Browse > Article

Secret Sharing Scheme using Gray Code based on Steganography  

Kim, Cheon-Shik (Dept. of Liberal Arts, Anyang Univ.)
Yoon, Eun-Jun (School of Electrical Engineering and Computer Science, Kyungpook National University)
Hong, You-Sik (Dept. of Computer Science, Sangji University)
Kim, Hyoung-Joong (Korea University)
Publication Information
Abstract
Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.
Keywords
Steganography; Secret sharing; Watermarking; LSB; BMP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Niels Provos, Peter Honeyman, 'Hide and Seek: An Introduction to Steganography,' IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, May, 2003   DOI   ScienceOn
2 Westfeld A., 'F5: A steganographic algorithm: High capacity despite better steganalysis,' Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001   DOI   ScienceOn
3 Solanki K., Sarkar A., Manjunath B. S., 'YASS: Yet another steganographic scheme that resists blind steganalysis,' Proceedings of the 9th International Workshop on Information Hiding, Saint Malo, Brittany, France, pp.16-31, 2007
4 Thien, C.C., Lin, J.C., 2002. Secret image sharing. Computers & Graphics, 26 (1), 765–770   DOI   ScienceOn
5 Chang, C.C., Hwang, R.J., 1998. Sharing secret images using shadow codebooks. Information Sciences 111 (1–4), 335–345   DOI   ScienceOn
6 Feng, J.B., Wu, H.C., Tsai, C.S., Chu, Y.P., 2005. A new multi-secret images sharing scheme using Largrange's interpolation. The Journal of Systems & Software 76 (3), 327–339   DOI   ScienceOn
7 Fridrich J., Goljan M., and Hogea H., 'Attacking the OutGuess,' Proceedings of the ACM Workshop on Multimedia and Security, pp. 967-982, 2002
8 Westfeld A., and Pfitzmann A., 'Attacks on steganographic systems,' Lecture Notes in Computer Science, vol. 1768, pp. 61-75, 2000   DOI   ScienceOn
9 Shamir, A., 1979. How to share a secret. Communications of the Association for Computing Machinery, 612–613
10 Lin, C.C., Tsai, W.H., 2004. Secret image sharing with steganography and authentication. Journal of Systems & Software 73 (3), 405–414   DOI   ScienceOn
11 Sallee P., 'Model-based steganography,' Lecture Notes in Computer Science, vol. 2939, pp. 154-167, 2004   DOI   ScienceOn
12 Raja, K.B.; Vikas; Venugopal, K.R.; Patnaik, L.M., High Capacity Lossless Secure Image Steganography using Wavelets, International Conference on Advanced Computing and Communications, vo., Issue , 20-23 Dec. 2006 Page(s):230 - 235