DocumentCode
2266645
Title
Steganography Using Sudoku Revisited
Author
Hong, Wien ; Chen, Tung-Shou ; Shiu, Chih-Wei
Author_Institution
Dept. of Inf. Manage., Yu Da Coll. of Bus., Miaoli
Volume
2
fYear
2008
fDate
20-22 Dec. 2008
Firstpage
935
Lastpage
939
Abstract
In this paper, we propose a revised version of information hiding scheme using Sudoku. The original work was proposed by Chang et al. in 2008, and their work was inspired by Zhang and Wang´s method and Sudoku solutions. Chang et al. successfully used Sudoku solutions to guide cover pixels to modify pixel values so that secret messages can be embedded. However, all possible embedding positions for smaller image distortions in Chang et al.´s method are not fully explored. The proposed method modified Chang et al.´s embedding rules by allowing candidate pairs falling into more suitable regions in the reference matrix, so that a better position for data embedding can be selected to minimize image distortions. The experimental results show that, in average, the visual quality of stego image is 0.81 dB higher than that of Chang et al.´s method without sacrificing any embedding capacity.
Keywords
games of skill; image processing; steganography; Sudoku; image distortions; information hiding scheme; steganography; stego image; visual quality; Application software; Cryptography; Data encapsulation; Digital images; Educational institutions; Frequency domain analysis; Image coding; Information management; Information technology; Steganography; Data hiding; Steganography; Sudoku;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on
Conference_Location
Shanghai
Print_ISBN
978-0-7695-3497-8
Type
conf
DOI
10.1109/IITA.2008.445
Filename
4739900
Link To Document