SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. IV (Mar – Apr. 2015), PP 17-23
www.iosrjournals.org
DOI: 10.9790/0661-17241723 www.iosrjournals.org 17 | Page
An Effective Method to Hide Texts Using Bit Plane Extraction
Mayukh Das
Department of Electronics & Communication Engineering,
Techno India (West Bengal University of Technology), India
Abstract: The work is to show how simply a data can be hidden inside an image and be easily extracted using
Matlab. The work focuses on bit plane extraction and how it can be used to complete the above mentioned task.
Both encryption and decryption procedure has been discussed. Here the data to be hidden refers to any piece of
writing that may contain valuable information. It does not include any audio or video file. The main focus has
been given to grayscaled images, which acts as the reference image that covers the data.
Keywords: Bit plane slicing, Decryption, Encryption, Histogram, Steganography
I. Introduction
With the advancement of digital technologies and communication systems the need for privacy and
security has enhanced. Hackers are always ready to exploit any sort of impuissance inside a network. Hence,
data shared over any communication media must be concealed from them. Steganography, or data hiding is a
significant process for this purpose as it allows an image to shroud a data to be shared. Hence the original data
becomes invisible in the image. This invisible data are transmitted across the channel and finally decoded in the
receiver end in order to extract the actual data back. This method intensifies the security of the system.
II. Background
A lot of research related to steganography is going on currently. This research steers one’s attention
towards hiding texts, scripts or any kind of writing in a simple way. Grayscale image or an intensity image is an
image in which the value of each pixel is a single sample ranging from 0 to 255. Hence it carries only intensity
information. Any value between 0-255 can be represented as an eight bit binary value, example (168)10 =
(10101000)2 [1]. Hence an intensity image can be sliced up into 8 bit planes which give a sequence of binary
images. This procedure is called bit plane slicing that has been exploited in this work. The slicing can be done
with RGB images also.
Fig 1: Bit plane slicing of a grayscale image
Hence a grayscale image may be considered as a combination of eight bit-planes where each bit-plane can be
represented by a binary matrix [2].
An Effective Method to Hide Texts Using Bit Plane Extraction
DOI: 10.9790/0661-17241723 www.iosrjournals.org 18 | Page
The formation of bit plane is given by
Bp(i,j) = r{(1/2)*floor[(1/2i
)*o(i,j)]} ……[2]
Where o(i,j) = original image
Bp(i,j) = bit plane info
r = remainder
floor(X) = rounds the elements of X to the nearest integers towards minus infinity.
III. Methodology
3.1 Encryption
The information to be hidden is first converted into an image file whose file format must be similar to
the reference image. The MSB (most significant bit) plane contains utmost information of the image. This
information content decreases as we go down and is least in the LSB (least significant bit) plane. The target is to
slice both the reference as well as the data image and then overlay a particular data plane with the reference
planes so as to form a single image with the desired data concealed in it. But the data plane selected must also
contain adequate info so that the original data can be extracted after decryption. Hence, choosing a particular
combination is the main challenge in the encoding part.
Fig 2: Block diagram of encryption process
Both the encoding and decoding parts were carried out in Matlab and the results were analyzed. The
encoding starts with converting all the images into grayscale, because if we separate out R, G and B color
components and create 8 bit planes for each color component then we can create total twenty four bit planes for
each color image [2]. Therefore, it is quite convenient to deal with grayscale as it has only 8 bit planes. The
Matlab command used to slice into bit planes is given by
An Effective Method to Hide Texts Using Bit Plane Extraction
DOI: 10.9790/0661-17241723 www.iosrjournals.org 19 | Page
Cj = mod(floor(refer/2j
),2);
Where Cj is the jth
bit plane
Then the 3rd
plane (the plane containing the 4th
bit information) of the data is extracted to be replaced
by 3rd
bit of reference data. Direct replacement generates a dimension error. Hence the dimensions of the 3rd bit
plane data were resized in accordance with the reference image (3rd
bit plane). The final encrypted image was
obtained by amalgamating the rest of the reference bit planes with the 3rd bit data. Reason behind preferring the
3rd
plane is further discussed in the next section.
3.2 Decryption
The decoding process was done in two steps. It includes bit plane extraction and morphological image
processing. The data plane that was blended with the reference image was pulled out and subsequent processing
was done. Binary image contains various imperfections. Particularly our extracted bit plane is actually a
bleached out image as it contains only the 4th
bit info about the original data. Hence morphological image
processing removes a fair amount of imperfection by accounting for the form and structure of the image [3]. A
pragmatic approach with this process helps us to erode the image in order to get an unclouded view of the data.
Erosion with small square structuring elements shrivels an image by discarding away a layer of pixels from both
the inner and outer boundaries of regions. The holes and gaps between different regions become larger, and
small details are eliminated [3]. Here erosion was done using a 3×3 structure. The image is then complemented
to give a convenient look. Processing has been done mainly to make the data decipherable.
Fig 3: Block diagram of decryption process
IV. Results And Observations
4.1 Encryption
Many pairs of reference and data images were conflated into a single image and their histogram plots
were compared with that of the original of which one is shown.
Fig 4: Reference image (R) Fig 5: Data image (D)
An Effective Method to Hide Texts Using Bit Plane Extraction
DOI: 10.9790/0661-17241723 www.iosrjournals.org 20 | Page
