Steganographic approach to enhancing secure data communication using contours and clustering

With the increasing developments in communication technologies, there is a need for extremely robust information exchange, which is the core aim of steganography. Steganography conceals this information into a trusted media, i.e., an image, video, or audio file, thereby masking its existence. In this paper, to improve the security of implanted data, a steganographic method is proposed that uses contours and clustering. Instead of using the entire image for embedding, the proposed method embeds the data in a particular location of the image that is obtained using a contour. Similar pixels inside the contour are grouped into clusters using the K-means clustering algorithm. Least-significant bit substitution is used to embed the data in the pixels of the cluster without causing any artifacts in the image. The experimental results indicate that our proposed scheme enhances security without degrading the image quality.

[1]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[2]  Simying Ong,et al.  An enhanced mechanism for image steganography using sequential colour cycle algorithm , 2013, Int. Arab J. Inf. Technol..

[3]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[4]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[5]  Hamed Modaghegh,et al.  A new fast and efficient active steganalysis based on combined geometrical blind source separation , 2014, Multimedia Tools and Applications.

[6]  Manpreet Kaur,et al.  ADCT-based Robust Methodology for Image Steganography , 2013 .

[7]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[8]  S. Ramakrishnan,et al.  An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image , 2014, Int. J. Netw. Secur..

[9]  G. Manikandan,et al.  A N-QUEEN BASED POLYNOMIAL APPROACH FOR IMAGE STEGANOGRAPHY , 2013 .

[10]  Tao Zhang,et al.  A novel blind detector for additive noise steganography in JPEG decompressed images , 2012, Multimedia Tools and Applications.

[11]  Yih-Kai Lin,et al.  High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..

[12]  Qiaoyan Wen,et al.  A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..

[13]  Jagannathan Chakravarthy,et al.  An enhanced Hill cipher approach for image encryption in steganography , 2013, Int. J. Electron. Secur. Digit. Forensics.

[14]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[15]  Jeong-A Lee,et al.  Double phase modular steganography with the help of error images , 2013, Multimedia Tools and Applications.

[16]  Cheng-Hsing Yang,et al.  Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[17]  Rengarajan Amirtharajan,et al.  PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography , 2010 .

[18]  Gopal K Gupta,et al.  Introduction to Data Mining with Case Studies , 2011 .

[19]  Guillermo Sapiro,et al.  Geodesic Active Contours , 1995, International Journal of Computer Vision.

[20]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[21]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[22]  Moazzam Hossain,et al.  Variable rate Steganography in gray scale digital images using neighborhood pixel information , 2009, 2009 12th International Conference on Computers and Information Technology.

[23]  Shang-Kuan Chen A module-based LSB substitution method with lossless secret data compression , 2011, Comput. Stand. Interfaces.

[24]  Reza Jafari,et al.  Efficient steganalysis of images: learning is good for anticipation , 2012, Pattern Analysis and Applications.

[25]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[26]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[27]  B. Karthikeyan,et al.  An efficient arithmetic coding data compression with steganography , 2013, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).

[28]  Hongjun Liu,et al.  Triple-image encryption scheme based on one-time key stream generated by chaos and plain images , 2013, J. Syst. Softw..

[29]  Mohey M. Hadhoud,et al.  Data hiding based on contrast mapping using DNA medium , 2011, Int. Arab J. Inf. Technol..

[30]  Nasser Hamad,et al.  Hiding Text Information in a Digital Image Based on Entropy Function , 2010, Int. Arab J. Inf. Technol..

[31]  B. Karthikeyan,et al.  Amalgamation of Scanning paths and Modified Hill Cipher for Secure Steganography , 2012 .

[32]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[33]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..