Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 24, pp 32257–32273 | Cite as

Steganographic approach to enhancing secure data communication using contours and clustering

  • G. Manikandan
  • R. Bala Krishnan
  • N. Rajesh Kumar
  • D. Narasimhan
  • A. Srinivasan
  • N. R. Raajan
Article
  • 41 Downloads

Abstract

With the increasing developments in communication technologies, there is a need for extremely robust information exchange, which is the core aim of steganography. Steganography conceals this information into a trusted media, i.e., an image, video, or audio file, thereby masking its existence. In this paper, to improve the security of implanted data, a steganographic method is proposed that uses contours and clustering. Instead of using the entire image for embedding, the proposed method embeds the data in a particular location of the image that is obtained using a contour. Similar pixels inside the contour are grouped into clusters using the K-means clustering algorithm. Least-significant bit substitution is used to embed the data in the pixels of the cluster without causing any artifacts in the image. The experimental results indicate that our proposed scheme enhances security without degrading the image quality.

Keywords

Data hiding Image steganography Security LSB technique Geodesic active contours K-means clustering 

Notes

Acknowledgements

The authors would like to express sincere appreciation to the anonymous reviewers for their constructive comments and suggestions.

References

  1. 1.
    Afrakhteh M, Moon I, Lee JA (2014) Double phase modular steganography with the help of error images. Multimed Tools Appl 74:4833–4847CrossRefGoogle Scholar
  2. 2.
    Amirtharajan R, Balaguru Rayappan JB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124CrossRefGoogle Scholar
  3. 3.
    Amirtharajan R, Adharsh D, Vignesh V, Bosco J, Balaguru R (2010) PVDBlend with pixel indicator—OPAP composite for high fidelity steganography. Int J Comput Appl 7:31–37Google Scholar
  4. 4.
    Caselles V, Kimmel R, Sapiro G (1997) Geodesic active contours. Int J Comput Vis 22:61–79CrossRefGoogle Scholar
  5. 5.
    Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474CrossRefGoogle Scholar
  6. 6.
    Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786CrossRefGoogle Scholar
  7. 7.
    Chen SK (2011) A module-based LSB substitution method with lossless secret data compression. Comp Stand Interfaces 33:367–371CrossRefGoogle Scholar
  8. 8.
    Goel S, Rana A, Kaur M (2013) ADCT-based robust methodology for image steganography. Int J Image Graph Sig ProcessingGoogle Scholar
  9. 9.
    Gomathymeenakshi M, Sruti S, Karthikeyan B, Nayana M (2013) An efficient arithmetic coding data compression with steganography. IEEE Int Conf Emerging Trends Comput Commun and Nanotech, ICE-CCN 6528520:342–345Google Scholar
  10. 10.
    Gupta GK (2008) Introduction to data mining with case studies. Prentice Hall of IndiaGoogle Scholar
  11. 11.
    Hamad N (2010) Hiding text information in a digital image based on entropy function. Int Arab J Inf Tech 7:146–151Google Scholar
  12. 12.
    Han J, Kamber M (2006) Data mining: Concepts and techniques. Morgan Kauffman Publishers, AmsterdamzbMATHGoogle Scholar
  13. 13.
    Hossain M, Al Haque S, Sharmin F (2010) Variable rate steganography in gray scale digital images using neighborhood pixel information. Int Arab J Inf Tech 7:34–38Google Scholar
  14. 14.
    Karthikeyan B, Chakravarthy J, Ramasubramanian S (2012) Amalgamation of scanning paths and modified hill cipher for secure steganography. Aust J Basic Appl Sci 6:55–61Google Scholar
  15. 15.
    Karthikeyan B, Chakravarthy J, Vaithiyanathan V (2013) An enhanced Hill cipher approach for image encryption in steganography. Int J Electron Security Digit Forensics 5:178–187CrossRefGoogle Scholar
  16. 16.
    Karthikeyan B, Ramakrishnan S, Vaithiyanathan V, Sruti S, Gomathymeenakshi M (2014) An improved steganographic technique using LSB replacement on a scanned path image. Int J Netw Security 16:14–18Google Scholar
  17. 17.
    Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177:3099–3109CrossRefGoogle Scholar
  18. 18.
    Li X, Zhang T, Zhang Y, Li W, Li K (2014) A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl 68:1051–1068CrossRefGoogle Scholar
  19. 19.
    Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22:1–8CrossRefGoogle Scholar
  20. 20.
    Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85:2395–2404CrossRefGoogle Scholar
  21. 21.
    Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86:826–834CrossRefGoogle Scholar
  22. 22.
    Manikandan G, Ramakrishnan S, Baburam Sathiya Nijanthan P, Harikrishnaa R (2013) A N-queen based polynomial approach for image steganography. Int J Eng Tech 5:2828–2831Google Scholar
  23. 23.
    Modaghegh H, Seyedin SA (2014) A new fast and efficient active Steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74:5285–5843Google Scholar
  24. 24.
    Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud M (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Tech 8:147–154Google Scholar
  25. 25.
    Por YL, Beh D, Ang TF, Ong SY (2013) An enhanced mechanism for image steganography using sequential colour cycle algorithm. Int Arab J Inf Tech 10:51–60Google Scholar
  26. 26.
    Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44CrossRefGoogle Scholar
  27. 27.
    Stallings W (2010) Cryptography and network security: Principles and practice. 5th edn. Prentice Hall Press, BostonGoogle Scholar
  28. 28.
    Vaithiyanathan V, Karthikeyan B, Venkatraman B (2013) A novel approach for compressing welding radiographic images using multilevel steganography. Int J Appl Eng Res 8:949–956Google Scholar
  29. 29.
    Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683CrossRefGoogle Scholar
  30. 30.
    Wu YDC, Tsai WH (2003) A steganographic method for images by pixel value differencing. Pattern Recogn Lett 24:1613–1626CrossRefGoogle Scholar
  31. 31.
    Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84:2196–2207CrossRefGoogle Scholar
  32. 32.
    Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn 41:2674–2683CrossRefGoogle Scholar
  33. 33.
    Yang CH et al (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181:2218–2230CrossRefGoogle Scholar
  34. 34.
    Ziou D, Jafari R (2012) Efficient steganalysis of images: Learning is good for anticipation. Pattern Anal Applic 17:279–289MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • G. Manikandan
    • 1
  • R. Bala Krishnan
    • 2
  • N. Rajesh Kumar
    • 2
  • D. Narasimhan
    • 2
  • A. Srinivasan
    • 2
  • N. R. Raajan
    • 3
  1. 1.School of ComputingSASTRA UniversityThanjavurIndia
  2. 2.Srinivasa Ramanujan CentreSASTRA UniversityThanjavurIndia
  3. 3.School of EEESASTRA UniversityThanjavurIndia

Personalised recommendations