Steganography Based on Grayscale Images Using (5,3) Hamming Code

被引:5
|
作者
Kim, Cheonshik [1 ]
Yang, Ching-Nung [2 ]
机构
[1] Anyang Univ, Dept Digital Media Engn, Anyang Si, Gyeonggi Do, South Korea
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien 97401, Taiwan
来源
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014 | 2015年 / 9023卷
关键词
Steganography; Data hiding; LSB; Hamming code; MODIFICATION DIRECTION;
D O I
10.1007/978-3-319-19321-2_45
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Steganography is a technique to hide secret data in cover images securely. This technique is used for secret communication. However, steganography is not as strong as watermark against various attacks. "Hamming+1" scheme is a well known scheme in the steganography. In this paper, we propose new data hiding scheme that showed better performance compared to "Hamming+1". The proposed scheme conceals 3 bits per 5 pixels of an image. The experimental result showed that the proposed scheme achieves an 0.599 bpp embedding payload and a higher visual quality of stego images compared to the previous schemes.
引用
收藏
页码:588 / 598
页数:11
相关论文
共 50 条
  • [31] A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7,4) Hamming Code
    Banerjee, Ananya
    Jana, Biswapati
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 85 - 98
  • [32] Hamming code based watermarking scheme for 3D model verification
    Wang, Jen-Tse
    Chang, Yi-Ching
    Yu, Shyr-Shen
    Yu, Chun-Yuan
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 1095 - 1098
  • [33] DE-Based Reversible Medical Image Authentication Using Hamming Code
    Arabzadeh, Mohammad
    Helfroush, Mohammad Sadegh
    Danyali, Habibollah
    Rahimi, Mohammad Reza
    2011 1ST INTERNATIONAL ECONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2011, : 183 - 188
  • [34] Hamming Code Based Watermarking Scheme for 3D Model Verification
    Wang, Jen-Tse
    Chang, Yi-Ching
    Yu, Chun-Yuan
    Yu, Shyr-Shen
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [35] Error Detection and Correction in Semiconductor Memories using 3D Parity Check Code with Hamming Code
    Tambatkar, Shivani .
    Menon, Siddharth Narayana
    Sudarshan, V
    Vinodhini, M.
    Murty, N. S.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 974 - 978
  • [36] A LS-Compression Scheme for Grayscale Images Using Pixel Based Technique
    Narmatha, C.
    Manimegalai, P.
    Manimurugan, S.
    2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [37] An adaptive steganography for index-based images using codeword grouping
    Chang, CC
    Tsai, P
    Lin, MH
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 3, PROCEEDINGS, 2004, 3333 : 731 - 738
  • [38] Frequency domain QR code based image steganography using Fresnelet transform
    Maheswari, S. Uma
    Hemanth, D. Jude
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (02) : 539 - 544
  • [40] DATA HIDING BASED ON VQ COMPRESSED IMAGES USING HAMMING CODES AND DECLUSTERING
    Tai, Wei-Liang
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 2043 - 2052