We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Image Steganography using Sudoku Puzzle for Secured Data Transmission

by Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 17
Year of Publication: 2012
Authors: Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A
10.5120/7443-0460

Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A . Image Steganography using Sudoku Puzzle for Secured Data Transmission. International Journal of Computer Applications. 48, 17 ( June 2012), 31-35. DOI=10.5120/7443-0460

@article{ 10.5120/7443-0460,
author = { Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A },
title = { Image Steganography using Sudoku Puzzle for Secured Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 17 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number17/7443-0460/ },
doi = { 10.5120/7443-0460 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:21.784557+05:30
%A Sanmitra Ijeri
%A Shivananda Pujeri
%A Shrikant B
%A Usha B A
%T Image Steganography using Sudoku Puzzle for Secured Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 17
%P 31-35
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Image Steganography is the method of hiding the presence of data in cover images . Here we propose the revised version of Roshan Shetty B R et al. whose work was inspired by C. Chang et al. In earlier work only the RED & GREEN components of cover image pixel was used and reference matrix used was of order 27 x 27 and embedding capacity was 3 bits per pixel. In this paper we use RED, GREEN & BLUE components of cover image pixel and reference matrix of order 9 x 9. Hence, the embedding capacity is 4. 5 bits per pixel. Prior to embedding the data we use compression and encryption so that more and various digital media are securely embedded in cover image.

References
  1. C. -C. Chang, T. D. Kieu, and Y. -C. Chou. High capacity data hiding for gray scale images. In Proceedings of the First International Conference on Ubiquitous Information Management and Communication, pages 139–148. Seoul, Korea, February 2007.
  2. C. -C. Chang and C. -Y. Lin. Reversible steganography for vq- compressed images using side matching and relocation. IEEE Transactions on Information Forensics and Security, 1(4):493–501, 2006.
  3. Y. -T. Wu and F. Y. Shih. Digital watermarking based on chaotic map and reference register. Pattern Recognition, 40(12):3754–3763, December 2007.
  4. Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li A (2, 3) Threshold Secret Sharing Scheme Using Sudoku 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 978-0-7695-4222-5/10, 2010
  5. C. C. Chang, Y. C. Chou and T. D. Kieu, An Information Hiding Scheme Using Sudoku, Proceedings of the Third International Conference on Innovative Computing, Information and Control (ICICIC2008), June 2008.
  6. Wien Hong, Tung-Shou Chen, Chih-Wei Shiu, Steganography Using Sudoku Revisited Second International Symposium on Intelligent Information Technology Application 978-0-7695-3497-8/08, 2008
  7. Roshan Shetty B R, Rohith J, Mukund V, Rohan Honwade Steganography using Sudoku Puzzle, 2009 International Conference on Advances in Recent Technologies in Communication and Computing 978-0-7695-3845-7/09, 2009
Index Terms

Computer Science
Information Sciences

Keywords

Secret Data Reference Matrix Rgb Pixel Cover Image Stego Image