BPCS Steganography. The goal of steganography is to hide a message in plain sight. BPCS is a method to embed a message in an image by replacing all. Principle of BPCS-Steganography. (Bit-Plane Complexity Segmentation Based Embedding). (KIT-STEGROUP). BPCS-Steganography (Bit-Plane Complexity Segmentation Steganography) is a new steganographic technique invented by Eiji Kawaguchi.

Author: Nanris Nira
Country: Anguilla
Language: English (Spanish)
Genre: Technology
Published (Last): 21 December 2009
Pages: 409
PDF File Size: 1.89 Mb
ePub File Size: 11.56 Mb
ISBN: 789-1-52309-942-3
Downloads: 60063
Price: Free* [*Free Regsitration Required]
Uploader: Sarisar

Bit-Plane Decomposition of a Multi-Valued Image A multi-valued image P consisting of n-bit pixels can be decomposed into a set of n binary pictures.

As far as the bit-planes of a natural image are concerned, complexity [2] of each bit-plane pattern increases monotonically from the MSB P 1 to the LSB P n. An image data not having this property will be an artificially processed stegangoraphy. Most of the LSB planes look like random pattern. Figure 1 illustrates a couple of PBC bit-planes of a true color image i.

Nature of the human steganogrxphy system steganigraphy information embedding Each bit-plane can be segmented into “shape-informative” and “noise-looking” regions [2][3]. A shape-informative region consists of simple patterns, while a noise-looking region consists of complex patterns [3]. P R4 is mixed with both shape-informative and noise-looking regions. It is reported that two regions can be segmented by using a “black-and-white boarder length” based complexity measure [3][4][6].

It is also reported that we can replace each noise-looking region with another noise-looking patterns without changing the overall image quality. However, no change is observed after embedding. BPCS-Steganography makes use of this nature of the human vision system.


BPCS-Steganography and traditional image-based steganography The most traditional image-based steganographic algorithms are as follows. Utilize the quantization error of the vessel image for a place to hide secret data However, all these methods have a relatively small data hiding capacity. BPCS-Steganography is absolutely different from traditional techniques.


The most important feature is a large embedding capacity. Reference [5] and [6] are good articles to know the details of BPCS embedding algorithm. Watermarking and Steganography Watermarking is a technique to embed some symbol data or evidence data in some valuable data such as an image, voice, music, video clip, etc. It protects the seganography data from alteration. In watermarking the steanography data” is valuable, but the embedded data is not so valuable.

While in steganography, the embedding capacity should be large enough.

Invitation to BPCS-Steganography

But, the embedded data can be fragile rather than robust. This is because the embedded data is secret. It should be better destroyed by attacking than robust enough to stay long. The external data is just a dummy. So, the requirement and the objective of watermarking and steeganography are very opposite even if they belong to the same information hiding technique.

It is downloadable from other page.

We intended to release this program for academic evaluation use. So, if you are a researcher, you can use it free.

If you are not a researcher, but are very much interested in knowing what a steganography program is, then steyanography can also download and use it for try.

Therefore, it is impossible for someone to dteganography it. As far as the Web version “Qtech-HV v” is concerned, we set up a “90 days validity” mechanism on the embedding part of the program. This is based on our security policy. When you want to implement your original BPCS-Steganography program, you need to tackle varieties of detailed algorithm before you start working on it. The followings are some of the examples. How you can outwit steganalysis It is practically stegqnography to make a compatible program with some given BPCS-Steganography program even if the embedding and extracting operations look the same.


Such topics include, but not all, the followings. A General feature of the complexity histogram of a “natural image” bit-plane An example is here. B Complexity histograms of a non-compressed and a compressed file in general See some examples.

BPCS-Steganography – Wikipedia

C How the complexity histogram changes after the embedding operation. An illustration is here.

E Details of the vessel image file format e. However, we bppcs heard of any report telling “We finally made it completely! References [1] Eiji Kawaguchi, et al: General feature of the complexity histogram of a “natural image” bit-plane An example is here. Complexity histograms of a non-compressed and a compressed file in general See some examples.

How the complexity histogram changes after the embedding operation. Details bpxs the vessel image file format e. Graphical User Interface knowledge to make a “user-friendly” program.