Research on Image Steganography Based on Sudoku Matrix

被引:5
|
作者
Hsiao, Tsung-Chih [1 ,2 ]
Liu, Dong-Xu [1 ,2 ]
Chen, Tzer-Long [3 ]
Chen, Chih-Cheng [4 ,5 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Quanzhou 361021, Peoples R China
[2] Huaqiao Univ, Xiamen Key Lab Data Secur & Blockchain Technol, Quanzhou 361021, Peoples R China
[3] Providence Univ, Dept Finance, Taichung 43301, Taiwan
[4] Feng Chia Univ, Dept Automat Control Engn, Taichung 40724, Taiwan
[5] Chaoyang Univ Technol, Dept Aeronaut Engn, Taichung 413310, Taiwan
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 03期
关键词
data hiding; magic matrix; double-layer; DATA HIDING METHOD; LOSSLESS DATA;
D O I
10.3390/sym13030387
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
At present, the Sudoku matrix, turtle shell matrix, and octagonal matrix have been put forward according to the magic matrix-based data hiding methods. Moreover, the magic matrices to be designed depend on the size of the embedding capacity. In addition, by determining the classification of points of pixel pairs after applying a magic matrix and by determining the traversal area, the average peak signal-to-noise ratio (PSNR) can be improved. Therefore, this topic intends to propose a data hiding method based on a 16 x 16 Sudoku matrix by using the 16 x 16 Sudoku matrix and extending it to a double-layer magic matrix. Low-cost data embedding methods are also studied, in order to improve the PSNR and maintain good image quality with the same embedding capacity.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [1] Retracing extended sudoku matrix for high-capacity image steganography
    Xuejing Li
    Yonglong Luo
    Weixin Bian
    Multimedia Tools and Applications, 2021, 80 : 18627 - 18651
  • [2] Retracing extended sudoku matrix for high-capacity image steganography
    Li, Xuejing
    Luo, Yonglong
    Bian, Weixin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (12) : 18627 - 18651
  • [3] A Permutation-Based 3D-Sudoku Mode/for Image Steganography
    Horng, Ji-Hwei
    Yang, Shan-Cheng
    Lee, Chih-Hung
    Feng, Hsuan-Ming
    2019 INTERNATIONAL CONFERENCE ON FUZZY THEORY AND ITS APPLICATIONS (IFUZZY), 2019, : 294 - 298
  • [4] An image steganography scheme using 3D-Sudoku
    Wang, An-Hong (wahty@163.com), 1600, Ubiquitous International (07):
  • [5] Image Encryption using the Sudoku Matrix
    Wu, Yue
    Zhou, Yicong
    Noonan, Joseph P.
    Panetta, Karen
    Agaian, Sos
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2010, 2010, 7708
  • [6] Steganography Using Sudoku Revisited
    Hong, Wien
    Chen, Tung-Shou
    Shiu, Chih-Wei
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 935 - +
  • [7] Steganography in SMS by Sudoku puzzle
    Shirali-Shahreza, M. Hassan
    Shirali-Shahreza, Mohammad
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 844 - +
  • [8] An Image Pixel Values Scrambling Algorithm Based on Sudoku Grids Matrix
    Wan, Dong
    Wang, Yueyue
    Sheng, Hongyu
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1298 - +
  • [9] Steganography using Sudoku Puzzle
    Shetty, Roshan B. R.
    Rohith, J.
    Mukund, V
    Honwade, Rohan
    Rangaswamy, Shanta
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 623 - +
  • [10] A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding
    Yang, Zhongliang
    Peng, Xueshun
    Huang, Yongfeng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 752 - 762