人人人人人人 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management, Yu Da College of Business, Miaoli, 361,Taiwan Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, 404, Taiwan 1 2 2 1 Speaker Chih-Wei Shiu 1 IITA 2008, Shanghai, China
Steganography Using Sudoku Revisited. Wien Hong, Tung-Shou Chen, Chih-Wei Shiu. Speaker Chih-Wei Shiu. 1. 1. 2. 1. Department of Information Management, Yu Da College of Business, Miaoli , 361,Taiwan. 2. Graduate School of Computer Science and Information Technology, - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
人力資源報告Image and Signal Processing
1
Steganography Using Sudoku Revisited
Wien Hong, Tung-Shou Chen, Chih-Wei Shiu
Department of Information Management,Yu Da College of Business, Miaoli, 361,Taiwan
Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, 404, Taiwan
12
2
1
Speaker Chih-Wei Shiu
1
IITA 2008, Shanghai, China
人力資源報告Image and Signal Processing
2
Outline
• Introduction
• Related works
• The proposed scheme
• Experimental results
• Conclusions
人力資源報告Image and Signal Processing
Introduction
303
Cover Image
Secret Data Stego-image
Extraction Algorithm
Embedding Algorithm
Extraction Secret Data
人力資源報告Image and Signal Processing
Related works
4
Each of the rows, columns and blocks are filled by the number 0-8
-1tile
Reference matrix M
人力資源報告Image and Signal Processing
Related works
5
12
11
9
7
5
12
15
7
10
13
6
8
12
14
5
9
Original image
6 1
Secret digits
Stego image
12 5
CEV=M(8,5)
CEV
6
ECHCEH=M(12,8)
ECBCEB=M(13,3)
|12-8|+|5-5|=4
|12-12|+|5-8|=3
|12-13|+|5-3|=3
13 3
Reference matrix M
人力資源報告Image and Signal Processing
Related works
6
12
11
9
7
5
12
15
7
10
13
6
8
12
14
5
9
Original image
6 1
Secret digits
13 3
Stego image
10 12
CEV=M(7,12)
CEV
1
CEHCEH=M(10,16) CEB
CEB=M(11,13)
|10-7|+|12-12|=3
|10-10|+|12-16|=4
|10-11|+|12-13|=2
11 13
Reference matrix M
11
9
7
12
15
7
13
6
8
14
5
9
人力資源報告Image and Signal Processing
7
The proposed scheme
12
11
9
7
5
12
15
7
10
13
6
8
12
14
5
9
Original image
6 1
Secret digits
CEV=M(8,5)
CEV
6
CEHCEH=M(12,8)
CEBCEB=M(13,3)
|12-8|+|5-5|=4
|12-12|+|5-8|=3
|12-13|+|5-3|=3
Reference matrix M
6
15
8
6
7
3
4
7
6
3
5
ECA=M(11,6) |12-11|+|5-6|=2
CEA
人力資源報告Image and Signal Processing
Experimental Results
8
Comparison of stego image quality
人力資源報告Image and Signal Processing
Conclusions
• The proposed method introduces an additional set of candidate elements CEA for referencing.
• image quality outperform Chang’s method at the same embedding capacity.