Skip to main content
Log in

Dual image based reversible data hiding scheme using (7,4) hamming code

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a new dual-image based reversible data hiding scheme through (7,4) Hamming code (RDHHC) using shared secret key. A block of seven pixels are collected from cover image and copied into two arrays then it is adjusted redundant Least Significant Bits (LSBs) using odd parity such that any error creation is encountered at the sender end and recovered at the receiver end. Before data embedding, we first complement the bit at shared secret position. After that, secret message bit is embedded by error creation caused by tamper in any suitable position except secret position and that error is detected as well as corrected at the receiver end using Hamming error correcting code. One shared secret position κ and one shared secret key ξ help to perform data embedding, data extraction and recovery of the original image. The secret data and original cover image are successfully recovered at the receiver end from dual stego image. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of PSNR.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Chang CC, Chou YC (2009) Information hiding in dual images with reversibility. In: 2009 Third International Conference on Multimedia and Ubiquitous Engineering. IEEE, pp 145–152

  2. Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In: TENCON 2007-2007 IEEE Region 10 Conference. IEEE, pp 1–4

  3. Chang CC, Kieu TD, Chou YC (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 International Symposium on Electronic Commerce and Security. IEEE, pp 16–21

  4. Chang CC, Lu TC, Horng G, Huang YH, Hsu YM (2013) A high payload data embedding scheme using dual stego-images with reversibility. In: Communications and Signal Processing (ICICS) 2013 9th International Conference on Information. IEEE, pp 1–5

  5. Fridrich J, Goljan M, Du R (2001) Invertible authentication. In: Photonics West 2001-Electronic Imaging (pp 197-208). International Society for Optics and Photonics

  6. Fu MS, Au OC (2001) Halftone image data hiding with intensity selection and connection selection. Signal Process Image Commun 16(10):909–930

    Article  Google Scholar 

  7. Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Comput Math Appl 60(2):319–325

    Article  MathSciNet  MATH  Google Scholar 

  8. Kim C, Shin D, Shin D (2011) Data hiding in a halftone image using hamming code (15, 11). In: Intelligent Information and Database Systems. Springer, Berlin Heidelberg, pp 372–381

  9. Kieu TD, Chang CC (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38(8):10648–10657

    Article  Google Scholar 

  10. Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247

    Article  Google Scholar 

  11. Lee CF, Chen HL (2012) Adjustable prediction-based reversible data hiding. Digit Signal Process 22(6):941–953

    Article  MathSciNet  Google Scholar 

  12. Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J Syst Softw 83(10):1864–1872

    Article  Google Scholar 

  13. Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication. ACM, pp 228–237

  14. Lien BK, Chen SK, Wang WS, King KP (2015) Dispersed data hiding using hamming code with recovery capability. In: Genetic and Evolutionary Computing. Springer International Publishing, pp 179–187

  15. Lien BK, Lin YM (2011) High-capacity reversible data hiding by maximum-span pairing. Multimed Tool Appl 52(2-3):499–511

    Article  Google Scholar 

  16. Liao PS, Pan JS, Chen YH, Liao BY (2005) A lossless watermarking technique for halftone images. In: Knowledge-Based Intelligent Information and Engineering Systems. Springer, Berlin Heidelberg, pp 593–599

  17. Lu ZM, Luo H, Pan JS (2006) Reversible watermarking for error diffused halftone images using statistical features. In: Digital Watermarking. Springer, Berlin Heidelberg, pp 71–81

  18. Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77–89

    Article  Google Scholar 

  19. MA ZP, LI FY, Zhang XP (2013) Data hiding in halftone images based on hamming code and slave pixels. Journal Shanghai University (Natural Science Edition) 2:003

    Google Scholar 

  20. Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  21. Pan JS, Luo H, Lu ZM (2006) A lossless watermarking scheme for halftone image authentication. Int J Comput Sci Netw Secur 6(2b):147–151

    Google Scholar 

  22. Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tool Appl 74(15):5861–5872

    Article  Google Scholar 

  23. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Techn 13(8):890–896

    Article  Google Scholar 

  24. Tseng HW, Hsieh CP (2009) Prediction-based reversible data hiding. Inf Sci 179(14):2460–2469

    Article  MATH  Google Scholar 

  25. Westfeld A (2001) F5a steganographic algorithm. In: Information Hiding. Springer, Berlin Heidelberg, pp 289–302

  26. Yu FX, Luo H, Chu SC (2009) Lossless data hiding for halftone images. In: Information Hiding and Applications. Springer, Berlin Heidelberg, pp 181–203

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Biswapati Jana.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jana, B., Giri, D. & Kumar Mondal, S. Dual image based reversible data hiding scheme using (7,4) hamming code. Multimed Tools Appl 77, 763–785 (2018). https://doi.org/10.1007/s11042-016-4230-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4230-4

Keywords

Navigation