Skip to main content

A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code

  • Conference paper
  • First Online:
Information Technology and Applied Mathematics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 699))

Abstract

Here we proposed an efficient dual image-based reversible steganographic technique using (7,4) Hamming code for image authentication and tampered detection. In this approach, the cover image is partitioned into \((1 \times 7)\) pixel blocks. The blocks are copied into two separate images, and three Least Significant Bits (LSB) are collected from each block separately. Then perform odd parity adjustment using Hamming code. Two symmetry keys \(\kappa \) and \(\xi \) are used for data embedding and stego block distribution among dual images, respectively. To embed secret bit complement data bit at \(\kappa \) position, then secret data bit is embedded through error creation at random positions within the block excluding the position of \(\kappa \) such that errors are corrected and cover image is recovered through (7,4) Hamming code. The proposed scheme has been verified through experimental results with existing scheme. The performance of this scheme is comparatively better in terms of visual quality. The experimental results showed that this new steganographic technique can be also applied for authentication and tampered detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johnson, N., Katzenbeisser, S.: A Survey of Steganographic Techniques, Information Hiding. Artech House, pp. 43–78 (2000)

    Google Scholar 

  2. Kim, C., Shin, D., Shin, D.: Data Hiding in a Halftone Image Using Hamming Code (15, 11). In: ACIIDS 2011, LNAI 6592, pp. 372–381. Springer, Berlin, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Ma, Z., Li, F., Zhang, X.: Data hiding in halftone images based on hamming code and slave pixels. J. Shanghai Univ. Nat. Sci. 19(2), 111–115 (2013)

    Google Scholar 

  4. Brian, K.L., Shan-Kang, C., Wang, W.-S., King, K.P.: Dispersed data hiding using hamming code with recovery capability. In: Advances in Intelligent Systems and Computing Springer International Publishing Switzerland, vol. 329, pp. 179–187 (2015)

    Google Scholar 

  5. Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible data hiding scheme using two steganographic images. In: Proceedings of IEEE Region \(10\) International Conference (TENCON), pp. 1–4, (2007)

    Google Scholar 

  6. Lee, C.F., Wang, K.H., Chang, C.C., Huang, Y.L.: A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228–237 (2009)

    Google Scholar 

  7. Lee, C.F., Huang, Y.L.: Reversible Data Hiding Scheme Based on Dual Stegano-Images Using Orientation Combinations, Telecommunication Systems, vol. \(52\), No. \(4\), pp. 2237–2247 (2013)

    Article  Google Scholar 

  8. Kim, C., Yang, C.N.: Improving Data Hiding Capacity Based on Hamming Code pp. 697–706. Springer, Netherlands (2014)

    Google Scholar 

  9. Jana, B., Giri, D., Mondal, S.K.: Partial reversible data hiding scheme using (7, 4) hamming code. Multimed. Tools Appl. 1–16 (2016)

    Google Scholar 

  10. Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682, (2007)

    Article  Google Scholar 

  11. Chang, C.C., Chou, Y.C.: Using nearest covering codes to embed secret information in grayscale images. In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 315–320. ACM (2008, Jan)

    Google Scholar 

  12. Cao, Z., Yin, Z., Hu, H., Gao, X., Wang, L.: High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1), 175 (2016)

    Article  Google Scholar 

  13. Chang, C.C., Kieu, T.D., Chou, Y.C.: A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 International Symposium on Electronic Commerce and Security, pp. 16–21. IEEE (2008, Aug)

    Google Scholar 

  14. University of Southern California, The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Partha Chowdhuri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chowdhuri, P., Pal, P., Jana, B. (2019). A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code. In: Chandra, P., Giri, D., Li, F., Kar, S., Jana, D. (eds) Information Technology and Applied Mathematics. Advances in Intelligent Systems and Computing, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-10-7590-2_12

Download citation

Publish with us

Policies and ethics