Abstract
The steganography is a graceful tactic to convey the confidential information to an authorized recipient with the most reliable safety measure which leads to avoiding the breaches of data security. Nowadays the significance of taking strong protection measures in data communication medium has a challenging task because of the security related issues which are developed by unauthorized intervention. This presentation intends to provide a new approach based on a combination of Steganography and Cryptography procedure for inserting the hidden data into a cover object and obtain high data embedding capacity with an improved security level. In this approach, the Elliptic Curve Cryptography algorithm is used to encrypt the hidden information and the encrypted data inserted into a cover object by the process of the LSB Inversion algorithm. This blend of technology has successfully reached the benchmark level of some essential properties known as data confidentiality, integrity verification, capacity and robustness which are the evidence to prove the excellent performance and effective implementation of this steganography process. This new approach intensely tested through several steganalysis attacks such as analysis of visual, histogram, and chi-square. The outcome of the experimental result shown that the stego image has delivered the strong opposition force against all attacks. The data embedding capacity has attained at an improved level compared with typical methods.
Similar content being viewed by others
Change history
14 June 2023
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11042-023-16005-5
References
Chang C-C, Lin M-H, Hu Y-C (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16(4):399–416
Desoky A (2008) A novel noiseless SteganographyParadigm. Journal of Digital Forensic practice 2:132–139. https://doi.org/10.1080/1556728080
Kekre HB, Athawale A, Halarnkar PN (2009) Performance Evaluation of Pixel Value Differencing And Kekre’s Modified Algorithm For Information Hiding In Images, Proceedings of the ACM International Conference on Advances in Computing, Communication and Control (ICAC3),pp.342–346
Kumar PM, Lokesh S, Varatharajan R, Babu GC, Parthasarathy P (2018) Cloud and IoT based disease prediction and diagnosis system for healthcare using fuzzy neural classifier. Futur Gener Comput Syst 86:527–534
Liao X, Wena Q-y, Zhang J (2010) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. IEEE Transaction on Image Processing 10(22):1–8
Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic Tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Computing and Applications, 1–11
Mandal JK, Das D (2012) Steganography Using Adaptive Pixel Value Differencing (APVD) for Gray Images through Exclusion of Underflow/Overflow, Computer Science & Information Series, ISBN: 978–1–921987-03-8, pp. 93–102
Mathan K, Kumar PM, Panchatcharam P, Manogaran G, Varadharajan R (2018) A novel Gini index decision tree data mining method with neural network classifiers for prediction of heart disease. Design Automation for Embedded Systems, 1–18
Mei-Yi W, Yu-Kun H, Jia-Hong L (2004) An iterative method of palette-based image steganography. Journal of Pattern Recognition Letters 25. https://doi.org/10.1016/j.patrec.2003.10.013
Parthasarathy P, Vivekanandan S (2018) A numerical modelling of an amperometric-enzymatic based uric acid biosensor for GOUT arthritis diseases. Informatics in Medicine Unlocked
Parthasarathy P, Vivekanandan S (2018) Investigation on uric acid biosensor model for enzyme layer thickness for the application of arthritis disease diagnosis. Health information science and systems 6:1–6
Parthasarathy P, Vivekanandan S (2018) A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm. International Journal of Computers and Applications, 1–11
Shanthakumari R, Malliga S (2015) Data hiding in image using tree based parity check with LSB matching revisited algorithm. International Journal of Innovative Research in Computer and Communication Engineering 3(6)
Shanthakumari R, Malliga S (2017) Information hiding in digital images using modified LSB substitution with multi-pixel differencing and HL code. Asian Journal of Research in Social Sciences and Humanities 7(1):198–207
Shanthakumari R, Malliga S, Dheepika S (2014) Data hiding scheme in spatial domain. International Journal of Computer Science Engineering and Technology 4(12):400–403
Sharmila B, Shanthakumari R (2012) Efficient adaptive steganography for color images based on LSBMR algorithm, ICTACT Journal on Image and Video Processing, 02, 03
Sundarasekar R, Thanjaivadivel M, Manogaran G, Kumar PM, Varatharajan R, Chilamkurti N, Hsu CH (2018) Internet of things with maximal overlap discrete wavelet transform for remote health monitoring of abnormal ECG signals. J Med Syst 42(11):228
Tyagi V, Kumar A (2012) Image steganography using least significant bit with cryptography. Journal of Global Research in Computer Science 3(3):53–55
Varadharajan R, Priyan MK, Panchatcharam P, Vivekanandan S, Gunasekaran M, (2018) A new approach for prediction of lung carcinoma using back propagation neural network with decision tree classifiers. Journal of Ambient Intelligence and Humanized Computing, 1–12
Varatharajan R, Preethi AP, Manogaran G, Kumar PM, Sundarasekar R (2018) Stealthy attack detection in multi-channel multi-radio wireless networks. Multimedia Tools and Applications, 1–24
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel- value differencing and LSB replacement methods. IEE Proceedings Vision, Image and Signal Processing 152(5):611–615
Xiang-yang L, Wang D, Ping W, Fen-lin L (2008) A review on blind detection for image steganography. J Signal Process 88(9):2138–2157. https://doi.org/10.1016/j.sigpro.2008.03.016
Yang C-H, Weng C-Y, Tso H-K, Wang S-J (2011) A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J Syst Softw 84(4):669–678
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Processing Letters 18(4):255–258
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest from the authors.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11042-023-16005-5"
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shanthakumari, R., Malliga, S. RETRACTED ARTICLE: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79, 3975–3991 (2020). https://doi.org/10.1007/s11042-019-7584-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7584-6