Data hiding using bit plane complexity segmentation steganography

  • Authors

    • M Chandra Sekhar
    • S K. Chandini
    • V Sai Rohith
    • V Jhansi Lakshmi
    • M Pavan Kumar
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.11740
  • Steganography, frequency, vessel image, bit-plane complexity segmentation.
  • Steganography is the basis of information covering the puzzle in some other data (we call it the ship), leaving no obvious evidence of data change. Most conventional steganographic strategies is limited data that hide the limit. They can cover up just 10% (or less) of the information measures of the vessel. This is on the grounds that the standard of those procedures was either to supplant an uncommon piece of the recurrence parts of the vessel picture, or to supplant all the slightest critical image bits with a secret multi-valued data. Our new Steganography uses the image as vessel information, and we enter the data in the bit-plane mystery vessel. This strategy makes use of human attributes, through which people cannot see the structure of any form of data exclusively damned pair, for example. We can replace most of the «Commotion like" regions in the bit-planes of the puzzle vessel image data without deteriorating the quality of the photos. We called our steganography "BPCS-steganography," which remains a Bit-Plane Complexity Segmentation steganography.

     

     
  • References

    1. [1] Kothari L, Thakkar R & Khara S, “Data hiding on web using combination of Steganography and Cryptographyâ€, International Conference on Computer, Communications and Electronics (Comptelix), (2017), pp.448-452.

      [2] Bansod SP, Mane VM & Ragha R, “Modified BPCS steganography using Hybrid cryptography for improving data embedding capacityâ€, International conference on Communication, information & computing technology (ICCICT), (2012), pp.1-6.

      [3] Kait VS & Chauhan B, “BPCS steganography for data security using FPGA implementationâ€, International Conference on Communications and Signal Processing (ICCSP), (2015), pp. 1887-1891.

      [4] Morkel T, Eloff JH & Olivier MS, “An overview of image steganographyâ€, ISSA, (2005), pp.1-11.

      [5] Jamil T, “Steganography: the art of hiding information in plain sightâ€, IEEE potentials, Vol.18, No.1, (1999), pp.10-12.

      [6] Altaay AAJ, Sahib SB & Zamani M, “An introduction to image steganography techniquesâ€, International Conference on Advanced Computer Science Applications and Technologies (ACSAT), (2012), pp.122-126.

      [7] Bhardwaj R & Sharma V, “Image steganography based on complemented message and inverted bit LSB substitutionâ€, Procedia Computer Science, Vol.93, (2016), pp.832-838.

      [8] Stallings W, Cryptography and network security design and principles, Pearson Education, (2008).

  • Downloads

  • How to Cite

    Chandra Sekhar, M., K. Chandini, S., Sai Rohith, V., Jhansi Lakshmi, V., & Pavan Kumar, M. (2018). Data hiding using bit plane complexity segmentation steganography. International Journal of Engineering & Technology, 7(2.20), 33-36. https://doi.org/10.14419/ijet.v7i2.20.11740