Title :
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku
Author :
Chou, Yung-Chen ; Lin, Chih-Hung ; Li, Pao-Ching ; Li, Yu-Chiang
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
Abstract :
Secret data delivery is an important application in the modern world. When sending secret data over public computer networks, it has been found that using the Steganography technique is more suitable than the Cryptography technique, because encrypted data looks like random noise that an unexpected user may not pay attention to. This paper presents a (2, 3) threshold secret sharing scheme to achieve the goal of secret data delivery with the high visual quality of a stego image and good security. The concept of Sudoku was adopted in the proposed method. According to the method´s design, secret data can only be extracted when a minimum number of two shadow images are received. Furthermore, a large number of solutions of Sudoku are an advantage to increase secret data delivery security.
Keywords :
cryptography; image coding; steganography; Sudoku; cryptography technique; data encryption; public computer networks; secret data delivery; steganography technique; stego image; threshold secret sharing scheme; Cryptography; Data mining; Matrix converters; PSNR; Pixel; Visualization; Data hiding; Sudoku; secret sharing; steganography;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
Conference_Location :
Darmstadt
Print_ISBN :
978-1-4244-8378-5
Electronic_ISBN :
978-0-7695-4222-5
DOI :
10.1109/IIHMSP.2010.18