An algorithm for generating only desired permutations for solving Sudoku puzzle

AK Maji, S Jana, RK Pal - Procedia Technology, 2013 - Elsevier
Abstract 'Sudoku'is the Japanese abbreviation of a longer phrase,'Suuji wa dokushin ni
kagiru', meaning 'the digits must remain single'. It is a challenging numeric puzzle that trains …

Anti-cropping digital image watermarking using Sudoku

SKA Khalid, MM Deris… - International Journal of …, 2013 - inderscienceonline.com
Many digital image watermarking schemes have been developed to embed copyright
information into an image. However, an attacker may reuse parts of a watermarked image by …

Combinatorial Cryptography and Latin Squares

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we
take look at some historical applications of non-combinatorial squares and cubes in …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

A novel search tree-based 3d sudoku solver

S Jana, M Mallik, AK Maji, RK Pal - Proceedings of the International …, 2021 - Springer
Sudoku matrix is a unique Latin square-based mathematical structure, which may have
several dimensions like 2D, 3D, etc. This structure has several applications in different …

Design and Analysis of a Modified 3D Sudoku Solver

S Jana, M Mallik, A Khan, AK Maji, RK Pal - IEEE Access, 2023 - ieeexplore.ieee.org
Sudoku is a complicated multidimensional mathematical structure with several applications
in various computer science domains. 3D Sudoku, compared to 2D, has one more …

[PDF][PDF] A robust digital image watermarking against salt and pepper using sudoku

SKA Khalid, MM Deris, KM Mohamad - The Second International …, 2013 - academia.edu
Copyright information embedded in a digital data may disappear or become undetectable
due to additive noise accidentally or deliberately introduced to a watermarked image …

[PDF][PDF] نهان‌نگاری تصویر دیجیتال مقاوم در برابر برش با استفاده از جدول سودوکو در حوزه مکان و تبدیلات

شادی صانعی, شادی, نقش - روش‌های هوشمند در صنعت برق, 2016‎ - research.iaun.ac.ir
With rapid development of digital technology, protecting information such as copyright,
content ownership confirmation has become more important. In image watermarking …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

A systematic redundancy approach in watermarking using Sudoku

SKA Khalid, MM Deris… - … Conference on IT …, 2014 - ieeexplore.ieee.org
Digital watermarking is one of the most important techniques employed to protect digital
contents. Copyright information embedded in the digital contents may become undetectable …