Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction

被引:0
|
作者
Jiin-Chiou Cheng [1 ]
Wen-Chung Kuo [2 ]
Bo-Rong Su [1 ]
机构
[1] the Department of Computer Science and Information Engineering.Southern Taiwan University of Science and Technology
[2] the Department of Computer Science and Information Engineering,Yunlin University of Science and Technology
关键词
Cover-image; division arithmetic and generalized exploiting modification direction(DAGEMD); stego-image; Sudoku;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Division arithmetic and generalized exploiting modification direction(DA-GEMD) method has perfect efficiency in data-hiding.However,there exist some weaknesses in DA-GEMD.Because the benchmarks are their median of nine pixels in each block of cover-image,it will give a hint for the attacker to hack the stego-image.In the paper,we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image.It will mix up the pixels in each image block and prevent the secret information from being extracted.The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding.
引用
收藏
页码:123 / 128
页数:6
相关论文
共 50 条
  • [31] Block compression of remote sensing image based on data-hiding
    Cui Tao
    Zhou Quan
    Li Jun
    Hu Yanlang
    CHINESE SPACE SCIENCE AND TECHNOLOGY, 2018, 38 (03) : 54 - 59
  • [32] Reversible data-hiding method for palette-based images
    Lee, Jia-Hong
    Wu, Mei-Yi
    OPTICAL ENGINEERING, 2008, 47 (04)
  • [33] Performance analysis of nonuniform quantization-based data-hiding
    Vila-Forcén, JE
    Voloshynovskiy, S
    Koval, O
    Pun, T
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [34] Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction
    Huang, Peng-Cheng
    Li, Yung-Hui
    Chang, Chin-Chen
    Liu, Yanjun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (05): : 2348 - 2365
  • [35] A generalization of fully exploiting modification directions data hiding scheme
    Kuo, Wen-Chung
    Kao, Ming-Chih
    Chang, Chin-Chen
    Journal of Information Hiding and Multimedia Signal Processing, 2015, 6 (04): : 718 - 727
  • [36] Two private, perceptual data-hiding games
    Goteti, AK
    Moulin, P
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL III, PROCEEDINGS: IMAGE AND MULTIDIMENSIONAL SIGNAL PROCESSING SPECIAL SESSIONS, 2004, : 373 - 376
  • [37] Capacity bounds and constructions for reversible data-hiding
    Kalker, T
    Willems, FMJ
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 604 - 611
  • [38] Data hiding with dual based reversible image using sudoku technique
    Kumar, Sravan M., V
    Mamatha, E.
    Reddy, C. S.
    Mukesh, V
    Reddy, Dasthagiri R.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2166 - 2172
  • [39] Reversible data-hiding for progressive image transmission
    Lin, Yih-Chuan
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (10) : 628 - 645
  • [40] Secure data-hiding in multimedia using NMF
    Malik, Hafiz
    Baqai, Farhan
    Khokhar, Ashfaq
    Ansari, Rashid
    MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 265 - 272