Skip to main content

Steganographic Approach to Enhance Secure Data Communication Using Nonograms

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1056))

Abstract

In the present scenario the security of data is of utmost importance. While cryptographic techniques render the data unintelligible, steganography conceals the presence of the data itself. There are many pre-existing methods of steganography that involve hiding encrypted data in various mediums such as images, videos, audio, etc. In this project, we are going to focus on data hiding in images. There are numerous ways to embed data into images out of which the most widely used is the least-significant-bit substitution, in this method the least-significant bits of each pixel are substituted with the data instead. Nonograms are Japanese grid-based puzzles which when solved produce a picture composed of square blocks. We are using the puzzle to divide the cover image into blocks and then we use k-means clustering to select the pixels for LSB substitution thereby going a step further and hiding the hidden data in RGB images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Manikandan, G., Bala Krishnan, R., Rajesh Kumar, N., et al.: Multimed Tools Appl. 77, 32257 (2008). https://doi.org/10.1007/s11042-018-6237-5

    Article  Google Scholar 

  2. Shifa, A., et al.: Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access 6, 16189–16206 (2018)

    Article  Google Scholar 

  3. Jing, M.Q., Yu, C.H., Lee, H.L., Chen, L.H.: Solving Japanese puzzles with logical rules and depth first search algorithm. Int. Conf. Mach. Learn. Cybernetics 2009, 12–15 (2009)

    Google Scholar 

  4. Kumari, T., Singh K.: A review on information hiding methods. Int. J. Eng. Sci. Comput. (2018, May)

    Google Scholar 

  5. Bobko, A., Grzywacz, T.: Solving nonograms using genetic algorithms. In: 2016 17th International Conference Computational Problems of Electrical Engineering (CPEE), pp. 1–4. Sandomierz (2016)

    Google Scholar 

  6. Ghosh, E., Debnath, D., Gupta Banik, B.: Blind RGB image steganography using discrete cosine transformation. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta S. (eds.) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol. 814. Springer, Singapore (2018)

    Google Scholar 

  7. SaiKrishna, A., Parimi, S., Manikandan, G., Sairam, N.: A clustering based steganographic approach for secure data communication. In: 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], pp. 1–5. Nagercoil (2015)

    Google Scholar 

  8. Wiggers, W.A.: A comparison of a genetic algorithm and a depth first search algorithm applied to Japanese nonograms. In Twente Student Conference on IT (2004)

    Google Scholar 

  9. Manikandan, G., Ramakrishnan, S., BaburamSathiyaNijanthan, P., Harikrishnhaa, R.: A N-queen based polynomial approach for image steganography. Int. J. Eng. Technol. 5(3), 2828–2831 (2013)

    Google Scholar 

  10. Prajapati, H.A., Chitaliya, N.G.: Secured and robust dual image steganography: a survey. Int. J. Innovative Res. Comput. Commun. Eng. 3, 30–37 (2015)

    Article  Google Scholar 

  11. Joshi, K., Yadav, R.: A new LSB-S image steganography method blend with cryptography for secret communication. In: 2015 Third International Conference on Image Information Processing (ICIIP), pp. 86–90. IEEE (2015)

    Google Scholar 

  12. Charan, G.S., Nithin Kumar S.S.V., Karthikeyan, B., Vaithiyanathan, V., Divya Lakshmi, K.”: A novel LSB based image steganography with multi-level encryption. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1–5. IEEE (2015)

    Google Scholar 

  13. Jain, M., Lenka, S.K.: Secret data transmission using vital image steganography over transposition cipher. In: 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1026–1029. IEEE (2015)

    Google Scholar 

  14. Qiao, X., Ji, G., Zheng, H.: A new method of steganalysis based on image entropy. 2, 810–815 (2007). https://doi.org/10.1007/978-3-540-74282-1_90

  15. Al-Omari, Z.Y., Al-Taani, A.T.: Secure LSB steganography for colored images using character-color mapping. In: 2017 8th International Conference on Information and Communication Systems (ICICS), Irbid, 2017, pp. 104–110. https://doi.org/10.1109/iacs.2017.7921954

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. R. Jansi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jansi, K.R., Muthusamy, S.H. (2020). Steganographic Approach to Enhance Secure Data Communication Using Nonograms. In: Dash, S., Lakshmi, C., Das, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-15-0199-9_60

Download citation

Publish with us

Policies and ethics