Bit Plane Based Image Authentication in Spatial Domain
Sujit Das1 , Jyotsna Kumar Mandal2 , Arundhati Bhowal3
Section:Review Paper, Product Type: Journal Paper
Volume-07 ,
Issue-01 , Page no. 132-137, Jan-2019
Online published on Jan 20, 2019
Copyright © Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal, “Bit Plane Based Image Authentication in Spatial Domain,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.132-137, 2019.
MLA Style Citation: Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal "Bit Plane Based Image Authentication in Spatial Domain." International Journal of Computer Sciences and Engineering 07.01 (2019): 132-137.
APA Style Citation: Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal, (2019). Bit Plane Based Image Authentication in Spatial Domain. International Journal of Computer Sciences and Engineering, 07(01), 132-137.
BibTex Style Citation:
@article{Das_2019,
author = {Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal},
title = {Bit Plane Based Image Authentication in Spatial Domain},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {132-137},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=608},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=608
TI - Bit Plane Based Image Authentication in Spatial Domain
T2 - International Journal of Computer Sciences and Engineering
AU - Sujit Das, Jyotsna Kumar Mandal, Arundhati Bhowal
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 132-137
IS - 01
VL - 07
SN - 2347-2693
ER -
Abstract
In this paper a corelated bit plane based steganographic technique has been proposed. The image is sliced into bit planes. A weighted matrix is created corresponding to each bit plane. The entries in the weighted matrix is made based on the position of bit plane and the values are corresponding to ones in bit plane matrix. The correlation of original image and all the weighted matrices corresponding to all bit planes are calculated and bit planes corresponding to two minimum correlation coefficients are selected for embedding. The secret image is converted into binary string. A window is swept over the selected bit planes in row major non-overlapping fashion and secret bits are embedded into these windows in diagonal fashion. The proposed method achieved better image quality on embedding
Key-Words / Index Term
Steganography, Correlation
References
[1]. K. Gaurav, U. Ghanekar,” Image steganography based on Canny edge detection”,dilation operator
and hybrid coding. Journal of Information Security and Applications Volume 41,pp:41-51
[2]. S.K Ghosal, J.K Mandal,” On the use of the Stirling Transform in image steganography”, Journal of Information Security and Applications,2018,Doi: https://doi.org/10.1016/j.jisa.2018.04.003.
[3]. S Kumar, A. Singh, M. Kumar,” Information hiding with adaptive steganography based on novel fuzzy edge identification”, Defence Technology,2018, doi: 10.1016/j.dt.2018.08.003
[4]. C-F. Lee, C-C. Chang, X. Xie, K. Mao, R-H. Shi,” An Adaptive High-Fidelity Steganographic Scheme Using Edge Detection and Hybrid Hamming Codes”, Displays,2018, doi: https://doi.org/ 10.1016/j.displa.2018.06.001
[5]. Nguyen, T.D., Arch-int, S. & Arch-int N., “An adaptive multi bit-plane image steganography using block data-hiding”, N. Multimed Tools Appl ,2018, Vol 75 issue 14, pp. 8319–8345.
[6]. Standard Image database, USC University of Southern California, http://sipi.usc.edu/database/, doa:16, October 2018
[7]. M. Y. Valandar, P. Ayubi., M. J Barani. “ A new transform domain steganography based on modified logistic chaotic map for color images”, Journal of Information Security and Applications, 2017, vol. 34 pp. 142-151.
[8]. P. Maniriho., T. Ahmad,” Information Hiding Scheme for Digital Images Using Difference Expansion and Modulus Function”, Journal of King Saud University - Computer And Information Sciences.,2018,doi:https://doi.org/10.1016/j.jksuci.2018.01.011
[9]. H.R Kanan,. And B. Nazeri,” A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm”, Expert Systems with Applications,vol. 41, issue 14,pp. 6123–6130.
[10]. X. Liao, J. Yin ,S. Guo.,X. Li.,” Medical JPEG image steganography based on preserving inter-block dependencies”, Computers and Electrical Engineering,2018, vol. 67, pp. 320-329.