Research on Image Steganography Based on Sudoku Matrix

被引:5
|
作者
Hsiao, Tsung-Chih [1 ,2 ]
Liu, Dong-Xu [1 ,2 ]
Chen, Tzer-Long [3 ]
Chen, Chih-Cheng [4 ,5 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Quanzhou 361021, Peoples R China
[2] Huaqiao Univ, Xiamen Key Lab Data Secur & Blockchain Technol, Quanzhou 361021, Peoples R China
[3] Providence Univ, Dept Finance, Taichung 43301, Taiwan
[4] Feng Chia Univ, Dept Automat Control Engn, Taichung 40724, Taiwan
[5] Chaoyang Univ Technol, Dept Aeronaut Engn, Taichung 413310, Taiwan
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 03期
关键词
data hiding; magic matrix; double-layer; DATA HIDING METHOD; LOSSLESS DATA;
D O I
10.3390/sym13030387
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
At present, the Sudoku matrix, turtle shell matrix, and octagonal matrix have been put forward according to the magic matrix-based data hiding methods. Moreover, the magic matrices to be designed depend on the size of the embedding capacity. In addition, by determining the classification of points of pixel pairs after applying a magic matrix and by determining the traversal area, the average peak signal-to-noise ratio (PSNR) can be improved. Therefore, this topic intends to propose a data hiding method based on a 16 x 16 Sudoku matrix by using the 16 x 16 Sudoku matrix and extending it to a double-layer magic matrix. Low-cost data embedding methods are also studied, in order to improve the PSNR and maintain good image quality with the same embedding capacity.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [21] Research on image steganography based on a conditional invertible neural network
    Liang, Menghua
    Zhao, Hongtu
    SIGNAL IMAGE AND VIDEO PROCESSING, 2025, 19 (03)
  • [22] Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
    Ye, Hanmin
    Su, Keqin
    Cheng, Xiaohui
    Huang, Shiming
    IET IMAGE PROCESSING, 2022, 16 (07) : 1959 - 1972
  • [23] A Minimal Euclidean Distance Searching Technique for Sudoku Steganography
    Hong, Wien
    Chen, Tung-Shou
    Shiu, Chih-Wei
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 515 - +
  • [24] Steganography Based on Image Morphing
    Zhao, Qiangfu
    Kunii, Tosiyasu L.
    2013 INTERNATIONAL JOINT CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY & UBI-MEDIA COMPUTING (ICAST-UMEDIA), 2013, : 157 - +
  • [25] An Image Encryption Algorithm by Scrambling the Pixel Location with Sudoku Grids Matrix
    Wang, Yueyue
    Wan, Dong
    Sheng, Hongyu
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1322 - +
  • [26] Coverless Image Steganography Based on Image Segmentation
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    He, Zhibin
    Xiong, Neal N.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1281 - 1295
  • [27] Coverless image steganography based on image segmentation
    Luo Y.
    Qin J.
    Xiang X.
    Tan Y.
    He Z.
    Xiong N.N.
    Qin, Jiaohua (qinjiaohua@163.com), 1600, Tech Science Press (64): : 1281 - 1295
  • [28] Color Image Steganography Using Random Key Matrix
    Anurag
    Meena, Shweta
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [29] Adaptive Image Steganography: A Review and Research Directions
    Fadhl, Ayyah Abdulhafith Mahmoud
    Shareif, Hanein Omar Mohamed
    Ali, Malak Ahmed Elsherif
    Elmangoush, Abdullah Mohammad Abdullah
    2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024, 2024, : 494 - 499
  • [30] A shell-matrix-based image steganography technique for multimedia security and covert communication
    Mukherjee, Subhadip
    Mukhopadhyay, Somnath
    Sarkar, Sunita
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2022, 20 (4) : 653 - 668