Browse > Article
http://dx.doi.org/10.7236/JIIBC.2014.14.4.13

Secret Sharing based on DCT using XOR  

Kim, Cheonshik (Dept. of Digital Medial Engineering, Anyang University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.14, no.4, 2014 , pp. 13-19 More about this Journal
Abstract
In general, if a secret of company is owned by a person, the secret is the most vulnerable to attack of hacking. Secret sharing is a solution to solve such a problem. To share the secret to many people not one, it is possible to restore secret when the secret is being stolen by someone. That is, secret sharing, a strong method, was proposed to keep secret information from the robbery. Until now, most secret sharing schemes were based on spatial domain. The hidden data based on spatial domain is easily deleted since a transformation of digital formats (i.e., jpeg to bmp or vise versa). In this paper, we proposed our scheme for complement to resist various attack of cover image as distributing secrets based on DCT of JPEG using exclusive-or operation. The result of experiments proved that the proposed scheme restore original secret.
Keywords
Secret Sharing; Cryptographic; DCT; JPEG; XOR;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proc. AFIPS National Computer Conf., vol. 48, pp. 313-317.
2 Shamir, A., 1979. How to share a secret. Comm. ACM 22 (11), 612-613.   DOI   ScienceOn
3 Naor, M., Shamir, A., 1995. Visual Cryptography. Advances in Cryptology: Eurocrypt'94. Spring-Verlag, Berlin. pp. 1-12.
4 Chen, T.H., Tsao, K.H., 2009. Visual secret sharing by random grids revisited. Pattern Recognition 42 (9), 2203-2217.   DOI
5 Shamir, A., Naor, M., 1996. Visual cryptography II: Improving the contrast via the cover base. Security Comm. Networks, 16-17.
6 Lin, C.C., Tsai, W.H., 2004. Secret image sharing with steganography and authentication. J. Syst. Software 73 (3), 405-414.   DOI   ScienceOn
7 Beimel, A., Chor, B., 1998. Secret sharing with public reconstruction. IEEE Trans. Inform. Theory 44 (5), 1887-1896.   DOI
8 Park, Y. B., Park, J. I., 2002. A Study on the Cipher JPEG Img, Journal of the Korea Academia-Industrial cooperation Society, vol.3, no.4, pp.308-312, 2002.
9 Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H., 2008. A novel secret image sharing scheme in color images using small shadow images. Inform. Sci. 178 (11), 2433-2447.   DOI   ScienceOn
10 Chang, C.C., Hsieh, Y.P., Lin, C.H., 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41 (10), 3130-3137.   DOI
11 Lin, P.Y., Lee, J.S., Chang, C.C., 2009. Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42 (5), 886-895.   DOI
12 Kim, C., 2013. (2, 2) Secret Sharing Using Data Hiding and Multiplexer Technique, The Journal of The Institute of Internet, Broadcasting and Communication, vol.13, no.4, pp.75-81.   과학기술학회마을   DOI
13 Thien, C.C., Lin, J.C., 2002. Secret image sharing. Comput. Graphics 26 (1), 765-770.   DOI   ScienceOn
14 Wang, R.Z., Su, C.H., 2006. Secret image sharing with smaller shadow images. Pattern Recognition Lett. 27 (6), 551-555.   DOI   ScienceOn
15 Wang, D., Zhang, L., Ma, N., Li, X., 2007. Two secret sharing schemes based on Boolean operations. Pattern Recognition 40 (10), 2776-2785.   DOI   ScienceOn
16 Wu, Y.S., Thien, C.C., Lin, J.C., 2004. Sharing and hiding secret images with size constraint. Pattern Recognition 37 (7), 1377-1385.   DOI
17 Kim, C., 2014. Data hiding by an improved exploiting modification direction, Multimedia Tools and Applications, vol.69, no.3, pp 569-584.   DOI   ScienceOn
18 Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., 2007. Improvements of image sharing with steganography and authentication. J. Syst. Software 80 (7), 1070-1076.   DOI   ScienceOn