基于修改方向开发的强篡改定位可视化秘密共享方案

Chinchen Chang, Ngoc-Tu Huynh, Chia-Chun Lin
{"title":"基于修改方向开发的强篡改定位可视化秘密共享方案","authors":"Chinchen Chang, Ngoc-Tu Huynh, Chia-Chun Lin","doi":"10.1109/AsiaJCIS.2012.9","DOIUrl":null,"url":null,"abstract":"Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.","PeriodicalId":130870,"journal":{"name":"2012 Seventh Asia Joint Conference on Information Security","volume":"356 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction\",\"authors\":\"Chinchen Chang, Ngoc-Tu Huynh, Chia-Chun Lin\",\"doi\":\"10.1109/AsiaJCIS.2012.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.\",\"PeriodicalId\":130870,\"journal\":{\"name\":\"2012 Seventh Asia Joint Conference on Information Security\",\"volume\":\"356 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Seventh Asia Joint Conference on Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsiaJCIS.2012.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Seventh Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS.2012.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

最近,保护在互联网上共享或传输的信息已成为一个关键问题。人们提出了几种传输秘密数据的方法,其中包括可视化秘密共享(VSS),它是一种有效的技术,因为秘密数据由一组参与者而不是一个人保存,因此它们不会丢失。本文提出了一种新的、可视化的、具有高质量阴影的秘密共享方法,该方法在共享构建过程中巧妙地采用了一种称为利用修改方向(EMD)的隐写方法。此外,该方案还可以检测影子上是否发生了任何篡改。实验结果表明,该方案是高效、安全的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction
Recently, protecting information that is shared or transmitted over the Internet has become a critical issue. Several ways to transfer secret data have been proposed, including visual secret sharing (VSS), which is an efficient technique because the secret data are kept by a group of participants, rather than one person, so that they cannot be lost. In this paper, we proposed a new, visual, secret-sharing method with high quality shadows by smartly employing a steganography method, called Exploiting Modification Direction (EMD), during share construction. In addition, the scheme can detect if any tampering has occurred on the shadow. Our experimental results show that the scheme is efficient and secure.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信