Abstract
With the increasing developments in communication technologies, there is a need for extremely robust information exchange, which is the core aim of steganography. Steganography conceals this information into a trusted media, i.e., an image, video, or audio file, thereby masking its existence. In this paper, to improve the security of implanted data, a steganographic method is proposed that uses contours and clustering. Instead of using the entire image for embedding, the proposed method embeds the data in a particular location of the image that is obtained using a contour. Similar pixels inside the contour are grouped into clusters using the K-means clustering algorithm. Least-significant bit substitution is used to embed the data in the pixels of the cluster without causing any artifacts in the image. The experimental results indicate that our proposed scheme enhances security without degrading the image quality.
Similar content being viewed by others
References
Afrakhteh M, Moon I, Lee JA (2014) Double phase modular steganography with the help of error images. Multimed Tools Appl 74:4833–4847
Amirtharajan R, Balaguru Rayappan JB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124
Amirtharajan R, Adharsh D, Vignesh V, Bosco J, Balaguru R (2010) PVDBlend with pixel indicator—OPAP composite for high fidelity steganography. Int J Comput Appl 7:31–37
Caselles V, Kimmel R, Sapiro G (1997) Geodesic active contours. Int J Comput Vis 22:61–79
Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469–474
Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786
Chen SK (2011) A module-based LSB substitution method with lossless secret data compression. Comp Stand Interfaces 33:367–371
Goel S, Rana A, Kaur M (2013) ADCT-based robust methodology for image steganography. Int J Image Graph Sig Processing
Gomathymeenakshi M, Sruti S, Karthikeyan B, Nayana M (2013) An efficient arithmetic coding data compression with steganography. IEEE Int Conf Emerging Trends Comput Commun and Nanotech, ICE-CCN 6528520:342–345
Gupta GK (2008) Introduction to data mining with case studies. Prentice Hall of India
Hamad N (2010) Hiding text information in a digital image based on entropy function. Int Arab J Inf Tech 7:146–151
Han J, Kamber M (2006) Data mining: Concepts and techniques. Morgan Kauffman Publishers, Amsterdam
Hossain M, Al Haque S, Sharmin F (2010) Variable rate steganography in gray scale digital images using neighborhood pixel information. Int Arab J Inf Tech 7:34–38
Karthikeyan B, Chakravarthy J, Ramasubramanian S (2012) Amalgamation of scanning paths and modified hill cipher for secure steganography. Aust J Basic Appl Sci 6:55–61
Karthikeyan B, Chakravarthy J, Vaithiyanathan V (2013) An enhanced Hill cipher approach for image encryption in steganography. Int J Electron Security Digit Forensics 5:178–187
Karthikeyan B, Ramakrishnan S, Vaithiyanathan V, Sruti S, Gomathymeenakshi M (2014) An improved steganographic technique using LSB replacement on a scanned path image. Int J Netw Security 16:14–18
Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177:3099–3109
Li X, Zhang T, Zhang Y, Li W, Li K (2014) A novel blind detector for additive noise steganography in JPEG decompressed images. Multimed Tools Appl 68:1051–1068
Liao X, Wen Q, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22:1–8
Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85:2395–2404
Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86:826–834
Manikandan G, Ramakrishnan S, Baburam Sathiya Nijanthan P, Harikrishnaa R (2013) A N-queen based polynomial approach for image steganography. Int J Eng Tech 5:2828–2831
Modaghegh H, Seyedin SA (2014) A new fast and efficient active Steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74:5285–5843
Mousa H, Moustafa K, Abdel-Wahed W, Hadhoud M (2011) Data hiding based on contrast mapping using DNA medium. Int Arab J Inf Tech 8:147–154
Por YL, Beh D, Ang TF, Ong SY (2013) An enhanced mechanism for image steganography using sequential colour cycle algorithm. Int Arab J Inf Tech 10:51–60
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1:32–44
Stallings W (2010) Cryptography and network security: Principles and practice. 5th edn. Prentice Hall Press, Boston
Vaithiyanathan V, Karthikeyan B, Venkatraman B (2013) A novel approach for compressing welding radiographic images using multilevel steganography. Int J Appl Eng Res 8:949–956
Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671–683
Wu YDC, Tsai WH (2003) A steganographic method for images by pixel value differencing. Pattern Recogn Lett 24:1613–1626
Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw 84:2196–2207
Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn 41:2674–2683
Yang CH et al (2011) Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf Sci 181:2218–2230
Ziou D, Jafari R (2012) Efficient steganalysis of images: Learning is good for anticipation. Pattern Anal Applic 17:279–289
Acknowledgements
The authors would like to express sincere appreciation to the anonymous reviewers for their constructive comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Manikandan, G., Bala Krishnan, R., Rajesh Kumar, N. et al. Steganographic approach to enhancing secure data communication using contours and clustering. Multimed Tools Appl 77, 32257–32273 (2018). https://doi.org/10.1007/s11042-018-6237-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6237-5