Top Banner
人人人人人人 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management, Yu Da College of Business, Miaoli, 361,Taiwan Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, 404, Taiwan 1 2 2 1 Speaker Chih-Wei Shiu 1 IITA 2008, Shanghai, China
10

Steganography Using Sudoku Revisited

Feb 04, 2016

Download

Documents

matana

Steganography Using Sudoku Revisited. Wien Hong, Tung-Shou Chen, Chih-Wei Shiu. Speaker Chih-Wei Shiu. 1. 1. 2. 1. Department of Information Management, Yu Da College of Business, Miaoli , 361,Taiwan. 2. Graduate School of Computer Science and Information Technology, - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

1

Steganography Using Sudoku Revisited

Wien Hong, Tung-Shou Chen, Chih-Wei Shiu

Department of Information Management,Yu Da College of Business, Miaoli, 361,Taiwan

Graduate School of Computer Science and Information Technology, National Taichung Institute of Technology, Taichung, 404, Taiwan

12

2

1

Speaker Chih-Wei Shiu

1

IITA 2008, Shanghai, China

Page 2: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

2

Outline

• Introduction

• Related works

• The proposed scheme

• Experimental results

• Conclusions

Page 3: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Introduction

303

Cover Image

Secret Data Stego-image

Extraction Algorithm

Embedding Algorithm

Extraction Secret Data

Page 4: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Related works

4

Each of the rows, columns and blocks are filled by the number 0-8

-1tile

Reference matrix M

Page 5: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Related works

5

12

11

9

7

5

12

15

7

10

13

6

8

12

14

5

9

Original image

6 1

Secret digits

Stego image

12 5

CEV=M(8,5)

CEV

6

ECHCEH=M(12,8)

ECBCEB=M(13,3)

|12-8|+|5-5|=4

|12-12|+|5-8|=3

|12-13|+|5-3|=3

13 3

Reference matrix M

Page 6: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Related works

6

12

11

9

7

5

12

15

7

10

13

6

8

12

14

5

9

Original image

6 1

Secret digits

13 3

Stego image

10 12

CEV=M(7,12)

CEV

1

CEHCEH=M(10,16) CEB

CEB=M(11,13)

|10-7|+|12-12|=3

|10-10|+|12-16|=4

|10-11|+|12-13|=2

11 13

Reference matrix M

11

9

7

12

15

7

13

6

8

14

5

9

Page 7: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

7

The proposed scheme

12

11

9

7

5

12

15

7

10

13

6

8

12

14

5

9

Original image

6 1

Secret digits

CEV=M(8,5)

CEV

6

CEHCEH=M(12,8)

CEBCEB=M(13,3)

|12-8|+|5-5|=4

|12-12|+|5-8|=3

|12-13|+|5-3|=3

Reference matrix M

6

15

8

6

7

3

4

7

6

3

5

ECA=M(11,6) |12-11|+|5-6|=2

CEA

Page 8: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Experimental Results

8

Comparison of stego image quality

Page 9: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Conclusions

• The proposed method introduces an additional set of candidate elements CEA for referencing.

• image quality outperform Chang’s method at the same embedding capacity.

9

Page 10: Steganography Using Sudoku Revisited

人力資源報告Image and Signal Processing

Thanks for your listening

10