(6):6574–6584. https://doi.org/10.11591/ijece.v12i6.pp6574-6584

    Article  MATH  Google Scholar 

  2. Abdulbaqi AS, Obaid AJ, Abdulameer MH (2021) Smartphone-based ECG signals encryption for transmission and analyzing via IoMTs. J Discret Math Sci Cryptogr 24(7):1979–1988. https://doi.org/10.1080/09720529.2021.1958996

    Article  MATH  Google Scholar 

  3. Al-kateeb ZN, Mohammed SJ (2020) A novel approach for audio file encryption using hand geometry. Multimed Tools Appl 79(27–28):19615–19628. https://doi.org/10.1007/s11042-020-08869-8

    Article  MATH  Google Scholar 

  4. Fadhel SA, Al-Kateeb ZN, Al-Shamdeen MJ (2021) An improved data hiding using pixel value difference method and hyperchaotic system. J Phys Conf Ser 1879(2). https://doi.org/10.1088/1742-6596/1879/2/022089

  5. Zhang Y, Ren Y, Liu Y, Wang F, Zhang H, Liu K (2022) Preservation and encryption in DNA Digital Data Storage. ChemPlusChem 87(9). https://doi.org/10.1002/cplu.202200183

  6. Zhang S, Liu L (2021) A novel image encryption algorithm based on SPWLCM and DNA coding. Math Comput Simul 190:723–744. https://doi.org/10.1016/j.matcom.2021.06.012

    Article  MathSciNet  MATH  Google Scholar 

  7. Zhu E, Luo X, Liu C, Chen C (2022) An operational DNA strand displacement encryption approach. Nanomaterials 12(5):877. https://doi.org/10.3390/nano12050877

    Article  MATH  Google Scholar 

  8. Kalaivani A, Ananthi B, Sangeetha S (2019) Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. Cluster Comput 22(S2):3783–3790. https://doi.org/10.1007/s10586-018-2346-1

    Article  MATH  Google Scholar 

  9. Indira N, Rukmanidevi S, Kalpana AV (2020) Light weight proactive padding based crypto security system in distributed cloud environment. Int J Comput Intell Syst 13(1):36. https://doi.org/10.2991/ijcis.d.200110.001

    Article  MATH  Google Scholar 

  10. Dhaief ZS, Mustafa R, Maryoosh AA (2021) Subject review: information hiding using chaotic map. Int J Adv Sci Res Eng 07(08):106–111. https://doi.org/10.31695/ijasre.2021.34072

    Article  Google Scholar 

  11. Al-Sulami ZA, Hashim HS (2021) Review of secure the online multimedia data using chaotic map and steganography techniques, pp 030001. https://doi.org/10.1063/5.0068876

  12. Al-Khateeb ZN, Jader M (2020) Encryption and hiding text using DNA coding and hyperchaotic system. Indones J Electr Eng Comput Sci 19(2):766. https://doi.org/10.11591/ijeecs.v19.i2.pp766-774

    Article  MATH  Google Scholar 

  13. Elkandoz MT, Alexan W (2022) Image encryption based on a combination of multiple chaotic maps. Multimed Tools Appl 81(18):25497–25518. https://doi.org/10.1007/s11042-022-12595-8

    Article  Google Scholar 

  14. Osman OM, Kanona MEA, Hassan MK, Elkhair AAE, Mohamed KS (2022) Hybrid multistage framework for data manipulation by combining cryptography and steganography. Bull Electr Eng Informatics 11(1):327–335. https://doi.org/10.11591/eei.v11i1.3451

    Article  Google Scholar 

  15. Sadique JJ, Ullah SE, Islam MR, Raad R, Kouzani AZ, Mahmud MAP (2021) Transceiver design for full-duplex UAV based zero-padded OFDM system with physical layer security. IEEE Access 9:59432–59445. https://doi.org/10.1109/ACCESS.2021.3073488

    Article  Google Scholar 

  16. Sheela SJ, Suresh KV, Tandur D (2017) Secured text communication using chaotic maps. In: International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), pp 1–6. https://doi.org/10.1109/ICAMMAET.2017.8186653

  17. Abdelgader AHS, Aboughalia RA, Alkishriwo OAS (2018) Combined image encryption and steganography algorithm in the spatial domain, no. September, pp 120–125, 2018. https://doi.org/10.21467/proceedings.2.16

  18. Wang L, Dong T, Ge M-F (2019) Finite-time synchronization of memristor chaotic systems and its application in image encryption. Appl Math Comput 347:293–305. https://doi.org/10.1016/j.amc.2018.11.017

    Article  MATH  Google Scholar 

  19. Kaur M, Singh D, Kumar V (2020) Color image encryption using minimax differential evolution-based 7D hyper-chaotic map. Appl Phys B 126(9):147. https://doi.org/10.1007/s00340-020-07480-x

    Article  MATH  Google Scholar 

  20. Abbas TMJ, Jawad LM (2020) An enhanced rc4 algorithm using an efficient PRNG generation method based on newton raphson method, SHA-1 and piecewise chaos method. J Xi’an Univ Archit Technol XII(IV). https://doi.org/10.37896/jxat12.04/1190

  21. Kareem S, Rahma AM (2020) A Modification on key stream generator for RC4 algorithm. Eng Technol J 38(2B):54–60. https://doi.org/10.30684/etj.v38i2b.404

    Article  MATH  Google Scholar 

  22. Folifack Signing VR, Fozin Fonzin T, Kountchou M, Kengne J, Njitacke ZT (2021) Chaotic Jerk System with Hump structure for text and image encryption using DNA coding, vol 40, no 9. Springer US. https://doi.org/10.1007/s00034-021-01665-1.

