2019
DOI: 10.1007/s11042-019-7584-6
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…This reference paper produced good image quality and embedding capability comparison with existing work. Shanthakumari, R. and S. Malliga (2020) [7] in this approach, authors proposed the Elliptic Curve Cryptography rule is employed to encrypt the hidden data and also the encrypted knowledge inserted into a cover object by the method of the LSB Inversion rule. This mix of technology has with success reached the benchmark level of some essential properties referred to acknowledge confidentiality, integrity verification, capability and robustness that are the evidence to prove the excellent performance and effective implementation of this steganography method.…”
Section: Related Workmentioning
confidence: 99%
“…This reference paper produced good image quality and embedding capability comparison with existing work. Shanthakumari, R. and S. Malliga (2020) [7] in this approach, authors proposed the Elliptic Curve Cryptography rule is employed to encrypt the hidden data and also the encrypted knowledge inserted into a cover object by the method of the LSB Inversion rule. This mix of technology has with success reached the benchmark level of some essential properties referred to acknowledge confidentiality, integrity verification, capability and robustness that are the evidence to prove the excellent performance and effective implementation of this steganography method.…”
Section: Related Workmentioning
confidence: 99%
“…Let the set {O, G, 2G, 3G, (n − 1) G} be a cyclic subgroup generated by G on E: (a, b). If d is selected as the private key and P � dG as the public key, the problem of finding d from P is the discrete logarithm problem (ECDLP) on elliptic curve group, which is the mathematical basis of elliptic curve encryption algorithm [14].…”
Section: Sm2 Digitalmentioning
confidence: 99%
“…Then, a coupling of the generated key stream and the three components of RGB color pixels was performed to encrypt the permuted components. In study [20], the following process took place: information to be hidden was encrypted using the Elliptic Curve Cryptography algorithm; then, the LSB Inversion algorithm was used to insert the encrypted data into a cover object. Several modes of attack were used to test the security of this method.…”
Section: Related Workmentioning
confidence: 99%