Skip to main content
main-content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

02.03.2019

Steganographic schemes from perfect codes on Cayley graphs

Zeitschrift:
Designs, Codes and Cryptography
Autoren:
Jon-Lark Kim, Junyong Park, Soohak Choi
Wichtige Hinweise
Communicated by J. H. Koolen.
J.-L. Kim was supported by Basic Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2013R1A1A2005172).

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Abstract

The main purpose of this paper is to give a new and general way to obtain steganographic schemes from perfect codes on Cayley graphs, motivated by the F5 algorithm based on binary Hamming codes. We obtain the steganography based on perfect Hamming codes as a special case and also give various equivalent conditions for the existence of a perfect code on a k-regular Abelian Cayley graph. Then we show that a perfect code on an Abelian Cayley graph produces a proper steganographic scheme. We further compute the various parameters for the steganographic scheme of type [n, k] over a finite field \(\mathbb {F}_q\) arising from a linear [n, nk, d] code over \(\mathbb {F}_q\) and find also parameters for some steganographic schemes from perfect codes in k-regular Abelian Cayley graphs.

Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten

Literatur
Über diesen Artikel

Premium Partner

    Bildnachweise