Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Binary in Binary for Secret Writing – A Cryptic’s Cousin Approach

International Journal of Computer Applications
© 2010 by IJCA Journal
Number 11 - Article 8
Year of Publication: 2010
R. Amirtharajan
Venkata Abhiram Murarisetty
Dr. R.John Bosco Balaguru

Dr. R.John Bosco Balaguru, Venkata Abhiram Murarisetty and R Amirtharajan. Article: Binary in Binary for Secret Writing A Cryptics Cousin Approach. International Journal of Computer Applications 5(11):41–47, August 2010. Published By Foundation of Computer Science. BibTeX

	author = {Dr. R.John Bosco Balaguru and Venkata Abhiram Murarisetty and R. Amirtharajan},
	title = {Article: Binary in Binary for Secret Writing  A Cryptics Cousin Approach},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {5},
	number = {11},
	pages = {41--47},
	month = {August},
	note = {Published By Foundation of Computer Science}


Binary images, like cartoons, text documents, signatures captured by signing pads and/or 2-color images are very commonly used in our daily life. The JPEG compression method which was designed to efficiently compress color images do not do a good job on a monochromatic (binary) image. Changing the pixel values in these images for hiding the data, may produce a noticeable change in the cover media. Embedding capacity and preservation of visible artifacts are the potential problems of this technique. This paper proposes several methods for hiding data in binary images (including fax). The proposed algorithms alter pixels of the embeddable blocks of cover image depending on the characteristic values of the block. In addition, the new algorithm deals with statistical embedding for each block, which enhances the security of embedded data and the capacity of the embedding method. The performances of the algorithms are tested over various sizes of binary cover images by embedding various sizes of secured data. The effectiveness of the stego process proposed has been studied by estimating the number of errors, Bit error rate and Relative entropy.


  • R.Amirtharajan, Krishnendra Nathella and J Harish, “Info Hide – A Cluster Cover Approach” International Journal of Computer Applications 3(5) (2010)11–18.
  • W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding, IBM Syst. J. 35 (3&4) (1996) 313–336.
  • Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  • J. Chen; T. S. Chen & M. W Cheng, “A New Data Hiding Method in Binary Image”, in proceedings of 5th IEEE international symposium on multimedia software engineering 2003
  • K. F. Hwang and C. C. Chang, “A Run Length Mechanism for Hiding Data into Binary Images”, In proceedings of pacific rim workshop on digital steganography 2002, 71-74.
  • S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000
  • M. Wu and J. Lee, "A Novel Data Embedding Method for Two-Color Facsimile Images", International Symposium on Multimedia Information Processing, Taiwan, December 1998.
  • Min Wu; Bede Liu; “Data hiding in binary image for authentication and annotation” in proceedings of IEEE Transactions on multimedia, 6(2004)528 – 538.
  • H.K. Pan, Y.Y. Chen and Y.C. Tseng, “A Secure Data Hiding Scheme for Two-Color Images”, in proceedings of 5th IEEE Symposium on computers and communication, (2000)750-755.
  • Yu-Chee Tseng; Hsiang-Kuang Pan, “Secure and invisible data hiding in 2-color images”, in proceedings of 20th IEEE Computer and Communications Societies, INFOCOM (2001) 2887 - 896.