Skip to main content


Weitere Artikel dieser Ausgabe durch Wischen aufrufen


Steganographic schemes from perfect codes on Cayley graphs

Designs, Codes and Cryptography
Jon-Lark Kim, Junyong Park, Soohak Choi
Wichtige Hinweise
Communicated by J. H. Koolen.
J.-L. Kim was supported by Basic Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2013R1A1A2005172).

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.


The main purpose of this paper is to give a new and general way to obtain steganographic schemes from perfect codes on Cayley graphs, motivated by the F5 algorithm based on binary Hamming codes. We obtain the steganography based on perfect Hamming codes as a special case and also give various equivalent conditions for the existence of a perfect code on a k-regular Abelian Cayley graph. Then we show that a perfect code on an Abelian Cayley graph produces a proper steganographic scheme. We further compute the various parameters for the steganographic scheme of type [n, k] over a finite field \(\mathbb {F}_q\) arising from a linear [n, nk, d] code over \(\mathbb {F}_q\) and find also parameters for some steganographic schemes from perfect codes in k-regular Abelian Cayley graphs.

Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten

Über diesen Artikel

Premium Partner