Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction

被引:0
|
作者
Jiin-Chiou Cheng [1 ]
Wen-Chung Kuo [2 ]
Bo-Rong Su [1 ]
机构
[1] the Department of Computer Science and Information Engineering.Southern Taiwan University of Science and Technology
[2] the Department of Computer Science and Information Engineering,Yunlin University of Science and Technology
关键词
Cover-image; division arithmetic and generalized exploiting modification direction(DAGEMD); stego-image; Sudoku;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Division arithmetic and generalized exploiting modification direction(DA-GEMD) method has perfect efficiency in data-hiding.However,there exist some weaknesses in DA-GEMD.Because the benchmarks are their median of nine pixels in each block of cover-image,it will give a hint for the attacker to hack the stego-image.In the paper,we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image.It will mix up the pixels in each image block and prevent the secret information from being extracted.The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding.
引用
收藏
页码:123 / 128
页数:6
相关论文
共 50 条
  • [1] Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction
    JiinChiou Cheng
    WenChung Kuo
    BoRong Su
    Journal of Electronic Science and Technology, 2018, 16 (02) : 123 - 128
  • [2] Data-hiding based on sudoku and generalized exploiting modification direction
    Cheng J.-C.
    Kuo W.-C.
    Su B.-R.
    Journal of Electronic Science and Technology, 2018, 16 (02) : 123 - 128
  • [3] Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD)
    El Salam, Nada Hussien Abd
    Xiong, Shengwu
    Liu, Xuan
    VISUAL COMPUTER, 2024, 40 (05): : 3663 - 3691
  • [4] Reversible data-hiding exploiting huffman encoding in dual image using weighted matrix and generalized exploiting modification direction (GEMD)
    Nada Hussien Abd El Salam
    Shengwu Xiong
    Xuan Liu
    The Visual Computer, 2024, 40 : 3663 - 3691
  • [5] Data hiding based on generalised exploiting modification direction method
    Kuo, W-C
    Wang, C-C
    IMAGING SCIENCE JOURNAL, 2013, 61 (06): : 484 - 490
  • [6] Data hiding by an improved exploiting modification direction
    Kim, Cheonshik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 69 (03) : 569 - 584
  • [7] Data hiding by an improved exploiting modification direction
    Cheonshik Kim
    Multimedia Tools and Applications, 2014, 69 : 569 - 584
  • [8] An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu
    Horng, Ji-Hwei
    Xu, Shuying
    Chang, Ching-Chun
    Chang, Chin-Chen
    SENSORS, 2020, 20 (09)
  • [9] A Novel Reversible Data Hiding Based on Exploiting Modification Direction Algorithm
    Chen, Kang-Kang
    Wang, Jian-Jun
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 514 - 518
  • [10] Improved Data Hiding Method by Exploiting Modification Direction
    Byun, Jin-Yong
    Jung, Kl-Hyun
    Yoo, Kee-Young
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 264 - +