DocumentCode :
3085774
Title :
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku
Author :
Chou, Yung-Chen ; Lin, Chih-Hung ; Li, Pao-Ching ; Li, Yu-Chiang
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
fYear :
2010
fDate :
15-17 Oct. 2010
Firstpage :
43
Lastpage :
46
Abstract :
Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achieve the goal of secret data delivery with the high visual quality of a stego image and good security. The concept of Sudoku was adopted in the proposed method. According to the method´s design, secret data can only be extracted when a minimum number of two shadow images are received. Furthermore, a large number of solutions of Sudoku are an advantage to increase secret data delivery security.
Keywords :
cryptography; image coding; steganography; Sudoku; cryptography technique; data encryption; public computer networks; secret data delivery; steganography technique; stego image; threshold secret sharing scheme; Cryptography; Data mining; Matrix converters; PSNR; Pixel; Visualization; Data hiding; Sudoku; secret sharing; steganography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
Conference_Location :
Darmstadt
Print_ISBN :
978-1-4244-8378-5
Electronic_ISBN :
978-0-7695-4222-5
Type :
conf
DOI :
10.1109/IIHMSP.2010.18
Filename :
5635775
Link To Document :
بازگشت