Fig 6: Encrypted image (E)
In the figure below a zoomed view of the encoded image is shown to substantiate the fact that the data is
perfectly hidden inside.
Fig 7: Zoomed view of E
Histogram plot of an intensity image shows the number of pixels in each and every intensity value. For a
grayscale image there are 256 different possible intensities, and so the histogram will graphically display 256
numbers(0-255) showing the distribution of pixels amongst those grayscale values [4].
An Effective Method to Hide Texts Using Bit Plane Extraction
DOI: 10.9790/0661-17241723 www.iosrjournals.org 21 | Page
Fig 8: Histogram plots
On comparing the two histogram graphs we see that the envelope of the curve is similar but in the
encrypted image some pixel values are suppressed. This is because the 3rd
bit plane is removed from the image
which actually contained a fair amount of info. Hence the histogram graphs emphasize the fact that the bit plane
switching has been performed successfully.
4.2 Decryption
The encrypted data was decoded and the information was retrieved. Although the final output slightly
differs from the actual data input, the info is clearly readable. Decoder part has mainly two sections i.e. bit plane
extraction output and the final output after being processed.
Fig 9: Output on extracting the 3rd bit plane of the encrypted image
Fig 10: Final image
An Effective Method to Hide Texts Using Bit Plane Extraction
DOI: 10.9790/0661-17241723 www.iosrjournals.org 22 | Page
Therefore, we see that the decoded output is clearly decipherable. However, in the bit plane extracted
output the smaller font characters are a bit obscured. Hence it has been processed to get a distinct appearance in
the final image. The larger figures are easily readable even from the first output image. So finally each alphabet
is clearly visible irrespective of font their font size.
4.3 Reason Behind Switching 3rd
Bit Plane
In order to understand the usefulness of this plane, the encryption part has been carried out by
switching other planes and corresponding outputs were observed.
Let us observe the encoded image when encryption is done by interchanging the 4th
bit plane.
Fig 11: A zoomed view of the encrypted image when the 4th
bit plane is interchanged
A significant amount of data is visible over the reference image. This is because bit plane 7, 6, 5 and 4
contains a substantial amount of information about the parent image. When the 4th plane is interchanged, a rich
content of image R is replaced by a data plane (denser than the 3rd
plane). Hence an imprint of the data is visible
throughout the encrypted image. This impression goes darker when higher planes are switched.
Now let us observe the encoded image when encryption is done by switching the 2nd
bit plane.
Fig 12: Encrypted image when 2nd
plane is switched
An Effective Method to Hide Texts Using Bit Plane Extraction
DOI: 10.9790/0661-17241723 www.iosrjournals.org 23 | Page
Fig 13: Decoded output
Here we see that encrypted image is fine, but the smaller font figures of the decoded output are too
hazy to be read. This image when processed produces a more blurred picture. Specially the smaller alphabets are
never distinctly readable. If the actual data never appears after decrypting then there is no point to choose this
combination. Then decoded output gets more obliterated as we interchange further lower bit planes. Only 3rd
plane switching yields a positive result for both encoding and decoding processes.
V. Conclusion
With the development of computer security, more and more research methodologies are also
developing for the purpose of data hiding. I have tried to implement one methodology for this purpose. One of
the main strengths of this work is the simplicity of the code. It allows a user to understand the method and
develop their own data hiding techniques. There are however a few limitations also. The main drawback is that
although readable the final decoded image is a bit distorted. An advance image processing technique is needed
to solve this problem. However, data hiding technologies have advanced from limited use to global deployment.
A new technique can further intensify the depth of exploration.
References
[1]. H. Faheem Ahmed and U. Rizwan, Embedding Multiple Images in an Image Using Bit Plane, International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013, ISSN: 2277 128X
[2]. N S T Sai and R C Patil, IMAGE RETRIEVAL USING BIT-PLANE PIXEL DISTRIBUTION, International Journal of Computer
Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011
[3]. Morphological Image Processing, Available at: https://www.cs.auckland.ac.nz/courses/compsci773s1c/lectures/ImageProcessing-
html/topic4.htm#morpho
[4]. Intensity Histogram, Available at: http://homepages.inf.ed.ac.uk/rbf/HIPR2/histgram.htm
[5]. A.M.Raid, W.M.Khedr, M.A.El-dosuky and Mona Aoud, IMAGE RESTORATION BASED ON MORPHOLOGICAL
[6]. OPERATIONS, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 4, No.3,
June 2014.
[7]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding ( IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4,
1996)
[8]. Faheem Ahmed, H and Rizwan. U, An Alternative Technique in Data Embedding, Advanced Materials in Physics, pp 233 – 242,
2012.
[9]. Cachin. C., An information-theoretic model for steganography, Information and Computation, Vol. 192 (1), Ed. Academic, USA,
pp. 41 – 56, 2004.
[10]. Rizwan. U and Faheem Ahmed. H, Comprehensive study on various types of steganographic schemes and possible steganalysis
methods for various cover carrier like image, text, audio and video, International Journal of Scientific and Engineering Research,
Volume 3, Issue 11, November 2012, pp 151 – 154.
[11]. Eric Cole, Ronald D. Krutz, “Hiding in Plain Sight: Steganography and the Art of Covert Communication”,( Wiley Publishing Inc.
(2003).n).
[12]. Mr. Vikas Tyagi, Data Hiding in Image using least significant bit with cryptography, International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 2, Issue 4, April 2012, ISSN: 2277 128X
[13]. Fridrich, J and M. Goljan and D. Hogea and D. Soukal, Quantitative steganalysis of digital images: estimating the secret message
length, Multimedia Systems Journal - Special issue on Multimedia Security, Vol. 9 (3), pp. 288 – 302, 2003.

