Title :
Steganography Using Sudoku Revisited
Author :
Hong, Wien ; Chen, Tung-Shou ; Shiu, Chih-Wei
Author_Institution :
Dept. of Inf. Manage., Yu Da Coll. of Bus., Miaoli
Abstract :
In this paper, we propose a revised version of information hiding scheme using Sudoku. The original work was proposed by Chang et al. in 2008, and their work was inspired by Zhang and Wang´s method and Sudoku solutions. Chang et al. successfully used Sudoku solutions to guide cover pixels to modify pixel values so that secret messages can be embedded. However, all possible embedding positions for smaller image distortions in Chang et al.´s method are not fully explored. The proposed method modified Chang et al.´s embedding rules by allowing candidate pairs falling into more suitable regions in the reference matrix, so that a better position for data embedding can be selected to minimize image distortions. The experimental results show that, in average, the visual quality of stego image is 0.81 dB higher than that of Chang et al.´s method without sacrificing any embedding capacity.
Keywords :
games of skill; image processing; steganography; Sudoku; image distortions; information hiding scheme; steganography; stego image; visual quality; Application software; Cryptography; Data encapsulation; Digital images; Educational institutions; Frequency domain analysis; Image coding; Information management; Information technology; Steganography; Data hiding; Steganography; Sudoku;
Conference_Titel :
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on
Conference_Location :
Shanghai
Print_ISBN :
978-0-7695-3497-8
DOI :
10.1109/IITA.2008.445