skip to main content
10.1145/2818567.2818674acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccctConference Proceedingsconference-collections
research-article

An Efficient Data Hiding Scheme using Hamming Error Correcting Code

Authors Info & Claims
Published:25 September 2015Publication History

ABSTRACT

In this paper, we propose an efficient secure partially reversible data hiding scheme using hamming error correcting code (PRDHHC). Recently, Kim et al. proposed a data hiding technique in halftone image which hides four secret bits within (4 x 4) image block through codeword. Lien et al. presented data hiding scheme using hamming code by generating dispersed block through space filling curve decomposition using fifteen bits codeword. Here, we propose data hiding scheme through error creation in three least significant bits of a (7 x 7) image block using shared secret key. During extraction, the receiver finds the error position within three least significant bits of the image block and extracts secret data with the help of shared secret key. After extraction, we complement the error bits to achieve partial reversible data hiding. Our scheme is compared with other state-of-the-art methods and we obtain reasonably good performance in terms of PSNR and embedding capacity.

References

  1. C.-K. Chan and L.-M. Cheng. Hiding data in images by simple lsb substitution. Pattern recognition, 37(3):469--474, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  2. C.-C. Chang, C.-S. Chan, and Y.-H. Fan. Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition, 39(6):1155--1167, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C.-C. Chang, J.-Y. Hsiao, and C.-S. Chan. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36(7):1583--1595, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. C. Kim, D. Shin, and D. Shin. Data hiding in a halftone image using hamming code (15, 11). In Intelligent Information and Database Systems, pages 372--381. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. K. Lien, S.-K. Chen, W.-S. Wang, and K.-P. King. Dispersed data hiding using hamming code with recovery capability. In Genetic and Evolutionary Computing, pages 179--187. Springer, 2015.Google ScholarGoogle Scholar
  6. B. K. Lien and Y.-m. Lin. High-capacity reversible data hiding by maximum-span pairing. Multimedia Tools and Applications, 52(2--3):499--511, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C.-C. Lin, W.-L. Tai, and C.-C. Chang. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 41(12):3582--3591, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su. Reversible data hiding. Circuits and Systems for Video Technology, IEEE Transactions on, 16(3):354--362, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C.-C. Thien and J.-C. Lin. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern recognition, 36(12):2875--2881, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  10. F.-X. Yu, H. Luo, and S.-C. Chu. Lossless data hiding for halftone images. In Information Hiding and Applications, pages 181--203. Springer, 2009.Google ScholarGoogle Scholar
  11. W. Zhang, S. Wang, and X. Zhang. Improving embedding efficiency of covering codes for applications in steganography. Communications Letters, IEEE, 11(8):680--682, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Zhipeng, wind Li Yong, and Z. Xinpeng. Based on hamming and subordinate pixel compensation halftone image information hiding. Journal of Shanghai University (Natural Science), 19(2):111--115, 2013.Google ScholarGoogle Scholar

Index Terms

  1. An Efficient Data Hiding Scheme using Hamming Error Correcting Code

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICCCT '15: Proceedings of the Sixth International Conference on Computer and Communication Technology 2015
              September 2015
              481 pages
              ISBN:9781450335522
              DOI:10.1145/2818567

              Copyright © 2015 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 25 September 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate33of124submissions,27%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader