A steganography scheme based on cyclic codes with iterative toggle search set

Hsi Yuan Chang, Jyun Jie Wang, Chi Yuan Lin, Chin Hsing Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper proposes a cyclic steganographic scheme based on cyclic codes for embedding secret message. This scheme is capable of achieving low complexity and fast embedding time. These are two attractive reasons for this method: first, embedding and secret message extraction can be implemented easily by employing shift registers with feedback connections, and second, because they are rich in coding structure, it is possible to devise various practical methods for decoding or extracting them. Moreover, this work has no need to find the maximum likelihood solution in terms of toggle sequence. Instead of full search method, iteration scheme is employed in this work.

Original languageEnglish
Title of host publicationProceedings - 2016 IEEE International Symposium on Computer, Consumer and Control, IS3C 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1089-1092
Number of pages4
ISBN (Electronic)9781509030712
DOIs
Publication statusPublished - 2016 Aug 16
Event2016 IEEE International Symposium on Computer, Consumer and Control, IS3C 2016 - Xi'an, China
Duration: 2016 Jul 42016 Jul 6

Publication series

NameProceedings - 2016 IEEE International Symposium on Computer, Consumer and Control, IS3C 2016

Other

Other2016 IEEE International Symposium on Computer, Consumer and Control, IS3C 2016
CountryChina
CityXi'an
Period16-07-0416-07-06

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Networks and Communications
  • Computer Science Applications
  • Energy Engineering and Power Technology
  • Control and Systems Engineering
  • Control and Optimization

Fingerprint Dive into the research topics of 'A steganography scheme based on cyclic codes with iterative toggle search set'. Together they form a unique fingerprint.

Cite this