An Information Hiding Scheme Based on Chinese Remainder Theorem

被引:0
作者
Chen, Jinrui [1 ]
Liu, Kesheng [1 ]
Yan, Xuehu [1 ]
Liu, Hanlin [1 ]
Liu, Lintao [1 ]
Tan, Longdan [1 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Anhui, Peoples R China
来源
2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC) | 2018年
基金
中国国家自然科学基金;
关键词
behavior steganography; Chinese Remainder Theorem; lossless recovery; no encryption; low computation complexity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The combination of steganography and secret image sharing (SIS) is an important aspect of information hiding. The two techniques are usually separate phases in one combination. A novel behavior steganography model was recently put forward to achieve the true fusion. However, the polynomial-based (k, n.) threshold SIS scheme based on the model is confront with some inevitable weaknesses, including auxiliary encryption, lossy recovery, and complex recovery computation. In this paper, a scheme based on Chinese remainder theorem-bawd secret image sharing of (k, n) threshold ((k,n) - CRTSIS) is proposed. The number of bits chosen from secret message to embed in SIS is determined by the interval range of the random parameter in (k, n) - CRTSIS. As a result, the proposed scheme realizes not only the (k, n) threshold, but also lossless recovery and low computation complexity without auxiliary encryption. Analysis and experiments are provided to indicate the effectiveness of the proposed scheme.
引用
收藏
页码:785 / 790
页数:6
相关论文
共 10 条
[1]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[2]   Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography [J].
Banik, Barnali Gupta ;
Bandyopadhyay, Samir Kumar .
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, :1147-1152
[3]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]   A secure image sharing scheme with high quality stego-images based on steganography [J].
He, Junhui ;
Lan, Weiqiang ;
Tang, Shaohua .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) :7677-7698
[5]  
Liu H., 2018, INT J DIGITAL CRIME
[6]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[7]  
Sumathi C. P., 2014, ABS14015561 CORR
[8]  
Thien CC, 2002, COMPUT GRAPH-UK, V26, P766
[9]   Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold [J].
Yan, Xuehu ;
Lu, Yuliang ;
Liu, Lintao ;
Wan, Song ;
Ding, Wanmeng ;
Liu, Hanlin .
CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 :433-440
[10]   Behavior Steganography in Social Network [J].
Zhang, Xinpeng .
ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, 2017, 63 :21-23