{"title":"基于修改方向开发的强篡改定位可视化秘密共享方案","authors":"Chinchen Chang, Ngoc-Tu Huynh, Chia-Chun Lin","doi":"10.1109/AsiaJCIS.2012.9","DOIUrl":null,"url":null,"abstract":"Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"356 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction\",\"authors\":\"Chinchen Chang, Ngoc-Tu Huynh, Chia-Chun Lin\",\"doi\":\"10.1109/AsiaJCIS.2012.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.\",\"PeriodicalId\":130870,\"journal\":{\"name\":\"2012 Seventh Asia Joint Conference on Information Security\",\"volume\":\"356 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Seventh Asia Joint Conference on Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS.2012.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Seventh Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2012.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction
Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.