More Related Content

What's hot

An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
 
Identification system of characters in vehicular plates
Identification system of characters in vehicular platesIdentification system of characters in vehicular plates
Identification system of characters in vehicular platesIJRES Journal
 
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...IJERA Editor
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space IJEEE
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIijcsit
 
Introducing the concept of information pixels and the sipa (storing informati...
Introducing the concept of information pixels and the sipa (storing informati...Introducing the concept of information pixels and the sipa (storing informati...
Introducing the concept of information pixels and the sipa (storing informati...IJITCA Journal
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd Iaetsd
 
Colfax-Winograd-Summary _final (1)
Colfax-Winograd-Summary _final (1)Colfax-Winograd-Summary _final (1)
Colfax-Winograd-Summary _final (1)Sangamesh Ragate
 
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...ArchiLab 7
 
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759Vandna Sambyal
 
Modified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformModified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformIJERA Editor
 
Week 11 - Optimisation and Output
Week 11 - Optimisation and OutputWeek 11 - Optimisation and Output
Week 11 - Optimisation and OutputScottRoberts37
 

What's hot (15)

An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
Identification system of characters in vehicular plates
Identification system of characters in vehicular platesIdentification system of characters in vehicular plates
Identification system of characters in vehicular plates
 
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
 
Q045079298
Q045079298Q045079298
Q045079298
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
 
Introducing the concept of information pixels and the sipa (storing informati...
Introducing the concept of information pixels and the sipa (storing informati...Introducing the concept of information pixels and the sipa (storing informati...
Introducing the concept of information pixels and the sipa (storing informati...
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
Colfax-Winograd-Summary _final (1)
Colfax-Winograd-Summary _final (1)Colfax-Winograd-Summary _final (1)
Colfax-Winograd-Summary _final (1)
 
Optimized feedforward network of cnn with xnor v5
Optimized feedforward network of cnn with xnor v5Optimized feedforward network of cnn with xnor v5
Optimized feedforward network of cnn with xnor v5
 
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...Drobics, m. 2001:  datamining using synergiesbetween self-organising maps and...
Drobics, m. 2001: datamining using synergiesbetween self-organising maps and...
 
