Implementation of Coding Theory with The Extended Hamming Code in Steganography
Data security needs to be considered to avoid noise when sending data or data breaches by hackers. In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. The media used is a grayscale image of size of len...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
institut agama islam negeri kediri
2024-01-01
|
Series: | Journal Focus Action of Research Mathematic |
Subjects: | |
Online Access: | https://jurnalfaktarbiyah.iainkediri.ac.id/index.php/factorm/article/view/1678 |