{"title":"Fuzzy Vault Schemes in Multi-secret Digital Steganography","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1109/BWCCA.2015.87","DOIUrl":null,"url":null,"abstract":"This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2015.87","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.