An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu
<p>Turtle shell reference matrix.</p> "> Figure 2
<p>Location table T.</p> "> Figure 3
<p>Four locations of elements in M.</p> "> Figure 4
<p>Mini-SuDoKu reference matrix.</p> "> Figure 5
<p>Candidates of embedding for different combinations of <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mn>2</mn> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>B</mi> <mn>3</mn> </msub> </mrow> </semantics></math>.</p> "> Figure 6
<p>Architecture of cubic matrix.</p> "> Figure 7
<p>Illustration of incremental value <math display="inline"><semantics> <mo>Δ</mo> </semantics></math> for different situations.</p> "> Figure 8
<p>Locating the basic structure for embedding by combining ranges of three axes.</p> "> Figure 9
<p>Examples of data hiding with cubic mini-SuDoKu matrix (CMSM). (<b>a</b>) Hide <math display="inline"><semantics> <mrow> <msub> <mrow> <mrow> <mo>(</mo> <mrow> <mn>001010</mn> </mrow> <mo>)</mo> </mrow> </mrow> <mn>2</mn> </msub> </mrow> </semantics></math> into cover triplet <math display="inline"><semantics> <mrow> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>; (<b>b</b>) Hide <math display="inline"><semantics> <mrow> <msub> <mrow> <mrow> <mo>(</mo> <mrow> <mn>101010</mn> </mrow> <mo>)</mo> </mrow> </mrow> <mn>2</mn> </msub> </mrow> </semantics></math> into cover triplet <math display="inline"><semantics> <mrow> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>; (<b>c</b>) Hide <math display="inline"><semantics> <mrow> <msub> <mrow> <mrow> <mo>(</mo> <mrow> <mn>000000</mn> </mrow> <mo>)</mo> </mrow> </mrow> <mn>2</mn> </msub> </mrow> </semantics></math> into cover triplet <math display="inline"><semantics> <mrow> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p> "> Figure 9 Cont.
<p>Examples of data hiding with cubic mini-SuDoKu matrix (CMSM). (<b>a</b>) Hide <math display="inline"><semantics> <mrow> <msub> <mrow> <mrow> <mo>(</mo> <mrow> <mn>001010</mn> </mrow> <mo>)</mo> </mrow> </mrow> <mn>2</mn> </msub> </mrow> </semantics></math> into cover triplet <math display="inline"><semantics> <mrow> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>,</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>; (<b>b</b>) Hide <math display="inline"><semantics> <mrow> <msub> <mrow> <mrow> <mo>(</mo> <mrow> <mn>101010</mn> </mrow> <mo>)</mo> </mrow> </mrow> <mn>2</mn> </msub> </mrow> </semantics></math> into cover triplet <math display="inline"><semantics> <mrow> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>,</mo> <mn>3</mn> <mo>,</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>; (<b>c</b>) Hide <math display="inline"><semantics> <mrow> <msub> <mrow> <mrow> <mo>(</mo> <mrow> <mn>000000</mn> </mrow> <mo>)</mo> </mrow> </mrow> <mn>2</mn> </msub> </mrow> </semantics></math> into cover triplet <math display="inline"><semantics> <mrow> <mrow> <mo>(</mo> <mrow> <mn>1</mn> <mo>,</mo> <mn>5</mn> <mo>,</mo> <mn>2</mn> </mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p> "> Figure 10
<p>Twelve cover images with size 512 × 512: (<b>a</b>) Lena; (<b>b</b>) peppers; (<b>c</b>) airplane; (<b>d</b>) baboon; (<b>e</b>) boat; (<b>f</b>) Elaine; (<b>g</b>) Gledhill; (<b>h</b>) sailboat; (<b>i</b>) baboon (RGB); (<b>j</b>) Lena (RGB); (<b>k</b>) peppers (RGB); and (<b>l</b>) Tiffany (RGB).</p> "> Figure 11
