Relationship between Correcting Code and Module Technique in Hiding Secret Data

نویسندگان

  • Phan Trung Huy
  • Nguyen Hai Thanh
  • Cheonsick Kim
چکیده

In this paper, we show the role of modules over rings of finite characteristics in data hiding area. Applications of correcting codes and covering functions in data hiding are shown as special cases of our module approach. Applications of modules over rings of characteristic 2 to design new embedding schemes for hiding secret data in binary images are introduced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Method of Hiding Information in Agglutinative Language Documents Using Adjustment to New Line Positions

Information hiding technology embeds information using the redundancy of information contained in cover data. Therefore, many informationhiding techniques for cover data with a lot of redundancy, such as images or sound signals, have been proposed. Most proposed information hiding techniques that set document to cover data tampered with layouts between spacing and words. In this paper, a new in...

متن کامل

Hiding Inside HTML and Other Source Codes

Many steganographic techniques [1] [2] [3] [4] were proposed for hiding secret message inside images, the simplest of them being the LSB data hiding [6] [7] [8] [9] [10], [11]. In this paper, we suggest a novel data hiding technique in an Html Web page [12] and also propose some simple techniques to extend the embedding technique to source codes written in any programming language (both case in...

متن کامل

ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application

The project proposes the enhancement of protection system for secret data communication through encrypted data concealment in ECG signals. The proposed encryption technique used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by making the information inaccessible to any intruder having a random method. After data encryption, ...

متن کامل

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes

In this paper we try to shed a new insight on Verifiable Secret Sharing Schemes (VSS). We first define a new “metric” (with slightly different properties than the standard Hamming metric). Using this metric we define a very particular class of codes that we call error-set correcting codes, based on a set of forbidden distances which is a monotone decreasing set. Next we redefine the packing pro...

متن کامل

Embedding Secret Data in HTML Web Page

In this paper, we suggest a novel data hiding technique in an Html Web page. Html Tags are case insensitive and hence an alphabet in lowercase and one in uppercase present inside an html tag are interpreted in the same manner by the browser, i.e., change in case in an web page is imperceptible to the browser. We basically exploit this redundancy and use it to embed secret data inside an web pag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012