Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2951
Title: Steganographic protocols based on rank metric codes
Authors: Selvaraj, R.S.
Demamu, J.
Keywords: Rank metric
Covering radius
Issue Date: Oct-2011
Publisher: 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
Abstract: Among the different applications where data hiding techniques can be used, one that has received huge attention in the recent years is steganography. With Matrix Embedding based on Hamming Codes which was first introduced by Crandall, coding theory has entered the field of steganography. In this paper, we investigate the application of q-ary codes with rank metric to steganography by using matrix embedding technique. We propose rank metric codes for steganographic security, as the nature of rank involves linear dependency or independency of symbols in the coordinates, which is more complex than merely comparing positions of bits. A method of constructing stego-codes using subcodes of linear codes is proposed. Some bounds, including the one for embedding efficiency, are also determined.
Description: NITW
URI: http://localhost:8080/xmlui/handle/123456789/2951
Appears in Collections:Mathematics

Files in This Item:
File Description SizeFormat 
Steganographic_protocols_based_on_rank_metric_codes.pdf254.18 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.