Abstract
Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bit plane. Unfortunately, it is insecure because it cannot resist against the visual attacks and statistic detection. In 2009, Lin et al. proposed a novel data embedding scheme by using the concept of Sudoku. Lin et al.’s scheme not only improved the performances of traditional LSB-based steganography schemes, but also resist against steganalysis. In this paper, a steganography scheme based on Lin et al.’s scheme is explored. Experimental results show that the proposed scheme can improve the visual quality of stego-images. In addition, the average of hiding capacity is 1.29 bpp (bits per pixel). Therefore, it confirms that our proposed scheme provides higher hiding capacity than that of LSB replacement 0.29 bpp. Furthermore, our method shows the positive results to resist against the visual attacks.
I gratefully acknowledge financial support for this research provided by the National Science Council with No. 100-2218-E-468-002-MY2.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25(10), 1431–1437 (2004)
Chang, C.C., Lu, T.C., Chang, Y.F., Lee, R.C.T.: Reversible Data Hiding Schemes for Deoxyribonucleic Acid (DNA) Medium. International Journal of In-novative Computing, Information and Control (IJICIC) 3(5), 1145–1160 (2007)
Chang, C.C., Wu, W.C., Chen, Y.H.: Joint Coding and Embedding Tech-niques for Multimedia Images. Information Sciences 178(18), 3543–3556 (2008)
Chen, Y.H., Chang, C.C., Lin, C.C.: Adaptive Data Embedding Using VQ and Clustering. International Journal of Innovational Computing and Information Control (IJICIC) 3(6(A)), 1471–1485 (2007)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-Scale Images. Magazine of IEEE Multimedia, Special Issue on Security 8(4), 22–28 (2001)
Guillermito, S.: Chi-square Steganography Test Program, http://www.guillermito2.net/stegano/tools/index.html
Ker, A.D.: Steganalysis of LSB Matching in Grayscale Images. IEEE Signal Processing Letters 12(6), 441–444 (2005)
Lin, C.C., Chen, Y.H., Chang, C.C.: LSB-based High-Capacity Data Em-bedding Scheme for Images. International Journal of Innovational Computing and Information Control (IJICIC) 5(11(B)), 4283–4289 (2009)
Lin, S.D., Kuo, Y., Yao, M.: An Image Watermarking Scheme with Tamper Detection and Recovery. International Journal of Innovative Computing, Information and Control (IJICIC) 3(6(A)), 1379–1387 (2007)
Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)
Weng, S., Zhao, Y., Pan, J.S.: A Novel Reversible Data Hiding Scheme. International Journal of Innovative Computing, Information and Control (IJICIC) 4(2), 351–358 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, YH., Lan, CW., Wang, ZH. (2011). A Two-Layer Steganography Scheme Using Sudoku for Digital Images. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-23641-9_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23640-2
Online ISBN: 978-3-642-23641-9
eBook Packages: Computer ScienceComputer Science (R0)