Abstract
Securing confidential data is imperative in the modern digital era, where the escalating challenges in data security underscore the urgency to provide a secure and efficient approach to confidential text data protection, This paper proposes an innovative three-pronged model integrating encryption, padding, and steganography to robustly protect sensitive text documents. The encryption process unfolds in two stages for heightened security. First, it employs the classical DNA encryption method, followed by a second step utilizing a DNA-complemented method. To increase complexity, the Rabinovich Hyperchaotic system generates pseudo-random sequences, that are based directly on the original data. Using this pseudo-random sequence, determine the DNA that, will be strategically inserted into the encrypted message, and the positions of this insertion. Thereafter, a novel steganography algorithm conceals the encrypted content within a cover image. This approach fuses the Least Significant Bit insertion method with inverse DNA encryption driven, again, by the chaotic system. Distinct initializations produce three unique pseudo-random sequences serving specialized purposes—identifying pixels to embed data, determining hidden layers, and maintaining randomness to frustrate statistical attacks. Through experiments, quantitative steganalysis measures like Mean Square Error, Correlation were obtained from those experiments, which were (0.999994796746295, 0.001096121973284) in addition to the measures, Signal-to-Noise, and Peak Signal-to-Noise Ratios which were good, ensured robust hidden communication. Additionally, Bit Error Rate = 0, following decryption reveals precise data reconstruction—no losses permeate the encryption layers. This makes the proposed encryption system an integrated encryption-steganography system that harnesses DNA cryptography and chaos theory to provide confidentiality, integrity, and secrecy for sensitive text transmission. The erroneous-free decryption and statistical invisibility highlight the immense promise of this approach.















Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Awadh WA, Alasady AS, Hamoud AK (2022) Hybrid information security system via combination of compression, cryptography, and image steganography. Int J Electr Comput Eng 12(6):6574–6584. https://doi.org/10.11591/ijece.v12i6.pp6574-6584
Abdulbaqi AS, Obaid AJ, Abdulameer MH (2021) Smartphone-based ECG signals encryption for transmission and analyzing via IoMTs. J Discret Math Sci Cryptogr 24(7):1979–1988. https://doi.org/10.1080/09720529.2021.1958996
Al-kateeb ZN, Mohammed SJ (2020) A novel approach for audio file encryption using hand geometry. Multimed Tools Appl 79(27–28):19615–19628. https://doi.org/10.1007/s11042-020-08869-8
Fadhel SA, Al-Kateeb ZN, Al-Shamdeen MJ (2021) An improved data hiding using pixel value difference method and hyperchaotic system. J Phys Conf Ser 1879(2). https://doi.org/10.1088/1742-6596/1879/2/022089
Zhang Y, Ren Y, Liu Y, Wang F, Zhang H, Liu K (2022) Preservation and encryption in DNA Digital Data Storage. ChemPlusChem 87(9). https://doi.org/10.1002/cplu.202200183
Zhang S, Liu L (2021) A novel image encryption algorithm based on SPWLCM and DNA coding. Math Comput Simul 190:723–744. https://doi.org/10.1016/j.matcom.2021.06.012
Zhu E, Luo X, Liu C, Chen C (2022) An operational DNA strand displacement encryption approach. Nanomaterials 12(5):877. https://doi.org/10.3390/nano12050877
Kalaivani A, Ananthi B, Sangeetha S (2019) Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. Cluster Comput 22(S2):3783–3790. https://doi.org/10.1007/s10586-018-2346-1
Indira N, Rukmanidevi S, Kalpana AV (2020) Light weight proactive padding based crypto security system in distributed cloud environment. Int J Comput Intell Syst 13(1):36. https://doi.org/10.2991/ijcis.d.200110.001
Dhaief ZS, Mustafa R, Maryoosh AA (2021) Subject review: information hiding using chaotic map. Int J Adv Sci Res Eng 07(08):106–111. https://doi.org/10.31695/ijasre.2021.34072
Al-Sulami ZA, Hashim HS (2021) Review of secure the online multimedia data using chaotic map and steganography techniques, pp 030001. https://doi.org/10.1063/5.0068876
Al-Khateeb ZN, Jader M (2020) Encryption and hiding text using DNA coding and hyperchaotic system. Indones J Electr Eng Comput Sci 19(2):766. https://doi.org/10.11591/ijeecs.v19.i2.pp766-774
Elkandoz MT, Alexan W (2022) Image encryption based on a combination of multiple chaotic maps. Multimed Tools Appl 81(18):25497–25518. https://doi.org/10.1007/s11042-022-12595-8
Osman OM, Kanona MEA, Hassan MK, Elkhair AAE, Mohamed KS (2022) Hybrid multistage framework for data manipulation by combining cryptography and steganography. Bull Electr Eng Informatics 11(1):327–335. https://doi.org/10.11591/eei.v11i1.3451
Sadique JJ, Ullah SE, Islam MR, Raad R, Kouzani AZ, Mahmud MAP (2021) Transceiver design for full-duplex UAV based zero-padded OFDM system with physical layer security. IEEE Access 9:59432–59445. https://doi.org/10.1109/ACCESS.2021.3073488
Sheela SJ, Suresh KV, Tandur D (2017) Secured text communication using chaotic maps. In: International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), pp 1–6. https://doi.org/10.1109/ICAMMAET.2017.8186653
Abdelgader AHS, Aboughalia RA, Alkishriwo OAS (2018) Combined image encryption and steganography algorithm in the spatial domain, no. September, pp 120–125, 2018. https://doi.org/10.21467/proceedings.2.16
Wang L, Dong T, Ge M-F (2019) Finite-time synchronization of memristor chaotic systems and its application in image encryption. Appl Math Comput 347:293–305. https://doi.org/10.1016/j.amc.2018.11.017
Kaur M, Singh D, Kumar V (2020) Color image encryption using minimax differential evolution-based 7D hyper-chaotic map. Appl Phys B 126(9):147. https://doi.org/10.1007/s00340-020-07480-x
Abbas TMJ, Jawad LM (2020) An enhanced rc4 algorithm using an efficient PRNG generation method based on newton raphson method, SHA-1 and piecewise chaos method. J Xi’an Univ Archit Technol XII(IV). https://doi.org/10.37896/jxat12.04/1190
Kareem S, Rahma AM (2020) A Modification on key stream generator for RC4 algorithm. Eng Technol J 38(2B):54–60. https://doi.org/10.30684/etj.v38i2b.404
Folifack Signing VR, Fozin Fonzin T, Kountchou M, Kengne J, Njitacke ZT (2021) Chaotic Jerk System with Hump structure for text and image encryption using DNA coding, vol 40, no 9. Springer US. https://doi.org/10.1007/s00034-021-01665-1.
