Abstract

At present, the Sudoku matrix, turtle shell matrix, and octagonal matrix have been put forward according to the magic matrix-based data hiding methods. Moreover, the magic matrices to be designed depend on the size of the embedding capacity. In addition, by determining the classification of points of pixel pairs after applying a magic matrix and by determining the traversal area, the average peak signal-to-noise ratio (PSNR) can be improved. Therefore, this topic intends to propose a data hiding method based on a 16 × 16 Sudoku matrix by using the 16 × 16 Sudoku matrix and extending it to a double-layer magic matrix. Low-cost data embedding methods are also studied, in order to improve the PSNR and maintain good image quality with the same embedding capacity.

Highlights

  • The development and popularization of Internet technology make the exchange and dissemination of information easy and allows people to get information from all over the world by just clicking a button

  • In order to design a more efficient data hiding scheme, this paper studies a large number of data hiding schemes and related knowledge, proposes two image data hiding algorithms based on blocks with higher embedding capacity [23,24,25,26]

  • The contrast mainly depends on the color difference, degree of difference, and other details of images to check traces of data embedding

Read more

Summary

Introduction

The development and popularization of Internet technology make the exchange and dissemination of information easy and allows people to get information from all over the world by just clicking a button. It is a common phenomenon that the information and privacy of individuals, companies, and governments are leaked. The Internet provides a public and convenient channel for exchanging information; the security becomes a critical issue on the Internet. The steganography technology provides practical solutions for exchanging secret message on the Internet. Information hiding technology play an increasingly more important role in government, military intelligence, financial systems, and the area of medical and health. It is widely used in secret communications, digital copyright protection, e-commerce security, data integrity, reliability validation, and so on [1,2]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call