Skip to main navigation Skip to search Skip to main content

Constructing good covering codes for applications in steganography

  • Michigan Technological University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

75 Scopus citations

Abstract

Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes constructed using the blockwise direct sum of factorizations. We show that non-linear constructions offer better performance compared to simple linear covering codes currently used by steganographers. Implementation details are given for a selected code family.

Original languageEnglish
Title of host publicationTransactions on Data Hiding and Multimedia Security III
EditorsYun Q. Shi
Pages1-22
Number of pages22
DOIs
StatePublished - 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4920 LNCS

Fingerprint

Dive into the research topics of 'Constructing good covering codes for applications in steganography'. Together they form a unique fingerprint.

Cite this