Open Access Open Access  Restricted Access Subscription Access

Image Steganography Using Ken Ken Puzzle for Secure Data Hiding


Affiliations
1 SASTRA University, India
 

In image steganography, a number of data hiding schemes have been proposed and data has been hidden using them. Among these, the usage of mind-teasers and puzzles like Sudoku has also been used as schemes to hide data. In this paper, the territory of puzzle usage as data hiding scheme in image steganography is extended. A novel data hiding scheme based on Ken Ken puzzle is proposed. Though the Ken Ken puzzle is similar to the existing Sudoku technique of data hiding, the inherent difficulty involved in solving a Ken Ken puzzle is leveraged in this method and the final results after embedding data are then analyzed in terms of the visual quality of the stego-image obtained. This is done by means of certain quality metrics available to test the resulting image quality. The proposed system has been found to enhance the graphical quality of the resulting stego-image when compared to the existing system.

Keywords

Data Hiding Scheme, Data Security, Image Steganography, Puzzle-based Steganography
User

Abstract Views: 234

PDF Views: 0




  • Image Steganography Using Ken Ken Puzzle for Secure Data Hiding

Abstract Views: 234  |  PDF Views: 0

Authors

G. Vidya
SASTRA University, India
R. Hema Preetha
SASTRA University, India
G. S. Shilpa
SASTRA University, India
V. Kalpana
SASTRA University, India

Abstract


In image steganography, a number of data hiding schemes have been proposed and data has been hidden using them. Among these, the usage of mind-teasers and puzzles like Sudoku has also been used as schemes to hide data. In this paper, the territory of puzzle usage as data hiding scheme in image steganography is extended. A novel data hiding scheme based on Ken Ken puzzle is proposed. Though the Ken Ken puzzle is similar to the existing Sudoku technique of data hiding, the inherent difficulty involved in solving a Ken Ken puzzle is leveraged in this method and the final results after embedding data are then analyzed in terms of the visual quality of the stego-image obtained. This is done by means of certain quality metrics available to test the resulting image quality. The proposed system has been found to enhance the graphical quality of the resulting stego-image when compared to the existing system.

Keywords


Data Hiding Scheme, Data Security, Image Steganography, Puzzle-based Steganography



DOI: https://doi.org/10.17485/ijst%2F2014%2Fv7i9%2F59483