RETRACTED ARTICLE: A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique

Nowadays, due to the rapid technological growth of information technology billions of data transferred through the network around the world in a fraction of seconds. To protect the transferred information from unauthorized access, security mechanism is required. At this point, significant role is performed by a technology called information security. So, to provide security, various techniques have been evolved such as cryptography, steganography and digital watermarking. Cryptography converts the message into scrambled format whereas in steganography the secret message is buried in the digital media. In this paper, both cryptography and steganography is combined to safeguard the information. First, the message is encrypted with the help of revised RSA algorithm to convert the message into secret message. Second, the cover image is segmented into edge and non-edge pixels using Canny edge detection technique and then N1(two) and N2 (four) bits of the secret messages are buried into the edge and non-edge pixel areas using LSB technique. Finally, the essential parameters like N1, N2 and the length values are implanted into the last four pixels of the cover-image to obtain the stego-image. At the recipient side, the hidden data are extracted from the stego-image after extracting N1, N2 and length information. Then, the extracted secret data is decrypted using revised RSA algorithm. Modified RSA algorithm improves the security by using two pairs of keys. At last, the various performance metrics parameters such as entropy, MSE, peak signal to noise ratio and histogram are measured. It is observed that the proposed system attains improved efficiency, security and imperceptibility properties of information hiding from the results.

[1]  Malin Premaratne,et al.  Key-Based Scrambling for Secure Image Communication , 2012, ICIC.

[2]  Jiying Zhao,et al.  An Image Quality Evaluation Method Based on Digital Watermarking , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Lin Guoying,et al.  An edge-detection method based on adaptive canny algorithm and iterative segmentation threshold , 2016, 2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE).

[4]  Donovan Artz,et al.  Spotlight: Digital Steganography , 2001, IEEE Internet Comput..

[5]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[6]  J. Jennifer Ranjani,et al.  Data hiding using pseudo magic squares for embedding high payload in digital images , 2017, Multimedia Tools and Applications.

[7]  N. Sivanandam,et al.  A Survey on Cryptography using Optimization algorithms in WSNs , 2015 .

[8]  S. Han,et al.  A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[9]  José Raymundo Marcial-Romero,et al.  A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography , 2018, Int. J. Pattern Recognit. Artif. Intell..

[10]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[11]  K. Vijayakumar,et al.  Stock market analysis using candlestick regression and market trend prediction (CKRM) , 2020, Journal of Ambient Intelligence and Humanized Computing.

[12]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[13]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[14]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[15]  M. Nithya,et al.  Secured segmentation for ICD datasets , 2020 .

[16]  Ahmad Habibizad Navin,et al.  An Optimized Color Image Steganography Using LFSR and DFT Techniques , 2011 .

[17]  Gandharba Swain,et al.  A Steganographic Method Combining LSB Substitution and PVD in a Block , 2016 .

[18]  R. S. Bichkar,et al.  A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .

[19]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[20]  Karim Faez,et al.  Adaptive image steganography based on transform domain via genetic algorithm , 2017 .

[21]  Majid A. Al-Taee,et al.  High-capacity image steganography based on Haar DWT for hiding miscellaneous data , 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).

[22]  Nidhi Chandrakar,et al.  Study and comparison of various image edge detection techniques , 2012 .

[23]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[24]  Chin-Chen Chang,et al.  Reversible Data Hiding Based on Histogram Modification of Pixel Differences , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[25]  Vijay Kumar,et al.  A modified DWT-based image steganography technique , 2017, Multimedia Tools and Applications.

[26]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[27]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[28]  C. Arun,et al.  Automated risk identification using NLP in cloud based development environments , 2017 .

[29]  Frank Y. Shih,et al.  Digital Watermarking and Steganography , 2007 .

[30]  Gandharba Swain,et al.  Performance evaluation parameters of image steganography techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).

[31]  M. S. Sutaone,et al.  Image based steganography using LSB insertion , 2008 .