Abstract
Here we proposed an efficient dual image-based reversible steganographic technique using (7,4) Hamming code for image authentication and tampered detection. In this approach, the cover image is partitioned into \((1 \times 7)\) pixel blocks. The blocks are copied into two separate images, and three Least Significant Bits (LSB) are collected from each block separately. Then perform odd parity adjustment using Hamming code. Two symmetry keys \(\kappa \) and \(\xi \) are used for data embedding and stego block distribution among dual images, respectively. To embed secret bit complement data bit at \(\kappa \) position, then secret data bit is embedded through error creation at random positions within the block excluding the position of \(\kappa \) such that errors are corrected and cover image is recovered through (7,4) Hamming code. The proposed scheme has been verified through experimental results with existing scheme. The performance of this scheme is comparatively better in terms of visual quality. The experimental results showed that this new steganographic technique can be also applied for authentication and tampered detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johnson, N., Katzenbeisser, S.: A Survey of Steganographic Techniques, Information Hiding. Artech House, pp. 43–78 (2000)
Kim, C., Shin, D., Shin, D.: Data Hiding in a Halftone Image Using Hamming Code (15, 11). In: ACIIDS 2011, LNAI 6592, pp. 372–381. Springer, Berlin, Heidelberg (2011)
Ma, Z., Li, F., Zhang, X.: Data hiding in halftone images based on hamming code and slave pixels. J. Shanghai Univ. Nat. Sci. 19(2), 111–115 (2013)
Brian, K.L., Shan-Kang, C., Wang, W.-S., King, K.P.: Dispersed data hiding using hamming code with recovery capability. In: Advances in Intelligent Systems and Computing Springer International Publishing Switzerland, vol. 329, pp. 179–187 (2015)
Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible data hiding scheme using two steganographic images. In: Proceedings of IEEE Region \(10\) International Conference (TENCON), pp. 1–4, (2007)
Lee, C.F., Wang, K.H., Chang, C.C., Huang, Y.L.: A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228–237 (2009)
Lee, C.F., Huang, Y.L.: Reversible Data Hiding Scheme Based on Dual Stegano-Images Using Orientation Combinations, Telecommunication Systems, vol. \(52\), No. \(4\), pp. 2237–2247 (2013)
Kim, C., Yang, C.N.: Improving Data Hiding Capacity Based on Hamming Code pp. 697–706. Springer, Netherlands (2014)
Jana, B., Giri, D., Mondal, S.K.: Partial reversible data hiding scheme using (7, 4) hamming code. Multimed. Tools Appl. 1–16 (2016)
Zhang, W., Wang, S., Zhang, X.: Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682, (2007)
Chang, C.C., Chou, Y.C.: Using nearest covering codes to embed secret information in grayscale images. In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, pp. 315–320. ACM (2008, Jan)
Cao, Z., Yin, Z., Hu, H., Gao, X., Wang, L.: High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1), 175 (2016)
Chang, C.C., Kieu, T.D., Chou, Y.C.: A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 International Symposium on Electronic Commerce and Security, pp. 16–21. IEEE (2008, Aug)
University of Southern California, The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chowdhuri, P., Pal, P., Jana, B. (2019). A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code. In: Chandra, P., Giri, D., Li, F., Kar, S., Jana, D. (eds) Information Technology and Applied Mathematics. Advances in Intelligent Systems and Computing, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-10-7590-2_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-7590-2_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7589-6
Online ISBN: 978-981-10-7590-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)