DocumentCode
3085774
Title
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku
Author
Chou, Yung-Chen ; Lin, Chih-Hung ; Li, Pao-Ching ; Li, Yu-Chiang
Author_Institution
Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
fYear
2010
fDate
15-17 Oct. 2010
Firstpage
43
Lastpage
46
Abstract
Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achieve the goal of secret data delivery with the high visual quality of a stego image and good security. The concept of Sudoku was adopted in the proposed method. According to the method´s design, secret data can only be extracted when a minimum number of two shadow images are received. Furthermore, a large number of solutions of Sudoku are an advantage to increase secret data delivery security.
Keywords
cryptography; image coding; steganography; Sudoku; cryptography technique; data encryption; public computer networks; secret data delivery; steganography technique; stego image; threshold secret sharing scheme; Cryptography; Data mining; Matrix converters; PSNR; Pixel; Visualization; Data hiding; Sudoku; secret sharing; steganography;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
Conference_Location
Darmstadt
Print_ISBN
978-1-4244-8378-5
Electronic_ISBN
978-0-7695-4222-5
Type
conf
DOI
10.1109/IIHMSP.2010.18
Filename
5635775
Link To Document