Scenario:
Mercenaries break into your house and force you to hand over your paper wallets. Easy for them to see how much you have simply by looking at the bitcoin address. From there they only have to torture you to obtain your BIP38 passphrase and sweep the funds.
Solution:
A) Encrypted Public Key. Thieves will have no way of knowing how much BTC is stored at any given address.
Useless. They only have to torture you to obtain your Public Key passphrase, then they know how much bitcoin you have and can decide to continue torturing you for the private key, or kill you since you're not worth their time.
B) Encrypted Private Key with two possible outcomes for plausible deniability. One password reveals a small amount of BTC, enough to satisfy your attackers. Another password reveals a different private key where you have stored the majority of your funds. Is this possible?
Since a private key is nothing more than a 256 bit integer, it would be easy to create a situation where decrypting the private key yielded the private key to an address that had very little in it, and then taking an additional step on the decrypted private key yields a private key completely different private key to an address that has lots of bitcoins. This is how the deterministic wallets (such as Electrum) work. As long as you know what the additional step is, and the attackers don't know that an additional step is necessary, they won't find the second private key.
Of course, once they realize that they wasted their time coming after someone that doesn't have much, they'll almost certainly just kill you. So you'll never get to use the hidden bitcoins.