Implementation of Coding Theory with The Extended Hamming Code in Steganography
Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size of len...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
institut agama islam negeri kediri
2024-01-01
|
Series: | Journal Focus Action of Research Mathematic |
Subjects: | |
Online Access: | https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841555800225480704 |
---|---|
author | Nurul Jannah Nur Hamid |
author_facet | Nurul Jannah Nur Hamid |
author_sort | Nurul Jannah |
collection | DOAJ |
description | Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time. |
format | Article |
id | doaj-art-07a26d5a40d048bd9edb71134ce0d45e |
institution | Kabale University |
issn | 2655-3511 2656-307X |
language | English |
publishDate | 2024-01-01 |
publisher | institut agama islam negeri kediri |
record_format | Article |
series | Journal Focus Action of Research Mathematic |
spelling | doaj-art-07a26d5a40d048bd9edb71134ce0d45e2025-01-07T23:48:40Zenginstitut agama islam negeri kediriJournal Focus Action of Research Mathematic2655-35112656-307X2024-01-016211212410.30762/f_m.v6i2.16781681Implementation of Coding Theory with The Extended Hamming Code in SteganographyNurul Jannah0Nur Hamid1Universitas Nurul JadidUniversitas Nurul JadidData security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time.https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678kode linierkode hamming yang diperluassteganografi |
spellingShingle | Nurul Jannah Nur Hamid Implementation of Coding Theory with The Extended Hamming Code in Steganography Journal Focus Action of Research Mathematic kode linier kode hamming yang diperluas steganografi |
title | Implementation of Coding Theory with The Extended Hamming Code in Steganography |
title_full | Implementation of Coding Theory with The Extended Hamming Code in Steganography |
title_fullStr | Implementation of Coding Theory with The Extended Hamming Code in Steganography |
title_full_unstemmed | Implementation of Coding Theory with The Extended Hamming Code in Steganography |
title_short | Implementation of Coding Theory with The Extended Hamming Code in Steganography |
title_sort | implementation of coding theory with the extended hamming code in steganography |
topic | kode linier kode hamming yang diperluas steganografi |
url | https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678 |
work_keys_str_mv | AT nuruljannah implementationofcodingtheorywiththeextendedhammingcodeinsteganography AT nurhamid implementationofcodingtheorywiththeextendedhammingcodeinsteganography |