Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Steganography
Andysah Putera Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
andiesiahaan@gmail.com
Abstract In BPCS Steganography, data hiding will be
split into blocks that have a high complexity where the
blocks are categorized into informative and noise-like
regions. A noise-like region is a bit-plane that has the
greatest probability as a data hiding since it has a high
complexity. In this region, the data inserted is vulnerable to
attack. Someone can easily take a series of characters that
are stored on a noise-like region previously if the system is
not modified. Improving the bit-plane composition is to
increase data security. Bit-plane will be combined with a
specified key. The key should be changed to bit-plane form
as well. The key that has already been turned into the bitplane will be mated with the original data. Using an
exclusive-or of this part is the best way to produce the
cipher bit-plane. Finally, the data residing on the cover
image produced have a high-security level.
Keywords - BPCS, Steganography, Security, Cryptography.
I. INTRODUCTION
Steganography is the art of data hiding. It covers messages
in a vessel image [1][4]. Only the receiver knows what happens
inside the picture. In steganography, sometimes we do not think
about the security level. When concealing the data, it is all the
original data. It means those are hidden without encryption. BitPlane Complexity Segmentation, BPCS, is one of the
steganography techniques that grouping the set of the original
message to bit-planes [5]. A noise-like region is a high
complexity area. It happens since the bit-plane has the intensity
variation. BPCS has an 8x8 matrix to represent the information.
It serves to divide the plaintext to layers. There are totally eight
layers to represent those bits in the plaintext. Complexity is the
formula to measure whether the bit-plane is ready to be used.
By attacking the bit-plane, someone might be retrieving the
secret message. Modifying the structure of the noise-like region
is the security technique to increase the security system [3].
There are numerous ways to manipulate the bit-plane. We can
combine with encryption to generate the new bit order. Creating
the cipher block has numerous benefits to camouflage the
original message. Once the cipher bits are created, the attacker
must spare more time to resolve the message.
PBC
0112131415161718
CGC1
PBC1
0
CGC2
PBC2 PBC1
10
CGC3
CGC4
CGC5
CGC6
CGC7
CGC8
(1)
Where:
CT
PT
Key
:
:
:
Cipher Bit-Plane
Plaint Bit-Plane
Password Block
PBC3 PBC2
11
0
PBC4 PBC3
11
0
PBC5 PBC4
11
0
PBC6 PBC5
11
0
0
127
31
23
9
54
117
170
200
0
1
2
3
4
5
6
7
1
27
52
29
14
44
91
181
198
6
67
1
41
34
60
203
216
199
7
69
10
21
1
74
190
235
247
0
1
2
3
4
5
6
7
01111111
00011011
00011101
00100111
00110001
01000001
01000011
01000101
00011111
00110100
00001100
00000001
00000111
00000000
00000001
00001010
00010111
00011101
00011000
00011100
00100101
00101100
00101001
00010101
00001001
00001110
00010100
00100011
00100000
00101100
00100010
00000001
00110110
00101100
00111111
00101111
00111011
01010101
00111100
01001010
01110101
01011011
01111001
10101001
10111010
10111001
11001011
10111110
10101010
10110101
11000001
11010001
11010000
11010101
11011000
11101011
11001000
11000110
10110011
10111000
11000110
10111011
11000111
11110111
PBC8 PBC7
11
0
PBC7 PBC6
11
0
1
2
3
4
5
6
7
01000000
00010110
00010011
00110100
00101001
01100001
01100010
01100111
00010000
00101110
00001010
00000001
00000100
00000000
00000001
00001111
00011100
00010011
00010100
00010010
00110111
00111010
00111101
00011111
00001101
00001001
00011110
00110010
00110000
00111010
00110011
00000001
00101101
00111010
00100000
00111000
00100110
01111111
00100010
01101111
01001111
01110110
01000101
11111101
11100111
11100101
10101110
11100001
11111111
11101111
10100001
10111001
10111000
10111111
10110100
10011110
10101100
10100101
11101010
11100100
10100101
11100110
10100100
10001100
Every bit order in Canonical Gray Code is split into bitplanes. For example, on the first bit-plane, it is resulted from
drawing every first bit on CGC map while on the last one, it is
from the last bit. Embedding a file-block in an n-th least PBC
plane means modifying the colors of several pixels in that block
with the value 2n-1. In this case the "blocking effect" likely to
appear on the stego image. While in the CGC embedding, the
color change "differs pixel by pixel" in the block varying from
1 to 2n-1. The average change in the block is 2n-1. Table 4 is the
result of splitting bit-planes.