Msekh ZA, Hreshee SS (2021) Implementation of a chaos-based symmetric text encryption using arduino microcontrollers. J Phys Conf Ser 1963(1). https://doi.org/10.1088/1742-6596/1963/1/012086
Elamir MM, Al-atabany WI, Mabrouk MS (2021) Hybrid image encryption scheme for secure E-health systems. Netw Model Anal Heal Informatics Bioinforma 10(1):1–8. https://doi.org/10.1007/s13721-021-00306-6
Alhija MA, Turab N, Abuthawabeh A, Abuowida H, Al Nabulsi J (2022) Dna cryptographic approaches: state of art, opportunities, and cutting edge perspectives. J Theor Appl Inf Technol 100(18):5346–5358
Yousef G, Elsharawy GA, Naim AA, Eid HF (2022) DNA encryption / decryption algorithm for securing students data system. Int J Math Sci Comput 8(4):30–40. https://doi.org/10.5815/ijmsc.2022.04.03
Rostam HE, Motameni H, Enayatifar R (2022) Privacy-preserving in the Internet of Things based on steganography and chaotic functions. Optik (Stuttg) 258:168864. https://doi.org/10.1016/j.ijleo.2022.168864
Rostam HE, Motameni H, Enayatifar R The Effect of DNA in image steganography on privacy preservation in Smart City, pp 68–83
Seenappa V, Krishnappa NC, Mallesh PK (2022) Hybrid compression and DNA sequence of hyper chaos system for medical image steganography. Int J Intell Eng Syst 15(3):566–575. https://doi.org/10.22266/ijies2022.0630.48
Zhang L, Han T, Liu X, Liu H (2022) Medical image encryption based on hyper-chaotic system. 1230605(August 2022): 32. https://doi.org/10.1117/12.2641315
Alemami Y, Mohamed MA, Atiewi S (2023) Advanced approach for encryption using advanced encryption standard with chaotic map. Int J Electr Comput Eng 13(2):1708–1723. https://doi.org/10.11591/ijece.v13i2.pp1708-1723
Fadhil FA, Abdul Hussien FT, AldeenKhairi TW, Safiullin N (2023) A proposed text encryption inside video using harris corner detection and Salsa20 encryption algorithm. Baghdad Sci J 20(1):1–11. https://doi.org/10.21123/bsj.2023.9168
Elsaid SA, Alotaibi ER, Alsaleh S (2023) A robust hybrid cryptosystem based on DNA and Hyperchaotic for images encryption. Multimed Tools Appl 82:1995–2019. https://doi.org/10.1007/s11042-022-12641-5
Nagarajegowda S, Krishnan K (2023) An image steganography using improved hyper-chaotic Henon map and fractal tromino. Int J Electr Comput Eng 13(6)
Liu Y, Yang Q, Pang G (2010) A hyperchaotic system from the Rabinovich system. J Comput Appl Math 234(1):101–113. https://doi.org/10.1016/j.cam.2009.12.008
AL-Azzawi SF, Mujiarto L, Patria A. Sambas, Sanjaya WSM (2020) Stability of Lorenz system at the second equilibria point based on Gardano’s method. J Phys Conf Ser 1477(2):022009. https://doi.org/10.1088/1742-6596/1477/2/022009
Aziz MM, Al-Azzawi SF (2021) A modification of nonlinear feedback controller. Int J Comput Sci Math 13(1):64. https://doi.org/10.1504/IJCSM.2021.114181
Al-Hayali MA, Al-Azzawi FS (2021) A 4D hyperchaoticSprott S system with multistability and hidden attractors. J Phys Conf Ser 1879(3).https://doi.org/10.1088/1742-6596/1879/3/032031
Rashid OF (2021) Text encryption based on DNA, Cryptography RNA, Amino Acid. E- Proc 5th Int Multi-Conference Artif Intell Technol (MCAIT ) Artif Intell 4th Ind Revolut, no 2017, pp167–173
Mohammed NM, Al-Kateeb ZN (2022) A new secure encryption algorithm based on RC4 Cipher and 4D Hyperchaotic Sprott-S System. 2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT), pp 131–136
Acknowledgements
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Al-Kateeb, Z.N., Jader, M. Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA. Multimed Tools Appl 84, 1211–1237 (2025). https://doi.org/10.1007/s11042-024-19057-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-024-19057-3