Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang
{"title":"基于完美码的数字音频信号信息隐藏方法","authors":"Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang","doi":"10.1109/IIH-MSP.2006.123","DOIUrl":null,"url":null,"abstract":"A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.","PeriodicalId":272579,"journal":{"name":"2006 International Conference on Intelligent Information Hiding and Multimedia","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Information Hiding Method in Digital Audio Signal Based on Perfect Codes\",\"authors\":\"Linna Zhou, Cui-Qing Liu, X. Ping, Tao Zhang, Yun-He Wang\",\"doi\":\"10.1109/IIH-MSP.2006.123\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.\",\"PeriodicalId\":272579,\"journal\":{\"name\":\"2006 International Conference on Intelligent Information Hiding and Multimedia\",\"volume\":\"143 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Conference on Intelligent Information Hiding and Multimedia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIH-MSP.2006.123\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Intelligent Information Hiding and Multimedia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2006.123","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Hiding Method in Digital Audio Signal Based on Perfect Codes
A novel information hiding method in digital audio signal by using the encoding redundancy of perfect codes is presented in this paper. Researches on perfect codes and its syndrome of the codeword show that the syndrome of a codeword depends only on the error, not on the codeword transmitting. A mapping encoding between secret message and codeword error map is built. According to the error map, we can embed secret messages by modifying the codeword of perfect codes. In this paper we propose a particular example of perfect codes that carrying secret messages with its encoding redundancy. Theoretical analysis and experimental results show that this method has good security.