Skip to main content
Log in

Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

Steganography is the science of communicating a secret message by hiding it in a cover object. The well known F5 algorithm is based on binary Hamming codes in Hamming graph. It has been an interesting research problem to construct other steganographic schemes from mathematically structured graphs. In this paper, we construct steganographic schemes explicitly from r-perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers, and Lipschitz integers, respectively. Then we further compute various parameters for the suggested steganographic schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Cox I.J., Miller M.L., Bloom J.A., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008).

    Google Scholar 

  2. Crandall R.: Some notes on steganography (1998).

  3. de Almeida C., Palazzo R. Jr.: Efficient two-dimensional interleaving technique by use of the set partitioning concept. IEE Electron. Lett. 32(6), 538–540 (1996).

    Article  Google Scholar 

  4. Fridrich J., Linsonek P.: Grid colorings in steganography. IEEE Trans. Inf. Thoery 53, 1547–1549 (2007).

    Article  MathSciNet  MATH  Google Scholar 

  5. Kim J.-L., Park J., Choi S.: Steganographic schemes from perfect codes on Cayley graphs. Des. Codes Cryptogr. 87, 2361–2374 (2019).

    Article  MathSciNet  MATH  Google Scholar 

  6. Martínez C., Beivide R., Gabidulin E.M.: Perfect codes for metrics induced by circulant graphs. IEEE Trans. Inf. Thoery 53, 3042–3052 (2007).

    Article  MathSciNet  MATH  Google Scholar 

  7. Martínez C., Beivide R., Gabidulin E.M.: Perfect codes from Cayley graphs over Lipschitz integers. IEEE Trans. Inf. Thoery 55, 3552–3562 (2009).

    Article  MathSciNet  MATH  Google Scholar 

  8. Munuera C.: Steganography from a coding theory point of view in the book. In: Martinez-Moro E. (ed.) Algebraic Geometry Modelling in Information Theory, pp. 83–128. World Scientific, Singapore (2012).

    Google Scholar 

  9. Shi Y.Q., Zhang X.M., Ni Z.-C., Ansari N.: Interleaving for combating bursts of errors. IEEE Circuits Syst. Mag. 4(1), 29–42 (2004).

    Article  Google Scholar 

  10. Trithemius J.: Steganographia, Germany (1499). https://en.wikipedia.org/wiki/Steganographia.

  11. Westfeld A.: F5_ a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of 4th Int’l Information Hiding Workshop, vol. 2137, pp. 289–302. Springer, Berlin (2001).

  12. Zhang W., Li S.: A coding problem in steganography. Des. Codes Cryptogr. 46(1), 67–81 (2008).

    Article  MathSciNet  MATH  Google Scholar 

  13. Zhou S.: Cyclotomic graphs and perfect codes. J. Pure Appl. Algebra 223, 931–947 (2019).

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for their helpful discussions and constructive comments on improving this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jon-Lark Kim.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The author is supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (NRF-2019R1A2C1088676)

This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue: On Coding Theory and Combinatorics: In Memory of Vera Pless”

Appendix

Appendix

See Tables 12 and 13.

Table 12 Values of emb(xy) on G\(_{5+i}\)
Table 13 Values of rec(x) on G\(_{5+i}\)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, JL., Park, J. Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers. Des. Codes Cryptogr. 90, 2967–2989 (2022). https://doi.org/10.1007/s10623-022-01063-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-022-01063-x

Keywords

Mathematics Subject Classification

Navigation