Bit Plane 1
0
0
0
1
0
2
0
3
0
4
0
5
0
6
1
7
1
0,080357143
5
6
0
0
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
0
0
0
0
0
0
1
1
2
0
0
0
0
0
0
1
1
3
0
0
0
0
0
1
1
1
4
0
0
0
0
0
1
1
1
7
0
0
0
0
0
1
1
1
0
1
2
3
4
5
6
7
0
1
0
0
0
0
1
1
0
Bit Plane 2
1
0
0
0
0
0
1
1
0
2
0
0
0
0
0
1
0
1
3
0
0
0
0
0
1
0
1
33
4
0
0
0
0
0
1
0
0
5
1
0
0
0
1
1
0
1
0,294642857
6
7
1
1
0
0
0
0
0
0
0
1
0
1
0
0
0
0
0
1
2
3
4
5
6
7
0
0
0
0
0
1
0
1
1
Bit Plane 3
1
0
1
0
0
1
1
1
1
2
0
0
0
0
1
0
1
1
3
1
0
0
1
1
1
1
1
34
4
1
0
1
1
1
1
1
1
5
1
0
1
1
1
1
1
1
0,303571429
6
7
1
1
0
0
1
0
1
0
1
1
1
1
1
0
1
0
0
1
2
3
4
5
6
7
0
0
1
1
0
0
0
1
0
Bit Plane 4
1
1
0
1
0
1
1
0
0
2
1
0
1
1
0
0
0
0
3
1
0
1
1
1
1
1
0
48
4
0
0
1
1
0
0
1
0
0,428571429
5
6
7
0
0
0
0
0
0
1
1
1
1
1
0
1
0
0
0
0
0
1
1
1
0
0
0
0
1
2
3
4
5
6
7
0
0
0
1
1
1
1
1
1
Bit Plane 5
1
0
1
0
1
1
0
1
0
2
0
1
0
1
0
0
0
1
3
0
0
0
0
1
1
1
0
61
4
1
0
0
0
0
0
1
0
5
0
0
1
1
1
0
1
0
0,544642857
6
7
0
0
0
1
1
1
0
0
0
1
1
0
0
1
0
1
0
1
2
3
4
5
6
7
0
0
0
1
1
1
1
1
1
Bit Plane 6
1
1
1
0
0
0
1
1
1
2
0
0
1
1
0
1
0
0
3
1
0
0
0
0
1
0
1
52
4
0
1
1
0
1
1
0
1
5
0
0
0
0
1
1
1
1
0,464285714
6
7
0
1
0
1
1
1
0
0
0
1
1
0
1
1
1
1
0
1
2
3
4
5
6
7
0
0
0
0
0
0
1
1
0
Bit Plane 7
1
1
1
1
0
1
1
1
0
2
1
1
0
1
0
0
0
1
3
0
0
1
1
0
0
0
0
57
4
0
0
1
0
1
1
0
0
5
0
0
1
1
1
0
1
1
0,508928571
6
7
1
1
0
1
0
1
1
0
1
1
1
0
0
1
0
0
0
1
2
3
4
5
6
7
0
0
0
0
1
1
1
1
0
Bit Plane 8
1
0
0
1
1
0
0
1
1
2
1
0
0
0
0
1
1
0
3
0
1
0
0
0
1
1
0
56
4
1
0
1
0
0
1
0
1
5
1
0
0
0
1
1
1
0
0,5
6
0
1
1
1
0
0
0
0
7
1
1
1
1
1
1
0
0
=
Where:
k
n
:
:
:
(2)
Bit-Plane Complexity
Total Bit change
Maximum Change of 8x8 bit-plane
Bit-Plane
1
2
3
4
5
6
7
8
Bit Change
9
33
34
48
61
52
57
56
Char
S
D
M
2
1
S
D
M
Complexity
0,080357142857
0,294642857143
0,303571428571
0,428571428571
0,544642857143
0,464285714286
0,508928571429
0,500000000000
Dec.
83
68
77
50
49
83
68
77
Biner
01010011
01000100
01001101
00110010
00110001
01010011
01000100
01001101
Dec.
65
78
68
89
83
65
72
33
Biner
1000001
1001110
1000100
1011001
1010011
1000001
1001000
100001
0
1
2
3
4
5
6
7
1
1
1
1
1
1
1
1
0
0
1
2
3
4
5
6
7
0
0
0
0
0
0
0
0
0
1
1
1
1
0
0
1
1
1
5
0
1
1
0
0
0
1
1
6
1
0
0
1
0
1
0
0
7
1
0
1
0
1
1
0
1
0
0
0
0
0
0
0
0
0
5
0
1
1
0
0
0
0
0
6
0
1
0
0
1
0
0
0
7
1
0
0
1
1
1
0
1
0
1
2
3
4
5
6
7
0
0
0
0
0
0
0
0
0
1
0
0
0
1
1
0
0
1
Cipher Bit-Plane
2
3
4
0
1
0
0
0
1
0
0
1
1
0
1
1
0
0
0
1
0
0
0
1
1
0
1
5
0
0
0
0
0
0
1
1
6
1
1
0
1
1
1
0
0
7
0
0
1
1
0
0
0
0
Char
k
b
Dec.
18
10
9
107
98
18
12
108
Biner
00010010
00001010
00001001
01101011
01100010
00010010
00001100
01101100