Abstract
Steganography is the science of communicating a secret message by hiding it in a cover object. The well known F5 algorithm is based on binary Hamming codes in Hamming graph. It has been an interesting research problem to construct other steganographic schemes from mathematically structured graphs. In this paper, we construct steganographic schemes explicitly from r-perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers, and Lipschitz integers, respectively. Then we further compute various parameters for the suggested steganographic schemes.
Similar content being viewed by others
References
Cox I.J., Miller M.L., Bloom J.A., Fridrich J., Kalker T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008).
Crandall R.: Some notes on steganography (1998).
de Almeida C., Palazzo R. Jr.: Efficient two-dimensional interleaving technique by use of the set partitioning concept. IEE Electron. Lett. 32(6), 538–540 (1996).
Fridrich J., Linsonek P.: Grid colorings in steganography. IEEE Trans. Inf. Thoery 53, 1547–1549 (2007).
Kim J.-L., Park J., Choi S.: Steganographic schemes from perfect codes on Cayley graphs. Des. Codes Cryptogr. 87, 2361–2374 (2019).
Martínez C., Beivide R., Gabidulin E.M.: Perfect codes for metrics induced by circulant graphs. IEEE Trans. Inf. Thoery 53, 3042–3052 (2007).
Martínez C., Beivide R., Gabidulin E.M.: Perfect codes from Cayley graphs over Lipschitz integers. IEEE Trans. Inf. Thoery 55, 3552–3562 (2009).
Munuera C.: Steganography from a coding theory point of view in the book. In: Martinez-Moro E. (ed.) Algebraic Geometry Modelling in Information Theory, pp. 83–128. World Scientific, Singapore (2012).
Shi Y.Q., Zhang X.M., Ni Z.-C., Ansari N.: Interleaving for combating bursts of errors. IEEE Circuits Syst. Mag. 4(1), 29–42 (2004).
Trithemius J.: Steganographia, Germany (1499). https://en.wikipedia.org/wiki/Steganographia.
Westfeld A.: F5_ a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of 4th Int’l Information Hiding Workshop, vol. 2137, pp. 289–302. Springer, Berlin (2001).
Zhang W., Li S.: A coding problem in steganography. Des. Codes Cryptogr. 46(1), 67–81 (2008).
Zhou S.: Cyclotomic graphs and perfect codes. J. Pure Appl. Algebra 223, 931–947 (2019).
Acknowledgements
The authors would like to thank the reviewers for their helpful discussions and constructive comments on improving this paper.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The author is supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (NRF-2019R1A2C1088676)
This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue: On Coding Theory and Combinatorics: In Memory of Vera Pless”
Rights and permissions
About this article
Cite this article
Kim, JL., Park, J. Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers. Des. Codes Cryptogr. 90, 2967–2989 (2022). https://doi.org/10.1007/s10623-022-01063-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-022-01063-x