  23. Msekh ZA, Hreshee SS (2021) Implementation of a chaos-based symmetric text encryption using arduino microcontrollers. J Phys Conf Ser 1963(1). https://doi.org/10.1088/1742-6596/1963/1/012086

  24. Elamir MM, Al-atabany WI, Mabrouk MS (2021) Hybrid image encryption scheme for secure E-health systems. Netw Model Anal Heal Informatics Bioinforma 10(1):1–8. https://doi.org/10.1007/s13721-021-00306-6

    Article  MATH  Google Scholar 

  25. Alhija MA, Turab N, Abuthawabeh A, Abuowida H, Al Nabulsi J (2022) Dna cryptographic approaches: state of art, opportunities, and cutting edge perspectives. J Theor Appl Inf Technol 100(18):5346–5358

    Google Scholar 

  26. Yousef G, Elsharawy GA, Naim AA, Eid HF (2022) DNA encryption / decryption algorithm for securing students data system. Int J Math Sci Comput 8(4):30–40. https://doi.org/10.5815/ijmsc.2022.04.03

    Article  MATH  Google Scholar 

  27. Rostam HE, Motameni H, Enayatifar R (2022) Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik (Stuttg) 258:168864. https://doi.org/10.1016/j.ijleo.2022.168864

    Article  MATH  Google Scholar 

  28. Rostam HE, Motameni H, Enayatifar R The Effect of DNA in image steganography on privacy preservation in Smart City, pp 68–83

  29. Seenappa V, Krishnappa NC, Mallesh PK (2022) Hybrid compression and DNA sequence of hyper chaos system for medical image steganography. Int J Intell Eng Syst 15(3):566–575. https://doi.org/10.22266/ijies2022.0630.48

    Article  Google Scholar 

  30. Zhang L, Han T, Liu X, Liu H (2022) Medical image encryption based on hyper-chaotic system. 1230605(August 2022): 32. https://doi.org/10.1117/12.2641315

  31. Alemami Y, Mohamed MA, Atiewi S (2023) Advanced approach for encryption using advanced encryption standard with chaotic map. Int J Electr Comput Eng 13(2):1708–1723. https://doi.org/10.11591/ijece.v13i2.pp1708-1723

    Article  MATH  Google Scholar 

  32. Fadhil FA, Abdul Hussien FT, AldeenKhairi TW, Safiullin N (2023) A proposed text encryption inside video using harris corner detection and Salsa20 encryption algorithm. Baghdad Sci J 20(1):1–11. https://doi.org/10.21123/bsj.2023.9168

    Article  Google Scholar 

  33. Elsaid SA, Alotaibi ER, Alsaleh S (2023) A robust hybrid cryptosystem based on DNA and Hyperchaotic for images encryption. Multimed Tools Appl 82:1995–2019. https://doi.org/10.1007/s11042-022-12641-5

    Article  MATH  Google Scholar 

  34. Nagarajegowda S, Krishnan K (2023) An image steganography using improved hyper-chaotic Henon map and fractal tromino. Int J Electr Comput Eng 13(6)

  35. Liu Y, Yang Q, Pang G (2010) A hyperchaotic system from the Rabinovich system. J Comput Appl Math 234(1):101–113. https://doi.org/10.1016/j.cam.2009.12.008

    Article  MathSciNet  MATH  Google Scholar 

  36. AL-Azzawi SF, Mujiarto L, Patria A. Sambas, Sanjaya WSM (2020) Stability of Lorenz system at the second equilibria point based on Gardano’s method. J Phys Conf Ser 1477(2):022009. https://doi.org/10.1088/1742-6596/1477/2/022009

    Article  Google Scholar 

  37. Aziz MM, Al-Azzawi SF (2021) A modification of nonlinear feedback controller. Int J Comput Sci Math 13(1):64. https://doi.org/10.1504/IJCSM.2021.114181

    Article  MathSciNet  MATH  Google Scholar 

  38. Al-Hayali MA, Al-Azzawi FS (2021) A 4D hyperchaoticSprott S system with multistability and hidden attractors. J Phys Conf Ser 1879(3).https://doi.org/10.1088/1742-6596/1879/3/032031

  39. Rashid OF (2021) Text encryption based on DNA, Cryptography RNA, Amino Acid. E- Proc 5th Int Multi-Conference Artif Intell Technol (MCAIT ) Artif Intell 4th Ind Revolut, no 2017, pp167–173

  40. Mohammed NM, Al-Kateeb ZN (2022) A new secure encryption algorithm based on RC4 Cipher and 4D Hyperchaotic Sprott-S System. 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT), pp 131–136

Download references

Acknowledgements

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeena N. Al-Kateeb.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Kateeb, Z.N., Jader, M. Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA. Multimed Tools Appl 84, 1211–1237 (2025). https://doi.org/10.1007/s11042-024-19057-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-024-19057-3

Keywords