Skip to main content

A Two-Layer Steganography Scheme Using Sudoku for Digital Images

  • Conference paper
  • 1616 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6905))

Abstract

Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bit plane. Unfortunately, it is insecure because it cannot resist against the visual attacks and statistic detection. In 2009, Lin et al. proposed a novel data embedding scheme by using the concept of Sudoku. Lin et al.’s scheme not only improved the performances of traditional LSB-based steganography schemes, but also resist against steganalysis. In this paper, a steganography scheme based on Lin et al.’s scheme is explored. Experimental results show that the proposed scheme can improve the visual quality of stego-images. In addition, the average of hiding capacity is 1.29 bpp (bits per pixel). Therefore, it confirms that our proposed scheme provides higher hiding capacity than that of LSB replacement 0.29 bpp. Furthermore, our method shows the positive results to resist against the visual attacks.

I gratefully acknowledge financial support for this research provided by the National Science Council with No. 100-2218-E-468-002-MY2.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chang, C.C., Tseng, H.W.: A Steganographic Method for Digital Images Using Side Match. Pattern Recognition Letters 25(10), 1431–1437 (2004)

    Article  Google Scholar 

  2. Chang, C.C., Lu, T.C., Chang, Y.F., Lee, R.C.T.: Reversible Data Hiding Schemes for Deoxyribonucleic Acid (DNA) Medium. International Journal of In-novative Computing, Information and Control (IJICIC) 3(5), 1145–1160 (2007)

    Google Scholar 

  3. Chang, C.C., Wu, W.C., Chen, Y.H.: Joint Coding and Embedding Tech-niques for Multimedia Images. Information Sciences 178(18), 3543–3556 (2008)

    Article  Google Scholar 

  4. Chen, Y.H., Chang, C.C., Lin, C.C.: Adaptive Data Embedding Using VQ and Clustering. International Journal of Innovational Computing and Information Control (IJICIC) 3(6(A)), 1471–1485 (2007)

    Google Scholar 

  5. Fridrich, J., Goljan, M., Du, R.: Detecting LSB Steganography in Color and Gray-Scale Images. Magazine of IEEE Multimedia, Special Issue on Security 8(4), 22–28 (2001)

    Article  Google Scholar 

  6. Guillermito, S.: Chi-square Steganography Test Program, http://www.guillermito2.net/stegano/tools/index.html

  7. Ker, A.D.: Steganalysis of LSB Matching in Grayscale Images. IEEE Signal Processing Letters 12(6), 441–444 (2005)

    Article  Google Scholar 

  8. Lin, C.C., Chen, Y.H., Chang, C.C.: LSB-based High-Capacity Data Em-bedding Scheme for Images. International Journal of Innovational Computing and Information Control (IJICIC) 5(11(B)), 4283–4289 (2009)

    Google Scholar 

  9. Lin, S.D., Kuo, Y., Yao, M.: An Image Watermarking Scheme with Tamper Detection and Recovery. International Journal of Innovative Computing, Information and Control (IJICIC) 3(6(A)), 1379–1387 (2007)

    Google Scholar 

  10. Mielikainen, J.: LSB Matching Revisited. IEEE Signal Processing Letters 13(5), 285–287 (2006)

    Article  Google Scholar 

  11. Weng, S., Zhao, Y., Pan, J.S.: A Novel Reversible Data Hiding Scheme. International Journal of Innovative Computing, Information and Control (IJICIC) 4(2), 351–358 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, YH., Lan, CW., Wang, ZH. (2011). A Two-Layer Steganography Scheme Using Sudoku for Digital Images. In: Hsu, CH., Yang, L.T., Ma, J., Zhu, C. (eds) Ubiquitous Intelligence and Computing. UIC 2011. Lecture Notes in Computer Science, vol 6905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23641-9_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23641-9_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23640-2

  • Online ISBN: 978-3-642-23641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics