Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction

被引:0
|
作者
Jiin-Chiou Cheng [1 ]
Wen-Chung Kuo [2 ]
Bo-Rong Su [1 ]
机构
[1] the Department of Computer Science and Information Engineering.Southern Taiwan University of Science and Technology
[2] the Department of Computer Science and Information Engineering,Yunlin University of Science and Technology
关键词
Cover-image; division arithmetic and generalized exploiting modification direction(DAGEMD); stego-image; Sudoku;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Division arithmetic and generalized exploiting modification direction(DA-GEMD) method has perfect efficiency in data-hiding.However,there exist some weaknesses in DA-GEMD.Because the benchmarks are their median of nine pixels in each block of cover-image,it will give a hint for the attacker to hack the stego-image.In the paper,we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image.It will mix up the pixels in each image block and prevent the secret information from being extracted.The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding.
引用
收藏
页码:123 / 128
页数:6
相关论文
共 50 条
  • [11] Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding
    Ahmad, Ali
    Sulong, Ghazali
    Rehman, Amjad
    Alkawaz, Mohammed
    Saba, Tanzila
    JOURNAL OF INTELLIGENT SYSTEMS, 2014, 23 (04) : 451 - 459
  • [12] Reversible data hiding scheme based on exploiting modification direction with two steganographic images
    Chuan Qin
    Chin-Chen Chang
    Tai-Jung Hsu
    Multimedia Tools and Applications, 2015, 74 : 5861 - 5872
  • [13] Reversible data hiding scheme based on exploiting modification direction with two steganographic images
    Qin, Chuan
    Chang, Chin-Chen
    Hsu, Tai-Jung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (15) : 5861 - 5872
  • [14] Extended Exploiting-Modification-Direction Data Hiding with High Capacity
    Liu, Yanjun
    Chang, Chin-Chen
    Huang, Peng-Cheng
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON VIDEO AND IMAGE PROCESSING (ICVIP 2017), 2017, : 151 - 155
  • [15] An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction
    Chen, Xiaofeng
    Hong, Chaoqun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [16] High-Capacity Data Hiding Scheme Based on Exploiting Modification Direction and Modulo Operation
    Jung, K. H.
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2471 - 2474
  • [17] Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding
    Kuo, Wen-Chung
    Xiao, Ren-Jun
    Wang, Chun-Cheng
    Huang, Yu-Chih
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 103 - 115
  • [18] Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding
    Liu, Yanxiao
    Yang, Chingnung
    Sun, Qindong
    IEEE ACCESS, 2018, 6 : 5374 - 5378
  • [19] Data-hiding codes
    Moulin, P
    Koetter, R
    PROCEEDINGS OF THE IEEE, 2005, 93 (12) : 2083 - 2126
  • [20] A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction method
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    Shyi, Chia-Nian
    Kuo, Shao-Hung
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 69 - +