A Novel Behavior Steganography Model Based on Secret Sharing

被引:1
|
作者
Liu, Hanlin [1 ]
Liu, Jingju [1 ]
Yan, Xuehu [1 ]
Liu, Lintao [1 ]
Ding, Wanmeng [1 ]
Jiang, Yue [1 ]
机构
[1] Natl Univ Def Technol, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
(k; k) Threshold VSS; n) Threshold SS; Behavior Steganography; Good Imperceptibility; Large Capacity; Secret Sharing; VISUAL CRYPTOGRAPHY;
D O I
10.4018/IJDCF.2019100107
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms - threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.
引用
收藏
页码:97 / 117
页数:21
相关论文
共 50 条
  • [1] Behavior Steganography in Social Network via Secret Sharing
    Zhu, Xuan
    Mo, Qun
    Li, Fengyong
    Zhang, Lei
    Qin, Chuan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 299 - 308
  • [2] A robust steganography method for HEVC based on secret sharing
    Liu, Shuyang
    Xu, Degang
    COGNITIVE SYSTEMS RESEARCH, 2020, 59 : 207 - 220
  • [3] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [4] Secret Image Sharing with Reversible Steganography
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 253 - +
  • [5] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893
  • [6] Secret Image Sharing Using Steganography with Different Cover Images
    Jagadeesh, Noopa
    Nandakumar, Aishwarya
    Harmya, P.
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 490 - 497
  • [7] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [8] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106
  • [9] A novel joint secret image sharing and robust steganography method using wavelet
    Mohammad Javad Khosravi
    Ahmad Reza Naghsh-Nilchi
    Multimedia Systems, 2014, 20 : 215 - 226
  • [10] Partial reversible AMBTC-based secret image sharing with steganography
    Wu, Xiaotian
    Yang, Ching-Nung
    DIGITAL SIGNAL PROCESSING, 2019, 93 : 22 - 33