Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Efficient BEMD Data Hiding Algorithm

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Shuchi Agarwal, Jaipal Singh Bisht

Shuchi Agarwal and Jaipal Singh Bisht. Efficient BEMD Data Hiding Algorithm. International Journal of Computer Applications 160(5):24-29, February 2017. BibTeX

	author = {Shuchi Agarwal and Jaipal Singh Bisht},
	title = {Efficient BEMD Data Hiding Algorithm},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {5},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {24-29},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2017913051},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Improved BEMD steganographic algorithm to hide secret text behind cover pixels of image to increase security of digital communication for exchanging private information worldwide using binary coefficient and modulus is proposed. From simulation results, Stego image quality better than 70dB which is higher than BEMD Kuo-Chang scheme thereby reducing mean square error difference between cover image and stego image.


  1. Wen-Chung Kuo, Chun-Cheng Wang, Yu-Chih Huang, “Binary power data hiding scheme”, Elsevier, 2015.
  2. Xinpeng Zhang and Shuozhong Wang, 2006, “Efficient steganographic embedding by Exploiting modification Direction”, IEEE Communication Letters.
  3. W-C Kuo, C-C Wang, “Data hiding based on generalized exploiting modification direction method”, Imaging Science Journal, 2013.
  4. Ratnakirti Roy, Suvamoy Changder, Anirban Sarkar, Narayan C Debnath, “Evaluating Image Steganography Techniques: Future Research Challenges”, IEEE, 2013.
  5. Fabien A.P. Petit colas, Ross J. Anderson, Markus G. Kuhn, “Information hiding-A survey”, Proceedings of the IEEE, July 1999, 0018-9219.
  6. Wen-Chung Kuo, Sheng-Yi Chang, “Hybrid GEMD data hiding”, Journal of information hiding and multimedia signal processing, July 2014, 2073-4212.
  7. Min WU, Heather Yu, Bede Liu, “Data hiding in image and video: Design and Applications”, IEEE transactions on image processing, June 2003, 1057-7149.
  8. R.J.Anderson, “Information Hiding: 1st International workshop (Lecture notes in computer science), Springer-Verlag, 1996, 1174.
  9. Vipul J Patel, Ms. Neha Ripal Soni, “Uncompressed Image Steganography using BPCS: Survey and Analysis”, IOSR Journal of Computer Engineering (IOSR-JCE), Dec 2013.
  10. A. Westfeld, “F5-A Steganographic Algorithm: High capacity despite better steganalysis”, Proc. 4th International Workshop on Information Hiding., 2001, Springer, 2001, 289-302.
  11. Huang, Y. M. and Jhan, P. W., “Two improved data hiding schemes”, Proc. 4th Int. Cong. on Image and signal processing: CISP 2011, Shanghai, China, October 2011, IEEE, pp. 1784–1787.
  12. Wen-Chung Kuo, Lih-Chyau ,Wuu Chia-Nian Shyi Shao-Hung Kuo, “A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method”, Ninth International Conference on Hybrid Intelligent Systems, 2009, IEEE, 978-0-7695-3745.
  13. F. Cayre, C. Fontaine, T. Furon, “Watermarking Security Theory and Practice,” IEEE Trans. on Signal Processing, 2005, Vol.53, pp.3976- 3987.
  14. M.D. Swanson, B. Zhu and A.H.Tewfik, “Robust Data hiding for Images”, IEEE Digital Signal Processing Workshop, September 1996.
  15. H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement Methods”, IEEE Proceedings-Vision, Image and Signal Processing, Vol.152, No. 5, pp.611-615, October 2005.
  16. Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, “A secure data hiding scheme for binary images,” IEEE Transaction Communication, Vol. 50, pp. 1227-1231, August 2002.
  17. W. Zhang, X. Zhang, S. Wang, “A Double Layered ‘‘Plus–Minus One data embedding scheme”, IEEE Signal Processing Letters, 2007, 848–851.
  18. N. Provos and P. Honeyman, “Hide and Seek: An Introduction to Steganography”, IEEE Security and Privacy Magazine, 2003.
  19. A. Cheddad, J. Condell, K. Curran and P.M. Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing, 90(3), 727-752, 2010.


Data hiding, steganography, stego image, cover image, MSE PSNR, EMD, BEMD, pixel value.