Abstract
At present, the Sudoku matrix, turtle shell matrix, and octagonal matrix have been put forward according to the magic matrix-based data hiding methods. Moreover, the magic matrices to be designed depend on the size of the embedding capacity. In addition, by determining the classification of points of pixel pairs after applying a magic matrix and by determining the traversal area, the average peak signal-to-noise ratio (PSNR) can be improved. Therefore, this topic intends to propose a data hiding method based on a 16 × 16 Sudoku matrix by using the 16 × 16 Sudoku matrix and extending it to a double-layer magic matrix. Low-cost data embedding methods are also studied, in order to improve the PSNR and maintain good image quality with the same embedding capacity.
Highlights
The development and popularization of Internet technology make the exchange and dissemination of information easy and allows people to get information from all over the world by just clicking a button
In order to design a more efficient data hiding scheme, this paper studies a large number of data hiding schemes and related knowledge, proposes two image data hiding algorithms based on blocks with higher embedding capacity [23,24,25,26]
The contrast mainly depends on the color difference, degree of difference, and other details of images to check traces of data embedding
Summary
The development and popularization of Internet technology make the exchange and dissemination of information easy and allows people to get information from all over the world by just clicking a button. It is a common phenomenon that the information and privacy of individuals, companies, and governments are leaked. The Internet provides a public and convenient channel for exchanging information; the security becomes a critical issue on the Internet. The steganography technology provides practical solutions for exchanging secret message on the Internet. Information hiding technology play an increasingly more important role in government, military intelligence, financial systems, and the area of medical and health. It is widely used in secret communications, digital copyright protection, e-commerce security, data integrity, reliability validation, and so on [1,2]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have