Fig. 5From: High capacity data hiding scheme based on (7, 4) Hamming codePSNR-ER comparison of BaboonBack to article page