Skip to main content
Log in

RETRACTED ARTICLE: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

This article was retracted on 14 June 2023

This article has been updated

Abstract

The steganography is a graceful tactic to convey the confidential information to an authorized recipient with the most reliable safety measure which leads to avoiding the breaches of data security. Nowadays the significance of taking strong protection measures in data communication medium has a challenging task because of the security related issues which are developed by unauthorized intervention. This presentation intends to provide a new approach based on a combination of Steganography and Cryptography procedure for inserting the hidden data into a cover object and obtain high data embedding capacity with an improved security level. In this approach, the Elliptic Curve Cryptography algorithm is used to encrypt the hidden information and the encrypted data inserted into a cover object by the process of the LSB Inversion algorithm. This blend of technology has successfully reached the benchmark level of some essential properties known as data confidentiality, integrity verification, capacity and robustness which are the evidence to prove the excellent performance and effective implementation of this steganography process. This new approach intensely tested through several steganalysis attacks such as analysis of visual, histogram, and chi-square. The outcome of the experimental result shown that the stego image has delivered the strong opposition force against all attacks. The data embedding capacity has attained at an improved level compared with typical methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

References

  1. Chang C-C, Lin M-H, Hu Y-C (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16(4):399–416

    Article  Google Scholar 

  2. Desoky A (2008) A novel noiseless SteganographyParadigm. Journal of Digital Forensic practice 2:132–139. https://doi.org/10.1080/1556728080

    Article  Google Scholar 

  3. Kekre HB, Athawale A, Halarnkar PN (2009) Performance Evaluation of Pixel Value Differencing And Kekre’s Modified Algorithm For Information Hiding In Images, Proceedings of the ACM International Conference on Advances in Computing, Communication and Control (ICAC3),pp.342–346

  4. Kumar PM, Lokesh S, Varatharajan R, Babu GC, Parthasarathy P (2018) Cloud and IoT based disease prediction and diagnosis system for healthcare using fuzzy neural classifier. Futur Gener Comput Syst 86:527–534

    Article  Google Scholar 

  5. Liao X, Wena Q-y, Zhang J (2010) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. IEEE Transaction on Image Processing 10(22):1–8

    Google Scholar 

  6. Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic Tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Computing and Applications, 1–11

  7. Mandal JK, Das D (2012) Steganography Using Adaptive Pixel Value Differencing (APVD) for Gray Images through Exclusion of Underflow/Overflow, Computer Science & Information Series, ISBN: 978–1–921987-03-8, pp. 93–102

  8. Mathan K, Kumar PM, Panchatcharam P, Manogaran G, Varadharajan R (2018) A novel Gini index decision tree data mining method with neural network classifiers for prediction of heart disease. Design Automation for Embedded Systems, 1–18

  9. Mei-Yi W, Yu-Kun H, Jia-Hong L (2004) An iterative method of palette-based image steganography. Journal of Pattern Recognition Letters 25. https://doi.org/10.1016/j.patrec.2003.10.013

  10. Parthasarathy P, Vivekanandan S (2018) A numerical modelling of an amperometric-enzymatic based uric acid biosensor for GOUT arthritis diseases. Informatics in Medicine Unlocked

  11. Parthasarathy P, Vivekanandan S (2018) Investigation on uric acid biosensor model for enzyme layer thickness for the application of arthritis disease diagnosis. Health information science and systems 6:1–6

    Article  Google Scholar 

  12. Parthasarathy P, Vivekanandan S (2018) A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm. International Journal of Computers and Applications, 1–11

  13. Shanthakumari R, Malliga S (2015) Data hiding in image using tree based parity check with LSB matching revisited algorithm. International Journal of Innovative Research in Computer and Communication Engineering 3(6)

  14. Shanthakumari R, Malliga S (2017) Information hiding in digital images using modified LSB substitution with multi-pixel differencing and HL code. Asian Journal of Research in Social Sciences and Humanities 7(1):198–207

    Article  Google Scholar 

  15. Shanthakumari R, Malliga S, Dheepika S (2014) Data hiding scheme in spatial domain. International Journal of Computer Science Engineering and Technology 4(12):400–403

    Google Scholar 

  16. Sharmila B, Shanthakumari R (2012) Efficient adaptive steganography for color images based on LSBMR algorithm, ICTACT Journal on Image and Video Processing, 02, 03

  17. Sundarasekar R, Thanjaivadivel M, Manogaran G, Kumar PM, Varatharajan R, Chilamkurti N, Hsu CH (2018) Internet of things with maximal overlap discrete wavelet transform for remote health monitoring of abnormal ECG signals. J Med Syst 42(11):228

    Article  Google Scholar 

  18. Tyagi V, Kumar A (2012) Image steganography using least significant bit with cryptography. Journal of Global Research in Computer Science 3(3):53–55

    Google Scholar 

  19. Varadharajan R, Priyan MK, Panchatcharam P, Vivekanandan S, Gunasekaran M, (2018) A new approach for prediction of lung carcinoma using back propagation neural network with decision tree classifiers. Journal of Ambient Intelligence and Humanized Computing, 1–12

  20. Varatharajan R, Preethi AP, Manogaran G, Kumar PM, Sundarasekar R (2018) Stealthy attack detection in multi-channel multi-radio wireless networks. Multimedia Tools and Applications, 1–24

  21. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel- value differencing and LSB replacement methods. IEE Proceedings Vision, Image and Signal Processing 152(5):611–615

    Article  Google Scholar 

  22. Xiang-yang L, Wang D, Ping W, Fen-lin L (2008) A review on blind detection for image steganography. J Signal Process 88(9):2138–2157. https://doi.org/10.1016/j.sigpro.2008.03.016

    Article  MATH  Google Scholar 

  23. Yang C-H, Weng C-Y, Tso H-K, Wang S-J (2011) A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J Syst Softw 84(4):669–678

    Article  Google Scholar 

  24. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Processing Letters 18(4):255–258

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Shanthakumari.

Ethics declarations

Conflict of interest

There is no conflict of interest from the authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11042-023-16005-5"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shanthakumari, R., Malliga, S. RETRACTED ARTICLE: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79, 3975–3991 (2020). https://doi.org/10.1007/s11042-019-7584-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7584-6

Keywords

Navigation