J. Bierbrauer, Crandall's problem, unpublished, available from http, 1998.

C. C. Chang, T. D. Kieu, and Y. C. Chou, A High Payload Steganographic Scheme based on (7,4) Hamming Code for Digital Images, Electronic Commerce and Security 2008 Symposium, pp.16-21, 2008.
DOI : 10.1109/isecs.2008.222

Y. Chen, H. Pan, and Y. Tseng, A secure of data hiding scheme for two-color images, IEEE symposium on computers and communications, 2000.

C. Kim, D. Shin, and D. Shin, Data Hiding in a Halftone Image Using Hamming Code (15, 11), ACIIDS 2011, LNAI 6592, pp.372-381, 2011.
DOI : 10.1109/LCOMM.2007.070438

R. Crandall, Some notes on steganography. Posted on steganography mailing list http, 1998.

G. Galand and . Kabatiansky, Information hiding by coverings, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674), pp.151-154, 2004.
DOI : 10.1109/ITW.2003.1216717

J. Bierbrauer and J. Fridrich, Constructing good covering codes for applications in Steganography, Transactions on Data Hiding and Multimedia Security III, Lecture Notes in Computer Science, vol.4920, pp.1-22, 2008.

C. F. Lee and H. L. Chen, A novel data hiding scheme based on modulus function, Journal of Systems and Software, vol.83, issue.5, pp.832-843, 2010.
DOI : 10.1016/j.jss.2009.12.018

M. B. Ould and M. , El Mamoun SOUIDI, A Novel Steganographic Protocol from Errorcorrecting Codes, Journal of Information Hiding and Multimedia Signal Processing 2010 ISSN 2073-4212. Ubiquitous International, 2010.

A. W. Nordstrom and J. P. Robinson, An optimum nonlinear code, Information and Control, vol.11, issue.5-6, pp.613-616, 1967.
DOI : 10.1016/S0019-9958(67)90835-2

URL : http://doi.org/10.1016/s0019-9958(67)90835-2

H. T. Phan-trung-huy and . Nguyen, On the Maximality of Secret Data Ratio in CPTE Schemes ACIIDS (1) 2011, LNCS/LNAI series 2011, pp.88-99

R. Struik, Covering Codes, 1994.

W. Zhang, X. Zhang, and S. Wang, Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, IH 2008, pp.60-71, 2008.
DOI : 10.1109/TIT.2003.810639

A. Westfeld, Information Hiding, 4th InternationalWorkshop, pp.289-302, 2001.

M. Y. Wu and J. H. Lee, Anovel data embedding method for two-color fascimile images, Proceedings of international symposium on multimedia information processing. Chung-Li, 1998.

X. Zhang and S. Wang, Analysis of Parity Assignment Steganography in Palette Images, KES 2005, LNAI 3683, pp.1025-1031, 2005.
DOI : 10.1007/11553939_144

X. Zhang and S. Wang, Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, vol.25, issue.3, pp.331-339, 2004.
DOI : 10.1016/j.patrec.2003.10.014