Implementation of Coding Theory with The Extended Hamming Code in Steganography
Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size of len...
Saved in:
Main Authors: | Nurul Jannah, Nur Hamid |
---|---|
Format: | Article |
Language: | English |
Published: |
institut agama islam negeri kediri
2024-01-01
|
Series: | Journal Focus Action of Research Mathematic |
Subjects: | |
Online Access: | https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Alih Kode dan Campur Kode dalam Interaksi Masyarakat di Terminal Harjamukti Kota Cirebon
by: Tasya Fauziyah, et al.
Published: (2024-10-01) -
Penggunaan Alih Kode Antara Penjual dan Pembeli di Pasar Lenteng (Kajian Sosiolinguistik)
by: Rizal Afandi, et al.
Published: (2024-04-01) -
Alih Kode dan Interferensi Bahasa pada Penyuluh Pertanian di Desa Ngluyu, Kecamatan Ngluyu, Kabupaten Nganjuk
by: Ervina Damayanti, et al.
Published: (2023-06-01) -
Kode etik dan penyimpangan budaya dalam konseling: studi literatur
by: Ida Ayu Made Diah Naraswari, et al.
Published: (2023-07-01) -
Perbandingan pembuatan produk menggunakan simulasi program CNC dan CNC Milling
by: Hendra -, et al.
Published: (2022-04-01)