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759
Optimizedfeedforwardnetworkofcnnwithxnorv5 180321130759
 
Modified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transformModified approximate 8-point multiplier less DCT like transform
Modified approximate 8-point multiplier less DCT like transform
 
Week 11 - Optimisation and Output
Week 11 - Optimisation and OutputWeek 11 - Optimisation and Output
Week 11 - Optimisation and Output
 

Viewers also liked

Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...IOSR Journals
 
The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...
The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...
The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...IOSR Journals
 
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPP
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPPEnergy Efficiency in IEEE 802.11 standard WLAN through MWTPP
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPPIOSR Journals
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionIOSR Journals
 
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.IOSR Journals
 
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...IOSR Journals
 
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’IOSR Journals
 
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...Prediction of Consumer Purchase Decision using Demographic Variables: A Study...
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...IOSR Journals
 
Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...IOSR Journals
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предпринимателиIOSR Journals
 
On Local Integrable Solutions of Abstract Volterra Integral Equations
On Local Integrable Solutions of Abstract Volterra Integral EquationsOn Local Integrable Solutions of Abstract Volterra Integral Equations
On Local Integrable Solutions of Abstract Volterra Integral EquationsIOSR Journals
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsIOSR Journals
 
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeIOSR Journals
 
Investigation of General Equation That Best Describe the Relationship between...
Investigation of General Equation That Best Describe the Relationship between...Investigation of General Equation That Best Describe the Relationship between...
Investigation of General Equation That Best Describe the Relationship between...IOSR Journals
 
Ecological consequences of The Acid rain
Ecological consequences of The Acid rainEcological consequences of The Acid rain
Ecological consequences of The Acid rainIOSR Journals
 
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review Article
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review ArticleSimple Thinking Makes Chemistry Metabolic and Interesting - A Review Article
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review ArticleIOSR Journals
 
Study of Optical Property of Gel Grown Mercuric Iodate Crystals
Study of Optical Property of Gel Grown Mercuric Iodate CrystalsStudy of Optical Property of Gel Grown Mercuric Iodate Crystals
Study of Optical Property of Gel Grown Mercuric Iodate CrystalsIOSR Journals
 
Influence of Construction Parameters on Performance of Dense Graded Bituminou...
Influence of Construction Parameters on Performance of Dense Graded Bituminou...Influence of Construction Parameters on Performance of Dense Graded Bituminou...
Influence of Construction Parameters on Performance of Dense Graded Bituminou...IOSR Journals
 

Viewers also liked (20)

Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
Novel Way to Isolate Adipose Derive Mesenchymal Stem Cells & Its Future Clini...
 
The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...
The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...
The Protective Role Of High Dietary Protein On Arsenic Induced Hepatotoxicity...
 
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPP
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPPEnergy Efficiency in IEEE 802.11 standard WLAN through MWTPP
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPP
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
 
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet TransmissionBehavioral Model to Detect Anomalous Attacks in Packet Transmission
Behavioral Model to Detect Anomalous Attacks in Packet Transmission
 
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
Characteristic Comparison of U-Shaped Monopole and Complete Monopole Antenna.
 
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
Toxicological Effect of Effluents from Indomie Plc on Some Biochemical Parame...
 
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
‘Indian Agriculture: A Fresh Approach Towards Green Revolution 2.0’
 
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...Prediction of Consumer Purchase Decision using Demographic Variables: A Study...
Prediction of Consumer Purchase Decision using Demographic Variables: A Study...
 
C0741113
C0741113C0741113
C0741113
 
Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...Analysis characteristics of power PV cells and wind turbine from power genera...
Analysis characteristics of power PV cells and wind turbine from power genera...
 
