2012
DOI: 10.5120/7443-0460
|View full text |Cite
|
Sign up to set email alerts
|

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Here, we consider the efficiency of a data hiding scheme to be based on two main factors, those are embedding capacity of the cover image and quality of its stego image [15,18,29]. Our schemes are the near optimal data hiding scheme (2,9,8) for gray and palette images with q color = 3, and the optimal data hiding scheme (1, 2 1, ) n n − for palette images with q color = 1.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Here, we consider the efficiency of a data hiding scheme to be based on two main factors, those are embedding capacity of the cover image and quality of its stego image [15,18,29]. Our schemes are the near optimal data hiding scheme (2,9,8) for gray and palette images with q color = 3, and the optimal data hiding scheme (1, 2 1, ) n n − for palette images with q color = 1.…”
Section: Resultsmentioning
confidence: 99%
“…Conversely, quality of stego image is low. In general, for the digital image, PSNR is defined by the following formula [8,15]…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Sudoku puzzles are generated by removing some elements from the sudoku matrix but keeping some hints for a unique solution [19]. The central idea of the Sudoku solution is to change the pixel pairs selected in the cover signal using an index matrix [20].…”
Section: Sudoku Puzzlesmentioning
confidence: 99%