The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Image Steganography Based on Hamming Code

In this paper a novel algorithm which is based on hamming code and 2k correction is proposed. The new method also utilizes canny edge detection and coherent bit length. Firstly, canny edge detector is applied to detect the edge of cover image and only edge pixels are selected for embedding payload. In order to enhance security, the edge pixels are scrambled. Then hamming encoding is practiced to code the secret data before embedded. Calculate coherent bit length L on the base of relevant edge pixels and replace with L bits of payload message. Finally, the method of 2k correction is applied to achieve better imperceptibility in stego image. The experiment shows that the proposed method is more advantage in Peak Signal-to- Noise Ratio (PSNR), capacity and universal image quality index (Q) than other methods.


[1] Agarwal A., Security Enhancement Scheme for Image Steganography Using S-DES Technique, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 4, pp. 164-169, 2012.

[2] Anand L., Sanket P., Sharath R., and Varun R., A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique, International Journal of Science and Research, vol. 2, no. 5, pp. 293-296, 2013.

[3] Bassil Y., Image Steganography Based on a Parameterized Canny Edge Detection Algorithm, International Journal of Computer Applications, vol. 64, no. 4, pp. 35-40, 2012.

[4] Chen W., Chang C., and Le T., High Payload Steganography Mechanism Using Hybrid Edge Detector, Expert Systems with Applications, vol. 37, no. 4, pp. 3292-3301, 2010.

[5] Gokul M., Umeshbabu R., Vasudevan S., and Karthik D., Hybrid Steganography Using Visual Cryptography and LSB Encryption Method, International Journal of Computer Applications, vol. 59, no. 14, pp. 5-8, 2012.

[6] Hamming R., Error Detecting and Error Correcting Codes, Bell System Technical Journal, vol. 29, no. 2, pp. 147-160, 1950.

[7] Jain N., Meshram S., and Dubey S., Image Steganography Using LSB and Edge Detection Technique, International Journal of Soft Computing and Engineering, vol. 2, no. 3, pp. 217-222, 2012.

[8] Javidi M. and Hosseinpourfard R., Chaos Genetic Algorithm Instead Genetic Algorithm, The International Arab Journal of Information Technology, vol. 12, no. 2, pp. 163-168, 2015.

[9] Karthikeyan B., Chakravarthy J., and Ramasubramanian S., Amalgamation of Scanning Paths and Modified Hill Cipher for Secure Steganography, Australian Journal of Basic and Applied Sciences, vol. 6, no. 7, pp. 55- 61, 2012.

[10] Kaur A. and Kaur S., Image Steganography Based on Hybrid Edge Detection and 2k Correction Method, International Journal of Engineering and Innovative Technology, vol. 1, no. 2, pp. 167-170, 2012.

[11] Mstafa R. and Elleithy K., A Highly Secure Video Steganography Using Hamming Code (7, 4), in Proceedings of IEEE Long Island Systems, Applications and Technology, Farmingdale, pp. 1-6, 2014.

[12] Pavan N., Nagarjun G., Nihaar N., Gaonkar G., and Sharma P., Image Steganography Based On Hill Cipher with Key Hiding Technique, IOSR Journal of Computer Engineering, vol. 11, no. 5, pp. 47-50, 2013.

[13] Sarkar A., Madhow U., and Manjunath B., Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography, IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 225-239, 2010.

[14] Sharma S. and Kumari U., A High Capacity Data-hiding Technique Using Steganography, International Journal of Emerging Trends and Technology in Computer Science, vol. 2, no. 3, pp. 288-292, 2013.

[15] Sun S., A Novel Edge Based Image Steganography with 2k Correction and Huffman Encoding, Information Processing Letters, vol. 116, no. 2, pp. 93-99, 2016.

[16] Vaidya A., More P., Fegade R., Bhavsar M., and Raut P., Image Steganography Using DWT and Blowfish Algorithms, IOSR Journal of Computer Engineering, vol. 8, no. 6, pp. 15-19, 2013.

[17] Wang J., Chang Y., Yu C., and Yu S., Hamming Code Based Watermarking Scheme for 3D Model Verification, in Proceedings of International Symposium on Computer, Tai chung, pp. 1095-1098, 2014.

[18] Wang Z., A Universal Image Quality Index, IEEE Signal Processing Letters, vol. 9, no. 3, pp. 880 The International Arab Journal of Information Technology, Vol. 15, No. 5, September 2018 81-84, 2002.

[19] Yu J., Yoon J., Shin S., and Yoo K., A New Image Steganography Based on 2k Correction and Edge-Detection, in Proceedings of the 5th International Conference on Information Technology: New Generations, Las Vegas, pp. 563-568, 2008.

[20] Zhang Y., Jiang J., Zha Y., Zhang H., and Zhao S., Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images, International Journal of Intelligence Science, vol. 3, pp. 77-85, 2013. Shuliang Sun graduated from Hangzhou Dianzi University, China, in 2003 and completed M.E. from Guangxi University in 2006, China. He received PhD from Tongji University in 2011, China. Currently, He is an Associate Professor at the School of Electronics and Information Engineering, Fuqing Branch of Fujian Normal University, China. His research includes Image Processing, Steganography and Pattern Recognition.