1 / 10

Steganography Using Sudoku Revisited

Steganography Using Sudoku Revisited. Wien Hong, Tung-Shou Chen, Chih-Wei Shiu. Speaker Chih-Wei Shiu. 1. 1. 2. 1. Department of Information Management, Yu Da College of Business, Miaoli , 361,Taiwan. 2. Graduate School of Computer Science and Information Technology,

matana
Download Presentation

Steganography Using Sudoku Revisited

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Speaker Chih-Wei Shiu 1 1 2 1 Department of Information Management, Yu Da College of Business, Miaoli, 361,Taiwan 2 Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, 404, Taiwan IITA 2008, Shanghai, China

  2. Outline • Introduction • Related works • The proposed scheme • Experimental results • Conclusions

  3. Introduction Embedding Algorithm Cover Image Stego-image Secret Data Extraction Algorithm Extraction Secret Data 03

  4. Related works tile -1 Reference matrix M Each of the rows, columns and blocks are filled by the number 0-8

  5. 6 12 1 5 10 12 Secret digits 11 12 13 14 9 15 6 5 7 7 8 9 Original image Stego image Related works 12 5 6 CEV CEV=M(8,5) |12-8|+|5-5|=4 CEH=M(12,8) |12-12|+|5-8|=3 ECH ECB CEB=M(13,3) |12-13|+|5-3|=3 13 3 Reference matrix M

  6. 12 13 6 3 5 1 10 12 Secret digits 11 12 13 14 9 15 6 5 7 7 8 9 Original image Stego image Related works 10 12 1 CEV CEV=M(7,12) |10-7|+|12-12|=3 CEH=M(10,16) |10-10|+|12-16|=4 CEH CEB CEB=M(11,13) |10-11|+|12-13|=2 11 13 11 12 13 14 9 15 6 5 Reference matrix M 7 7 8 9

  7. 12 6 1 5 10 12 Secret digits 11 12 13 14 9 15 6 5 7 7 8 9 Original image The proposed scheme 6 6 8 5 1 6 3 CEV CEA 6 5 4 7 CEV=M(8,5) |12-8|+|5-5|=4 7 3 CEH=M(12,8) |12-12|+|5-8|=3 CEH CEB CEB=M(13,3) |12-13|+|5-3|=3 ECA=M(11,6)|12-11|+|5-6|=2 Reference matrix M

  8. Experimental Results Comparison of stego image quality

  9. Conclusions • The proposed method introduces an additional set of candidate elements CEA for referencing. • image quality outperform Chang’s method at the same embedding capacity.

  10. Thanks for your listening

More Related