High-Capacity Reversible Data Hiding Scheme Using Dual Color Image Through (7, 4) Hamming Code

  • Ananya Banerjee
  • Biswapati Jana
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 470)


Achievement of high-capacity data hiding with good visual quality is an important research issue in the field of steganography. In this paper, we have introduced a new dual color image-based reversible data hiding scheme through (7, 4) Hamming code and shared a secret key. We partitioned the color image into (3 × 3) pixel blocks and then decomposed into three basic color blocks. Again each color blocks are sliced up to 4-bit plane starting from LSB plane. Now, a segment of 3-bit secret data is embedded within each bit plane depending on a syndrome calculated using (7, 4) Hamming code. As a result, 36-bit secret data can be embedded within a (3 × 3) pixel block. Therefore, we achieve a high payload good visual quality stego compared with existing schemes. Dual stego images are generated to achieve reversibility in (7, 4) Hamming code-based data hiding. The secret data and the original cover image both are successfully retrieved and recovered from dual stego images.


Steganography Hamming code Least significant bit (LSB) Bit plane Reversible data hiding Dual image 


  1. 1.
    C. Kim, C.N. Yang, Improving data hiding capacity based on hamming code, in Frontier and Innovation in Future Computing and Communications (Springer, Netherlands, 2014), pp. 697–706Google Scholar
  2. 2.
    H.J. Kim, C. Kim, Y. Choi, S. Wang, X. Zhang, Improved modification direction methods. Comput. Math Appl. 60(2), 319–325 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRefGoogle Scholar
  4. 4.
    C.F. Lee, H.L. Chen, Adjustable prediction-based reversible data hiding. Digit. Signal Process. 22(6), 941–953 (2012)MathSciNetCrossRefGoogle Scholar
  5. 5.
    C.F. Lee, H.L. Chen, H.K. Tso, Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J. Syst. Softw. 83(10), 1864–1872 (2010)CrossRefGoogle Scholar
  6. 6.
    J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)CrossRefGoogle Scholar
  7. 7.
    H.W. Tseng, C.P. Hsieh, Prediction-based reversible data hiding. Inf. Sci. 179(14), 2460–2469 (2009)CrossRefzbMATHGoogle Scholar
  8. 8.
    R. Crandall, Some notes on steganography, posted on steganography mailing list (1998),
  9. 9.
    A. Westfeld, F5—a steganographic algorithm, in International Workshop on Information Hiding (Springer, Berlin, 2001), pp. 289–302Google Scholar
  10. 10.
    W. Zhang, S. Wang, X. Zhang, Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8) (2007)Google Scholar
  11. 11.
    C.C. Chang, Y.C. Chou, Using nearest covering codes to embed secret information in grayscale images, in Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication (ACM, 2008), pp. 315–320Google Scholar
  12. 12.
    C.C. Chang, T.D. Kieu, Y.C. Chou, Reversible data hiding scheme using two steganographic images, in 2007 IEEE Region 10 Conference, TENCON 2007 (IEEE, 2007), pp. 1–4Google Scholar
  13. 13.
    C.F. Lee, K.H. Wang, C.C. Chang, Y.L. Huang, A reversible data hiding scheme based on dual steganographic images, in Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ACM, 2009), pp. 228–237Google Scholar
  14. 14.
    C.F. Lee, Y.L. Huang, Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 52(4), 2237–2247 (2013)CrossRefGoogle Scholar
  15. 15.
    B. Jana, D. Giri, S.K. Mondal, Dual image based reversible data hiding scheme using (7, 4) hamming code. Multimedia Tools Appl. 1–23 (2016)Google Scholar
  16. 16.
    R.S. DeBellis, R.M. Sr Smith, P.C.C. Yeh, U.S. Patent No. 6,044,388. Washington, DC: U.S. Patent and Trademark Office (2000)Google Scholar
  17. 17.
    University of Southern California, The USC-SIPI Image Database (2015),
  18. 18.
    C.C. Chang, Y.C. Chou, T.D. Kieu, Information hiding in dual images with reversibility, in Proceedings of the 3rd International Conference on Multimedia and Ubiquitous Engineering (2009), pp. 145–152 Google Scholar
  19. 19.
    C.C. Chang, T.C. Lu, G. Horng, Y.H. Huang, Y.M. Hsu, A high payload data embedding scheme using dual stego-images with reversibility, in Proceedings of the 3rd International Conference on Information, Communications and Signal Processing (2013), pp. 1–5Google Scholar
  20. 20.
    C. Qin, C.C. Chang, T.J. Hsu, Reversible data hiding scheme based on exploiting modification direction with two steganographic images, Multimedia Tools Appl. 1–12 (2014) Google Scholar
  21. 21.
    T.C. Lu, C.Y. Tseng, J.H. Wu, Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 108, 77–89 (2015)Google Scholar
  22. 22.
    J. Fridrich, M. Goljan, R. Du, Invertible authentication, in Photonics West 2001-Electronic Imaging, International Society for Optics and Photonics (2001), pp. 197–208Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceVidyasagar UniversityMidnaporeIndia

Personalised recommendations