Partial reversible data hiding scheme using (7,4) hamming code

被引:32
作者
Jana, Biswapati [1 ]
Giri, Debasis [2 ]
Mondal, Shyamal Kumar [3 ]
机构
[1] Vidyasagar Univ, Dept Comp Sci, Midnapore 721102, W Bengal, India
[2] Haldia Inst Technol, Dept Comp Sci & Engn, Haldia 721657, W Bengal, India
[3] Vidyasagar Univ, Dept Appl Math Oceanol & Comp Programming, Midnapore 721102, India
关键词
Steganography; Hamming error correcting code; Least significant bit; Partial reversible data hiding; RS analysis; Steganographic attack; EMBEDDING EFFICIENCY; IMAGES;
D O I
10.1007/s11042-016-3990-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a partial reversible data hiding scheme using (7,4) Hamming code (PRDHHC) with secret position (kappa). In this scheme, we partition the original cover image into (7 x 7) pixel block and adjust redundant LSB bits of each row using odd parity. Then we calculate secret position kappa = (delta mod 7) + 1, where delta is a shared secret key. The bit at position kappa and a suitable location for hidden message bit is modified through error creation caused by tamper in each row of the selected block. For the next row, the kappa is updated by the data embedding position (omega) of the previous row. We repeat this process to embed secret message bits within the selected block. For each new block, the kappa is updated by kappa (i+1) = (kappa (i) x delta x omega) mod 7 + 1, where i = 0, 1, 2, 3, ..., number of blocks. At the receiver end, we complement the bit at position kappa then retrieve the secret message bit by applying Hamming error correcting code. The extraction process will be stopped when we find continuous no error within stego image. The propose PRDHHC scheme extract the hidden message successfully and recover hamming adjusted cover image by complement bits at both the kappa and omega positions but can not recover original cover image, that is to say, our scheme is partial reversible. Finally, we compared our scheme with other state-of-the-art methods and obtained reasonably better performance in terms of visual quality (measured by PSNR). Also we analyze our generated stego image using some steganalysis techniques which give promising results.
引用
收藏
页码:21691 / 21706
页数:16
相关论文
共 50 条
  • [21] Robust data hiding scheme for highly compressed image exploiting btc with hamming code
    Kankana Datta
    Biswapati Jana
    Prabhash Kumar Singh
    Mamata Dalui Chakraborty
    Multimedia Tools and Applications, 2024, 83 : 8591 - 8628
  • [22] Improving Data Hiding Capacity Based on Hamming Code
    Kim, Cheonshik
    Yang, Ching-Nung
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 697 - 706
  • [23] A robust reversible data hiding scheme for color image using reed-solomon code
    Banerjee, Ananya
    Jana, Biswapati
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (17) : 24903 - 24922
  • [24] A robust reversible data hiding scheme for color image using reed-solomon code
    Ananya Banerjee
    Biswapati Jana
    Multimedia Tools and Applications, 2019, 78 : 24903 - 24922
  • [25] High payload reversible data hiding scheme using weighted matrix
    Jana, Biswapati
    OPTIK, 2016, 127 (06): : 3347 - 3358
  • [26] A Reversible Data Hiding Scheme Using Pixel Location
    Kumar, Rajeev
    Chand, Satish
    Singh, Samayveer
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (04) : 763 - 768
  • [27] A novel adjustable reversible data hiding method for AMBTC-compressed codes using Hamming distance
    Xia, Ting-Ting
    Lin, Juan
    Chang, Chin-Chen
    Lu, Tzu-Chuen
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2021, 14 (04) : 313 - 323
  • [28] A reversible data hiding scheme based on the Sudoku technique
    Nguyen, Thai-Son
    Chang, Chin-Chen
    DISPLAYS, 2015, 39 : 109 - 116
  • [29] A reversible data hiding scheme using complementary embedding strategy
    Chang, Chin-Chen
    The Duc Kieu
    INFORMATION SCIENCES, 2010, 180 (16) : 3045 - 3058
  • [30] Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation
    Biswapati, Jana
    Debasis, Giri
    Kumar, Mondal Shyamal
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM, VOL 2, 2016, 411 : 239 - 248