Sound Steganography using Shamir Secret Sharing Scheme

被引:0
|
作者
Kacamak, Salajdin [1 ]
Uka, Arban [1 ]
机构
[1] Epoka Univ, Dept Comp Engn, Tirana, Albania
关键词
Shamir Secret Sharing; steganography; water-marking; encryption; IMAGE; PROTECTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Transmitting information in a secure way is now both a challenge in everyday life and a beautiful area for research. The type of information may intended to hide may include sensitive information of institutions or private health information of ordinary people. Several algorithms and combination of algorithms have been proposed and tested. Here in this work we propose to hide an image in several other images after it is separated in pieces and then reconstruct it in a similar way to the Shamir secret sharing scheme. We will do this in to steps: firstly, by attaching n chunks of the image into n other images; and secondly, these combined images will be embedded to n different audio files. Any random collection of k (k<n) audio files will be used to reconstruct the original image.
引用
收藏
页码:217 / 220
页数:4
相关论文
共 50 条
  • [1] Securing graph steganography by using Shamir's secret sharing
    Sari, A. N.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [2] A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT Domain
    Onuma, Kaito
    Miyata, Sumiko
    [J]. 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 255 - 260
  • [3] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [4] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249
  • [5] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [6] Hierarchical Visual Secret Sharing Scheme Using Steganography
    Jana, Biswapati
    Samanta, Amita
    Giri, Debasis
    [J]. MATHEMATICS AND COMPUTING, 2015, 139 : 363 - 389
  • [7] A Modified Shamir Secret Sharing Scheme With Efficient Encoding
    Hineman, Allyson
    Blaum, Mario
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (04) : 758 - 762
  • [8] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [9] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [10] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200