{"title":"一种基于Shamir秘密共享方案和DCT域的相关隐写算法","authors":"Kaito Onuma, S. Miyata","doi":"10.1109/ICOIN50884.2021.9333925","DOIUrl":null,"url":null,"abstract":"In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir’s secret sharing scheme using the spread spectrum method and analyze its basic characteristics.","PeriodicalId":6741,"journal":{"name":"2021 International Conference on Information Networking (ICOIN)","volume":"52 18","pages":"255-260"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Proposal for Correlation-based Steganography Using Shamir’s Secret Sharing Scheme and DCT Domain\",\"authors\":\"Kaito Onuma, S. Miyata\",\"doi\":\"10.1109/ICOIN50884.2021.9333925\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir’s secret sharing scheme using the spread spectrum method and analyze its basic characteristics.\",\"PeriodicalId\":6741,\"journal\":{\"name\":\"2021 International Conference on Information Networking (ICOIN)\",\"volume\":\"52 18\",\"pages\":\"255-260\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Information Networking (ICOIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN50884.2021.9333925\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN50884.2021.9333925","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Proposal for Correlation-based Steganography Using Shamir’s Secret Sharing Scheme and DCT Domain
In recent years, the number of opportunities to exchange information on the Internet has increased, and a method for safely exchanging information is required. In such a situation, steganography, which is a communication technology that embeds information in images, is attracting attention. Image steganography is roughly classified into two types: pixel value replacement and transform domain usage. In most cases, pixel value replacement steganography, which uses the least significant bit (LSB) of the image, is used. However, it is easy to predict when hidden information is embedded in the lower bits of an image. In this study, we propose a correlation-based steganography that embeds secret information encrypted by Shamir’s secret sharing scheme using the spread spectrum method and analyze its basic characteristics.