Quantum-Chaotic Encryption Integrated DCT-Based Steganography

  • Kalaiselvi M Department of Computer Science and Engineering (Cyber Security), Dr. N.G.P. Institute of Technology, Coimbatore, Tamil Nadu, India.
  • Suganya R.T Department of Computer Science and Engineering (Cyber Security), Dr. N.G.P. Institute of Technology, Coimbatore, Tamil Nadu, India.
Keywords: Game Theory, Incentives, Security Economics, Retail Payment Security, MFA, JWT, Auth0 SDK

Abstract

Ensuring safe and convenient access to essential services, including pension retrieval, is crucial in the current digital era. Passwords and PINs are examples of traditional authentication systems that frequently expose people to fraud and identity theft. In order to replace these traditional methods with biometric verification (such as fingerprint and facial recognition), this project suggests a Web Biometric Credentialing System for pension retrieval. The system incorporates Auth0 for secure identity and   management   of   sessions and WebAuthn API for biometric authentication. This method greatly enhances security and user experience by enabling pensioners to verify their identity using biometric information. The technology makes sure that only authorized people can access sensitive financial data and, after successful verification, enables pensioners to safely retrieve their pension amounts. By lowering fraud, eliminating unwanted access, and streamlining the authentication procedure, the suggested solution improves security.

References

S. Rahman, J. Uddin, M. Zakarya, H. Hussain, A.A. Khan, A. Ahmed, M. Haleem. (2023). A comprehensive study of digital image steganographic techniques. IEEE Access, IEEE, 11, 6770–6791. https://doi.org/10.1109/access.2023.3237393

H. Wen, C. Zhang, P. Chen, R. Chen, J. Xu, Y. Liao, Z. Liang, D. Shen, L. Zhou, J. Ke. (2021). A Quantum Chaotic Image Cryptosystem and its application in IOT Secure Communication. IEEE access, IEEE, 9, 20481-20492. https://doi.org/10.1109/ACCESS.2021.3054952

R.I. Abdelfatah. (2022). Quantum Image Encryption Using a Self-Adaptive Hash Function-Controlled Chaotic Map (SAHF-CCM). IEEE Access, IEEE, 10, 107152-107169. https://doi.org/10.1109/ACCESS.2022.3212899

T. Bikku, R. Paturi. (2019). Frequency Domain Steganography with Reversible Texture Combination. Traitement du Signal, 36(1), 109-117.https://doi.org/10.18280/ts.360114

A.Z. Abd Aziz, M.F.M. Sultan, N.L.M. Zulkufli. (2024). Image steganography: Comparative analysis of their techniques, complexity and enhancements. International Journal on Perceptive and Cognitive Computing, 10(1), 59-70. https://doi.org/10.31436/ijpcc.v10i1.449

Published
2025-12-05
How to Cite
M, K., & R.T, S. (2025). Quantum-Chaotic Encryption Integrated DCT-Based Steganography. International Journal of Computer Communication and Informatics, 7(2), 17-24. https://doi.org/10.34256/ijcci2522



Views: Abstract : 28 | PDF : 32

Plum Analytics