The hiding of secret data using the run length matching method

6Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This study proposes a data hiding method based on run length encoding. This proposed method uses the location of accumulated run length values, where the cover data run length are compared with the secret data run length. The run length matching (RLM) method uses the run length table which is constructed from the cover and secret data. The experimental results demonstrated that the RLM has advantages with respect to different types of data and run length encoding value match. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Jung, K. H., Yu, J. G., Kim, S. M., Kim, K. J., Byun, J. Y., & Yoo, K. Y. (2007). The hiding of secret data using the run length matching method. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4496 LNAI, pp. 1027–1034). Springer Verlag. https://doi.org/10.1007/978-3-540-72830-6_109

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free