Skip to main content

Improving Data Hiding Capacity Based on Hamming Code

  • Conference paper
  • First Online:
Frontier and Innovation in Future Computing and Communications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

Abstract

Matrix encoding proposed by Crandall can be used in steganography data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of Matrix encoding steganography. The embedding efficiency of “Hamming + 1” is equal to (k + 1)2k+1 − 1/(2k+1 − 1), and embedding rate is (k + 1)/2k. Our proposed “Hamming + 3” scheme has a slightly reduced embedding efficiency, but improve highly embedding rate. We therefore propose verifying the embedding rate during the embedding and extracting phase. Experimental results show that the reconstructed secret messages are the same as the original secret messages, and that the proposed scheme exhibits a good embedding rate compared to that of previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Comput Math Appl 60(2):319–325

    Article  MATH  MathSciNet  Google Scholar 

  2. Yang CN, Ye G-C, Kim C (2011) Data hiding in halftone images by XOR block-wise operation with difference minimization. KSII Trans Internet Inf Syst 5(2):457–476

    Article  Google Scholar 

  3. Crandall R (1998) Some notes on steganography. Posted on steganography mailing list, http://os.inf.tu-dresden.de/westfeld/crandall.pdf

  4. Westfeld A (2001) F5: a steganographic algorithm. In: Proceedings of the 4th international workshop information hiding 2001. Lecture Notes in Computer Science, vol 2137, no 1, pp 289–302

    Google Scholar 

  5. Bierbrauer J (2005) Introduction to coding theory, Sect. 14.2. Chapman and Hall, CRC Press

    Google Scholar 

  6. Galand F, Kabatiansky G (2004) Information hiding by coverings. In: Proceedings of the IEEE information theory workshop 2004, pp 151–154

    Google Scholar 

  7. Bierbrauer J, Fridrich J (2006) Constructing good covering codes for applications in steganography. Available: http://www.math.mtu.edu/jbierbra/

  8. Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inf Secur Forensics 1(3):390–394

    Article  Google Scholar 

  9. Schonfeld D, Winkler A (2006) Embedding with syndrome coding based on BCH codes. In: Proceedings of the 8th ACM workshop on multimedia and security, pp 214–223

    Google Scholar 

  10. Tseng Y-C, Chen Y–Y, Pan H-K (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231

    Article  Google Scholar 

  11. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  12. Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214

    Article  Google Scholar 

  13. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  14. Chang CC, Kieu TD, Chou YC (2008) A high payload steganographic scheme based on (7, 4) Hamming Code for digital images. In: International symposium on electronic commerce and security, pp 16–21

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheonshik Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kim, C., Yang, CN. (2014). Improving Data Hiding Capacity Based on Hamming Code. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_80

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_80

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics