A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique

12Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, due to the rapid technological growth of information technology billions of data transferred through the network around the world in a fraction of seconds. To protect the transferred information from unauthorized access, security mechanism is required. At this point, significant role is performed by a technology called information security. So, to provide security, various techniques have been evolved such as cryptography, steganography and digital watermarking. Cryptography converts the message into scrambled format whereas in steganography the secret message is buried in the digital media. In this paper, both cryptography and steganography is combined to safeguard the information. First, the message is encrypted with the help of revised RSA algorithm to convert the message into secret message. Second, the cover image is segmented into edge and non-edge pixels using Canny edge detection technique and then N1(two) and N2 (four) bits of the secret messages are buried into the edge and non-edge pixel areas using LSB technique. Finally, the essential parameters like N1, N2 and the length values are implanted into the last four pixels of the cover-image to obtain the stego-image. At the recipient side, the hidden data are extracted from the stego-image after extracting N1, N2 and length information. Then, the extracted secret data is decrypted using revised RSA algorithm. Modified RSA algorithm improves the security by using two pairs of keys. At last, the various performance metrics parameters such as entropy, MSE, peak signal to noise ratio and histogram are measured. It is observed that the proposed system attains improved efficiency, security and imperceptibility properties of information hiding from the results.

References Powered by Scopus

Digital image steganography: Survey and analysis of current methods

1356Citations
N/AReaders
Get full text

Hide and seek: An introduction to steganography

826Citations
N/AReaders
Get full text

Reversible data hiding based on histogram modification of pixel differences

579Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

37Citations
N/AReaders
Get full text

An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing

33Citations
N/AReaders
Get full text

A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN

19Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kalaichelvi, V., Meenakshi, P., Vimala Devi, P., Manikandan, H., Venkateswari, P., & Swaminathan, S. (2021, July 1). A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique. Journal of Ambient Intelligence and Humanized Computing. Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s12652-020-02398-w

Readers over time

‘21‘22‘23‘2402468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

80%

Lecturer / Post doc 1

20%

Readers' Discipline

Tooltip

Computer Science 8

100%

Save time finding and organizing research with Mendeley

Sign up for free
0