• DocumentCode
    3085774
  • Title

    A (2, 3) Threshold Secret Sharing Scheme Using Sudoku

  • Author

    Chou, Yung-Chen ; Lin, Chih-Hung ; Li, Pao-Ching ; Li, Yu-Chiang

  • Author_Institution
    Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
  • fYear
    2010
  • fDate
    15-17 Oct. 2010
  • Firstpage
    43
  • Lastpage
    46
  • Abstract
    Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achieve the goal of secret data delivery with the high visual quality of a stego image and good security. The concept of Sudoku was adopted in the proposed method. According to the method´s design, secret data can only be extracted when a minimum number of two shadow images are received. Furthermore, a large number of solutions of Sudoku are an advantage to increase secret data delivery security.
  • Keywords
    cryptography; image coding; steganography; Sudoku; cryptography technique; data encryption; public computer networks; secret data delivery; steganography technique; stego image; threshold secret sharing scheme; Cryptography; Data mining; Matrix converters; PSNR; Pixel; Visualization; Data hiding; Sudoku; secret sharing; steganography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
  • Conference_Location
    Darmstadt
  • Print_ISBN
    978-1-4244-8378-5
  • Electronic_ISBN
    978-0-7695-4222-5
  • Type

    conf

  • DOI
    10.1109/IIHMSP.2010.18
  • Filename
    5635775