Log in

RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 23 May 2022

This article has been updated

Abstract

Nowadays, due to the rapid technological growth of information technology billions of data transferred through the network around the world in a fraction of seconds. To protect the transferred information from unauthorized access, security mechanism is required. At this point, significant role is performed by a technology called information security. So, to provide security, various techniques have been evolved such as cryptography, steganography and digital watermarking. Cryptography converts the message into scrambled format whereas in steganography the secret message is buried in the digital media. In this paper, both cryptography and steganography is combined to safeguard the information. First, the message is encrypted with the help of revised RSA algorithm to convert the message into secret message. Second, the cover image is segmented into edge and non-edge pixels using Canny edge detection technique and then N1(two) and N2 (four) bits of the secret messages are buried into the edge and non-edge pixel areas using LSB technique. Finally, the essential parameters like N1, N2 and the length values are implanted into the last four pixels of the cover-image to obtain the stego-image. At the recipient side, the hidden data are extracted from the stego-image after extracting N1, N2 and length information. Then, the extracted secret data is decrypted using revised RSA algorithm. Modified RSA algorithm improves the security by using two pairs of keys. At last, the various performance metrics parameters such as entropy, MSE, peak signal to noise ratio and histogram are measured. It is observed that the proposed system attains improved efficiency, security and imperceptibility properties of information hiding from the results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Change history

References

  • Amin MM, Salleh M, Ibrahim S, Katmin MR, Shamsuddin MZI (2003) Information hiding using steganography. In: 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia IEEE

  • Anathi M, Vijayakumar K (2020) Stock market analysis using candlestick regression and market trend prediction (CKRM). J Ambient Intell Hum Comput. https://doi.org/10.1007/s12652-020-01892-5

    Article  Google Scholar 

  • Anderson RJ, Peticolas FAP (1988) On the limits of steganography. IEEE J Sel Areas Comm

  • Artz D (2001) Digital steganography: hiding data within data. IEEE Int Comput 5:75–80

    Article  Google Scholar 

  • Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727–752. https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  MATH  Google Scholar 

  • Gonzalez RC, Woods RE (2002) Digital image processing, 2nd edn. Prentice hall, USA

    Google Scholar 

  • Grajeda-Marin IR, Montes-Venegas HA, Marcial-Romero JR, Hernandez Servin JA, Jimenez MV, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. J Pat Recognit Artif Intell Int. https://doi.org/10.1142/s0218001418600108

    Article  Google Scholar 

  • Hamad A, Al-Korbi A, Al-Ataby A, Majid A, Al-Taee A, Al-Nuaimy W (2015) High-capacity image staeganography based on Haar DWT for hiding miscellaneous data. In: IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies

  • Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer (Long Beach. Calif)

  • Juneja M, Sandhu PS (2009) Designing of robust image steganography technique based on lSB insertion and encryption. In: Proceedings of the 2009 International conference on Advances in Recent Technologies in Communication and Computing. pp. 302–305. doi: https://doi.org/10.1109/ARTCom.2009.228

  • Khashandarag AS, Navin AH, Mirnia MK, Agha Mohammadi HH (2011) An optimized color image steganography using LFSR and DFT techniques. Commun Comput Inf Sci 247–253 (CCIS)

  • Kumar V, Kumar D (2017) A modified DWT based image steganography technique. Multimed Tools Appl 77(11):13493–13510. https://doi.org/10.1007/s11042-017-4947-8

    Article  Google Scholar 

  • Maini R, Aggarwal H (2010) Study and comparison of various image edge detection techniques. Intern J Image Process 3(1)

  • Miri A, Faez K (2017) Adaptive image steagnography based on transform domain via genetic algorithm. Optik 158–168. doi: https://doi.org/10.1016/j.leo.2017.07.043

  • Nithya M, Vijayakumar K (2020) Secured segmentation for ICD datasets. J Ambient Intell Hum Comput doi: https://doi.org/10.1007/s12652-020-02009-8

  • Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques. In: Proceedings of the 2016 International Conference on Research Advances in Research Advances in Integrated Navigation Systems. doi: https://doi.org/10.1109/RAINS.2016.7764399

  • Pratik D, Shah PD, Bichkar RS (2018) A Secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: Subhransu SD, Swagatam D, Bijaya KP (eds) International conference on intelligent computing and applications. Springer, Singapore, pp 119–129

    Google Scholar 

  • Premaratne P, Premaratne M (2012) Key based scrambling for secure image communication. In: International Conference on Intelligent Computing, Springer, Berlin pp 259–263

  • Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Secur Privacy 1:32–44

    Article  Google Scholar 

  • Qiang S, Guoying L, **gqi M, Hongmei Z (2016) An edge-detection method based on adaptive Canny algorithm and iterative segmentation threshold. In: 2nd International conference on Control Science and Systems Engineering

  • Ranjani J (2016) Data hiding using pseudo magic squares for embedding high payload in digital images. Springer Science Business Media, New York

    Google Scholar 

  • Sasi SB, Sivanandam N (2015) A survey on cryptography using optimization algorithms in WSN. Indian J Sci Technol 8:216–221

    Article  Google Scholar 

  • Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press, USA

    Book  Google Scholar 

  • Simmons GJ (1983) The prisoner’s problem and the subliminal channel. In: Advances in cryptology: proceedings of CRYPTO’83, in: lecture notes in computer science, Plenum, New York, pp. 51–67

  • Sutaone MS, Khandare MV (2008) Image based steganography using LSB insertion. In: Proceedings of the 2008 IET International Conference on Wireless, Mobile and Multimedia Networks. pp 146–151. doi.https://doi.org/10.1049/cp:20080166

  • Swain G (2016) A steganographic method combining LSB substitution and PVD in a block. Procedia Comput Sci 85:39–44. https://doi.org/10.1016/j.procs.2016.05.174

    Article  Google Scholar 

  • Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19:906–910. https://doi.org/10.1109/TCSVT.2009.2017409

    Article  Google Scholar 

  • Vidyasagar M. Potdar AA, Han S, Elizabeth C (2005) A survey of digital image watermarking techniques. In: 3rd IEEE International Conference on Industrial Informatics (INDIN)

  • Vijayakumar K, Arun C (2017) Automated risk identification using NLP in cloud based development environments. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-017-0503-7

    Article  Google Scholar 

  • Wang S, Zheng D, Zhan J, Tam WJ, Speranza F (2007) An image quality evaluation method based on digital watermarking. IEEE Trans Circuits Syst Video Technol 17(1):98–105. https://doi.org/10.1109/TCSVT.2006.887086

    Article  Google Scholar 

  • Wu M, Liu B (2003) Data Hiding in image and video part I fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695. https://doi.org/10.1109/Tip.2003.8105588

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Swaminathan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-03949-z

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kalaichelvi, V., Meenakshi, P., Vimala Devi, P. et al. RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique. J Ambient Intell Human Comput 12, 7235–7243 (2021). https://doi.org/10.1007/s12652-020-02398-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02398-w

Keywords

Navigation