Fig. 3From: High capacity data hiding scheme based on (7, 4) Hamming codeThe nine test imagesBack to article page