Title :
Steganographic protocols based on rank metric codes
Author :
Selvaraj, R.S. ; Demamu, Jejaw
Author_Institution :
Dept. of Math., Nat. Inst. of Technol. Warangal, Warangal, India
Abstract :
Among the different applications where data hiding techniques can be used, one that has received huge attention in the recent years is steganography. With Matrix Embedding based on Hamming Codes which was first introduced by Crandall, coding theory has entered the field of steganography. In this paper, we investigate the application of q-ary codes with rank metric to steganography by using matrix embedding technique. We propose rank metric codes for steganographic security, as the nature of rank involves linear dependency or independency of symbols in the coordinates, which is more complex than merely comparing positions of bits. A method of constructing stego-codes using subcodes of linear codes is proposed. Some bounds, including the one for embedding efficiency, are also determined.
Keywords :
Hamming codes; cryptographic protocols; linear codes; steganography; telecommunication security; Hamming code; coding theory; data hiding technique; linear code; matrix embedding technique; q-ary code application; rank metric code; steganographic protocol; steganographic security; stegocode construction; Cryptography; Decoding; Error correction codes; Linear code; Measurement; Parity check codes; Vectors; cover; covering codes; covering radius; matrix embedding; rank metric; secret; steganography; stego-Codes;
Conference_Titel :
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011 3rd International Congress on
Conference_Location :
Budapest
Print_ISBN :
978-1-4577-0682-0