Implementation of Coding Theory with The Extended Hamming Code in Steganography

Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size  of len...

Full description

Saved in:
Bibliographic Details
Main Authors: Nurul Jannah, Nur Hamid
Format: Article
Language:English
Published: institut agama islam negeri kediri 2024-01-01
Series:Journal Focus Action of Research Mathematic
Subjects:
Online Access:https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841555800225480704
author Nurul Jannah
Nur Hamid
author_facet Nurul Jannah
Nur Hamid
author_sort Nurul Jannah
collection DOAJ
description Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size  of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time.
format Article
id doaj-art-07a26d5a40d048bd9edb71134ce0d45e
institution Kabale University
issn 2655-3511
2656-307X
language English
publishDate 2024-01-01
publisher institut agama islam negeri kediri
record_format Article
series Journal Focus Action of Research Mathematic
spelling doaj-art-07a26d5a40d048bd9edb71134ce0d45e2025-01-07T23:48:40Zenginstitut agama islam negeri kediriJournal Focus Action of Research Mathematic2655-35112656-307X2024-01-016211212410.30762/f_m.v6i2.16781681Implementation of Coding Theory with The Extended Hamming Code in SteganographyNurul Jannah0Nur Hamid1Universitas Nurul JadidUniversitas Nurul JadidData security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size  of lengths 50,100,150,200,250 and 300 characters with 6 attempts. In addition, we show the PSNR result obtained and also the computation time.https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678kode linierkode hamming yang diperluassteganografi
spellingShingle Nurul Jannah
Nur Hamid
Implementation of Coding Theory with The Extended Hamming Code in Steganography
Journal Focus Action of Research Mathematic
kode linier
kode hamming yang diperluas
steganografi
title Implementation of Coding Theory with The Extended Hamming Code in Steganography
title_full Implementation of Coding Theory with The Extended Hamming Code in Steganography
title_fullStr Implementation of Coding Theory with The Extended Hamming Code in Steganography
title_full_unstemmed Implementation of Coding Theory with The Extended Hamming Code in Steganography
title_short Implementation of Coding Theory with The Extended Hamming Code in Steganography
title_sort implementation of coding theory with the extended hamming code in steganography
topic kode linier
kode hamming yang diperluas
steganografi
url https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678
work_keys_str_mv AT nuruljannah implementationofcodingtheorywiththeextendedhammingcodeinsteganography
AT nurhamid implementationofcodingtheorywiththeextendedhammingcodeinsteganography