..............................
            ..............................
            ..............................
            
Image Steganography Based on Hamming Code
        
        In  this  paper  a  novel  algorithm  which  is  based  on  hamming  code  and  2k correction  is  proposed. The new method 
also utilizes canny  edge  detection  and coherent bit  length.  Firstly, canny edge  detector  is  applied  to  detect  the  edge  of  cover 
image  and only  edge  pixels are  selected for embedding payload. In order to enhance security, the  edge  pixels are scrambled. 
Then hamming encoding is practiced to code  the  secret  data before  embedded. Calculate coherent bit length L on the base of 
relevant edge  pixels and  replace  with  L  bits  of  payload  message. Finally, the method  of  2k correction  is  applied  to achieve 
better  imperceptibility  in  stego  image. The  experiment  shows  that  the  proposed  method is  more  advantage  in Peak  Signal-to-
Noise Ratio (PSNR), capacity and universal image quality index (Q) than other methods.    
            [1] Agarwal A., Security Enhancement Scheme for Image Steganography Using S-DES Technique, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 4, pp. 164-169, 2012.
[2] Anand L., Sanket P., Sharath R., and Varun R., A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique, International Journal of Science and Research, vol. 2, no. 5, pp. 293-296, 2013.
[3] Bassil Y., Image Steganography Based on a Parameterized Canny Edge Detection Algorithm, International Journal of Computer Applications, vol. 64, no. 4, pp. 35-40, 2012.
[4] Chen W., Chang C., and Le T., High Payload Steganography Mechanism Using Hybrid Edge Detector, Expert Systems with Applications, vol. 37, no. 4, pp. 3292-3301, 2010.
[5] Gokul M., Umeshbabu R., Vasudevan S., and Karthik D., Hybrid Steganography Using Visual Cryptography and LSB Encryption Method, International Journal of Computer Applications, vol. 59, no. 14, pp. 5-8, 2012.
[6] Hamming R., Error Detecting and Error Correcting Codes, Bell System Technical Journal, vol. 29, no. 2, pp. 147-160, 1950.
[7] Jain N., Meshram S., and Dubey S., Image Steganography Using LSB and Edge Detection Technique, International Journal of Soft Computing and Engineering, vol. 2, no. 3, pp. 217-222, 2012.
[8] Javidi M. and Hosseinpourfard R., Chaos Genetic Algorithm Instead Genetic Algorithm, The International Arab Journal of Information Technology, vol. 12, no. 2, pp. 163-168, 2015.
[9] Karthikeyan B., Chakravarthy J., and Ramasubramanian S., Amalgamation of Scanning Paths and Modified Hill Cipher for Secure Steganography, Australian Journal of Basic and Applied Sciences, vol. 6, no. 7, pp. 55- 61, 2012.
[10] Kaur A. and Kaur S., Image Steganography Based on Hybrid Edge Detection and 2k Correction Method, International Journal of Engineering and Innovative Technology, vol. 1, no. 2, pp. 167-170, 2012.
[11] Mstafa R. and Elleithy K., A Highly Secure Video Steganography Using Hamming Code (7, 4), in Proceedings of IEEE Long Island Systems, Applications and Technology, Farmingdale, pp. 1-6, 2014.
[12] Pavan N., Nagarjun G., Nihaar N., Gaonkar G., and Sharma P., Image Steganography Based On Hill Cipher with Key Hiding Technique, IOSR Journal of Computer Engineering, vol. 11, no. 5, pp. 47-50, 2013.
[13] Sarkar A., Madhow U., and Manjunath B., Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography, IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 225-239, 2010.
[14] Sharma S. and Kumari U., A High Capacity Data-hiding Technique Using Steganography, International Journal of Emerging Trends and Technology in Computer Science, vol. 2, no. 3, pp. 288-292, 2013.
[15] Sun S., A Novel Edge Based Image Steganography with 2k Correction and Huffman Encoding, Information Processing Letters, vol. 116, no. 2, pp. 93-99, 2016.
[16] Vaidya A., More P., Fegade R., Bhavsar M., and Raut P., Image Steganography Using DWT and Blowfish Algorithms, IOSR Journal of Computer Engineering, vol. 8, no. 6, pp. 15-19, 2013.
[17] Wang J., Chang Y., Yu C., and Yu S., Hamming Code Based Watermarking Scheme for 3D Model Verification, in Proceedings of International Symposium on Computer, Tai chung, pp. 1095-1098, 2014.
[18] Wang Z., A Universal Image Quality Index, IEEE Signal Processing Letters, vol. 9, no. 3, pp. 880 The International Arab Journal of Information Technology, Vol. 15, No. 5, September 2018 81-84, 2002.
[19] Yu J., Yoon J., Shin S., and Yoo K., A New Image Steganography Based on 2k Correction and Edge-Detection, in Proceedings of the 5th International Conference on Information Technology: New Generations, Las Vegas, pp. 563-568, 2008.
[20] Zhang Y., Jiang J., Zha Y., Zhang H., and Zhao S., Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images, International Journal of Intelligence Science, vol. 3, pp. 77-85, 2013. Shuliang Sun graduated from Hangzhou Dianzi University, China, in 2003 and completed M.E. from Guangxi University in 2006, China. He received PhD from Tongji University in 2011, China. Currently, He is an Associate Professor at the School of Electronics and Information Engineering, Fuqing Branch of Fujian Normal University, China. His research includes Image Processing, Steganography and Pattern Recognition.
