{"title":"多秘密数字隐写中的模糊保险库方案","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1109/BWCCA.2015.87","DOIUrl":null,"url":null,"abstract":"This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Fuzzy Vault Schemes in Multi-secret Digital Steganography\",\"authors\":\"Katarzyna Koptyra, M. Ogiela\",\"doi\":\"10.1109/BWCCA.2015.87\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.\",\"PeriodicalId\":193597,\"journal\":{\"name\":\"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BWCCA.2015.87\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2015.87","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fuzzy Vault Schemes in Multi-secret Digital Steganography
This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this approach with each secret is linked corresponding key in the form of unordered set. The requirement that these sets have to satisfy is disjunctiveness. For an unauthorized user multi-secret form of fuzzy vault is identical as standard one. During revealing, depending on used key, corresponding secret is decoded. Described concept is suitable for using with biometrics. It can also work in cooperation with false steganography where every biometric trait encodes different steganographic key.