scispace - formally typeset
Search or ask a question
Book ChapterDOI

A Novel Image Steganographic Scheme Using \(8 \times 8\) Sudoku Puzzle

TL;DR: This work has proposed an Image Steganographic Scheme using \(8{ \times }8\) Sudoku puzzle for secure data transmission and the originality of the work is that if any intruder changes any part of the secret message, then the proposed algorithm will be able to detect it.
Abstract: The word steganography has originated from two Greek words, namely, stegos and grahia meaning cover and writing, respectively. The concept behind steganography is that the transmitted message should be indiscernible to the regular eye. It is the art of concealing information within a medium. The main aim of steganography is to protect this concealed information. A message transmitted using a cipher text may incite suspicion, but an invisible message will not. Digital images constitute a flexible medium for carrying secret messages because slight modifications done to a cover image is hard to be distinguished by the human eyes. In this work, we have proposed an Image Steganographic Scheme using \(8{ \times }8\) Sudoku puzzle for secure data transmission. The originality of the work is that if any intruder changes any part of the secret message, then the proposed algorithm will be able to detect it.
Citations
More filters
Journal ArticleDOI
TL;DR: This proposed work combines both cryptographic and steganographic technique and Sudoku puzzle to enhance the security in maximum level with optimal computational complexity and good embedding capacity rate.
Abstract: Video steganography is the method of hiding the presence of data within the cover video. In this paper, a novel video steganography technique is revealed, where with the help of Sudoku puzzle of order 9 × 9, extracted image frames of a cover video are utilized to hide encrypted data. The novelties of the work imply that as the input information is first encrypted into cipher text using a new modified substitution and permutation network (SPN)-type block cipher, then, that cipher text is embedded in the video using Sudoku puzzle as a key. This new and robust encryption model is like a block cipher in comparison with Advanced Encryption Standard (AES) that provides enhanced resistance in case of fault attack. This new SPN-type architecture differs with AES architecture in the step of round key mixing function. Its computation complexity is much higher compared to original AES to find 128 bits of tenth round key. Therefore, our proposed work combines both cryptographic and steganographic technique and Sudoku puzzle to enhance the security in maximum level with optimal computational complexity and good embedding capacity rate.

4 citations

Book ChapterDOI
19 Jan 2018
TL;DR: In this work, a secured Video Steganographic scheme is proposed using Sudoku puzzle to enhance the security in maximum level with maintained computational complexity.
Abstract: Video Steganography is a method for securing data in a video file and hence it prevents the chance of theft. The proposed scheme uses the Video Steganography technique on the encrypted data (using RSA and AES) for providing maximum security and stability. In this work, a secured Video Steganographic scheme is proposed using Sudoku puzzle. The novelties of the work imply that nobody could be able to see as well as modify data during transmission as the secret message is first encrypted into cipher text twice using RSA and AES cryptographic technique then that cipher text is embedded in video using a Sudoku reference matrix. So, our proposed work combines both Cryptographic and Steganographic technique to enhance the security in maximum level with maintained computational complexity.
References
More filters
Journal ArticleDOI
TL;DR: The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.
Abstract: Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the raw data before embedding it in the image. Though the encryption process increases the time complexity, but at the same time provides higher security also. This paper uses two popular techniques Rivest, Shamir, Adleman (RSA) algorithm and Diffie Hellman algorithm to encrypt the data. The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.

134 citations

Proceedings ArticleDOI
18 Jun 2008
TL;DR: The proposed method is inspired from Zhang and Wang's method and Sudoku solutions and a selected Sudoku solution is used to guide cover pixels' modification in order to imply secret data.
Abstract: Steganography is the science of secret message delivery using cover media. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Zhang and Wang's method and Sudoku solutions. A selected Sudoku solution is used to guide cover pixels' modification in order to imply secret data. Because the number of possible Sudoku solutions is very large, the proposed method is more secure than Mielikainen's method and Zhang and Wang's method. From the experimental results, the visual quality of stego images produced by the proposed method is higher than 44 dB in average, which is slightly less than that of related works; however, the embedding capacity of the proposed method is 1.5 bit per pixel, which is greater than that of the related works.

132 citations

Journal Article
TL;DR: This paper critically analyzed various steganographic techniques and also has covered steganography overview its major types, classification, applications.
Abstract: Abspract Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stegoimage (generated image which is carrying a hidden message). In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.

126 citations

Journal ArticleDOI
01 Apr 2013
TL;DR: The analysis intends to identify a best mutation technique for every benchmark problem and to understand the dependency behaviour of mutation techniques with other genetic algorithm parameters such as population sizes, crossover rates and number of generations.
Abstract: In this paper, a systematic comparative analysis is presented on various static and adaptive mutation techniques to understand their nature on genetic algorithm. Three most popular random mutation techniques such as uniform mutation, Gaussian mutation and boundary mutation, two recently introduced individual adaptive mutation techniques, a self-adaptive mutation technique and a deterministic mutation technique are taken to carry out the analysis. A common experimental bench of benchmark test functions is used to test the techniques and the results are analysed. The analysis intends to identify a best mutation technique for every benchmark problem and to understand the dependency behaviour of mutation techniques with other genetic algorithm parameters such as population sizes, crossover rates and number of generations. Based on the analytical results, interesting findings are obtained that would improve the performance of genetic algorithm.

126 citations

Journal ArticleDOI
TL;DR: This paper proposes an improved algorithm for increasing the embedding capacity and preserving the ''perfect'' property of the stego maze and select maze games as carrier media to conceal secret data.

16 citations