кайртаева жадыра театр - предприниматели
кайртаева жадыра   театр - предпринимателикайртаева жадыра   театр - предприниматели
кайртаева жадыра театр - предприниматели
 
On Local Integrable Solutions of Abstract Volterra Integral Equations
On Local Integrable Solutions of Abstract Volterra Integral EquationsOn Local Integrable Solutions of Abstract Volterra Integral Equations
On Local Integrable Solutions of Abstract Volterra Integral Equations
 
On Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable LabelingsOn Embedding and NP-Complete Problems of Equitable Labelings
On Embedding and NP-Complete Problems of Equitable Labelings
 
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration schemeDesigning of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
 
Investigation of General Equation That Best Describe the Relationship between...
Investigation of General Equation That Best Describe the Relationship between...Investigation of General Equation That Best Describe the Relationship between...
Investigation of General Equation That Best Describe the Relationship between...
 
Ecological consequences of The Acid rain
Ecological consequences of The Acid rainEcological consequences of The Acid rain
Ecological consequences of The Acid rain
 
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review Article
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review ArticleSimple Thinking Makes Chemistry Metabolic and Interesting - A Review Article
Simple Thinking Makes Chemistry Metabolic and Interesting - A Review Article
 
Study of Optical Property of Gel Grown Mercuric Iodate Crystals
Study of Optical Property of Gel Grown Mercuric Iodate CrystalsStudy of Optical Property of Gel Grown Mercuric Iodate Crystals
Study of Optical Property of Gel Grown Mercuric Iodate Crystals
 
Influence of Construction Parameters on Performance of Dense Graded Bituminou...
Influence of Construction Parameters on Performance of Dense Graded Bituminou...Influence of Construction Parameters on Performance of Dense Graded Bituminou...
Influence of Construction Parameters on Performance of Dense Graded Bituminou...
 

Similar to D017241723

IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...IJERA Editor
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smtZiadAlqady
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionIEEEFINALYEARPROJECTS
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation IJEEE
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYJournal For Research
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 

Similar to D017241723 (20)

IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
 
Color image encryption decryption using smt
Color image encryption decryption using smtColor image encryption decryption using smt
Color image encryption decryption using smt
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Ijetcas14 335
Ijetcas14 335Ijetcas14 335
Ijetcas14 335
 
