Open Access   Article Go Back

Bit Plane Based Image Authentication in Spatial Domain

Sujit Das1 , Jyotsna Kumar Mandal2 , Arundhati Bhowal3

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 132-137, Jan-2019

Online published on Jan 20, 2019

Copyright © Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal, “Bit Plane Based Image Authentication in Spatial Domain,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.132-137, 2019.

MLA Style Citation: Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal "Bit Plane Based Image Authentication in Spatial Domain." International Journal of Computer Sciences and Engineering 07.01 (2019): 132-137.

APA Style Citation: Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal, (2019). Bit Plane Based Image Authentication in Spatial Domain. International Journal of Computer Sciences and Engineering, 07(01), 132-137.

BibTex Style Citation:
@article{Das_2019,
author = {Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal},
title = {Bit Plane Based Image Authentication in Spatial Domain},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {132-137},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=608},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=608
TI - Bit Plane Based Image Authentication in Spatial Domain
T2 - International Journal of Computer Sciences and Engineering
AU - Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 132-137
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

In this paper a corelated bit plane based steganographic technique has been proposed. The image is sliced into bit planes. A weighted matrix is created corresponding to each bit plane. The entries in the weighted matrix is made based on the position of bit plane and the values are corresponding to ones in bit plane matrix. The correlation of original image and all the weighted matrices corresponding to all bit planes are calculated and bit planes corresponding to two minimum correlation coefficients are selected for embedding. The secret image is converted into binary string. A window is swept over the selected bit planes in row major non-overlapping fashion and secret bits are embedded into these windows in diagonal fashion. The proposed method achieved better image quality on embedding

Key-Words / Index Term

Steganography, Correlation

References

[1]. K. Gaurav, U. Ghanekar,” Image steganography based on Canny edge detection”,dilation operator
and hybrid coding. Journal of Information Security and Applications Volume 41,pp:41-51
[2]. S.K Ghosal, J.K Mandal,” On the use of the Stirling Transform in image steganography”, Journal of Information Security and Applications,2018,Doi: https://doi.org/10.1016/j.jisa.2018.04.003.
[3]. S Kumar, A. Singh, M. Kumar,” Information hiding with adaptive steganography based on novel fuzzy edge identification”, Defence Technology,2018, doi: 10.1016/j.dt.2018.08.003
[4]. C-F. Lee, C-C. Chang, X. Xie, K. Mao, R-H. Shi,” An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes”, Displays,2018, doi: https://doi.org/ 10.1016/j.displa.2018.06.001
[5]. Nguyen, T.D., Arch-int, S. & Arch-int N., “An adaptive multi bit-plane image steganography using block data-hiding”, N. Multimed Tools Appl ,2018, Vol 75 issue 14, pp. 8319–8345.
[6]. Standard Image database, USC University of Southern California, http://sipi.usc.edu/database/, doa:16, October 2018
[7]. M. Y. Valandar, P. Ayubi., M. J Barani. “ A new transform domain steganography based on modified logistic chaotic map for color images”, Journal of Information Security and Applications, 2017, vol. 34 pp. 142-151.
[8]. P. Maniriho., T. Ahmad,” Information Hiding Scheme for Digital Images Using Difference Expansion and Modulus Function”, Journal of King Saud University - Computer And Information Sciences.,2018,doi:https://doi.org/10.1016/j.jksuci.2018.01.011
[9]. H.R Kanan,. And B. Nazeri,” A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications,vol. 41, issue 14,pp. 6123–6130.
[10]. X. Liao, J. Yin ,S. Guo.,X. Li.,” Medical JPEG image steganography based on preserving inter-block dependencies”, Computers and Electrical Engineering,2018, vol. 67, pp. 320-329.