Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos

Geeta Kasana, Dr Kulbir Singh, Dr Satwinder Singh Bhatia



In this paper, a Bit Plane Coding (BPC) based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP) is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image.

Full Text:



ISO/IEC 15444-1, (2001). Information Technology – JPEG2000 Image Coding System – Part 1: Core Coding System..

Carvajal-Gamez, B. E., Gallegos-Funes F. J., and Rosales-Silva, A. J. (2013). Color local complexity estimation based steganographic method, EXPERT SYSTEMS WITH APPLICATIONS, 40(4): 1132–1142.


Chan, C. K. and Cheng, L. M. (2004). Hiding data in images by simple LSB substitution, PATTERN RECOGNITION, 37(3):469–474.


Chang, C. C., Tai, W. L., and Lin, C. C., (2006). A reversible data hiding scheme based on side match vector quantization. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 16(10):1301–1308.

doi: 10.1109/TCSVT.2006.882380

Chang, C. C. et al, (2007). Reversible hiding in DCT-based compressed images. INFORMATION SCIENCES, 177(13): 2768–2786.


Chang, C. C., Wu, W. C., and Hu Y.C. (2007). Lossless recovery of a VQ index table with embedded secret data. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 18(3):207–216.


Chang, C. C., Nguyen, T. S., and Lin, C. C. (2011). A reversible data hiding scheme for VQ indices using locally adaptive coding. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 22(7): 664–672.


Chen, W. J., Chang, C. C., and Le, T. (2010). High payload steganography mechanism using hybrid edge detector. EXPERT SYSTEMS WITH APPLICATIONS, 37(4):3292–3301.


Chen, W. Y. (2008). Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. APPLIED MATHEMATICS AND COMPUTATION, 196(1): 40–54.


Chu, R., You, X., Kong X., and Ba, X. (2004). DCT-based image steganographic method resisting statistical attacks. Proceedings of IEEE international conference on acoustics, speech, and signal processing, 5.

Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., and Kalker, T. (2008). Digital Watermarking and Steganography. 2nd ed., Burlington, MA: Morgan Kaufmann.

Goudia, D., Chaumont M., Puech W. and Said N. H. (2011). A Joint Trellis Coded Quantization Data Hiding Scheme in the JPEG2000 Part-2 Coding Framework, 19th European Signal Processing Conference, pp. 1110-1114, Sept.

Hai-ying, G., Yin, X. and Guo-qiang, L. (2008). A steganographic algorithm for JPEG2000 images. IEEE computer society, Int. Conf. on Computer Science and Software Engineering, pp. 1263-1266.

doi: 10.1109/CSSE.2008.139

Hsieh, M. S. (2010). A robust image authentication method based on wavelet transform and Teager energy operator. INTERNATIONAL JOURNAL OF MULTIMEDIA AND ITS APPLICATIONS, 2(3):1-17.

doi: : 10.5121/ijma.2010.2301

Ioannidou, A., Halkidis, S. T., and Stephanides, G. (2012). A novel technique for image steganography based on a high payload method and edge detection. EXPERT SYSTEMS WITH APPLICATIONS, 39(14): 11517–11524.


Ishida, T., Yamawak,i K., Noda H., and Niimi M. (2008). Performance improvement of JPEG2000 steganography using QIM. Intelligent Information Hiding and Multimedia Signal Processing, International Conference, IEEE Computer Society, pp: 155-158.


Ishida T., Yamawaki K., Noda H. and Niimi M. (2009). An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis. JOURNAL OF INFORMATION PROCESSING, 17: 267-272.

KAKADU software,

Jafari, R., Ziou, D., and Rashidi, M. M. (2013). Increasing image compression rate using steganography. EXPERT SYSTEMS WITH APPLICATIONS, 40(17): 6918–6927.


Jin, H. L., Fujiyoshi, M., Sheki Y. and Kiya, H. (2007). A Data Hiding Method for JPEG2000 Coded Images Using Module Arithmetic. ELECTRONICS AND COMMUNICATIONS IN JAPAN, 90(7): 37-45.

doi: 10.1002/ecjc.20286

Ni, Z., Shi, Y. Q., Ansari, N., and Su, W., (2006). Reversible data hiding. IEEE Transactions on Circuits Systems and Video Technology, 16(3), pp. 354–362.

doi: 10.1109/TCSVT.2006.869964

Noda, H., Spaulding, J., Shirazi, M. N., Kawaguchi, E. (2002). Application of bit plane decomposition steganography to JPEG2000 encoded images. IEEE Signal Processing Letters, 9(12), pp. 410-413.

doi: 10.1109/LSP.2002.806056

Noda, H., Niimi, M., and Kawaguchi, E. (2006). High-performance JPEG steganography using quantization index modulation in DCT domain. PATTERN RECOGNITION LETTERS, 27(5): 455–461, 2006.


Ohyama, S., Niimi, M., Yamawaki, K., and Noda, H. (2008). Reversible data hiding for full color JPEG2000 compressed bit-stream preserving bit-depth information. In Proc. ICPR 08: the 19th International Conference on Pattern Recognition, pp. 1-4, December.


Sweldens W. (1997). The lifting scheme: a custom-design construction of second generation wavelets. SIAM JOURNAL OF MATHEMATICAL ANALYSIS, 29:511-546.

Sajedi, H., and Jamzad, M. (2010). BSS: Boosted steganography scheme with cover image preprocessing. EXPERT SYSTEMS WITH APPLICATIONS, 37(12): 7703–7710.


Su, P. C., and Kuo, J. (2003). Steganography in JPEG2000 compressed images. IEEE Transactions on Consumer Electronics, 49(4), pp. 824-832.


Wu, D. C., and Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. PATTERN RECOGNITION LETTERS, 24(9):1613–1626.


Yang, C. H., Yang W. J., Huang, C. T., and Wang, S. J. (2011). Reversible steganography based on side match and hit pattern for VQ-compressed images. INFORMATION SCIENCES, 181(11):2218–2230.


Yang, C. H., Weng, C. Y., Wang, S. J., and Sun, H. M. (2008). Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 3(3), pp. 488–497.


Zhang, L., Wang, H., and Wu, R., (2009). A high capacity steganography scheme for JPEG2000 baseline system. IEEE Transactions on Image Processing, 18(8), pp. 1797-1803.

doi: 10.1109/TIP.2009.2021544


  • There are currently no refbacks.

Published by Department of Chemical Engineering University of Diponegoro Semarang
Google Scholar

IJSE  by is licensed under Creative Commons Attribution 3.0 License.