Id62
Id62Id62
Id62
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

D017241723

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. IV (Mar – Apr. 2015), PP 17-23 www.iosrjournals.org DOI: 10.9790/0661-17241723 www.iosrjournals.org 17 | Page An Effective Method to Hide Texts Using Bit Plane Extraction Mayukh Das Department of Electronics & Communication Engineering, Techno India (West Bengal University of Technology), India Abstract: The work is to show how simply a data can be hidden inside an image and be easily extracted using Matlab. The work focuses on bit plane extraction and how it can be used to complete the above mentioned task. Both encryption and decryption procedure has been discussed. Here the data to be hidden refers to any piece of writing that may contain valuable information. It does not include any audio or video file. The main focus has been given to grayscaled images, which acts as the reference image that covers the data. Keywords: Bit plane slicing, Decryption, Encryption, Histogram, Steganography I. Introduction With the advancement of digital technologies and communication systems the need for privacy and security has enhanced. Hackers are always ready to exploit any sort of impuissance inside a network. Hence, data shared over any communication media must be concealed from them. Steganography, or data hiding is a significant process for this purpose as it allows an image to shroud a data to be shared. Hence the original data becomes invisible in the image. This invisible data are transmitted across the channel and finally decoded in the receiver end in order to extract the actual data back. This method intensifies the security of the system. II. Background A lot of research related to steganography is going on currently. This research steers one’s attention towards hiding texts, scripts or any kind of writing in a simple way. Grayscale image or an intensity image is an image in which the value of each pixel is a single sample ranging from 0 to 255. Hence it carries only intensity information. Any value between 0-255 can be represented as an eight bit binary value, example (168)10 = (10101000)2 [1]. Hence an intensity image can be sliced up into 8 bit planes which give a sequence of binary images. This procedure is called bit plane slicing that has been exploited in this work. The slicing can be done with RGB images also. Fig 1: Bit plane slicing of a grayscale image Hence a grayscale image may be considered as a combination of eight bit-planes where each bit-plane can be represented by a binary matrix [2].
  • 2. An Effective Method to Hide Texts Using Bit Plane Extraction DOI: 10.9790/0661-17241723 www.iosrjournals.org 18 | Page The formation of bit plane is given by Bp(i,j) = r{(1/2)*floor[(1/2i )*o(i,j)]} ……[2] Where o(i,j) = original image Bp(i,j) = bit plane info r = remainder floor(X) = rounds the elements of X to the nearest integers towards minus infinity. III. Methodology 3.1 Encryption The information to be hidden is first converted into an image file whose file format must be similar to the reference image. The MSB (most significant bit) plane contains utmost information of the image. This information content decreases as we go down and is least in the LSB (least significant bit) plane. The target is to slice both the reference as well as the data image and then overlay a particular data plane with the reference planes so as to form a single image with the desired data concealed in it. But the data plane selected must also contain adequate info so that the original data can be extracted after decryption. Hence, choosing a particular combination is the main challenge in the encoding part. Fig 2: Block diagram of encryption process Both the encoding and decoding parts were carried out in Matlab and the results were analyzed. The encoding starts with converting all the images into grayscale, because if we separate out R, G and B color components and create 8 bit planes for each color component then we can create total twenty four bit planes for each color image [2]. Therefore, it is quite convenient to deal with grayscale as it has only 8 bit planes. The Matlab command used to slice into bit planes is given by
  • 3. An Effective Method to Hide Texts Using Bit Plane Extraction DOI: 10.9790/0661-17241723 www.iosrjournals.org 19 | Page Cj = mod(floor(refer/2j ),2); Where Cj is the jth bit plane Then the 3rd plane (the plane containing the 4th bit information) of the data is extracted to be replaced by 3rd bit of reference data. Direct replacement generates a dimension error. Hence the dimensions of the 3rd bit plane data were resized in accordance with the reference image (3rd bit plane). The final encrypted image was obtained by amalgamating the rest of the reference bit planes with the 3rd bit data. Reason behind preferring the 3rd plane is further discussed in the next section. 3.2 Decryption The decoding process was done in two steps. It includes bit plane extraction and morphological image processing. The data plane that was blended with the reference image was pulled out and subsequent processing was done. Binary image contains various imperfections. Particularly our extracted bit plane is actually a bleached out image as it contains only the 4th bit info about the original data. Hence morphological image processing removes a fair amount of imperfection by accounting for the form and structure of the image [3]. A pragmatic approach with this process helps us to erode the image in order to get an unclouded view of the data. Erosion with small square structuring elements shrivels an image by discarding away a layer of pixels from both the inner and outer boundaries of regions. The holes and gaps between different regions become larger, and small details are eliminated [3]. Here erosion was done using a 3×3 structure. The image is then complemented to give a convenient look. Processing has been done mainly to make the data decipherable. Fig 3: Block diagram of decryption process IV. Results And Observations 4.1 Encryption Many pairs of reference and data images were conflated into a single image and their histogram plots were compared with that of the original of which one is shown. Fig 4: Reference image (R) Fig 5: Data image (D)
