A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography

被引:12
|
作者
Kusuma, Edi Jaya [1 ]
Sari, Christy Atika [1 ]
Rachmawanto, Eko Hari [1 ]
Setiadi, De Rosal Ignatius Moses [1 ]
机构
[1] Dian Nuswantoro Univ, Fac Comp Sci, Jalan Imam Bonjol 207, Semarang 50131, Indonesia
关键词
Arnold's transformation; cryptography; inverted 2-bit LSB; RSA; steganography;
D O I
10.5614/itbj.ict.res.appl.2018.12.2.1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.
引用
收藏
页码:103 / 122
页数:20
相关论文
共 31 条
  • [21] Hybrid Method using 3-DES, DWT and LSB for Secure Image Steganography Algorithm
    Ardiansyah, Giovani
    Sari, Christy Atika
    Setiadi, De Rosal Ignatius Moses
    Rachmawanto, Eko Hari
    [J]. 2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE): OPPORTUNITIES AND CHALLENGES ON BIG DATA FUTURE INNOVATION, 2017, : 249 - 254
  • [22] Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm
    Sabeti, Vajiheh
    Amerehei, Mahsa
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (02): : 185 - 197
  • [23] Highly Secure Image Steganography Approach Using Arnold's Cat Map and Maximum Image Entropy
    Hamza, Yasir Ahmed
    [J]. INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2019), 2019, : 134 - 138
  • [24] Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography
    Ramyashree
    Venugopala, P.S.
    Raghavendra, S.
    Kubihal, Vijay S.
    [J]. IEEE Access, 2025, 13 : 1566 - 1580
  • [25] Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography
    Al-Chaab, Wafaa
    Abduljabbar, Zaid Ameen
    Abood, Enas Wahab
    Nyangaresi, Vincent Omollo
    Mohammed, Hussein M.
    Ma, Junchao
    [J]. Informatica (Slovenia), 2023, 47 (06): : 65 - 74
  • [26] A novel secure image steganography scheme based on Hamming encoding and LSB matching revisited using Lah Transform
    Nguyen, Tuan Duc
    Le, Hai Quoc
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (32) : 77347 - 77375
  • [27] Secure and authentic DCT image steganography through DWT - SVD based Digital watermarking with RSA encryption
    Patel, Palak
    Patel, Yask
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 736 - 739
  • [28] RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique
    V. Kalaichelvi
    P. Meenakshi
    P. Vimala Devi
    H. Manikandan
    P. Venkateswari
    S. Swaminathan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 7235 - 7243
  • [29] Retraction Note to: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique
    V. Kalaichelvi
    P. Meenakshi
    P. Vimala Devi
    H. Manikandan
    P. Venkateswari
    S. Swaminathan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 73 - 73
  • [30] Secured Image Transmission Using Color Transformation Fragmented Mosaic, Chaos Based Encryption and LSB - Mapping Steganography Technique
    Manjula, Y.
    Shivakumar, K. B.
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (13): : 58 - 66