Abstract
In the present scenario the security of data is of utmost importance. While cryptographic techniques render the data unintelligible, steganography conceals the presence of the data itself. There are many pre-existing methods of steganography that involve hiding encrypted data in various mediums such as images, videos, audio, etc. In this project, we are going to focus on data hiding in images. There are numerous ways to embed data into images out of which the most widely used is the least-significant-bit substitution, in this method the least-significant bits of each pixel are substituted with the data instead. Nonograms are Japanese grid-based puzzles which when solved produce a picture composed of square blocks. We are using the puzzle to divide the cover image into blocks and then we use k-means clustering to select the pixels for LSB substitution thereby going a step further and hiding the hidden data in RGB images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Manikandan, G., Bala Krishnan, R., Rajesh Kumar, N., et al.: Multimed Tools Appl. 77, 32257 (2008). https://doi.org/10.1007/s11042-018-6237-5
Shifa, A., et al.: Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access 6, 16189–16206 (2018)
Jing, M.Q., Yu, C.H., Lee, H.L., Chen, L.H.: Solving Japanese puzzles with logical rules and depth first search algorithm. Int. Conf. Mach. Learn. Cybernetics 2009, 12–15 (2009)
Kumari, T., Singh K.: A review on information hiding methods. Int. J. Eng. Sci. Comput. (2018, May)
Bobko, A., Grzywacz, T.: Solving nonograms using genetic algorithms. In: 2016 17th International Conference Computational Problems of Electrical Engineering (CPEE), pp. 1–4. Sandomierz (2016)
Ghosh, E., Debnath, D., Gupta Banik, B.: Blind RGB image steganography using discrete cosine transformation. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta S. (eds.) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol. 814. Springer, Singapore (2018)
SaiKrishna, A., Parimi, S., Manikandan, G., Sairam, N.: A clustering based steganographic approach for secure data communication. In: 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], pp. 1–5. Nagercoil (2015)
Wiggers, W.A.: A comparison of a genetic algorithm and a depth first search algorithm applied to Japanese nonograms. In Twente Student Conference on IT (2004)
Manikandan, G., Ramakrishnan, S., BaburamSathiyaNijanthan, P., Harikrishnhaa, R.: A N-queen based polynomial approach for image steganography. Int. J. Eng. Technol. 5(3), 2828–2831 (2013)
Prajapati, H.A., Chitaliya, N.G.: Secured and robust dual image steganography: a survey. Int. J. Innovative Res. Comput. Commun. Eng. 3, 30–37 (2015)
Joshi, K., Yadav, R.: A new LSB-S image steganography method blend with cryptography for secret communication. In: 2015 Third International Conference on Image Information Processing (ICIIP), pp. 86–90. IEEE (2015)
Charan, G.S., Nithin Kumar S.S.V., Karthikeyan, B., Vaithiyanathan, V., Divya Lakshmi, K.”: A novel LSB based image steganography with multi-level encryption. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–5. IEEE (2015)
Jain, M., Lenka, S.K.: Secret data transmission using vital image steganography over transposition cipher. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1026–1029. IEEE (2015)
Qiao, X., Ji, G., Zheng, H.: A new method of steganalysis based on image entropy. 2, 810–815 (2007). https://doi.org/10.1007/978-3-540-74282-1_90
Al-Omari, Z.Y., Al-Taani, A.T.: Secure LSB steganography for colored images using character-color mapping. In: 2017 8th International Conference on Information and Communication Systems (ICICS), Irbid, 2017, pp. 104–110. https://doi.org/10.1109/iacs.2017.7921954
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jansi, K.R., Muthusamy, S.H. (2020). Steganographic Approach to Enhance Secure Data Communication Using Nonograms. In: Dash, S., Lakshmi, C., Das, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-15-0199-9_60
Download citation
DOI: https://doi.org/10.1007/978-981-15-0199-9_60
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0198-2
Online ISBN: 978-981-15-0199-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)