IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • MANAS Journal of Engineering
  • Volume:10 Issue:1
  • Data hiding to the image with bit plane slicing and double XOR

Data hiding to the image with bit plane slicing and double XOR

Authors : Bilgi ÖZDEMİR, Nurettin DOĞAN
Pages : 66-72
Doi:10.51354/mjen.1049851
View : 14 | Download : 13
Publication Date : 2022-06-30
Article Type : Research Paper
Abstract :Data hiding is done in different environments and with different techniques, and applications in this area attract a lot of attention. In data hiding, the method of securing the data in the image by hiding data is one of the steganography methods. Bit Plane Slicing, one of the techniques applied in image steganography, is a reliable technique applied on images such as data hiding or compression, which allows us to operate on some special bits by separating each pixel that makes up the image into planes. This technique is aimed to provide high image quality and data security. In this study, two encryption layers and a concealment stage are proposed. Here, the bit planes of the three channels of the color image were first extracted using the BPS technique. The message to be hidden later was encrypted using a double XOR operation using binary representation and a secret key insert ignore into journalissuearticles values(extracted from the MSB);. Then, the stream of encrypted bits is hidden in the cover image using the least significant bit plane. Well-known evaluation criteria such as MSE, PSNR, and histogram distribution were calculated to ensure the quality of the proposed method. Experimental results show that the proposed method has acceptable results and maintains the security of confidential text messages.
Keywords : Bit Plane Slicing BPS, Steganography, Cryptology, Least Significant Bit LSB, Metod, Most Significant Bit MSB, Meto

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025