Fingerprinted secret sharing steganography for robustness against image cropping attacks
MetadataShow full item record
Copyright 2005 IEEE
2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005
IEEE Catalog Number ISBN 05EX1057
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Steganography is the art and science of hiding information. In this paper we propose a conceptual framework for Fingerprinted Secret Sharing Steganography. We offer a technique to break the main secret into multiple parts and hide them individually in a cover medium. We use a novel technique to compress the data to a considerable extent. We use the Lagrange Interpolating Polynomial method to recover the shared secret. We also show how the proposed technique can offer robust mechanism to protect data loss because of image cropping. We use the (k,n) threshold scheme to decide the minimum number of parts required to recover the secret data completely. The security of our scheme is based on the security principle of steganography and secret sharing scheme.
Showing items related by title, author, creator and subject.
Potdar, Vidyasagar; Han, Song; Chang, Elizabeth (2005)Watermarking, which belong to the information hiding field, has seen a lot of research interest recently. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret ...
Tian, Biming; Han, Song; Dillon, Tharam S.; Das, S. (2008)An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function ...
White, Hollie ; Willis, Craig; Greenberg, Jane (2012)The proliferation of discipline-specific metadata schemes contributes to artificial barriers that can impede interdisciplinary and transdisciplinary research. The authors considered this problem by examining the domains, ...