DOI QR코드

DOI QR Code

A Reversible Data Hiding Scheme Using 7×7 Sudoku Based on Secret Sharing

비밀 공유 기반의 7×7 스도쿠를 사용한 가역 정보 은닉 기법

  • Kim, Young-Ju (Dept. of Computer Science & Engineering, Graduate School, Kyungpook National University) ;
  • Kim, Pyung-Han (Dept. of Computer Science & Engineering, Graduate School, Kyungpook National University) ;
  • Yoo, Kee-Young (School of Computer Science & Engineering, Kyungpook National University)
  • Received : 2017.01.16
  • Accepted : 2017.01.19
  • Published : 2017.02.28

Abstract

Data hiding is a way to hide the information in multimedia media such as images or video. The scheme proposed by Nguyen and Chang, was able to embed, extract, and restore the cover image and the secret data using Sudoku. But in the extracting phase, the occurrence of duplicate values in the reference matrix was found to decrease the embedding capacity of secret data. This paper has proposed a reversible data hiding scheme while maintaining the quality of the image to provide high embedding capacity using $7{\times}7$ Sudoku and Shamir's secret sharing scheme.

Keywords

References

  1. S. Wang, Z. Cao, M.A. Strangio, and L. Wang, "Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol," IEEE Communications Letters, Vol. 12, No. 2, pp. 149-151, 2008. https://doi.org/10.1109/LCOMM.2008.071307
  2. C.W. Leung, F.Y. Ng, and D.S. Wong, "On the Security of a Visual Cryptography Scheme for Color Images," Pattern Recognition, Vol. 42, No. 5, pp. 920-940, 2009.
  3. B.H. Jeon, S.H. Shin, K.H. Jung, J.H. Lee and K.Y. Yoo, "Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images," Journal of the Korea Multimedia Society, Vol. 18, No. 11, pp. 1332- 1341, 2015. https://doi.org/10.9717/kmms.2015.18.11.1332
  4. J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp. 890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
  5. D.M. Thodi and J.J. Rodriguez, "Expansion Embedding Techniques for Reversible Watermarking," IEEE Transactions on Image Processing, Vol. 16, No. 3, pp. 721-730, 2007. https://doi.org/10.1109/TIP.2006.891046
  6. Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
  7. K.S. Kim, M.J. Lee, and H.K. Lee, "Reversible Data Hiding Exploiting Spatial Correlation Between Sub-sampled Images," Communications in Nonlinear Science and Numerical Simulation, Vol. 42, No. 11, pp. 3083-3096, 2009.
  8. J.Y. Byun, P.H. Kim, J.H. Lee, K.H. Jung and K.Y. Yoo, "Data Hiding Using Pixel-Value Modular Operation," Journal of the Korea Multimedia Society, Vol. 18, No. 4, pp. 483-491, 2015. https://doi.org/10.9717/kmms.2015.18.4.483
  9. J.H. Lee, K.H. Jung and K.Y. Yoo, "Hybrid Information Hiding Method Based on the Characteristics of Military Images on Naval Combat System," Journal of the Korea Multimedia Society, Vol. 19, No. 9, pp. 1669- 1678, 2016. https://doi.org/10.9717/kmms.2016.19.9.1669
  10. T.S. Nguyen and C.C. Chang, "A Reversible Data Hiding Scheme Based on the Sudoku Technique," Displays, Vol. 39, pp. 109-116, 2015. https://doi.org/10.1016/j.displa.2015.10.003
  11. A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
  12. G.R. Blakley, "Safeguarding Cryptographic Keys," Proceedings of the National Computer Conference, Vol. 48, pp. 313-317, 1979.
  13. K.H. Jung and K.Y. Yoo, "Data Hiding Method Using Image Interpolation," Computer Standards and Interfaces, Vol. 31, No. 2, pp. 465-470, 2009. https://doi.org/10.1016/j.csi.2008.06.001
  14. X. Wu and W. Sun, "High-capacity Reversible Data Hiding in Encrypted Images by Prediction Error," Signal Processing, Vol. 104, pp. 387-400, 2014. https://doi.org/10.1016/j.sigpro.2014.04.032
  15. D.C. Wu and W.H. Tsai, "A Steganographic Method for Images by Pixel-value Differencing," Pattern Recognition Letters, Vol. 24, No. 9-10, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  16. C.M. Wang, N.I. Wu, C.S. Tsai, and M.S. Hwang, "A High Quality Steganographic Method with Pixel-value Differencing and Modulus Function," Systems and Software, Vol. 81, No. 1, pp. 150-158, 2008. https://doi.org/10.1016/j.jss.2007.01.049
  17. A. Abdulfetah, X. Sun, and H. Yang, "Quantization Based Robust Image Watermarking in DCT-SVD Domain," Information Technology, Vol. 1, No. 3, pp. 107-114, 2009. https://doi.org/10.5507/jtie.2009.020
  18. A. Sverdlov, S. Dexter, and A.M. Eskicioglu, "Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies," Proceedings of Image Proceedings 2000, Vol. 1, pp. 454-457, 2000.
  19. E. Yavuz and T. Ziya, "Improved SVD-DWT Based Digital Image Watermarking against Watermark Ambiguity," Proceedings of the 2007 ACM Symposium on Applied Computing, pp. 1051-1055, 2007.
  20. J. Mei, S. Li, and X. Tan, "A Digital Watermarking Algorithm Based on DCT and DWT," Proceedings of the 2009 International Symposium on Web Information Systems and Applications, pp. 104-107, 2009.