A Steganography Embedding Method Based on Hamming Coding and Histogram-Preserving

This paper proposes an information hiding algorithm using matrix embedding with Hamming codes and histogram preservation in order to keep the histogram of the image unchanged before and after hidin...

[1]  Shuliang Sun Image steganography based on hamming code and edge detection , 2018, Int. Arab J. Inf. Technol..

[2]  Shyamal Kumar Mondal,et al.  Partial reversible data hiding scheme using (7, 4) hamming code , 2017, Multimedia Tools and Applications.

[3]  Javaid A. Sheikh,et al.  Information hiding in edges: A high capacity information hiding technique using hybrid edge detection , 2016, Multimedia Tools and Applications.

[4]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Ching-Nung Yang,et al.  A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC , 2012, ACIIDS.

[6]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[7]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[8]  Wenxiu Ma,et al.  Nonlinear integrable couplings of a generalized super Ablowitz‐Kaup‐Newell‐Segur hierarchy and its super bi‐Hamiltonian structures , 2017, 1706.05234.

[9]  Xinpeng Zhang,et al.  Efficient data hiding with histogram-preserving property , 2012, Telecommun. Syst..

[10]  Ning Zhang,et al.  A Riemann-Hilbert Approach to the Chen-Lee-Liu Equation on the Half Line , 2018, Acta Mathematicae Applicatae Sinica, English Series.

[11]  Liangmin Wang,et al.  High capacity data hiding scheme based on (7, 4) Hamming code , 2016, SpringerPlus.

[12]  Ching-Nung Yang,et al.  Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k , 2018, Digit. Signal Process..

[13]  Dongkyoo Shin,et al.  Data Hiding in a Halftone Image Using Hamming Code (15, 11) , 2011, ACIIDS.

[14]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[15]  Chin-Chen Chang,et al.  A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images , 2008, 2008 International Symposium on Electronic Commerce and Security.

[16]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[17]  Weiping Zhang,et al.  Fuzzy theoretic approach to signals and systems: Static systems , 2017, Inf. Sci..

[18]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[19]  Shuliang Sun,et al.  A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..

[20]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[21]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[22]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.