<p>Twelve stego images with size 512 × 512: (<b>a</b>) Lena; (<b>b</b>) peppers; (<b>c</b>) airplane; (<b>d</b>) baboon; (<b>e</b>) boat; (<b>f</b>) Elaine; (<b>g</b>) Gledhill; (<b>h</b>) sailboat; (<b>i</b>) baboon (RGB); (<b>j</b>) Lena (RGB); (<b>k</b>) peppers (RGB); and (<b>l</b>) Tiffany (RGB).</p> ">
Abstract
:1. Introduction
2. Related Work
2.1. Turtle Shell Matrix Data Hiding
2.2. Mini SuDoKu Matrix-Based Data Hiding
3. The Proposed Scheme
3.1. Cubic Mini-SuDoKu Matrix (CMSM)
3.1.1. Construction of the Cubic Mini-SuDoKu Matrix
3.1.2. Secret Data Embedding
3.1.3. Secret Data Extraction
3.2. N-Dimensional MSM (NMSM)
3.2.1. The Data-Embedding and Extraction Algorithm
3.2.2. Fast Algorithm for the Inner Layer of Embedding
4. Experimental Results
4.1. EC and PSNR Comparison
4.2. Time Efficiency Comparison
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
Appendix A
Appendix B
Appendix C
References
- Matsui, M. Linear cryptanalysis scheme for DES cipher. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1993; pp. 386–397. [Google Scholar]
- Rivest, R.; Shamir, A.; Adleman, L. A scheme for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Ullah, S.; Marcenaro, L.; Rinner, B. Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications. Sensors 2019, 19, 327. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Li, Y.; Tu, Y.; Lu, J.; Wang, Y. A security transmission and storage solution about sensing image for blockchain in the Internet of Things. Sensors 2020, 20, 916. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ker, A. Improved detection of LSB steganography in grayscale images. In International Workshop on Information Hiding; Springer: Berlin/Heidelberg, Germany, 2004; Volume 3200, pp. 97–115. [Google Scholar]
- Qin, C.; Chang, C.; Huang, Y. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 2012, 23, 1109–1118. [Google Scholar] [CrossRef]
- Chang, C.; Lin, C.; Tseng, C.; Tai, W. Reversible hiding in DCT-based compressed images. Inf. Sci. 2007, 177, 2768–2786. [Google Scholar] [CrossRef]
- Huang, F.; Qu, X.; Kim, H.; Huang, J. Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 2016, 26, 1610–1621. [Google Scholar] [CrossRef]
- Chang, C.; Kieu, T.; Wu, W. A loss-less data embedding technique by joint neighboring coding. Pattern Recog. 2009, 42, 1597–1603. [Google Scholar] [CrossRef]
- Hu, Y. High capacity image hiding scheme based on vector quantization. Pattern Recogn. 2006, 39, 1715–1724. [Google Scholar] [CrossRef]
- Lin, Y.; Hsia, C.; Chen, B.; Chen, Y. Visual IoT security: Data hiding in AMBTC images using block-wise embedding strategy. Sensors 2019, 19, 1974. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Chang, C.; Wang, X.; Horng, J. A hybrid data hiding method for strict AMBTC format images with high-fidelity. Symmetry 2019, 11, 1314. [Google Scholar] [CrossRef] [Green Version]
- Bender, W.; Gruhl, D.; Morimoto, N.; Lu, A. Techniques for data hiding. IBM Syst. J. 1996, 35, 313–336. [Google Scholar] [CrossRef]
- Kim, H.; Kim, C.; Choi, Y.; Wang, S.; Zhang, X. Improved modification direction schemes. Comput. Math. Appl. 2010, 60, 319–325. [Google Scholar] [CrossRef] [Green Version]
- Mielikainen, J. LSB matching revisited. IEEE Signal Proc. Lett. 2006, 13, 285–287. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 2006, 10, 781–783. [Google Scholar] [CrossRef]
