Browse > Article
http://dx.doi.org/10.9717/kmms.2017.20.2.261

A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing  

Kim, Young-Ju (Dept. of Computer Science & Engineering, Graduate School, Kyungpook National University)
Kim, Pyung-Han (Dept. of Computer Science & Engineering, Graduate School, Kyungpook National University)
Yoo, Kee-Young (School of Computer Science & Engineering, Kyungpook National University)
Publication Information
Abstract
Data hiding is a way to hide the information in multimedia media such as images or video. The scheme proposed by Nguyen and Chang, was able to embed, extract, and restore the cover image and the secret data using Sudoku. But in the extracting phase, the occurrence of duplicate values in the reference matrix was found to decrease the embedding capacity of secret data. This paper has proposed a reversible data hiding scheme while maintaining the quality of the image to provide high embedding capacity using $7{\times}7$ Sudoku and Shamir's secret sharing scheme.
Keywords
Reversible Data Hiding; Secret Sharing; Sudoku; Embedding Capacity;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 A. Abdulfetah, X. Sun, and H. Yang, "Quantization Based Robust Image Watermarking in DCT-SVD Domain," Information Technology, Vol. 1, No. 3, pp. 107-114, 2009.   DOI
2 A. Sverdlov, S. Dexter, and A.M. Eskicioglu, "Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies," Proceedings of Image Proceedings 2000, Vol. 1, pp. 454-457, 2000.
3 E. Yavuz and T. Ziya, "Improved SVD-DWT Based Digital Image Watermarking against Watermark Ambiguity," Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 1051-1055, 2007.
4 J. Mei, S. Li, and X. Tan, "A Digital Watermarking Algorithm Based on DCT and DWT," Proceedings of the 2009 International Symposium on Web Information Systems and Applications, pp. 104-107, 2009.
5 D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003.   DOI
6 J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, 2003.   DOI
7 D.M. Thodi and J.J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Transactions on Image Processing, Vol. 16, No. 3, pp. 721-730, 2007.   DOI
8 Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.   DOI
9 K.S. Kim, M.J. Lee, and H.K. Lee, "Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images," Communications in Nonlinear Science and Numerical Simulation, Vol. 42, No. 11, pp. 3083-3096, 2009.
10 J.Y. Byun, P.H. Kim, J.H. Lee, K.H. Jung and K.Y. Yoo, "Data Hiding Using Pixel-Value Modular Operation," Journal of the Korea Multimedia Society, Vol. 18, No. 4, pp. 483-491, 2015.   DOI
11 J.H. Lee, K.H. Jung and K.Y. Yoo, "Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System," Journal of the Korea Multimedia Society, Vol. 19, No. 9, pp. 1669- 1678, 2016.   DOI
12 T.S. Nguyen and C.C. Chang, "A Reversible Data Hiding Scheme Based on the Sudoku Technique," Displays, Vol. 39, pp. 109-116, 2015.   DOI
13 A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.   DOI
14 G.R. Blakley, "Safeguarding Cryptographic Keys," Proceedings of the National Computer Conference, Vol. 48, pp. 313-317, 1979.
15 K.H. Jung and K.Y. Yoo, "Data Hiding Method Using Image Interpolation," Computer Standards and Interfaces, Vol. 31, No. 2, pp. 465-470, 2009.   DOI
16 X. Wu and W. Sun, "High-capacity Reversible Data Hiding in Encrypted Images by Prediction Error," Signal Processing, Vol. 104, pp. 387-400, 2014.   DOI
17 C.M. Wang, N.I. Wu, C.S. Tsai, and M.S. Hwang, "A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function," Systems and Software, Vol. 81, No. 1, pp. 150-158, 2008.   DOI
18 S. Wang, Z. Cao, M.A. Strangio, and L. Wang, "Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol," IEEE Communications Letters, Vol. 12, No. 2, pp. 149-151, 2008.   DOI
19 C.W. Leung, F.Y. Ng, and D.S. Wong, "On the Security of a Visual Cryptography Scheme for Color Images," Pattern Recognition, Vol. 42, No. 5, pp. 920-940, 2009.
20 B.H. Jeon, S.H. Shin, K.H. Jung, J.H. Lee and K.Y. Yoo, "Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images," Journal of the Korea Multimedia Society, Vol. 18, No. 11, pp. 1332- 1341, 2015.   DOI