Implementation of Coding Theory with The Extended Hamming Code in Steganography

Authors

  • Nurul Jannah Universitas Nurul Jadid
  • Nur Hamid Universitas Nurul Jadid

DOI:

https://doi.org/10.30762/f_m.v6i2.1678

Keywords:

Kode Linier, Kode Hamming yang diperluas, steganografi

Abstract

Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size  of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time.

References

Keleş, O., Yılmaz, M. A., Tekalp, A. M., Korkmaz, C., & Dogan, Z. (2021). On the Computation of PSNR for a Set of Images or Video (arXiv:2104.14868). arXiv. http://arxiv.org/abs/2104.14868

MacWilliams, F. J., & Sloane, N. J. A. (1977). The Theory of Error-Correcting Codes (Vol. 16).

Minarni, M., & Redha, R. (2020). Implementasi Least Significant Bit (LSB) dan Algoritma Vigenere Chiper pada Audio Steganografi. Jurnal Sains dan Teknologi: Jurnal Keilmuan dan Aplikasi Teknologi Industri, 20(2), 168. https://doi.org/10.36275/stsp.v20i2.268

Mstafa, R. J., & Elleithy, K. M. (2014). A highly secure video steganography using Hamming code (7, 4). IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 1–6. https://doi.org/10.1109/LISAT.2014.6845191

Nurhadi. (2022). Inilah 7 Kasus Dugaan Kebocoran Data Pribadi Sepanjang 2022, (Online), (https://nasional.tempo.co/read/1632043/inilah-7-kasus-dugaan-kebocoran-data-pribadi-sepanjang-2022), diakses 08 September 2022

Rahman, M. S., Khalil, I., & Yi, X. (2021). Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code. IEEE Journal of Biomedical and Health Informatics, 25(1), 35–46. https://doi.org/10.1109/JBHI.2020.2988449

Riyanto, M. Z. (2020). Kode Linier untuk Deteksi dan Koreksi Kesalahan Penulisan dalam Huruf Hijaiyah. JURNAL FOURIER, 9, 49–58. https://doi.org/10.14421/fourier.2020.92.49-58

Roopaei, M., Eghbal, M. K., Shadaram, M., & Agaian, S. (2016). Noise-Free Rule-Based Fuzzy Image Enhancement. Electronic Imaging, 28(13), 1–5. https://doi.org/10.2352/ISSN.2470-1173.2016.13.IQSP-225

Sajati, H. (2018). The Effect of Peak Signal to Noise Ratio (PSNR) Values on Object Detection Accuracy in Viola Jones Method. Conference SENATIK STT Adisutjipto Yogyakarta, 4. https://doi.org/10.28989/senatik.v4i0.139

Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image Steganography: A Review of the Recent Advances. IEEE Access, 9, 23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998

Published

18-01-2024

How to Cite

Jannah, N., & Hamid, N. (2024). Implementation of Coding Theory with The Extended Hamming Code in Steganography. Journal Focus Action of Research Mathematic (Factor M), 6(2), 112–124. https://doi.org/10.30762/f_m.v6i2.1678