BPCS-Steganography
Encyclopedia
BPCS-Steganography is a type of digital steganography
. Digital steganography can hide confidential data (i.e., secret files) very securely by embedding them into some media data called "vessel data." The vessel data is also referred to as "carrier, cover, or dummy data". In BPCS-Steganography true color images (i.e., 24-bit color images) are mostly used for vessel data. The embedding operation in practice is to replace the "complex areas" on the bit plane
s of the vessel image with the confidential data. The most important aspect of BPCS-Steganography is that the embedding capacity is very large.
Web site and downloadable for everyone. Recently, many researchers are tackling its algorithm
improvement and applications as well as resistibility studies against steganalysis
.
Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...
. Digital steganography can hide confidential data (i.e., secret files) very securely by embedding them into some media data called "vessel data." The vessel data is also referred to as "carrier, cover, or dummy data". In BPCS-Steganography true color images (i.e., 24-bit color images) are mostly used for vessel data. The embedding operation in practice is to replace the "complex areas" on the bit plane
BIT plane
This article is about Natalie Jeremijenko and the Bureau of Inverse Technology's project. For the company, see Bitplane. For the digital information term, see bit plane....
s of the vessel image with the confidential data. The most important aspect of BPCS-Steganography is that the embedding capacity is very large.
Principle of embedding
The Human visual system has such a special property that a too complicated visual pattern can not be perceived as "shape-informative." For example, on a very flat beach shore every single square-foot area looks the same - it is just a sandy area, no shape is observed. However, if you watch carefully, two same-looking areas are entirely different in their sand particle shapes. BPCS-Steganography makes use of this property. It replaces complex areas on the bit-planes of the vessel image with other complex data patterns (i.e., pieces of secret files). This replacing operation is called "embedding." No one can see any difference between the two vessel images of before and after the embedding operation.Present status of research and development
This steganography was proposed jointly by a Japanese researcher and an American researcher in 1997. Their experimental program (titled Qtech Hide & View) is uploaded on an InternetInternet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...
Web site and downloadable for everyone. Recently, many researchers are tackling its algorithm
Algorithm
In mathematics and computer science, an algorithm is an effective method expressed as a finite list of well-defined instructions for calculating a function. Algorithms are used for calculation, data processing, and automated reasoning...
improvement and applications as well as resistibility studies against steganalysis
Steganalysis
Steganalysis is the art and science of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography.- Overview :...
.
See also
- SteganographySteganographySteganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...
- Steganography toolsSteganography toolsA steganography software tool implements a subset of the most general digital steganography process, allowing users to insert and extract hidden data into and from carrier files.-Architecture:...
- Steganographic file systemSteganographic file systemSteganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir. Their paper proposed two main methods of hiding data: in a series of fixed size files originally consisting of random bits on top of which 'vectors' could be superimposed in such a...
- Steganography detection