Implementation of Coding Theory with The Extended Hamming Code in Steganography
DOI:
https://doi.org/10.30762/f_m.v6i2.1678Keywords:
Kode Linier, Kode Hamming yang diperluas, steganografiAbstract
Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time.
Downloads
References
Keleş, O., Yılmaz, M. A., Tekalp, A. M., Korkmaz, C., & Dogan, Z. (2021). On the Computation of PSNR for a Set of Images or Video (arXiv:2104.14868). arXiv. http://arxiv.org/abs/2104.14868
MacWilliams, F. J., & Sloane, N. J. A. (1977). The Theory of Error-Correcting Codes (Vol. 16).
Minarni, M., & Redha, R. (2020). Implementasi Least Significant Bit (LSB) dan Algoritma Vigenere Chiper pada Audio Steganografi. Jurnal Sains dan Teknologi: Jurnal Keilmuan dan Aplikasi Teknologi Industri, 20(2), 168. https://doi.org/10.36275/stsp.v20i2.268
Mstafa, R. J., & Elleithy, K. M. (2014). A highly secure video steganography using Hamming code (7, 4). IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, 1–6. https://doi.org/10.1109/LISAT.2014.6845191
Nurhadi. (2022). Inilah 7 Kasus Dugaan Kebocoran Data Pribadi Sepanjang 2022, (Online), (https://nasional.tempo.co/read/1632043/inilah-7-kasus-dugaan-kebocoran-data-pribadi-sepanjang-2022), diakses 08 September 2022
Rahman, M. S., Khalil, I., & Yi, X. (2021). Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code. IEEE Journal of Biomedical and Health Informatics, 25(1), 35–46. https://doi.org/10.1109/JBHI.2020.2988449
Riyanto, M. Z. (2020). Kode Linier untuk Deteksi dan Koreksi Kesalahan Penulisan dalam Huruf Hijaiyah. JURNAL FOURIER, 9, 49–58. https://doi.org/10.14421/fourier.2020.92.49-58
Roopaei, M., Eghbal, M. K., Shadaram, M., & Agaian, S. (2016). Noise-Free Rule-Based Fuzzy Image Enhancement. Electronic Imaging, 28(13), 1–5. https://doi.org/10.2352/ISSN.2470-1173.2016.13.IQSP-225
Sajati, H. (2018). The Effect of Peak Signal to Noise Ratio (PSNR) Values on Object Detection Accuracy in Viola Jones Method. Conference SENATIK STT Adisutjipto Yogyakarta, 4. https://doi.org/10.28989/senatik.v4i0.139
Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image Steganography: A Review of the Recent Advances. IEEE Access, 9, 23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Nurul Jannah, Nur Hamid
This work is licensed under a Creative Commons Attribution 4.0 International License.