Steganography Using Sudoku Puzzle

@article{Shetty2009SteganographyUS,
  title={Steganography Using Sudoku Puzzle},
  author={B. R. Roshan Shetty and J. Rohith and V. Mukund and Rohan Honwade and Shanta Rangaswamy},
  journal={2009 International Conference on Advances in Recent Technologies in Communication and Computing},
  year={2009},
  pages={623-626}
}
  • B. R. Shetty, J. Rohith, S. Rangaswamy
  • Published 27 October 2009
  • Computer Science
  • 2009 International Conference on Advances in Recent Technologies in Communication and Computing
Steganography is the art of concealing the existence of information within seemingly harmless carriers. It is a method similar to covert channels, spread spectrum communication and invisible inks which adds another step in security. A message in cipher text may arouse suspicion while an invisible message will not. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. In this paper, we propose a… 

Figures from this paper

Steganography using Hexa Sudoku Puzzle in Color Images

TLDR
A 16×16 Sudoku which has a 64×64 reference matrix instead of 256×256 matrix as proposed in the previous method and base 16 system for the representation of the secret message is used.

Improving Image Data Hiding Capacity Scheme using Sudoku Puzzle in Color Images

TLDR
Experimental results show that the proposed scheme can improve the visual quality of stego-images and provide a large capacity for embedded secret data, and the method shows the positive results to resist against the visual attacks.

A novel steganographic scheme using Sudoku

  • A. K. MajiR. PalS. Roy
  • Computer Science
    2013 International Conference on Electrical Information and Communication Technology (EICT)
  • 2014
TLDR
A Steganographic scheme using Sudoku puzzle so that nobody could be able to modify the cover image during transmission as well as the message is embedded using a Sudoku reference matrix.

A NEW STEGANOGRAPHIC APPROACH USING SUDOKU WITH DIGITAL SIGNATURE

TLDR
A new approach on steganography using Sudoku puzzle with digital signature for providing authentication, integrity as well as non-repudiation is proposed.

Image Steganography using Sudoku Puzzle for Secured Data Transmission

TLDR
The revised version of Roshan Shetty B R et al.'s Image Steganography using RED, GREEN & BLUE components of cover image pixel and reference matrix of order 9 x 9 with embedding capacity 4.5 bits per pixel is proposed.

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)

TLDR
The main goal of Steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data.

Steganography using local colour statistics

TLDR
The new steganography method based on the local colour statistics for edge definition in image is proposed, which opens a complete new perspective of the world, parallel to the existing one, where hidden messages create the world of their own.

Image Steganography Using Ken Ken Puzzle for Secure Data Hiding

TLDR
The proposed data hiding scheme based on Ken Ken puzzle is proposed and has been found to enhance the graphical quality of the resulting stego-image when compared to the existing system.

AN EFFICIENT DATA HIDING USING HEXADECIMAL SUDOKU FOR STEGANOGRAPHY

TLDR
An improved data hiding steganographic scheme using Sudoku puzzle, which can be utilize to identify least distortion pixel value of selected pixel from the digital image with respect to secret digit is proposed.

An Information Hiding Scheme Using Magic Squares

TLDR
A data hiding scheme has been proposed to efficiently hide the data at the LSBs of a host image by transposition and substitution to disarrange and replace the data stream.

References

SHOWING 1-6 OF 6 REFERENCES

An Information Hiding Scheme Using Sudoku

TLDR
The proposed method is inspired from Zhang and Wang's method and Sudoku solutions and a selected Sudoku solution is used to guide cover pixels' modification in order to imply secret data.

Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation

TLDR
A reversible embedding scheme for VQ-compressed images that is based on side matching and relocation that achieves reversibility without using the location map is proposed.

High Capacity Data Hiding for Grayscale Images

TLDR
The experimental results show that the proposed method can be used to embed two secret bits into one cover pixel with the imperceptible image distortion and indeed outperforms all others in terms of embedding capacity.

Digital watermarking based on chaotic map and reference register

Mathematics of Sudoku I

In an earlier article [1] of Bertram Felgenhauer and the second author, the number of different Sudoku grids was computed to be N0 = 6670903752021072936960 ≈ 6.671 × 10 . However, distinct solutions

Mathematics of Sudoku I, Mathematical Spectrum

  • Mathematics of Sudoku I, Mathematical Spectrum
  • 2006