Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction

被引:0
|
作者
Jiin-Chiou Cheng [1 ]
Wen-Chung Kuo [2 ]
Bo-Rong Su [1 ]
机构
[1] the Department of Computer Science and Information Engineering.Southern Taiwan University of Science and Technology
[2] the Department of Computer Science and Information Engineering,Yunlin University of Science and Technology
关键词
Cover-image; division arithmetic and generalized exploiting modification direction(DAGEMD); stego-image; Sudoku;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Division arithmetic and generalized exploiting modification direction(DA-GEMD) method has perfect efficiency in data-hiding.However,there exist some weaknesses in DA-GEMD.Because the benchmarks are their median of nine pixels in each block of cover-image,it will give a hint for the attacker to hack the stego-image.In the paper,we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image.It will mix up the pixels in each image block and prevent the secret information from being extracted.The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding.
引用
收藏
页码:123 / 128
页数:6
相关论文
共 50 条
  • [41] Capacity bounds and constructions for reversible data-hiding
    Kalker, T
    Willems, FMJ
    DSP 2002: 14TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2, 2002, : 71 - 76
  • [42] Distortion-free data-hiding algorithm
    Huang, Xia-Ling
    Liu, Hong-Mei
    Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni, 2002, 41 (06):
  • [43] Protocols for data-hiding based text document security and automatic processing
    Deguillaume, F
    Rytsar, Y
    Voloshynovskiy, S
    Pun, T
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 25 - 28
  • [44] Capacity of data-hiding system subject to desynchronization
    Pateux, S
    Le Guelvouit, G
    Delhumeau, J
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 286 - 295
  • [45] An efficient and adaptive data-hiding scheme based on secure random matrix
    Zhang, Mingwu
    Zhang, Shaochen
    Harn, Lein
    PLOS ONE, 2019, 14 (10):
  • [46] Enhanced embedding capacity for the SMSD-based data-hiding method
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Sun, Qin-Dong
    Wu, Song-Yu
    Lin, Shin-Shang
    Chou, Yung-Shun
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 216 - 222
  • [47] Asymmetric spread spectrum data-hiding for Laplacian host data
    Vila-Forcén, JE
    Koval, O
    Voloshynovskiy, S
    Pun, T
    2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 1 - 4
  • [48] High-capacity steganographic method based on division arithmetic and generalized exploiting modification direction
    Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Taiwan
    不详
    Kuo, W.-C. (simonkuo@yuntech.edu.tw), 1600, Ubiquitous International (05):
  • [49] A high-capacity, invertible, data-hiding algorithm using a generalized, reversible, integer transform
    Stach, J
    Alattar, AM
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 386 - 396
  • [50] Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding
    Mathon, Benjamin
    Bas, Patrick
    Cayre, Francois
    Perez-Gonzalez, Fernando
    INFORMATION HIDING, 2008, 5284 : 325 - +