Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Steganographic approach to enhancing secure data communication using contours and clustering

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the increasing developments in communication technologies, there is a need for extremely robust information exchange, which is the core aim of steganography. Steganography conceals this information into a trusted media, i.e., an image, video, or audio file, thereby masking its existence. In this paper, to improve the security of implanted data, a steganographic method is proposed that uses contours and clustering. Instead of using the entire image for embedding, the proposed method embeds the data in a particular location of the image that is obtained using a contour. Similar pixels inside the contour are grouped into clusters using the K-means clustering algorithm. Least-significant bit substitution is used to embed the data in the pixels of the cluster without causing any artifacts in the image. The experimental results indicate that our proposed scheme enhances security without degrading the image quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Afrakhteh M, Moon I, Lee JA (2014) Double phase modular steganography with the help of error images. Multimed Tools Appl 74:4833–4847

    Article  Google Scholar 

  2. Amirtharajan R, Balaguru Rayappan JB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124

    Article  Google Scholar 

  3. Amirtharajan R, Adharsh D, Vignesh V, Bosco J, Balaguru R (2010) PVDBlend with pixel indicator—OPAP composite for high fidelity steganography. Int J Comput Appl 7:31–37

    Google Scholar 

  4. Caselles V, Kimmel R, Sapiro G (1997) Geodesic active contours. Int J Comput Vis 22:61–79

    Article  Google Scholar 

  5. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474

    Article  Google Scholar 

  6. Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786

    Article  Google Scholar 

  7. Chen SK (2011) A module-based LSB substitution method with lossless secret data compression. Comp Stand Interfaces 33:367–371

    Article  Google Scholar 

  8. Goel S, Rana A, Kaur M (2013) ADCT-based robust methodology for image steganography. Int J Image Graph Sig Processing

  9. Gomathymeenakshi M, Sruti S, Karthikeyan B, Nayana M (2013) An efficient arithmetic coding data compression with steganography. IEEE Int Conf Emerging Trends Comput Commun and Nanotech, ICE-CCN 6528520:342–345

    Google Scholar 

  10. Gupta GK (2008) Introduction to data mining with case studies. Prentice Hall of India

  11. Hamad N (2010) Hiding text information in a digital image based on entropy function. Int Arab J Inf Tech 7:146–151

    Google Scholar 

  12. Han J, Kamber M (2006) Data mining: Concepts and techniques. Morgan Kauffman Publishers, Amsterdam

    MATH  Google Scholar 

  13. Hossain M, Al Haque S, Sharmin F (2010) Variable rate steganography in gray scale digital images using neighborhood pixel information. Int Arab J Inf Tech 7:34–38

    Google Scholar 

  14. Karthikeyan B, Chakravarthy J, Ramasubramanian S (2012) Amalgamation of scanning paths and modified hill cipher for secure steganography. Aust J Basic Appl Sci 6:55–61

    Google Scholar 

  15. Karthikeyan B, Chakravarthy J, Vaithiyanathan V (2013) An enhanced Hill cipher approach for image encryption in steganography. Int J Electron Security Digit Forensics 5:178–187

    Article  Google Scholar 

  16. Karthikeyan B, Ramakrishnan S, Vaithiyanathan V, Sruti S, Gomathymeenakshi M (2014) An improved steganographic technique using LSB replacement on a scanned path image. Int J Netw Security 16:14–18

    Google Scholar 

  17. Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177:3099–3109

    Article  Google Scholar 

  18. Li X, Zhang T, Zhang Y, Li W, Li K (2014) A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl 68:1051–1068

    Article  Google Scholar 

  19. Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22:1–8

    Article  Google Scholar 

  20. Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85:2395–2404

    Article  Google Scholar 

  21. Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86:826–834

    Article  Google Scholar 

  22. Manikandan G, Ramakrishnan S, Baburam Sathiya Nijanthan P, Harikrishnaa R (2013) A N-queen based polynomial approach for image steganography. Int J Eng Tech 5:2828–2831

    Google Scholar 

  23. Modaghegh H, Seyedin SA (2014) A new fast and efficient active Steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74:5285–5843

    Google Scholar 

  24. Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud M (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Tech 8:147–154

    Google Scholar 

  25. Por YL, Beh D, Ang TF, Ong SY (2013) An enhanced mechanism for image steganography using sequential colour cycle algorithm. Int Arab J Inf Tech 10:51–60

    Google Scholar 

  26. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44

    Article  Google Scholar 

  27. Stallings W (2010) Cryptography and network security: Principles and practice. 5th edn. Prentice Hall Press, Boston

    Google Scholar 

  28. Vaithiyanathan V, Karthikeyan B, Venkatraman B (2013) A novel approach for compressing welding radiographic images using multilevel steganography. Int J Appl Eng Res 8:949–956

    Google Scholar 

  29. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683

    Article  Google Scholar 

  30. Wu YDC, Tsai WH (2003) A steganographic method for images by pixel value differencing. Pattern Recogn Lett 24:1613–1626

    Article  Google Scholar 

  31. Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84:2196–2207

    Article  Google Scholar 

  32. Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn 41:2674–2683

    Article  Google Scholar 

  33. Yang CH et al (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181:2218–2230

    Article  Google Scholar 

  34. Ziou D, Jafari R (2012) Efficient steganalysis of images: Learning is good for anticipation. Pattern Anal Applic 17:279–289

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to express sincere appreciation to the anonymous reviewers for their constructive comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Manikandan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manikandan, G., Bala Krishnan, R., Rajesh Kumar, N. et al. Steganographic approach to enhancing secure data communication using contours and clustering. Multimed Tools Appl 77, 32257–32273 (2018). https://doi.org/10.1007/s11042-018-6237-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6237-5

Keywords

Navigation