An Image Steganography Scheme Using 3D-Sudoku
نویسندگان
چکیده
Steganography, an information-hiding technique, is that embedding secret information into a cover-media to generate a meaningful stego-media. This paper proposes a novel image steganography scheme using 3D-Sudoku. In this paper, a cyclically moving algorithm is used to construct a 3D-Sudoku. The data-embedding phase is that the pixels of the cover-image as the coordinate of 3D-Sudoku are modified in the rule of a minimal distortion to indicate the position of a given secret data. And in the dataextraction phase, the modified pixels of the stego-image as the coordinate of 3D-Sudoku are applied to directly extract the embedded secret data. The experimental results show that the visual quality of stego-image in the proposed scheme is slightly less than that in the steganography scheme using 2D-Sudoku, but the embedding capacity in the proposed scheme is higher than that in the steganography scheme using 2D-Sudoku.
منابع مشابه
Improving Image Data Hiding Capacity Scheme using Sudoku Puzzle in Color Images
-Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bit plane. Unfortunately, it is insecure because it cannot resist against the visual attacks and statistic detection. The original work was proposed by Chang et al. in 2010, and their work ...
متن کاملA High Capacity Email Steganography Scheme using Dictionary
The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...
متن کاملA Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, t...
متن کاملImage Steganography Technique Using Sudoku Puzzle and Ecc Algorithm for Secured Data Transmission
Nowadays, Data transmission is becoming very important among humans. So there are many modes of data transmission introduced. Some of the modes of data transmission are through copper wires, wireless channels, computer buses, etc. Though there are certain modes of transmission, secured data transmission is an important thing what everyone needs, because everyone wants their data to transmit sec...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016