Browse > Article
http://dx.doi.org/10.5573/ieek.2013.50.8.180

Data Hiding using Improving Hamming Code  

Kim, Cheonshik (Dept. of Digital Media Engineering, Anyang Univ.)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.50, no.8, 2013 , pp. 180-186 More about this Journal
Abstract
The primary goal of attack on steganographic images, termed steganalysis, is to detect the presence of hidden data by finding statistical abnormality of a stego-media caused by data embedding. This paper proposes a novel steganographic scheme based on improving the (7, 4) Hamming code for digital images. The proposed scheme embeds a segment of six secret bits into a group of nine cover pixels at a time. The experimental results show that the proposed scheme achieves a 0.67bpp embedding payload and a slightly higher visual quality of stego images compared with the previous arts.
Keywords
Data Hiding; Steganography; LSB; BMP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yu, Y. H., C. C. Chang, and Y. C. Hu. "Hiding secret data in images via predictive coding", Pattern Recognition, vol.38, no.5, pp.691-705, 2005.   DOI   ScienceOn
2 Zhang, X. and S. Wang. "Efficient steganographic embedding by exploiting modification direction", IEEE Communications Letters, vol.10, no.11, pp.781-783, 2006.   DOI   ScienceOn
3 Chang, C.C., T.S. Chen, and L.Z. Chung. "A steganographic method based upon JPEG and quantization table modification", Information Sciences-Informatics and Computer Science, vol.141, no.1-2, pp.123-138, 2002.
4 김천식, 윤은준, 조민호, 홍유식, "의료영상을 위한 복원 가능한 정보 은닉 및 메시지 인증", 대한전자 공학회 논문지 CI편, 제 47권, 1호, pp.65-72, 2010.
5 Chang, C. -C., T. D. Kieu, and Y.-C. Chou. "A high payload steganographic scheme based on (7, 4) Hamming code for digital images", International Symposium on Electronic Commerce and Security, Guangzhou, China, pp.16-21, 2002.
6 Chao, R. M., H. C. Wu, C. -C. Lee, and Y.-P. Chu. "A novel image data hiding scheme with diamond encoding", EURASIP Journal on Information Security, vol. 2009, pp.1-9 (2009).
7 Fridrich, J., M. Goljan, and R. Du. "Detecting LSB steganography in color, and gray-scale images", IEEE Transactions on Multimedia, vol. 8, pp. 22-28, 2001.
8 Lee, C. F., C. C. Chang, and K. H. Wang. "Improvement of EMD embedding method for large payloads by pixel segmentation strategy", Image and Vision Computing, vol. 26, no. 12, pp. 1670-1676, 2008.   DOI   ScienceOn
9 Lin, P. L., C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery", Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.   DOI   ScienceOn
10 Provos, N. and P. Honeyman. "Hide and seek: An introduction to steganography", IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, 2003.   DOI   ScienceOn
11 Ni, Z., Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin. "Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication", IEEE transactions on circuits and systems for video technology, vol. 18, no.4, pp.497-509, 2008.   DOI   ScienceOn
12 Spaulding, J., H. Noda, M. N. Shirazi, and E. Kawaguchi. "BPCS steganography using EZW lossy compressed images", Pattern Recognition Letters, vol. 23, no. 13, pp. 1579-1587, 2002.   DOI   ScienceOn
13 Mielikainen, J. "LSB matching revisited", IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.   DOI   ScienceOn
14 Wang, H. and S. Wang. "Cyber warfare: Steganography vs. steganalysis," Communications of the ACM, vol. 47, no.10, pp.76-82, 2004.
15 Westfeld, A. "F5: A steganographic algorithm", Proceedings of the 4th International Workshop on Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, Pittsburgh, PA, USA, pp.289-302, 2004.
16 Bender W., D. Gruhl, N. Mormoto, A.Lu. "Techniques for data hiding", IBM systems journal, vol. 35, pp.313-336 (1996).   DOI
17 Hamming, R.W., "Error detecting and error correcting codes", Bell System Technical Journal, vol.29, no.2, pp.147-160, 1950.   DOI
18 Zhang, W., Wang, S., and Zhang, X., "Improve embedding efficiency of covering codes for applications in steganography", IEEE Communications Letters, vol.11, no.8, pp.680-682, 2007.   DOI   ScienceOn
19 University of Southern California. The USC-SIPI Image Database. Retrieved fro http://sipi.usc.edu/database/ on March 1, 2011.
20 Lin, W.H., Wang, Y.R., Horng, S.J., "A wavelet-tree-based watermarking method using distance vector of binary cluster", Expert Systems with Applications, vol.36, no.6, pp.9869-9878, 2009.   DOI   ScienceOn
21 Westfeld, A. "Attacks on steganographic systems", Proceedings of the 3rd Information Hiding Workshops, Dresden, Germany, September 28-October 1, pp.61-75, 1999.