IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014 2014
DOI: 10.1109/lisat.2014.6845191
|View full text |Cite
|
Sign up to set email alerts
|

A highly secure video steganography using Hamming code (7, 4)

Abstract: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bridgeport's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 48 publications
(26 citation statements)
references
References 7 publications
0
25
0
1
Order By: Relevance
“…Hence, researchers have to develop secure steganography algorithms that are protected from both attackers and steganalysis detectors. Any successful steganography system should consider two main important factors: embedding payload and embedding efficiency [2].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, researchers have to develop secure steganography algorithms that are protected from both attackers and steganalysis detectors. Any successful steganography system should consider two main important factors: embedding payload and embedding efficiency [2].…”
Section: Introductionmentioning
confidence: 99%
“…Information and parity bits can be mixed together in different ways [23]. In this paper, parity bits are put at the beginning of information bits.…”
Section: Hamming Encodermentioning
confidence: 99%
“…If noise (4) exists, then (3) is called noisy channel and there is a probability of errors which could change the encoded message. After encoded message is received, it will be decoded and corrected if possible in (5), and finally the decoded message will arrive at sink (6). Like on error-detecting codes, we need to add some additional check digits to the message such that any changes made to the other digits will be detected and corrected properly.…”
Section: Parity Check Encodermentioning
confidence: 99%
“…This idea leads to error-correcting codes, which has the abilities of detecting and correcting errors, provided they are less or equal to correcting radius of the code [4]. Some applications of coding theory was shown by [5] video steganography using Hamming code, [6] on lossless data compression, [7] on development of Hamming codes as error-reducing codes, and [8] on biomedical engineering's medical image authentication using Hamming code. In this paper we will use two types of data for simulations, namely vector and text data.…”
Section: Introductionmentioning
confidence: 99%