Product perfect codes and steganography

被引:15
|
作者
Rifa-Pous, H. [2 ]
Rifa, J. [1 ]
机构
[1] Univ Autonoma Barcelona, Dept Informat & Commun Engn, E-08193 Barcelona, Spain
[2] Univ Oberta Catalunya, Dept Comp Sci & Multimedia, Barcelona 08018, Spain
关键词
Average distortion; Embedding rate; Encoding; LSB embedding; Perfect codes; Product codes; Steganography;
D O I
10.1016/j.dsp.2008.11.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A new coding technique to be used in steganography is evaluated. The performance of this new technique is computed and comparisons with the well-known theoretical upper bound, Hamming upper bound and basic LSB are established. (c) 2008 Elsevier Inc. All rights reserved.
引用
收藏
页码:764 / 769
页数:6
相关论文
共 50 条
  • [1] Product Constructions for Perfect Lee Codes
    Etzion, Tuvi
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (11) : 7473 - 7481
  • [2] Z2Z4-ADDITIVE PERFECT CODES IN STEGANOGRAPHY
    Rifa-Pous, Helena
    Rifa, Josep
    Ronquillo, Lorena
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2011, 5 (03) : 425 - 433
  • [3] A PRODUCT CONSTRUCTION FOR PERFECT CODES OVER ARBITRARY ALPHABETS
    PHELPS, KT
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1984, 30 (05) : 769 - 771
  • [4] Perfect Codes in Unity Product Graphs of Some Commutative Rings
    Mudaber, Mohammad Hassan
    Sarmin, Nor Haniza
    Gambo, Ibrahim
    [J]. SOUTHEAST ASIAN BULLETIN OF MATHEMATICS, 2024, 48 (03) : 401 - 409
  • [5] PERMUTATION CODES AND STEGANOGRAPHY
    Balado, Felix
    Haughton, David
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2954 - 2958
  • [6] Perfect undetectability of network steganography
    Fraczek, Wojciech
    Szczypiorski, Krzysztof
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2998 - 3010
  • [7] Using of LDPC codes in steganography
    Diop, I.
    Farssi, S.M.
    Chaumont, M.
    Khouma, O.
    Diouf, H.B.
    Tall, K.
    Sylla, K.
    [J]. Journal of Theoretical and Applied Information Technology, 2012, 38 (01) : 103 - 109
  • [8] Steganography via covering codes
    Galand, F
    Kabatiansky, G
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 192 - 192
  • [9] Error Codes in and for Network Steganography
    Keller, Joerg
    Langsdorf, Saskia
    [J]. ARCHITECTURE OF COMPUTING SYSTEMS, ARCS 2023, 2023, 13949 : 81 - 93
  • [10] Using of Polar Codes in Steganography
    Diop, Idy
    Diouf, Birahime
    Farssi, Sidi Mohamed
    Tall, K.
    Fall, P. A.
    Diop, A. K.
    Sylla, K.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ENGINEERING (CSE 2013), 2013, 42 : 262 - 266