High capacity data hiding scheme based on (7, 4) Hamming code

Aiming to embed large amount of data while minimize the sum of costs of all changed pixels, a novel high capacity data hiding scheme based on (7, 4) Hamming code is realized by a family of algorithms. Firstly, n (n = 1, 2, 3) cover pixels are assigned to one set according to the payload. Then, 128 binary strings of length seven are divided into eight sets according to the syndrome of every binary string. Binary strings that share the same syndrome are classified into one set. Finally, a binary string in a certain set determined by the data to be embedded is chosen to modify some of the least significant bits of the n cover pixels. The experimental results demonstrate that the image quality of the proposed method with high embedding payload is superior to those of the related schemes.

[1]  Chin-Chen Chang,et al.  Using nearest covering codes to embed secret information in grayscale images , 2008, ICUIMC '08.

[2]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[3]  Zhenxing Qian,et al.  Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Zhenxing Qian,et al.  Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine , 2015, IEEE Transactions on Cybernetics.

[5]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[6]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[7]  Weiming Zhang,et al.  A Steganographic Algorithm Based on Hamming Code and Wet Paper Code: A Steganographic Algorithm Based on Hamming Code and Wet Paper Code , 2010 .

[8]  R. Crandall,et al.  Some Notes on Steganography , 1999 .

[9]  Tung-Shou Chen,et al.  Reversible data hiding using Delaunay triangulation and selective embedment , 2015, Inf. Sci..

[10]  Wojciech Mazurczyk,et al.  Trends in steganography , 2014, Commun. ACM.

[11]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[12]  SunXingming,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014 .

[13]  Yanping Zhang,et al.  AN INFORMATION HIDING SCHEME BASED ON ( 7 , 4 ) HAMMING CODE ORIENTED WET PAPER CODES , 2010 .