- Xie, X.; Liu, Y.; Chang, C. Extended squared magic matrix for embedding secret information with large payload. Multimed. Tools Appl. 2019, 78, 19045–19059. [Google Scholar] [CrossRef]
- Xia, B.; Wang, H.; Chang, C.; Liu, L. An image steganography scheme using 3D-Sudoku. J. Inf. Hiding Multimed. Signal Process. 2016, 7, 836–845. [Google Scholar]
- Lin, C.; Chang, C.; Lee, W.; Lin, J. A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. In Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, Japan, 12–14 September 2009; pp. 369–373. [Google Scholar]
- Chang, C.; Chou, Y.; Kieu, T. An Information Hiding Scheme Using Sudoku. In Proceedings of the 3rd International Conference on Innovative Computing Information and Control (ICICIC), Dalian, China, 18–20 June 2008; pp. 17–22. [Google Scholar]
- Hong, W.; Chen, T.; Shiu, C. A Minimal Euclidean Distance Searching Technique for Sudoku Steganography. In Proceedings of the International Symposium on Information Science and Engineering (ISISE2008), Shanghai, China, 20–22 December 2008; pp. 515–518. [Google Scholar]
- Chang, C.; Liu, Y.; Nguyen, T. A Novel Turtle Shell Based Scheme for Data Hiding. In Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), Kitakyushu, Japan, 27–29 August 2014; pp. 89–93. [Google Scholar]
- Liu, Y.; Chang, C.; Nguyen, T. High capacity turtle shell-based data hiding. IET Image Process. 2016, 10, 130–137. [Google Scholar] [CrossRef]
- Jin, Q.; Li, Z.; Chang, C.; Wang, A.; Liu, L. Minimizing turtle shell matrix based stego image distortion using particle swarm optimization. Netw. Secur. 2017, 19, 154–162. [Google Scholar]
- He, M.; Liu, Y.; Chang, C. A mini-Sudoku matrix-based data embedding scheme with high payload. IEEE Access 2019, 7, 141414–141425. [Google Scholar] [CrossRef]
Image | EC (bits) | PSNR (dB) | SSIM |
---|---|---|---|
Lena | 524,288 | 46.38 | 0.9918 |
Peppers | 524,288 | 46.37 | 0.9906 |
Airplane | 524,288 | 46.37 | 0.9883 |
Baboon | 524,288 | 46.36 | 0.9958 |
Boat | 524,288 | 46.37 | 0.9938 |
Elaine | 524,288 | 46.38 | 0.9919 |
Gledhill | 524,288 | 46.36 | 0.9936 |
Sailboat | 524,288 | 46.37 | 0.9929 |
Average | 524.288 | 46.37 | 0.9923 |
Image | EC (bits) | PSNR (dB) | SSIM |
---|---|---|---|
Baboon (RGB) | 1,572,864 | 46.36 | 0.9930 |
Lena (RGB) | 1,572,864 | 46.38 | 0.9926 |
Peppers (RGB) | 1,572,864 | 46.37 | 0.9908 |
Elaine (RGB) | 1,572,864 | 46.37 | 0.9916 |
Average (RGB) | 1,572,864 | 46.37 | 0.9920 |
Image | Jin et al. [24] | Liu et al. [23] | Xie et al. [17] | Proposed | ||||
---|---|---|---|---|---|---|---|---|
EC | PSNR | EC | PSNR | EC | PSNR | EC | PSNR | |
Lena | 524,288 | 45.57 | 524,288 | 45.55 | 524,288 | 41.87 | 524,288 | 46.38 |
Peppers | 524,288 | 45.56 | 524,288 | 45.54 | 524,288 | 41.86 | 524,288 | 46.37 |
Airplane | 524,288 | 45.56 | 524,288 | 45.58 | 524,288 | 41.87 | 524,288 | 46.37 |
Baboon | 524,288 | 45.57 | 524,288 | 45.55 | 524,288 | 41.86 | 524,288 | 46.36 |
Boat | 524,288 | 45.58 | 524,288 | 45.54 | 524,288 | 41.87 | 524,288 | 46.37 |
Elaine | 524,288 | 45.56 | 524,288 | 45.49 | 524,288 | 41.87 | 524,288 | 46.38 |
Gledhill | 524,288 | 45.49 | 524,288 | 45.49 | 524,288 | 41.87 | 524,288 | 46.36 |
Sailboat | 524,288 | 45.58 | 524,288 | 45.55 | 524,288 | 41.86 | 524,288 | 46.37 |
Average | 524,288 | 45.56 | 524,288 | 45.54 | 524,288 | 41.87 | 524,288 | 46.37 |
