Abstract
Nowadays, due to the rapid technological growth of information technology billions of data transferred through the network around the world in a fraction of seconds. To protect the transferred information from unauthorized access, security mechanism is required. At this point, significant role is performed by a technology called information security. So, to provide security, various techniques have been evolved such as cryptography, steganography and digital watermarking. Cryptography converts the message into scrambled format whereas in steganography the secret message is buried in the digital media. In this paper, both cryptography and steganography is combined to safeguard the information. First, the message is encrypted with the help of revised RSA algorithm to convert the message into secret message. Second, the cover image is segmented into edge and non-edge pixels using Canny edge detection technique and then N1(two) and N2 (four) bits of the secret messages are buried into the edge and non-edge pixel areas using LSB technique. Finally, the essential parameters like N1, N2 and the length values are implanted into the last four pixels of the cover-image to obtain the stego-image. At the recipient side, the hidden data are extracted from the stego-image after extracting N1, N2 and length information. Then, the extracted secret data is decrypted using revised RSA algorithm. Modified RSA algorithm improves the security by using two pairs of keys. At last, the various performance metrics parameters such as entropy, MSE, peak signal to noise ratio and histogram are measured. It is observed that the proposed system attains improved efficiency, security and imperceptibility properties of information hiding from the results.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-020-02398-w/MediaObjects/12652_2020_2398_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-020-02398-w/MediaObjects/12652_2020_2398_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-020-02398-w/MediaObjects/12652_2020_2398_Fig3_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-020-02398-w/MediaObjects/12652_2020_2398_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12652-020-02398-w/MediaObjects/12652_2020_2398_Fig5_HTML.png)
Similar content being viewed by others
Change history
23 May 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-03949-z
References
Amin MM, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZI (2003) Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia IEEE
Anathi M, Vijayakumar K (2020) Stock market analysis using candlestick regression and market trend prediction (CKRM). J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-020-01892-5
Anderson RJ, Peticolas FAP (1988) On the limits of steganography. IEEE J Sel Areas Comm
Artz D (2001) Digital steganography: hiding data within data. IEEE Int Comput 5:75–80
Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010
Gonzalez RC, Woods RE (2002) Digital image processing, 2nd edn. Prentice hall, USA
Grajeda-Marin IR, Montes-Venegas HA, Marcial-Romero JR, Hernandez Servin JA, Jimenez MV, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. J Pat Recognit Artif Intell Int. https://doi.org/10.1142/s0218001418600108
Hamad A, Al-Korbi A, Al-Ataby A, Majid A, Al-Taee A, Al-Nuaimy W (2015) High-capacity image staeganography based on Haar DWT for hiding miscellaneous data. In: IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies
Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer (Long Beach. Calif)
Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on lSB insertion and encryption. In: Proceedings of the 2009 International conference on Advances in Recent Technologies in Communication and Computing. pp. 302–305. doi: https://doi.org/10.1109/ARTCom.2009.228
Khashandarag AS, Navin AH, Mirnia MK, Agha Mohammadi HH (2011) An optimized color image steganography using LFSR and DFT techniques. Commun Comput Inf Sci 247–253 (CCIS)
Kumar V, Kumar D (2017) A modified DWT based image steganography technique. Multimed Tools Appl 77(11):13493–13510. https://doi.org/10.1007/s11042-017-4947-8
Maini R, Aggarwal H (2010) Study and comparison of various image edge detection techniques. Intern J Image Process 3(1)
Miri A, Faez K (2017) Adaptive image steagnography based on transform domain via genetic algorithm. Optik 158–168. doi: https://doi.org/10.1016/j.leo.2017.07.043
Nithya M, Vijayakumar K (2020) Secured segmentation for ICD datasets. J Ambient Intell Hum Comput doi: https://doi.org/10.1007/s12652-020-02009-8
Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: Proceedings of the 2016 International Conference on Research Advances in Research Advances in Integrated Navigation Systems. doi: https://doi.org/10.1109/RAINS.2016.7764399
Pratik D, Shah PD, Bichkar RS (2018) A Secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Subhransu SD, Swagatam D, Bijaya KP (eds) International conference on intelligent computing and applications. Springer, Singapore, pp 119–129
Premaratne P, Premaratne M (2012) Key based scrambling for secure image communication. In: International Conference on Intelligent Computing, Springer, Berlin pp 259–263
Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Secur Privacy 1:32–44
Qiang S, Guoying L, **gqi M, Hongmei Z (2016) An edge-detection method based on adaptive Canny algorithm and iterative segmentation threshold. In: 2nd International conference on Control Science and Systems Engineering
Ranjani J (2016) Data hiding using pseudo magic squares for embedding high payload in digital images. Springer Science Business Media, New York
Sasi SB, Sivanandam N (2015) A survey on cryptography using optimization algorithms in WSN. Indian J Sci Technol 8:216–221
Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press, USA
Simmons GJ (1983) The prisoner’s problem and the subliminal channel. In: Advances in cryptology: proceedings of CRYPTO’83, in: lecture notes in computer science, Plenum, New York, pp. 51–67
Sutaone MS, Khandare MV (2008) Image based steganography using LSB insertion. In: Proceedings of the 2008 IET International Conference on Wireless, Mobile and Multimedia Networks. pp 146–151. doi.https://doi.org/10.1049/cp:20080166
Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44. https://doi.org/10.1016/j.procs.2016.05.174
Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19:906–910. https://doi.org/10.1109/TCSVT.2009.2017409
Vidyasagar M. Potdar AA, Han S, Elizabeth C (2005) A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics (INDIN)
Vijayakumar K, Arun C (2017) Automated risk identification using NLP in cloud based development environments. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0503-7
Wang S, Zheng D, Zhan J, Tam WJ, Speranza F (2007) An image quality evaluation method based on digital watermarking. IEEE Trans Circuits Syst Video Technol 17(1):98–105. https://doi.org/10.1109/TCSVT.2006.887086
Wu M, Liu B (2003) Data Hiding in image and video part I fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695. https://doi.org/10.1109/Tip.2003.8105588
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03949-z
About this article
Cite this article
Kalaichelvi, V., Meenakshi, P., Vimala Devi, P. et al. RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique. J Ambient Intell Human Comput 12, 7235–7243 (2021). https://doi.org/10.1007/s12652-020-02398-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02398-w