Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/2951
Title: | Steganographic protocols based on rank metric codes |
Authors: | Selvaraj, R.S. Demamu, J. |
Keywords: | Rank metric Covering radius |
Issue Date: | Oct-2011 |
Publisher: | 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) |
Abstract: | Among the different applications where data hiding techniques can be used, one that has received huge attention in the recent years is steganography. With Matrix Embedding based on Hamming Codes which was first introduced by Crandall, coding theory has entered the field of steganography. In this paper, we investigate the application of q-ary codes with rank metric to steganography by using matrix embedding technique. We propose rank metric codes for steganographic security, as the nature of rank involves linear dependency or independency of symbols in the coordinates, which is more complex than merely comparing positions of bits. A method of constructing stego-codes using subcodes of linear codes is proposed. Some bounds, including the one for embedding efficiency, are also determined. |
Description: | NITW |
URI: | http://localhost:8080/xmlui/handle/123456789/2951 |
Appears in Collections: | Mathematics |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Steganographic_protocols_based_on_rank_metric_codes.pdf | 254.18 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.