The Community for Technology Leaders
2010 International Conference on Broadband, Wireless Computing, Communication and Applications (2010)
Fukuoka, Fukuoka Prefecture Japan
Nov. 4, 2010 to Nov. 6, 2010
ISBN: 978-0-7695-4236-2
pp: 556-560
ABSTRACT
In this paper, a data hiding scheme has been proposed to efficiently hide the data at the LSBs of a host image. Two operations used in the encryption and decryption processes, transposition and substitution, are performed to disarrange and replace the data stream. First, data are exchanged by the transposition square which is reordered by a sequential of magic squares. The secret data are replaced by matching, encoding and substituting from a constructed table. The hidden data are embedded into the LSBs of the host images. The stego images with embedded data are imperceptible. The needed parameters formed a private key are encrypted and sent to the receiver by the RSA method in the Internet. Moreover, if any one of them is incorrect, it is very difficult to find the correct texts. The averaged error hamming distances are near to 50% of the host image size. These results are the same with those by guessing.
INDEX TERMS
steganography, transposition, substitution, secret sharing, sudoku puzzle
CITATION

C. Han, M. Wen and S. Huang, "An Information Hiding Scheme Using Magic Squares," 2010 International Conference on Broadband, Wireless Computing, Communication and Applications(BWCCA), Fukuoka, Fukuoka Prefecture Japan, 2010, pp. 556-560.
doi:10.1109/BWCCA.2010.131
94 ms
(Ver 3.3 (11022016))