Affiliation:
1. Universitat Polit`ecnica de Catalunya Departament de Matem`atiques Mineria 1, Barcelona Spain
2. University of Douala Faculty of Sciences Douala, 24157 Campus PK17, Cameroon
Abstract
Steganography, as it is known, is a technique to hide a secret message within a message or collection of data that is not secret, and a problem in mathematics is to decipher the secret included in the message, to solve this problem a good tool It is the theory of codes. Unlike the existing works that use block codes to hide information using the steganographic process, in this work, we propose the use of convolutional coding theory in steganography to encrypt and decrypt messages methods to decrypt messages. Here, we suggest a steganographic protocol based on convolutional codes in which they are defined as discrete linear dynamical systems with which the properties on controllability and observability characteristic of linear systems theory can be applied, in particular the properties of output observability character which can be easily described using matrix language. The proposed decoding algorithm used for dissimulation is a linear decoding method, which has decreased both the time and space complexity, compared to the Viterbi decoding algorithm, sometimes used in other cases; indeed, we go from 2h.n to 2h=2.n, in memory space (with h: constraint height, and n: length of cover object). Moreover, the time complexity is better, while we can also denote that with the convolutional approach, we intend to take advantage of the time-depending transaction.
Publisher
North Atlantic University Union (NAUN)
Subject
Electrical and Electronic Engineering,Signal Processing
Reference22 articles.
1. Z. Bao, Y. Guo, X. Li, Y. Zhang, M. Xu, X. Luo. A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients, Journal of Ambient Intelligence and Humanized Computing 11, 2020, pp.1–13. DOI: 10.1007/s12652-019-01376-1
2. R, Dariti, El M. Souidi. An application of linear errorblock codes in steganography. International Journal of Digital Information and Wireless Communications 1(2), 2012, pp. 426–433.
3. P. Elias. Coding for noisy channels. IRE Conv. Rec 4, 1955, pp. 37–46.
4. T. Filler, J. Judas, J. Fridrich. Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization. In Proceedings Volume 7541, Media Forensics and Security II 7541, 2006, pp. 1–11. DOI: 10.1117/12.838002
5. J. Fridrich. Steganography in Digital Media - Principles, Algorithms, and Applications. Cambridge Univ. Press, 2009, pp. 1–76.