{"title":"A Proposal for Correlation-based Steganography Using Shamir’s Secret Sharing Scheme and DCT Domain","authors":"Kaito Onuma, S. Miyata","doi":"10.1109/ICOIN50884.2021.9333925","DOIUrl":null,"url":null,"abstract":"In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir’s secret sharing scheme using the spread spectrum method and analyze its basic characteristics.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"52 18","pages":"255-260"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN50884.2021.9333925","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir’s secret sharing scheme using the spread spectrum method and analyze its basic characteristics.