High capacity data hiding scheme based on (7, 4) Hamming code.
نویسندگان
چکیده
Aiming to embed large amount of data while minimize the sum of costs of all changed pixels, a novel high capacity data hiding scheme based on (7, 4) Hamming code is realized by a family of algorithms. Firstly, n (n = 1, 2, 3) cover pixels are assigned to one set according to the payload. Then, 128 binary strings of length seven are divided into eight sets according to the syndrome of every binary string. Binary strings that share the same syndrome are classified into one set. Finally, a binary string in a certain set determined by the data to be embedded is chosen to modify some of the least significant bits of the n cover pixels. The experimental results demonstrate that the image quality of the proposed method with high embedding payload is superior to those of the related schemes.
منابع مشابه
A High Payload Steganographic Scheme for Compressed Images with Hamming Code
Data hiding schemes in the compressed domain have attracted more attention since the compressed image format is one of the most frequently transmitted formats over the Internet. Specifically, among various compression algorithms, Absolute Moment Block Truncation Coding (AMBTC) is a good choice due to its extremely low complexity and acceptable distortion. In this study, we propose a novel stega...
متن کاملAn Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes
Generally, the embedding quality and the embedding capacity are two important factors in evaluating the performance of information hiding schemes, but they are usually inversely proportional. Thus, to satisfy the different requirements, the users often make a tradeoff between good embedding quality and high embedding capacity. In this paper, a spatial domain technique, embedding binary message ...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملImage data hiding based on capacity-approaching dirty-paper coding
We present an image data-hiding scheme based on near-capacity dirty-paper codes. The scheme achieves high embedding rates by ”hiding” information into mid-frequency DCT coefficients among each DCT block of the host image. To reduce the perceptual distortion due to data-hiding, the mid-frequency DCT coefficients are first perceptually scaled according to Watson’s model. Then a rate-1/3 projectio...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- SpringerPlus
دوره 5 شماره
صفحات -
تاریخ انتشار 2016