Securing matrix counting-based secret-sharing involving crypto steganography

被引:35
作者
Al-Shaarani, Faiza [1 ]
Gutub, Adnan [1 ]
机构
[1] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
关键词
Counting-based secret sharing; Image-based steganography; Secret sharing; LSB; DWT; Encryption; IMAGE;
D O I
10.1016/j.jksuci.2021.09.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The privacy and confidentiality of our data are more fundamental to our existence than ever, especially with our growing dependence on online services and the transfer of information, be it for convenience or the unfortunate COVID 19 pandemic. Traditional security measures such as cryptography and steganog-raphy are essential. However, they are not sufficient anymore as when one party maintains complete control over the data, they may intentionally, or not, lose or reveal it. Thus, secret sharing schemes were introduced to address applications that require collective agreement by authorized personnel to access or modify, such as missile launching, sophisticated medical agreements, or high-level bank transfers. In standard secret sharing, the target key is distributed among several authorized participants in a way that only the intended group of them are needed to reconstruct the original target key. These schemes became popular as they fortified the security of both cryptography and steganography and accomplished extraor-dinary results combined with each. This work focuses on two particular secret sharing techniques known as counting-based secret sharing and matrix-based secret sharing, which is based on the former. These methods are simple and intuitive. Consequently, they are prone to attacks that may result in the success-ful guessing of the key. In this work, not only are the shares hidden but they are also encrypted before-hand so that should they be intercepted, the adversary cannot decipher them. In other words, two layers of security are added to the secret-sharing method: steganography and cryptography. We studied two image steganography methods: least significant bit (LSB) and discrete wavelet transform (DWT), each combined with XOR encryption for security and robustness acceptability verification. The research results demonstrated that the use of steganography and encryption along with the matrix-based secret sharing did not affect the quality of operation nor compromised the security of information presenting attractive remarks. (c) 2021 The Authors. Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:6909 / 6924
页数:16
相关论文
共 52 条
[1]   Security enhancement of shares generation process for multimedia counting-based secret-sharing technique [J].
Al-Ghamdi, Maimoona ;
Al-Ghamdi, Manal ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) :16283-16310
[2]  
Al-Qurashi A., 2018, J COMPUTER SCI COMPU, V8, P87, DOI [10.20967/jcscm.2018.04.006, DOI 10.20967/JCSCM.2018.04.006]
[3]   Remodeling randomness prioritization to boost-up security of RGB image encryption [J].
Al-Roithy, Budoor Obid ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) :28521-28581
[4]   Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography [J].
Al-Shaarani, Faiza ;
Gutub, Adnan .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) :2455-2477
[5]   Involving Spaces of Unicode Standard Within Irreversible Arabic Text Steganography for Practical Implementations [J].
Alanazi, Norah ;
Khan, Esam ;
Gutub, Adnan .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) :8869-8885
[6]   Refining image steganography distribution for higher security multimedia counting-based secret-sharing [J].
AlKhodaidi, Taghreed ;
Gutub, Adnan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) :1143-1173
[7]   Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability [J].
AlKhodaidi, Taghreed ;
Gutub, Adnan .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) :3403-3423
[8]  
ALNOFAIE Safia, 2016, Journal of Computer Science & Computational Mathematics (JCSCM), V6, P59
[9]  
Beimel A., 2011, LECT NOTES COMPUTER, V6639, P11, DOI [10.1007/978-3-642-20901-7_2, DOI 10.1007/978-3-642-20901-7_2, 10.1007/978-3-642-22140-8_12]
[10]  
Bhargava Swati, 2019, J IMAGE VIDEO PROCES, V9, P1940, DOI DOI 10.21917/IJIVP.2019.0275