Bit Plane Based Image Authentication in Spatial Domain

Authors

  • Das S University of Kalyani, Kalyani, Nadia-741234, West Bengal, India
  • Mandal jK University of Kalyani, Kalyani, Nadia-741234, West Bengal, India
  • Bhowal A University of Kalyani, Kalyani, Nadia-741234, West Bengal, India

Keywords:

Steganography, Correlation

Abstract

In this paper a corelated bit plane based steganographic technique has been proposed. The image is sliced into bit planes. A weighted matrix is created corresponding to each bit plane. The entries in the weighted matrix is made based on the position of bit plane and the values are corresponding to ones in bit plane matrix. The correlation of original image and all the weighted matrices corresponding to all bit planes are calculated and bit planes corresponding to two minimum correlation coefficients are selected for embedding. The secret image is converted into binary string. A window is swept over the selected bit planes in row major non-overlapping fashion and secret bits are embedded into these windows in diagonal fashion. The proposed method achieved better image quality on embedding

References

[1] K. Gaurav, U. Ghanekar,” Image steganography based on Canny edge detection”,dilation operator and hybrid coding. Journal of Information Security and Applications Volume 41,pp:41-51

[2] S.K Ghosal, J.K Mandal,” On the use of the Stirling Transform in image steganography”, Journal of Information Security and Applications,2018,Doi: https://doi.org/10.1016/j.jisa.2018.04.003.

[3] S Kumar, A. Singh, M. Kumar,” Information hiding with adaptive steganography based on novel fuzzy edge identification”, Defence Technology,2018, doi: 10.1016/j.dt.2018.08.003

[4] C-F. Lee, C-C. Chang, X. Xie, K. Mao, R-H. Shi,” An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes”, Displays,2018, doi: https://doi.org/ 10.1016/j.displa.2018.06.001

[5] Nguyen, T.D., Arch-int, S. & Arch-int N., “An adaptive multi bit-plane image steganography using block data-hiding”, N. Multimed Tools Appl ,2018, Vol 75 issue 14, pp. 8319–8345.

[6] Standard Image database, USC University of Southern California, http://sipi.usc.edu/database/, doa:16, October 2018

[7] M. Y. Valandar, P. Ayubi., M. J Barani. “ A new transform domain steganography based on modified logistic chaotic map for color images”, Journal of Information Security and Applications, 2017, vol. 34 pp. 142-151.

[8] P. Maniriho., T. Ahmad,” Information Hiding Scheme for Digital Images Using Difference Expansion and Modulus Function”, Journal of King Saud University - Computer And Information Sciences.,2018,doi:https://doi.org/10.1016/j.jksuci.2018.01.011

[9] H.R Kanan,. And B. Nazeri,” A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications,vol. 41, issue 14,pp. 6123–6130.

[10] X. Liao, J. Yin ,S. Guo.,X. Li.,” Medical JPEG image steganography based on preserving inter-block dependencies”, Computers and Electrical Engineering,2018, vol. 67, pp. 320-329.

Downloads

Published

2025-11-24

How to Cite

[1]
S. Das, J. K. Mandal, and A. Bhowal, “Bit Plane Based Image Authentication in Spatial Domain”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 132–137, Nov. 2025.