A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT Domain

被引:1
|
作者
Onuma, Kaito [1 ]
Miyata, Sumiko [1 ]
机构
[1] Shibaura Inst Technol, Koto Ku, 3-7-5 Toyosu, Tokyo 1358548, Japan
关键词
Steganography; information hiding; Shamir's secret sharing scheme; spread spectrum method;
D O I
10.1109/ICOIN50884.2021.9333925
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir's secret sharing scheme using the spread spectrum method and analyze its basic characteristics.
引用
收藏
页码:255 / 260
页数:6
相关论文
共 50 条
  • [1] Sound Steganography using Shamir Secret Sharing Scheme
    Kacamak, Salajdin
    Uka, Arban
    [J]. 2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 217 - 220
  • [2] Securing graph steganography by using Shamir's secret sharing
    Sari, A. N.
    [J]. INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [3] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [4] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [5] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [6] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [7] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249
  • [8] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
  • [9] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [10] DCT-domain copyright protection scheme based on secret sharing technique
    Wang, Ming-Shi
    Chen, Wei-Che
    [J]. PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY AND ARTIFICIAL VISION (ISCGAV'-07), 2007, : 103 - +