Fingerprinted secret sharing steganography for robustness against image cropping attacks
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2017-01-30T13:56:37Z | |
dc.date.available | 2017-01-30T13:56:37Z | |
dc.date.created | 2008-11-12T23:21:41Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Potdar, Vidyasagar and Han, Song and Chang, Elizabeth. 2005. : Fingerprinted secret sharing steganography for robustness against image cropping attacks, in Dillon, T. and Yu, X. and Chan, E. (ed), INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Aug 10 2005, pp. 717-724. Perth, WA: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/36595 | |
dc.identifier.doi | 10.1109/INDIN.2005.1560463 | |
dc.description.abstract |
Steganography is the art and science of hiding information. In this paper we propose a conceptual framework for Fingerprinted Secret Sharing Steganography. We offer a technique to break the main secret into multiple parts and hide them individually in a cover medium. We use a novel technique to compress the data to a considerable extent. We use the Lagrange Interpolating Polynomial method to recover the shared secret. We also show how the proposed technique can offer robust mechanism to protect data loss because of image cropping. We use the (k,n) threshold scheme to decide the minimum number of parts required to recover the secret data completely. The security of our scheme is based on the security principle of steganography and secret sharing scheme. | |
dc.publisher | IEEE | |
dc.subject | Steganography | |
dc.subject | Information Hiding | |
dc.subject | Data Embedding Capacity | |
dc.subject | Data Compression | |
dc.subject | Secret Sharing Scheme | |
dc.title | Fingerprinted secret sharing steganography for robustness against image cropping attacks | |
dc.type | Conference Paper | |
dcterms.source.startPage | 717 | |
dcterms.source.endPage | 724 | |
dcterms.source.title | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.series | 3rd IEEE International Conference on Industrial Informatics (INDIN 2005) | |
dcterms.source.conference | INDIN 2005: 3rd International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business | |
dcterms.source.conference-start-date | Aug 10 2005 | |
dcterms.source.conferencelocation | Perth, WA | |
dcterms.source.place | Perth, WA | |
curtin.note |
Copyright 2005 IEEE | |
curtin.note |
Reprinted from: | |
curtin.note |
2005 3rd IEEE International Conference on Industrial Informatics (INDIN) Perth, Australia 10-12 August 2005 | |
curtin.note |
IEEE Catalog Number ISBN 05EX1057 | |
curtin.note |
ISBN 0-7803-9094-6 | |
curtin.note |
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Curtin University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to | |
curtin.note |
pubs-permissions@ieee.org. | |
curtin.note |
By choosing to view this document, you agree to all provisions of the copyright laws protecting it. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-545 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |