Fig. 4From: High capacity data hiding scheme based on (7, 4) Hamming codePSNR-ER comparison of LenaBack to article page