RETRACTED: A stable image steganography: a novel approach based on modified RSA algorithm and 2-4 least significant bit (LSB) technique (Retracted Article)

被引:8
|
作者
Kalaichelvi, V. [1 ]
Meenakshi, P. [1 ]
Vimala Devi, P. [1 ]
Manikandan, H. [1 ]
Venkateswari, P. [1 ]
Swaminathan, S. [2 ]
机构
[1] Shanmugha Arts Sci Technol & Res Acad, Dept CSE, SRC, Thanjavur, Tamil Nadu, India
[2] Shanmugha Arts Sci Technol & Res Acad, Dept ECE, SRC, Thanjavur, Tamil Nadu, India
关键词
Cipher; Data security; Canny edge detection; LSB;
D O I
10.1007/s12652-020-02398-w
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, due to the rapid technological growth of information technology billions of data transferred through the network around the world in a fraction of seconds. To protect the transferred information from unauthorized access, security mechanism is required. At this point, significant role is performed by a technology called information security. So, to provide security, various techniques have been evolved such as cryptography, steganography and digital watermarking. Cryptography converts the message into scrambled format whereas in steganography the secret message is buried in the digital media. In this paper, both cryptography and steganography is combined to safeguard the information. First, the message is encrypted with the help of revised RSA algorithm to convert the message into secret message. Second, the cover image is segmented into edge and non-edge pixels using Canny edge detection technique and then N1(two) and N2 (four) bits of the secret messages are buried into the edge and non-edge pixel areas using LSB technique. Finally, the essential parameters like N1, N2 and the length values are implanted into the last four pixels of the cover-image to obtain the stego-image. At the recipient side, the hidden data are extracted from the stego-image after extracting N1, N2 and length information. Then, the extracted secret data is decrypted using revised RSA algorithm. Modified RSA algorithm improves the security by using two pairs of keys. At last, the various performance metrics parameters such as entropy, MSE, peak signal to noise ratio and histogram are measured. It is observed that the proposed system attains improved efficiency, security and imperceptibility properties of information hiding from the results.
引用
收藏
页码:7235 / 7243
页数:9
相关论文
共 5 条
  • [1] RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique
    V. Kalaichelvi
    P. Meenakshi
    P. Vimala Devi
    H. Manikandan
    P. Venkateswari
    S. Swaminathan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 7235 - 7243
  • [2] Retraction Note to: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique
    V. Kalaichelvi
    P. Meenakshi
    P. Vimala Devi
    H. Manikandan
    P. Venkateswari
    S. Swaminathan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (Suppl 1) : 73 - 73
  • [3] An Improved Approach of Image Steganography Based on Least Significant Bit Technique for Secure Communication in Cloud
    Alam, Md. Khorshed
    Nushrat, Samia
    Patwary, Md. Amir Hamza
    Ullah, Ahsan
    Robin, Kazi Hassan
    [J]. ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 215 - 233
  • [4] RETRACTED: A novel approach for ranking customer reviews using a modified PSO-based aspect ranking algorithm (Retracted Article)
    Alfarraj, Osama
    AlZubi, Ahmad Ali
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : S3175 - S3181
  • [5] RETRACTED ARTICLE: A novel approach for ranking customer reviews using a modified PSO-based aspect ranking algorithm
    Osama Alfarraj
    Ahmad Ali AlZubi
    [J]. Cluster Computing, 2019, 22 : 3175 - 3181