• DocumentCode
    2266645
  • Title

    Steganography Using Sudoku Revisited

  • Author

    Hong, Wien ; Chen, Tung-Shou ; Shiu, Chih-Wei

  • Author_Institution
    Dept. of Inf. Manage., Yu Da Coll. of Bus., Miaoli
  • Volume
    2
  • fYear
    2008
  • fDate
    20-22 Dec. 2008
  • Firstpage
    935
  • Lastpage
    939
  • Abstract
    In this paper, we propose a revised version of information hiding scheme using Sudoku. The original work was proposed by Chang et al. in 2008, and their work was inspired by Zhang and Wang´s method and Sudoku solutions. Chang et al. successfully used Sudoku solutions to guide cover pixels to modify pixel values so that secret messages can be embedded. However, all possible embedding positions for smaller image distortions in Chang et al.´s method are not fully explored. The proposed method modified Chang et al.´s embedding rules by allowing candidate pairs falling into more suitable regions in the reference matrix, so that a better position for data embedding can be selected to minimize image distortions. The experimental results show that, in average, the visual quality of stego image is 0.81 dB higher than that of Chang et al.´s method without sacrificing any embedding capacity.
  • Keywords
    games of skill; image processing; steganography; Sudoku; image distortions; information hiding scheme; steganography; stego image; visual quality; Application software; Cryptography; Data encapsulation; Digital images; Educational institutions; Frequency domain analysis; Image coding; Information management; Information technology; Steganography; Data hiding; Steganography; Sudoku;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on
  • Conference_Location
    Shanghai
  • Print_ISBN
    978-0-7695-3497-8
  • Type

    conf

  • DOI
    10.1109/IITA.2008.445
  • Filename
    4739900