100 likes | 299 Views
Steganography Using Sudoku Revisited. Wien Hong, Tung-Shou Chen, Chih-Wei Shiu. Speaker Chih-Wei Shiu. 1. 1. 2. 1. Department of Information Management, Yu Da College of Business, Miaoli , 361,Taiwan. 2. Graduate School of Computer Science and Information Technology,
E N D
Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Speaker Chih-Wei Shiu 1 1 2 1 Department of Information Management, Yu Da College of Business, Miaoli, 361,Taiwan 2 Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, 404, Taiwan IITA 2008, Shanghai, China
Outline • Introduction • Related works • The proposed scheme • Experimental results • Conclusions
Introduction Embedding Algorithm Cover Image Stego-image Secret Data Extraction Algorithm Extraction Secret Data 03
Related works tile -1 Reference matrix M Each of the rows, columns and blocks are filled by the number 0-8
6 12 1 5 10 12 Secret digits 11 12 13 14 9 15 6 5 7 7 8 9 Original image Stego image Related works 12 5 6 CEV CEV=M(8,5) |12-8|+|5-5|=4 CEH=M(12,8) |12-12|+|5-8|=3 ECH ECB CEB=M(13,3) |12-13|+|5-3|=3 13 3 Reference matrix M
12 13 6 3 5 1 10 12 Secret digits 11 12 13 14 9 15 6 5 7 7 8 9 Original image Stego image Related works 10 12 1 CEV CEV=M(7,12) |10-7|+|12-12|=3 CEH=M(10,16) |10-10|+|12-16|=4 CEH CEB CEB=M(11,13) |10-11|+|12-13|=2 11 13 11 12 13 14 9 15 6 5 Reference matrix M 7 7 8 9
12 6 1 5 10 12 Secret digits 11 12 13 14 9 15 6 5 7 7 8 9 Original image The proposed scheme 6 6 8 5 1 6 3 CEV CEA 6 5 4 7 CEV=M(8,5) |12-8|+|5-5|=4 7 3 CEH=M(12,8) |12-12|+|5-8|=3 CEH CEB CEB=M(13,3) |12-13|+|5-3|=3 ECA=M(11,6)|12-11|+|5-6|=2 Reference matrix M
Experimental Results Comparison of stego image quality
Conclusions • The proposed method introduces an additional set of candidate elements CEA for referencing. • image quality outperform Chang’s method at the same embedding capacity.