Abstract
Matrix encoding proposed by Crandall can be used in steganography data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of Matrix encoding steganography. The embedding efficiency of “Hamming + 1” is equal to (k + 1)2k+1 − 1/(2k+1 − 1), and embedding rate is (k + 1)/2k. Our proposed “Hamming + 3” scheme has a slightly reduced embedding efficiency, but improve highly embedding rate. We therefore propose verifying the embedding rate during the embedding and extracting phase. Experimental results show that the reconstructed secret messages are the same as the original secret messages, and that the proposed scheme exhibits a good embedding rate compared to that of previous schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Comput Math Appl 60(2):319–325
Yang CN, Ye G-C, Kim C (2011) Data hiding in halftone images by XOR block-wise operation with difference minimization. KSII Trans Internet Inf Syst 5(2):457–476
Crandall R (1998) Some notes on steganography. Posted on steganography mailing list, http://os.inf.tu-dresden.de/westfeld/crandall.pdf
Westfeld A (2001) F5: a steganographic algorithm. In: Proceedings of the 4th international workshop information hiding 2001. Lecture Notes in Computer Science, vol 2137, no 1, pp 289–302
Bierbrauer J (2005) Introduction to coding theory, Sect. 14.2. Chapman and Hall, CRC Press
Galand F, Kabatiansky G (2004) Information hiding by coverings. In: Proceedings of the IEEE information theory workshop 2004, pp 151–154
Bierbrauer J, Fridrich J (2006) Constructing good covering codes for applications in steganography. Available: http://www.math.mtu.edu/jbierbra/
Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inf Secur Forensics 1(3):390–394
Schonfeld D, Winkler A (2006) Embedding with syndrome coding based on BCH codes. In: Proceedings of the 8th ACM workshop on multimedia and security, pp 214–223
Tseng Y-C, Chen Y–Y, Pan H-K (2002) A secure data hiding scheme for binary images. IEEE Trans Commun 50(8):1227–1231
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Willems F, Dijk M (2005) Capacity and codes for embedding information in gray-scale signals. IEEE Trans Inf Theory 51(3):1209–1214
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Chang CC, Kieu TD, Chou YC (2008) A high payload steganographic scheme based on (7, 4) Hamming Code for digital images. In: International symposium on electronic commerce and security, pp 16–21
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) by the Ministry of Education, Science and Technology (20120192).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Kim, C., Yang, CN. (2014). Improving Data Hiding Capacity Based on Hamming Code. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_80
Download citation
DOI: https://doi.org/10.1007/978-94-017-8798-7_80
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8797-0
Online ISBN: 978-94-017-8798-7
eBook Packages: EngineeringEngineering (R0)