Image | Chang et al. [20] | Hong et al. [21] | Lin et al. [19] | Proposed | ||||
---|---|---|---|---|---|---|---|---|
EC | PSNR | EC | PSNR | EC | PSNR | EC | PSNR | |
Lena | 393,216 | 44.96 | 393,216 | 48.68 | 393,216 | 49.90 | 524,288 | 46.38 |
Peppers | 393,216 | 44.67 | 393,216 | 48.67 | 393,216 | 49.91 | 524,288 | 46.37 |
Airplane | 393,216 | 44.99 | 393,216 | 48.68 | 393,216 | 49.92 | 524,288 | 46.37 |
Baboon | 393,216 | 44.68 | 393,216 | 48.66 | 393,216 | .49.89 | 524,288 | 46.36 |
Boat | 393,216 | 44.90 | 393,216 | 48.67 | 393,216 | 49.91 | 524,288 | 46.37 |
Elaine | 393,216 | 44.92 | 393,216 | 48.68 | 393,216 | 49.91 | 524,288 | 46.38 |
Gledhill | 393,216 | 44.85 | 393,216 | 48.67 | 393,216 | 49.90 | 524,288 | 46.36 |
Sailboat | 393,216 | 44.67 | 393,216 | 48.67 | 393,216 | 49.90 | 524,288 | 46.37 |
Average | 393,216 | 44.83 | 393,216 | 48.67 | 393,216 | 49.90 | 524,288 | 46.37 |
Image | Xia et al. [18] | Proposed | ||
---|---|---|---|---|
EC | PSNR | EC | PSNR | |
Lena | 524,288 | 41.31 | 524,288 | 46.38 |
Peppers | 524,288 | 41.30 | 524,288 | 46.37 |
Airplane | 524,288 | 41.28 | 524,288 | 46.37 |
Baboon | 524,288 | 41.25 | 524,288 | 46.36 |
Boat | 524,288 | 41.23 | 524,288 | 46.37 |
Elaine | 524,288 | 41.26 | 524,288 | 46.38 |
Gledhill | 524,288 | 41.29 | 524,288 | 46.36 |
Sailboat | 524,288 | 41.27 | 524,288 | 46.37 |
Average | 524,288 | 41.27 | 524,288 | 46.37 |
Image | He et al. [25] | Proposed | ||||
---|---|---|---|---|---|---|
EC | PSNR | TC | EC | PSNR | TC | |
Lena | 524,288 | 46.37 | 2.71 s | 524,288 | 46.38 | 1.07 s |
Peppers | 524,288 | 46.37 | 2.72 s | 524,288 | 46.37 | 1.12 s |
Airplane | 524,288 | 46.37 | 2.70 s | 524,288 | 46.37 | 1.10 s |
Baboon | 524,288 | 46.36 | 2.73 s | 524,288 | 46.36 | 1.09 s |
Boat | 524,288 | 46.36 | 2.71 s | 524,288 | 46.37 | 1.11 s |
Elaine | 524,288 | 46.38 | 2.71 s | 524,288 | 46.38 | 1.12 s |
Gledhill | 524,288 | 46.37 | 2.72 s | 524,288 | 46.36 | 1.09 s |
Sailboat | 524,288 | 46.35 | 2.71 s | 524,288 | 46.37 | 1.12 s |
Average | 524,288 | 46.37 | 2.71 s | 524,288 | 46.37 | 1.10 s |
Image | Trad-2D | Trad-3D | Proposed-2D | Proposed-3D | Proposed-4D |
---|---|---|---|---|---|
Lena | 2.80 s | 4.48 s | 1.09 s | 1.07 s | 1.11 s |
Peppers | 2.81 s | 4.51 s | 1.11 s | 1.12 s | 1.13 s |
Airplane | 2.83 s | 4.52 s | 1.10 s | 1.10 s | 1.12 s |
Baboon | 2.82 s | 4.49 s | 1.11 s | 1.09 s | 1.11 s |
Boat | 2.75 s | 4.47 s | 1.10 s | 1.11 s | 1.12 s |
Elaine | 2.94 s | 4.54 s | 1.13 s | 1.12 s | 1.14 s |
Gledhill | 2.86 s | 4.54 s | 1.08 s | 1.09 s | 1.11 s |
Sailboat | 2.83 s | 4.49 s | 1.11 s | 1.13 s | 1.13 s |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Horng, J.-H.; Xu, S.; Chang, C.-C.; Chang, C.-C. An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors 2020, 20, 2739. https://doi.org/10.3390/s20092739
Horng J-H, Xu S, Chang C-C, Chang C-C. An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors. 2020; 20(9):2739. https://doi.org/10.3390/s20092739
Chicago/Turabian StyleHorng, Ji-Hwei, Shuying Xu, Ching-Chun Chang, and Chin-Chen Chang. 2020. "An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu" Sensors 20, no. 9: 2739. https://doi.org/10.3390/s20092739
APA StyleHorng, J.-H., Xu, S., Chang, C.-C., & Chang, C.-C. (2020). An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu. Sensors, 20(9), 2739. https://doi.org/10.3390/s20092739