CFP last date
20 January 2025
Reseach Article

An Approach to Steganography using Local Binary Pattern on CIELAB based K-Means Clustering

Published on September 2015 by Diljeet Singh, Navdeep Kanwal
CAE Proceedings on International Conference on Communication Technology
Foundation of Computer Science USA
ICCT2015 - Number 5
September 2015
Authors: Diljeet Singh, Navdeep Kanwal
5c4d18eb-13cb-4ff5-b389-a67278cf9581

Diljeet Singh, Navdeep Kanwal . An Approach to Steganography using Local Binary Pattern on CIELAB based K-Means Clustering. CAE Proceedings on International Conference on Communication Technology. ICCT2015, 5 (September 2015), 35-40.

@article{
author = { Diljeet Singh, Navdeep Kanwal },
title = { An Approach to Steganography using Local Binary Pattern on CIELAB based K-Means Clustering },
journal = { CAE Proceedings on International Conference on Communication Technology },
issue_date = { September 2015 },
volume = { ICCT2015 },
number = { 5 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 35-40 },
numpages = 6,
url = { /proceedings/icct2015/number5/22669-1574/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 CAE Proceedings on International Conference on Communication Technology
%A Diljeet Singh
%A Navdeep Kanwal
%T An Approach to Steganography using Local Binary Pattern on CIELAB based K-Means Clustering
%J CAE Proceedings on International Conference on Communication Technology
%@ 0975-8887
%V ICCT2015
%N 5
%P 35-40
%D 2015
%I International Journal of Computer Applications
Abstract

Steganography is the art and science of secret communication. Various types of media, such as images, videos, audio etc. can be used to hide the message. This paper presents an approach to steganography using LBP on a cluster formed by the CIELAB (Informally called Lab) based k-means clustering. Image Steganography embeds the secret message into the images exclusively. Basically Image Steganography uses LSB of pixels to embed the message, but this lone technique is easily detectable, so LBP is the technique which is used in the approach to embed data into image. It uses the pattern classification characteristics to modify the values of pixels in such a way that the modification yields the message requirements and aids the extraction process. But using pure LBP is also detectable and messages can be retrieved. Even to secure the location of LBP hidden message in the image, segmentation is used for hiding the using only desired areas of the image. For segmentation various clustering techniques can be implemented. For the purpose k-means clustering is used, which provides better accuracy for huge data sets. The images have huge number of pixels and every pixel further has 3 components namely red, green and blue for color images. So k-means clustering serves the purpose even concerning the speed. For k-means clustering using Lab color space adds its own advantages, as Lab color space approximates human vision.

References
  1. Osama Abu Abbas, 2008, "Comparison between Data Clustering Algorithms" The International Arab Journal of Information Technology, vol. 5.
  2. T. Ojala, M. Pietikäinen, D. Harwood, 1994, "Performance Evaluation Of Texture Measures With Classification Based On Kullback Discrimination Of Distributions", Proceedings of the 12th IAPR International Conference on Pattern Recognition (ICPR 1994), vol. 1, pp. 582 - 585.
  3. T. Ojala, M. Pietikäinen, D. Harwood, 1996, "A Comparative Study of Texture Measures with Classification Based on Feature Distributions", Pattern Recognition, vol. 29, pp. 51-59.
  4. DC. He, L. Wang, 1990, "Texture Unit, Texture Spectrum, And Texture Analysis", Geoscience and Remote Sensing, IEEE Transactions on, vol. 28, pp. 509 - 512.
  5. L. Wang, DC. He, 1990, "Texture Classification Using Texture Spectrum", Pattern Recognition, vol. 23, no. 8, pp. 905-910.
  6. Xinlu Gui, 2014, "Steganalysis of LSB Matching Based on Local Binary Pattern", IEEE, pp. 475-480.
  7. M. Aggarwal, 2013, "An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, pp. 746-751.
  8. V. Tyagi et al. , 2012, "Image Steganography Using Least Significant Bit With Cryptography", Journal of Global Research in Computer Science (JGRCS), pp. 53-55.
  9. G. Nehru et al. , 2012, "A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach", International Journal of Computer Science Issues (IJCSI), vol. 9, Issue 1, pp. 402-406.
  10. S. R. Govada et al. , 2012, "Text Steganography with Multi level Shielding", International Journal of Computer Science Issues, vol. 9, Issue 4, pp. 401-405.
  11. Ms. Bhakti N. Palkar, 2014, "Color Image Segmentation using K-means Clustering and KPE Vector Quantization Algorithm", International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, Issue 1.
  12. Sheetal Thorave, Prof. M. S. Biradar, 2014, "New Technology for Fabric Defect Detection Based on K-means Algorithm", IOSR Journal of Engineering (IOSRJEN), vol. 4, Issue 1.
  13. Asghar Shahrzad Khashandarag, Akbar Shahrzad Khashandarag, Amin Rahimi Oskuei, Hamid Haji Agha Mohammadi and Mirkamal Mirnia, May 2011, "A Hybrid Method for Color Image Steganography in Spatial and Frequency Domain", International Journal of Computer Science Issues (IJCSI), vol. 8, Issue 3, pp. 15-20.
  14. Naina Pal, Kamiya Arora, Md. Khalid Imam Rahmani 2014, "Clustering of Image Data Using K-Means and Fuzzy K-Means", International Journal of Advanced Computer Science and Applications (IJACSA), vol. 5.
  15. Soumya. D. S, Arya. V, 2013 "Chromosome Segmentation Using K-Means Clustering", International Journal of Scientific & Engineering Research, vol. 4, Issue 9.
  16. Ms. Chinki Chandhok, Mrs. Soni Chaturvedi, Dr. A. A Khurshid, 2012, "An Approach to Image Segmentation using K-means Clustering Algorithm", International Journal of Information Technology (IJIT), vol. 1.
  17. T. Kanungo et al. , 2002, An Analysis of LSB based Steganography Techniques, IEEE Computer Communication and Informatic (ICCCI), pp. 1-4.
  18. Eleni E. Varsaki, Vassilis Fotopoulos, Athanassios N. Skodras, 2011, "A Data Hiding Scheme Based On LBPROT Pattern", SIVip, 7: 247-253.
  19. Eleni E. Varsaki, Vassilis Fotopoulos, Athanassios N. Skodras, 2011, "Data Hiding Based On Image Texture Classification", vol. 3.
  20. Harpreet Kaur, Gaurav Deep, 2015, "Level's 4 Security in Image Steganography", International Journal of Computer Applications (IJCA), vol. 121-No. 23.
  21. Mitali Garg et al. , 2014 "Data Security with Image Clustering using Hopping Neighbor Technique", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), pp. 628-634.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Lbp Rgb Cielab K-means