A Novel Behavior Steganography Model Based on Secret Sharing

被引:1
|
作者
Liu, Hanlin [1 ]
Liu, Jingju [1 ]
Yan, Xuehu [1 ]
Liu, Lintao [1 ]
Ding, Wanmeng [1 ]
Jiang, Yue [1 ]
机构
[1] Natl Univ Def Technol, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
(k; k) Threshold VSS; n) Threshold SS; Behavior Steganography; Good Imperceptibility; Large Capacity; Secret Sharing; VISUAL CRYPTOGRAPHY;
D O I
10.4018/IJDCF.2019100107
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms - threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.
引用
收藏
页码:97 / 117
页数:21
相关论文
共 50 条
  • [41] A Secret Sharing Scheme Based on AES
    Cui, Jie
    Chen, Lei
    Zhang, Yiming
    Xie, Zhiqiang
    Zhong, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 295 - 302
  • [42] THE BLAKLEY BASED SECRET SHARING APPROACH
    Calkavur, Selda
    Molla, Fatih
    SIGMA JOURNAL OF ENGINEERING AND NATURAL SCIENCES-SIGMA MUHENDISLIK VE FEN BILIMLERI DERGISI, 2019, 37 (02): : 489 - 494
  • [43] Visual multiple secret sharing based upon turning and flipping
    Shyu, Shyong Jian
    Chen, Kun
    INFORMATION SCIENCES, 2011, 181 (15) : 3246 - 3266
  • [44] Secret image sharing based on error-correcting codes
    Yan, Xuehu
    Lu, Yuliang
    Chen, Yuxin
    Lu, Canju
    Zhu, Benmu
    Liao, Qinglei
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 86 - 89
  • [45] Bit-level based secret sharing for image encryption
    Lukac, R
    Plataniotis, KN
    PATTERN RECOGNITION, 2005, 38 (05) : 767 - 772
  • [46] Enhanced Matrix-Based Secret Image Sharing Scheme
    Yang, Ching-Nung
    Wu, Chih-Cheng
    Lin, Yi-Chin
    Kim, Cheonshik
    IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (12) : 789 - 792
  • [47] A secret sharing scheme based on solving a system of linear equations
    Chang, Chin-Chen
    Chen, Kuo-Lun
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2004, 3 : 362 - 366
  • [48] A Visual Cryptography based system for sharing multiple secret images
    Chen, Shang-Kuan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY AND ARTIFICIAL VISION (ISCGAV'-07), 2007, : 113 - +
  • [49] A Partition Based Visual Secret Sharing Schemes for Large Images
    Mishra, Abhishek
    Gupta, Ashutosh
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 885 - 890
  • [50] A homomorphic computational model for Chinese remainder theorem-based secret sharing
    Roy, Parthajit
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2021, 17 (01) : 63 - 70