Hamming Code-Based Watermarking Scheme for Image Authentication and Tampered Detection

  • Pabitra Pal
  • Partha Chowdhuri
  • Biswapati Jana
  • Jaydeb Bhaumik
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 470)


In this paper, a (7, 4) Hamming code-based color image watermarking scheme has been proposed for image authentication and tampered detection. Here, watermark image is generated after embedding watermark symbol within a color cover image. The cover image is partitioned into \((7 \times 7)\) pixel blocks and separated into three R, G, B color blocks. To embed watermark, (7, 4) Hamming code is used in each block. For each watermark embedding operation, 21 bits of watermark information are embedded within each color image block. The proposed scheme extracts secret data successfully from watermarked image. The authentication and tampered detection have been tested on watermarked image. Finally, the proposed scheme has been compared with the related existing state of the art methods in terms of visual quality.


Watermarking Hamming code Matrix coding Payload PSNR Standard deviation and correlation coefficient 


  1. 1.
    R.W. Hamming, Error detecting and error correcting codes. Bell Labs Tech. J. 29(2), 147–160 (1950)MathSciNetCrossRefGoogle Scholar
  2. 2.
    R. Crandall, Some Notes on Steganography. Steganography Mailing List (1998)Google Scholar
  3. 3.
    A. Westfeld, F5—a steganographic algorithm, in International Workshop on Information Hiding, April 2001 (Springer, Berlin, Heidelberg, 2001), pp. 289–302Google Scholar
  4. 4.
    J. Fridrich, D. Soukal, Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390–395 (2006)CrossRefGoogle Scholar
  5. 5.
    W. Zhang, S. Wang, X. Zhang, Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007)Google Scholar
  6. 6.
    W. Zhang, X. Zhang, S. Wang, Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes, in International Workshop on Information Hiding, May 2008 (Springer, Berlin, Heidelberg, 2008), pp. 60–71Google Scholar
  7. 7.
    C.C. Chang, T.D. Kieu, Y.C. Chou, A high payload steganographic scheme based on (7, 4) hamming code for digital images, in 2008 International Symposium on Electronic Commerce and Security, Aug 2008, (IEEE), pp. 16–21Google Scholar
  8. 8.
    C. Kim, D. Shin, D. Shin, Data hiding in a halftone image using hamming code (15, 11), in Asian Conference on Intelligent Information and Database Systems, April 2011 (Springer, Berlin, Heidelberg, 2011), pp. 372–381Google Scholar
  9. 9.
    C. Kim, C.N. Yang, Improving Data Hiding Capacity Based on Hamming Code (Springer, Netherlands, 2014), pp. 697–706Google Scholar
  10. 10.
    M.H. Mohamed, L.M. Mohamed, High capacity image steganography technique based on LSB substitution method. Appl. Math. Inf. Sci. 10(1), 259 (2016)CrossRefGoogle Scholar
  11. 11.
    B. Jana, D. Giri, S.K. Mondal, Partial reversible data hiding scheme using (7, 4) hamming code. Multimed. Tools Appl. 1–16 (2016)Google Scholar
  12. 12.
    University of Southern California, “The USC-SIPI Image Database”,
  13. 13.
    C.C. Chang, Y.C. Chou, Using nearest covering codes to embed secret information in grayscale images, in Proceedings of the 2nd international conference on Ubiquitous information management and communication, Jan 2008 (ACM), pp. 315–320Google Scholar
  14. 14.
    Z. Cao, Z. Yin, H. Hu, X. Gao, L. Wang, High capacity data hiding scheme based on (7, 4) Hamming code. SpringerPlus 5(1), 175 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Pabitra Pal
    • 1
  • Partha Chowdhuri
    • 1
  • Biswapati Jana
    • 1
  • Jaydeb Bhaumik
    • 2
  1. 1.Department of Computer ScienceVidyasagar UniversityMidnaporeIndia
  2. 2.Department of Electronics and Communication EngineeringHITMidnaporeIndia

Personalised recommendations