Implementation of the Bit Plane Complexity Segmentation (BPCS) Steganography Method for Embedding  Secret Messages  in Image Media

Main Article Content

Yadi Limanta Maha
Andre Septianus Nababan
Lonia Harefa

Abstract

Rapid developments in information technology have increased the need for data security and confidentiality. Steganography, as a technique for hiding messages in digital media, is an effective solution for keeping messages hidden. One steganography method that has high capacity and is capable of maintaining image quality is Bit-Plane Complexity Segmentation (BPCS). This study aims to implement the BPCS method on digital color images (RGB) using the Python programming language with a Graphical User Interface (GUI) that makes it easy for users to insert and extract secret messages. The research process includes separating images into bit planes, calculating the complexity of each bit plane block, embedding secret messages in complex bit planes, and extracting messages to ensure information integrity. Manual calculation examples and message embedding simulations show that the BPCS method can embed large messages without reducing image visual quality. Test results show that changes only occur in the low bit-planes, so the image remains visually unchanged. The implementation of this GUI application makes it easier for users to insert and extract secret messages without having to deeply understand the BPCS algorithm, while also proving the reliability of this method in digital image steganography.

Article Details

Section

Articles

How to Cite

Implementation of the Bit Plane Complexity Segmentation (BPCS) Steganography Method for Embedding  Secret Messages  in Image Media. (2026). International Journal of Science and Informatics Technology (IJOSIT), 1(01). https://www.ijosit.org/index.php/ijosit/article/view/1

References

[1] f. Kurniawan, z. Sitorus, and r. R. Putra, “combination of cryptography and steganography in improving text data security using des (data encryotion standard) and lsb (least significant bit) methods.”

[2] a. Phipps, k. Ouazzane, and v. Vassilev, “computer network and information security, 2022, x, xx-xx,” 2022. [online]. Available: http://www.mecs-press.org/

[3] a. Arya, s. Soni, and ] m-tech scholar student, “performance evaluation of secrete image steganography techniques using least significant bit (lsb) method,” international journal of computer science trends and technology (ijcst), vol. 6, [online]. Available: www.ijcstjournal.org

[4] h. Alshamrani, dr. S. H. Alajmani, dr. R. Y. Alyami, and dr. Ben soh, “comprehensive comparison of image steganography techniques with security enhancement,” international journal of recent technology and engineering (ijrte), vol. 14, no. 2, pp. 7–19, jul. 2025, doi: 10.35940/ijrte.a8249.14020725.

[5] h. Caballero, v. Muñoz, and m. A. Ramos-corchado, “a comparative study of steganography using watermarking and modifications pixels versus least significant bit,” international journal of electrical and computer engineering, vol. 13, no. 6, pp. 6335–6350, dec. 2023, doi: 10.11591/ijece.v13i6.pp6335-6350.

[6] r. Panigrahi and n. Padhy, “an effective steganographic technique for hiding the image data using the lsb technique,” cyber security and applications, vol. 3, dec. 2025, doi: 10.1016/j.csa.2024.100069.

[7] aqilah syaima’ fadel, rianto david saputra, y. Fatma, and risky nanda putra, “analisis keamanan steganografi teks dengan metode lsb (least significant bit) pada citra digital,” jurnal coscitech (computer science and information technology), vol. 5, no. 1, pp. 36–41, apr. 2024, doi: 10.37859/coscitech.v5i1.6759.

[8] k. Dharma kusumah, j. Pragantha, and n. Jaya perdana, “steganography implementation of insertion of confidential data on digital image media,” international journal of application on sciences, technology and engineering, vol. 1, no. 2, pp. 695–702, may 2023, doi: 10.24912/ijaste.v1.i2.695-702.

[9] c. Do xuan, “a proposal to improve the bit plane steganography based on the complexity calculation technique.” [online]. Available: www.ijacsa.thesai.org

[10] p. P. Khairnar and p. V. S. Ubale, “steganography using bpcs technology,” 2013.

[11] e. Kawaguchi and r. O. Eason, “header for spie use principle and applications of bpcs-steganography.” [online]. Available: http://www.datahide.org/bpcse/qtechhv-program-e.html

[12] r. Hidayat, “klasifikasi bit-plane noise untuk penyisipan pesan pada teknik steganography bpcs menggunakan fuzzy inference sistem mamdani,” jurnal rekayasa elektrika, vol. 11, no. 3, apr. 2015, doi: 10.17529/jre.v11i3.2238.