Abstract
Most data hiding schemes change the least significant bits to conceal messages in the cover images. Matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be used in steganographic data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of matrix encoding steganography. The embedding efficiency of “Hamming + 1” is very high for data hiding, but the embedding rate is low. Our proposed “Hamming + 3” scheme has a slightly reduced embedding efficiency, but improve the embedding rate and image quality. “Hamming + 3” is applied to overlapped blocks, which are composed of 2k+3 pixels, where k=3. We therefore propose verifying the embedding rate during the embedding and extracting phases. Experimental results show that the reconstructed secret messages are the same as the original secret message, and the proposed scheme exhibits a good embedding rate compared to those of previous schemes.
Similar content being viewed by others
References
Chang CC, Kieu TD, Chou YC (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. Int Symp Elect Commerce Security:16–21
Chen CW, Tsai YR, Wang SJ (2012) Cost-saving key agreement via secret sharing in two-party communication systems. J Convergence 3(4):29–36
Crandall R (1998) Some notes on steganography, Posted on steganography mailing list. http://os.inf.tu-dresden.de/westfeld/crandall.pdf.
Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inf Security Forensic 1(3):390–394
Gnanaraj JW, Ezra K, Rajsingh E (2013) Smart card based time efficient authentication scheme for global grid computing. Human-centric Comput Info Scie 3(16):1–16
Juneja M, Sandhu PS (2013) A new approach for information security using an improved steganography technique. J Info Process Syst 9(3):405–424
Kim C, Shin DK, Shin D, Yang CN (2012) A (2, 2) secret sharing scheme based on hamming code and AMBTC. Lecture Notes in Comput Sci 7197:129–139
Kim C, Shin DK, Shin D (2011) Data hiding in a halftone image using hamming code (15, 11). Lecture Notes Comput Sci 6592:372–381
Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Comput & Math Appl 60(2):319–325
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Panduranga HT, Naveen SK, Kumar HS, Kumar S (2013) Hardware software co-simulation of the multiple image encryption technique using the Xilinx system generator. J Info Process Syst 9(3):499–510
Truong TT, Tran MT, Duong AD (2012) Improvement of the more efficient & secure ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. J Convergence 3(1):25–36
Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Comput Info Sci 1(4):1–16
Tseng Y-C, Chen Y-Y, Pan H-K (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231
Westfeld A (2001) F5: a steganographic algorithm. Proceedings of the 4th International Workshop Information Hiding 2001, Lecture Notes in Computer Science 2137(1):289–302
Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214
Yang CN, Ye G-C, Kim C (2011) Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization. KSII Trans Internet Info Syst 5(2):457–476
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Acknowledgments
This paper was extended and improved from an accepted paper of the KCIC–2013/FCC–2014 conferences. This research was supported by the Basic Science Research Program Through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, C., Yang, CN. Data hiding based on overlapped pixels using hamming code. Multimed Tools Appl 75, 15651–15663 (2016). https://doi.org/10.1007/s11042-014-2355-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2355-x