Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-69019-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Constructing Good Covering Codes for Applications in Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
61
0

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 78 publications
(63 citation statements)
references
References 24 publications
0
61
0
Order By: Relevance
“…The definition of covering codes and the relations between covering codes and steganography were studied in [1], where it is described the good performance of some covering codes used in steganography.…”
Section: Introduction and Preliminary Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The definition of covering codes and the relations between covering codes and steganography were studied in [1], where it is described the good performance of some covering codes used in steganography.…”
Section: Introduction and Preliminary Resultsmentioning
confidence: 99%
“…Remember that for a Hamming code [n, n − t], where n = 2 t − 1, it is easy to compute the embedding rate t/n = t 2 t −1 and the average distortion R a /n = 1/2 t (see (1), where ρ = 1 and a 1 = n).…”
Section: Product Perfect Codesmentioning
confidence: 99%
“…By inspecting this construction for the Hamming code H 1 , which corresponds to the trivial embedding method that embeds one bit in one pixel using on average Figure 1. This family outperforms all known embedding schemes constructed from structured covering codes (both linear and non-linear [1]) designed to have a small covering radius to bound the worst case of the number of embedding changes. Code families of sparse random constructions [4] follow the bound even closer.…”
Section: Motivation and Backgroundmentioning
confidence: 99%
“…By mapping the individual pixels of the cover to elements of a finite field, for example, by associating a bit (or q-ary symbol from finite field F q ) with each pixel value 1 , one can formulate the problem of maximizing embedding efficiency within the framework of coding theory [3], [8]. In particular, it is known that a q-ary linear code C with length n, dimension k, parity check matrix H, and covering radius R can be used to communicate n − k q-ary symbols (or (n − k) lg q bits) in a cover consisting of n elements by making at most R changes in the following manner.…”
Section: Motivation and Backgroundmentioning
confidence: 99%
See 1 more Smart Citation