Correspondence between steganographic protocols and error correcting codes

M’hammed Boulagouaz, Mohamed Bouye

Abstract


In this work we present a correspondence between the steganographic systems and error correcting codes. We propose a new steganographic protocol based on 3-error-correcting primitive BCH codes. We show that this new protocol has much better parameters than protocols which we get from Hamming codes or from the 2-error-correcting primitive BCH codes, for high levels of incorporation.

Full Text:

PDF

References


E. Assmus, H. Mattson, Some 3–error–correcting BCH codes have covering radius 5, IEEE Trans. Inform. Theory 22(3) (1976) 348–349.

R. Crandall, Some notes on steganography, available at http://dde.binghamton.edu/download/ Crandall_matrix.pdf, 1998.

J. Fridrich, D. Soukal, Matrix embedding for large payloads, IEEE Trans. Inf. Forensics Security 1(3) (2006) 390–395.

T. Helleseth, All binary 3–error–correcting BCH codes of length 2^m-1 have covering radius 5, IEEE Trans. Inform. Theory 24(2) (1978) 257–258.

J. van der Horst, T. Berger, Complete decoding of triple–error–correcting binary BCH Codes, IEEE Trans. Inform. Theory 22(2) (1976) 138–147.

F. J. Mac Williams, N. Sloane, The Theory of Error Correcting Codes, Amsterdam, Netherlands, North–Holland, 1966.

C. Munuera, Steganography and error–correcting codes, Signal Process. 87(6) (2007) 1528–1533.

A. Westfeld, F5—A Steganographic Algorithm, Lecture Notes in Comput. Sci. 2137 (2001) 289–302.


Refbacks

  • There are currently no refbacks.


ISSN: 2148-838X