[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Partial reversible data hiding scheme using (7, 4) hamming code

Published: 01 October 2017 Publication History

Abstract

In this paper, we propose a partial reversible data hiding scheme using (7,4) Hamming code (PRDHHC) with secret position (ź). In this scheme, we partition the original cover image into (7 7) pixel block and adjust redundant LSB bits of each row using odd parity. Then we calculate secret position ź = (ź mod 7) + 1, where ź is a shared secret key. The bit at position ź and a suitable location for hidden message bit is modified through error creation caused by tamper in each row of the selected block. For the next row, the ź is updated by the data embedding position (ź) of the previous row. We repeat this process to embed secret message bits within the selected block. For each new block, the ź is updated by źi+1 = (źi ź ź) mod 7 + 1, where i = 0, 1, 2, 3, . . . , number of blocks. At the receiver end, we complement the bit at position ź then retrieve the secret message bit by applying Hamming error correcting code. The extraction process will be stopped when we find continuous no error within stego image. The propose PRDHHC scheme extract the hidden message successfully and recover hamming adjusted cover image by complement bits at both the ź and ź positions but can not recover original cover image, that is to say, our scheme is partial reversible. Finally, we compared our scheme with other state-of-the-art methods and obtained reasonably better performance in terms of visual quality (measured by PSNR). Also we analyze our generated stego image using some steganalysis techniques which give promising results.

References

[1]
Chan C.K., Cheng L.M. (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469---474
[2]
Chang C., Chou Y. (2008) Using nearest covering codes to embed secret information in gray scale images. In: Proceedings of the 2nd international conference on ubiquitous information management and communication. ACM, pp 315---320
[3]
Chang C.C., Chan C.S., Fan Y.H. (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39 (6):1155---1167
[4]
Chang C.C., Kieu T.D., Chou Y.C. (2008). A high payload steganographic scheme based on (7, 4) hamming code for digital images. In Electronic Commerce and Security, 2008 International Symposium on (pp. 16---21). IEEE
[5]
Cao Z., Yin Z., Hu H., Gao X., Wang L (2016) High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1):1---13
[6]
Crandall R. (1998). Some notes on steganography. Posted on steganography mailing list
[7]
Fan L., Gao T., Cao Y. (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng 39(3):873---881
[8]
Fridrich J., Goljan M., Du R. (2001). Invertible authentication. In photonics west 2001-electronic imaging (pp. 197-208). International society for optics and photonics
[9]
Guo J.M. (2008) Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning. Signal Process 88(6):1496---1510
[10]
Kim C., Shin D., Shin D. (2011) Data hiding in a halftone image using hamming code (15, 11). Springer, Berlin Heidelberg, pp 372---381
[11]
Kim C., Yang C.N. (2014) Improving data hiding capacity based on hamming code. Springer, Netherlands, pp 697---706
[12]
Lien B.K., Chen S.K., Wang W.S., King K.P. (2015) Dispersed Data Hiding Using Hamming Code with Recovery Capability. Springer International Publishing, pp 179---187
[13]
Lin C.C., Tai W.L., Chang C.C. (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582---3591
[14]
Ma Z.P., Li F.Y., Zhang X.P. (2013) Data hiding in halftone images based on hamming code and slave pixels. J Shanghai Univ (Nat Scie Edn) 2:003
[15]
Qin C., Chang C.C., Hsu T.J. (2014) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl:1---12
[16]
Tian J. (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Techn 13(8):890---896
[17]
Tsai P., Hu Y.C., Yeh H.L. (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129---1143
[18]
Westfeld A. (2001) F5-a Steganographic Algorithm. Springer, Berlin Heidelberg, pp 289---302
[19]
Wu D.C., Tsai W.H. (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613---1626
[20]
Zhang W., Wang S., Zhang X. (2007) Improving embedding efficiency of covering codes for applications in steganography. Commun Lett IEEE 11(8):680---682

Cited By

View all
  • (2025)Hybrid coding table-based semi-reversible data hiding using least significant bits and encryptionThe Journal of Supercomputing10.1007/s11227-024-06712-781:1Online publication date: 1-Jan-2025
  • (2024)A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and EmbeddingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337281119(4114-4129)Online publication date: 4-Mar-2024
  • (2024)Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authenticationCAAI Transactions on Intelligence Technology10.1049/cit2.123579:6(1435-1450)Online publication date: 29-Dec-2024
  • Show More Cited By
  1. Partial reversible data hiding scheme using (7, 4) hamming code

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Multimedia Tools and Applications
    Multimedia Tools and Applications  Volume 76, Issue 20
    October 2017
    1428 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 October 2017

    Author Tags

    1. Hamming error correcting code
    2. Least significant bit
    3. Partial reversible data hiding
    4. RS analysis
    5. Steganographic attack
    6. Steganography

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Hybrid coding table-based semi-reversible data hiding using least significant bits and encryptionThe Journal of Supercomputing10.1007/s11227-024-06712-781:1Online publication date: 1-Jan-2025
    • (2024)A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and EmbeddingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337281119(4114-4129)Online publication date: 4-Mar-2024
    • (2024)Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authenticationCAAI Transactions on Intelligence Technology10.1049/cit2.123579:6(1435-1450)Online publication date: 29-Dec-2024
    • (2024)Robust data hiding scheme for highly compressed image exploiting btc with hamming codeMultimedia Tools and Applications10.1007/s11042-023-15727-w83:3(8591-8628)Online publication date: 1-Jan-2024
    • (2023)Overlapped (7,4) hamming code for large-capacity and low-loss data hidingMultimedia Tools and Applications10.1007/s11042-023-14502-182:20(30345-30374)Online publication date: 1-Aug-2023
    • (2022)A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering GraphicsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/353966119:2(1-20)Online publication date: 8-Jun-2022
    • (2021)A reversible data hiding scheme based on (5, 3) Hamming code using extra information on overlapped pixel blocks of grayscale imagesMultimedia Tools and Applications10.1007/s11042-020-10347-080:9(13099-13120)Online publication date: 1-Apr-2021
    • (2019)A robust reversible data hiding scheme for color image using reed-solomon codeMultimedia Tools and Applications10.1007/s11042-019-7626-078:17(24903-24922)Online publication date: 1-Sep-2019
    • (2019)Enhanced stego-image quality and embedding capacity for the partial reversible data hiding schemeMultimedia Tools and Applications10.1007/s11042-019-7220-578:13(18595-18616)Online publication date: 2-Aug-2019
    • (2018)Directional PVO for reversible data hiding scheme with image interpolationMultimedia Tools and Applications10.5555/3288443.328848077:23(31281-31311)Online publication date: 1-Dec-2018
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media