A Novel Behavior Steganography Model Based on Secret Sharing

被引:1
|
作者
Liu, Hanlin [1 ]
Liu, Jingju [1 ]
Yan, Xuehu [1 ]
Liu, Lintao [1 ]
Ding, Wanmeng [1 ]
Jiang, Yue [1 ]
机构
[1] Natl Univ Def Technol, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
(k; k) Threshold VSS; n) Threshold SS; Behavior Steganography; Good Imperceptibility; Large Capacity; Secret Sharing; VISUAL CRYPTOGRAPHY;
D O I
10.4018/IJDCF.2019100107
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms - threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.
引用
收藏
页码:97 / 117
页数:21
相关论文
共 50 条
  • [11] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249
  • [12] A novel joint secret image sharing and robust steganography method using wavelet
    Khosravi, Mohammad Javad
    Naghsh-Nilchi, Ahmad Reza
    MULTIMEDIA SYSTEMS, 2014, 20 (02) : 215 - 226
  • [13] Secret sharing with multi-cover adaptive steganography
    Yuan, Hai-Dong
    INFORMATION SCIENCES, 2014, 254 : 197 - 212
  • [14] (N, 1) Secret Sharing Approach Based on Steganography with Gray Digital Images
    Baek, Jinsuk
    Kim, Cheonshik
    Fisher, Paul S.
    Chao, Hongyang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 325 - +
  • [15] Hierarchical Visual Secret Sharing Scheme Using Steganography
    Jana, Biswapati
    Samanta, Amita
    Giri, Debasis
    MATHEMATICS AND COMPUTING, 2015, 139 : 363 - 389
  • [16] Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC
    Yingnan Zhang
    Minqing Zhang
    Xiaoyuan Yang
    Duntao Guo
    Longfei Liu
    Tsinghua Science and Technology, 2017, (02) : 198 - 209
  • [17] Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H. 264/AVC
    Zhang, Yingnan
    Zhang, Minqing
    Yang, Xiaoyuan
    Guo, Duntao
    Liu, Longfei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (02) : 198 - 209
  • [18] Securing matrix counting-based secret-sharing involving crypto steganography
    Al-Shaarani, Faiza
    Gutub, Adnan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) : 6909 - 6924
  • [19] A geometry-based secret image sharing approach
    Chen, Chien-Chang
    Fu, Wen-Yin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (05) : 1567 - 1577
  • [20] Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography
    Banik, Barnali Gupta
    Bandyopadhyay, Samir Kumar
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1147 - 1152