Fingerprinted secret sharing steganography for robustness against image cropping attacks
Access Status
Authors
Date
2005Type
Metadata
Show full item recordCitation
Source Title
Source Conference
Faculty
School
Remarks
Copyright 2005 IEEE
Reprinted from:
2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005
IEEE Catalog Number ISBN 05EX1057
ISBN 0-7803-9094-6
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to
pubs-permissions@ieee.org.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Collection
Abstract
Steganography is the art and science of hiding information. In this paper we propose a conceptual framework for Fingerprinted Secret Sharing Steganography. We offer a technique to break the main secret into multiple parts and hide them individually in a cover medium. We use a novel technique to compress the data to a considerable extent. We use the Lagrange Interpolating Polynomial method to recover the shared secret. We also show how the proposed technique can offer robust mechanism to protect data loss because of image cropping. We use the (k,n) threshold scheme to decide the minimum number of parts required to recover the secret data completely. The security of our scheme is based on the security principle of steganography and secret sharing scheme.
Related items
Showing items related by title, author, creator and subject.
-
Potdar, Vidyasagar; Han, Song; Chang, Elizabeth (2005)Watermarking, which belong to the information hiding field, has seen a lot of research interest recently. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret ...
-
Tian, Biming; Han, Song; Dillon, Tharam S.; Das, S. (2008)An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function ...
-
White, Hollie ; Willis, Craig; Greenberg, Jane (2012)The proliferation of discipline-specific metadata schemes contributes to artificial barriers that can impede interdisciplinary and transdisciplinary research. The authors considered this problem by examining the domains, ...