A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT Domain

Kaito Onuma, Sumiko Miyata

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir's secret sharing scheme using the spread spectrum method and analyze its basic characteristics.

Original languageEnglish
Title of host publication35th International Conference on Information Networking, ICOIN 2021
PublisherIEEE Computer Society
Pages255-260
Number of pages6
ISBN (Electronic)9781728191003
DOIs
Publication statusPublished - 2021 Jan 13
Event35th International Conference on Information Networking, ICOIN 2021 - Jeju Island, Korea, Republic of
Duration: 2021 Jan 132021 Jan 16

Publication series

NameInternational Conference on Information Networking
Volume2021-January
ISSN (Print)1976-7684

Conference

Conference35th International Conference on Information Networking, ICOIN 2021
Country/TerritoryKorea, Republic of
CityJeju Island
Period21/1/1321/1/16

Keywords

  • Shamir's secret sharing scheme
  • Shamir's secret sharing scheme
  • Steganography
  • Steganography
  • information hiding
  • information hiding
  • spread spectrum method
  • spread spectrum method

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT Domain'. Together they form a unique fingerprint.

Cite this