Fig. 2From: High capacity data hiding scheme based on (7, 4) Hamming codeMarked-image marked_I Back to article page