Implementation of Coding Theory with The Extended Hamming Code in Steganography

Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size  of len...

Full description

Saved in:
Bibliographic Details
Main Authors: Nurul Jannah, Nur Hamid
Format: Article
Language:English
Published: institut agama islam negeri kediri 2024-01-01
Series:Journal Focus Action of Research Mathematic
Subjects:
Online Access:https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size  of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time.
ISSN:2655-3511
2656-307X