{"title":"通过隐写术实现个人记忆的秘密共享技术","authors":"A. Gutub, Maimoona Al-Ghamdi","doi":"10.1109/ICFIR.2019.8894784","DOIUrl":null,"url":null,"abstract":"The secret sharing scheme is a data security tool that provide the reliability and robustness for multi-user authentication systems. This work focus on improving counting-based secret sharing technique for better shares security as well as simple and fast computation. The research considers resolving some originally published defects in the shares reconstruction phase proposing new distribution model authenticated to be optimized practical and efficient. The shares reconstruction model also reflected increasing the security of the system by authenticity of the shares via steganography. We have employed image-based steganography methods to store the shares presenting a comparison proofed remark. The improved system has been analyzed according to distortion security and capacity parameters showing attractive contributions.","PeriodicalId":255353,"journal":{"name":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","volume":"2020 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Accommodating Secret Sharing Technique for Personal Remembrance via Steganography\",\"authors\":\"A. Gutub, Maimoona Al-Ghamdi\",\"doi\":\"10.1109/ICFIR.2019.8894784\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The secret sharing scheme is a data security tool that provide the reliability and robustness for multi-user authentication systems. This work focus on improving counting-based secret sharing technique for better shares security as well as simple and fast computation. The research considers resolving some originally published defects in the shares reconstruction phase proposing new distribution model authenticated to be optimized practical and efficient. The shares reconstruction model also reflected increasing the security of the system by authenticity of the shares via steganography. We have employed image-based steganography methods to store the shares presenting a comparison proofed remark. The improved system has been analyzed according to distortion security and capacity parameters showing attractive contributions.\",\"PeriodicalId\":255353,\"journal\":{\"name\":\"2019 International Conference on Fourth Industrial Revolution (ICFIR)\",\"volume\":\"2020 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Fourth Industrial Revolution (ICFIR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFIR.2019.8894784\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Fourth Industrial Revolution (ICFIR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFIR.2019.8894784","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Accommodating Secret Sharing Technique for Personal Remembrance via Steganography
The secret sharing scheme is a data security tool that provide the reliability and robustness for multi-user authentication systems. This work focus on improving counting-based secret sharing technique for better shares security as well as simple and fast computation. The research considers resolving some originally published defects in the shares reconstruction phase proposing new distribution model authenticated to be optimized practical and efficient. The shares reconstruction model also reflected increasing the security of the system by authenticity of the shares via steganography. We have employed image-based steganography methods to store the shares presenting a comparison proofed remark. The improved system has been analyzed according to distortion security and capacity parameters showing attractive contributions.