  • 4. An Effective Method to Hide Texts Using Bit Plane Extraction DOI: 10.9790/0661-17241723 www.iosrjournals.org 20 | Page Fig 6: Encrypted image (E) In the figure below a zoomed view of the encoded image is shown to substantiate the fact that the data is perfectly hidden inside. Fig 7: Zoomed view of E Histogram plot of an intensity image shows the number of pixels in each and every intensity value. For a grayscale image there are 256 different possible intensities, and so the histogram will graphically display 256 numbers(0-255) showing the distribution of pixels amongst those grayscale values [4].
  • 5. An Effective Method to Hide Texts Using Bit Plane Extraction DOI: 10.9790/0661-17241723 www.iosrjournals.org 21 | Page Fig 8: Histogram plots On comparing the two histogram graphs we see that the envelope of the curve is similar but in the encrypted image some pixel values are suppressed. This is because the 3rd bit plane is removed from the image which actually contained a fair amount of info. Hence the histogram graphs emphasize the fact that the bit plane switching has been performed successfully. 4.2 Decryption The encrypted data was decoded and the information was retrieved. Although the final output slightly differs from the actual data input, the info is clearly readable. Decoder part has mainly two sections i.e. bit plane extraction output and the final output after being processed. Fig 9: Output on extracting the 3rd bit plane of the encrypted image Fig 10: Final image
  • 6. An Effective Method to Hide Texts Using Bit Plane Extraction DOI: 10.9790/0661-17241723 www.iosrjournals.org 22 | Page Therefore, we see that the decoded output is clearly decipherable. However, in the bit plane extracted output the smaller font characters are a bit obscured. Hence it has been processed to get a distinct appearance in the final image. The larger figures are easily readable even from the first output image. So finally each alphabet is clearly visible irrespective of font their font size. 4.3 Reason Behind Switching 3rd Bit Plane In order to understand the usefulness of this plane, the encryption part has been carried out by switching other planes and corresponding outputs were observed. Let us observe the encoded image when encryption is done by interchanging the 4th bit plane. Fig 11: A zoomed view of the encrypted image when the 4th bit plane is interchanged A significant amount of data is visible over the reference image. This is because bit plane 7, 6, 5 and 4 contains a substantial amount of information about the parent image. When the 4th plane is interchanged, a rich content of image R is replaced by a data plane (denser than the 3rd plane). Hence an imprint of the data is visible throughout the encrypted image. This impression goes darker when higher planes are switched. Now let us observe the encoded image when encryption is done by switching the 2nd bit plane. Fig 12: Encrypted image when 2nd plane is switched
  • 7. An Effective Method to Hide Texts Using Bit Plane Extraction DOI: 10.9790/0661-17241723 www.iosrjournals.org 23 | Page Fig 13: Decoded output Here we see that encrypted image is fine, but the smaller font figures of the decoded output are too hazy to be read. This image when processed produces a more blurred picture. Specially the smaller alphabets are never distinctly readable. If the actual data never appears after decrypting then there is no point to choose this combination. Then decoded output gets more obliterated as we interchange further lower bit planes. Only 3rd plane switching yields a positive result for both encoding and decoding processes. V. Conclusion With the development of computer security, more and more research methodologies are also developing for the purpose of data hiding. I have tried to implement one methodology for this purpose. One of the main strengths of this work is the simplicity of the code. It allows a user to understand the method and develop their own data hiding techniques. There are however a few limitations also. The main drawback is that although readable the final decoded image is a bit distorted. An advance image processing technique is needed to solve this problem. However, data hiding technologies have advanced from limited use to global deployment. A new technique can further intensify the depth of exploration. References [1]. H. Faheem Ahmed and U. Rizwan, Embedding Multiple Images in an Image Using Bit Plane, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013, ISSN: 2277 128X [2]. N S T Sai and R C Patil, IMAGE RETRIEVAL USING BIT-PLANE PIXEL DISTRIBUTION, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 [3]. Morphological Image Processing, Available at: https://www.cs.auckland.ac.nz/courses/compsci773s1c/lectures/ImageProcessing- html/topic4.htm#morpho [4]. Intensity Histogram, Available at: http://homepages.inf.ed.ac.uk/rbf/HIPR2/histgram.htm [5]. A.M.Raid, W.M.Khedr, M.A.El-dosuky and Mona Aoud, IMAGE RESTORATION BASED ON MORPHOLOGICAL [6]. OPERATIONS, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol. 4, No.3, June 2014. [7]. W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding ( IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996) [8]. Faheem Ahmed, H and Rizwan. U, An Alternative Technique in Data Embedding, Advanced Materials in Physics, pp 233 – 242, 2012. [9]. Cachin. C., An information-theoretic model for steganography, Information and Computation, Vol. 192 (1), Ed. Academic, USA, pp. 41 – 56, 2004. [10]. Rizwan. U and Faheem Ahmed. H, Comprehensive study on various types of steganographic schemes and possible steganalysis methods for various cover carrier like image, text, audio and video, International Journal of Scientific and Engineering Research, Volume 3, Issue 11, November 2012, pp 151 – 154. [11]. Eric Cole, Ronald D. Krutz, “Hiding in Plain Sight: Steganography and the Art of Covert Communication”,( Wiley Publishing Inc. (2003).n). [12]. Mr. Vikas Tyagi, Data Hiding in Image using least significant bit with cryptography, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012, ISSN: 2277 128X [13]. Fridrich, J and M. Goljan and D. Hogea and D. Soukal, Quantitative steganalysis of digital images: estimating the secret message length, Multimedia Systems Journal - Special issue on Multimedia Security, Vol. 9 (3), pp. 288 – 302, 2003.