An Efficient Data Hiding Scheme using Hamming Error Correcting Code

被引:1
作者
Jana, Biswapati [1 ]
Giri, Debasis [2 ]
Mondal, Shyamal Kumar [3 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, Midnapore 721102, India
[2] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia Midnapore East, India
[3] Vidyasagar Univ, Dept Appl Math Oceanol & Comp Programming, Midnapore 721102, India
来源
6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015) | 2015年
关键词
Data Hiding; Hamming Code; Steganography; Partially Reversible Data Hiding; DYNAMIC-PROGRAMMING STRATEGY; MODULUS FUNCTION; SUBSTITUTION; IMAGES;
D O I
10.1145/2818567.2818674
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose an efficient secure partially reversible data hiding scheme using hamming error correcting code (PRDHHC). Recently, Kim et al. proposed a data hiding technique in halftone image which hides four secret bits within (4 x 4) image block through codeword. Lien et al. presented data hiding scheme using hamming code by generating dispersed block through space filling curve decomposition using fifteen bits codeword. Here, we propose data hiding scheme through error creation in three least significant bits of a (7 x 7) image block using shared secret key. During extraction, the receiver finds the error position within three least significant bits of the image block and extracts secret data with the help of shared secret key. After extraction, we complement the error bits to achieve partial reversible data hiding. Our scheme is compared with other state-of-the-art methods and we obtain reasonably good performance in terms of PSNR and embedding capacity.
引用
收藏
页码:360 / 365
页数:6
相关论文
共 12 条
[1]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[2]   Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels [J].
Chang, CC ;
Chan, CS ;
Fan, YH .
PATTERN RECOGNITION, 2006, 39 (06) :1155-1167
[3]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[4]  
Kim C, 2011, LECT NOTES ARTIF INT, V6592, P372, DOI 10.1007/978-3-642-20042-7_38
[5]   Dispersed Data Hiding Using Hamming Code with Recovery Capability [J].
Lien, Brian K. ;
Chen, Shan-Kang ;
Wang, Wei-Sheng ;
King, Kuan-Pang .
GENETIC AND EVOLUTIONARY COMPUTING, 2015, 329 :179-187
[6]   High-capacity reversible data hiding by maximum-span pairing [J].
Lien, Brian K. ;
Lin, Yen-ming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) :499-511
[7]  
Lin C.-C., PATTERN RECOGNITION
[8]  
Ni Z., CIRCUITS SYSTEMS VID, V16, P354
[9]   A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function [J].
Thien, CC ;
Lin, JC .
PATTERN RECOGNITION, 2003, 36 (12) :2875-2881
[10]  
Yu FX, 2009, STUD COMPUT INTELL, V227, P181