2009
DOI: 10.1016/j.dsp.2008.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Product perfect codes and steganography

Abstract: A new coding technique to be used in steganography is evaluated. The performance of this new technique is computed and comparisons with the well-known theoretical upper bound, Hamming upper bound and basic LSB are established.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(27 citation statements)
references
References 7 publications
0
27
0
Order By: Relevance
“…As proved in [7], the performance one can obtain with this method is better than the one obtained by just using the conventional F 5 algorithm on the corresponding codes with the same average distortion. We refer to [7] for further details on this method. Now, in this paper we will proceed with a generalization of the above procedure, by taking the product of more than two q-ary Hamming codes.…”
Section: Product Of Perfect Codes and Steganographymentioning
confidence: 86%
“…As proved in [7], the performance one can obtain with this method is better than the one obtained by just using the conventional F 5 algorithm on the corresponding codes with the same average distortion. We refer to [7] for further details on this method. Now, in this paper we will proceed with a generalization of the above procedure, by taking the product of more than two q-ary Hamming codes.…”
Section: Product Of Perfect Codes and Steganographymentioning
confidence: 86%
“…The idea of product code-based data hiding was introduced in [5][6][7][8]. Basically, it can be considered as an extension of the previous works [1 -4] by taking a cover matrix block, not a cover sequence, for embedding on each time.…”
Section: Introductionmentioning
confidence: 99%
“…Although, the embedding concepts for both the 1-D and 2-D linear code-based data hiding schemes are similar in respectively adopting the technique of 1-D syndrome coding and 2-D syndrome coding, the embedding efficiency of the latter is much higher. However, due to the tremendous computational complexity in finding a coset leader [9,10] of a 2-D linear code, only suboptimal approaches with moderate computational complexity were presented in the literature [5][6][7][8]11,12]. In [5][6][7][8]12], the authors still utilized the 1-D toggle syndrome coding technique to solve the product code-based data hiding problem, whereas the authors of [11] directly utilized the concept of the 2-D toggle syndrome and proposed a sub-optimal approach with better embedding efficiency and low computational complexity.…”
Section: Introductionmentioning
confidence: 99%
“…The smaller size of the intersected area, the larger number of possible joint solutions. Similar approach has been tested for Hamming code in [23].…”
Section: Introductionmentioning
confidence: 99%