A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme

Kaito Onuma, Sumiko Miyata

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In recent years, opportunities to exchange information on the Internet has increased. Under such circumstances, steganography is a technology for safely exchanging information. Previous studies have proposed some methods that combine Shamir's secret sharing method and correlation-based steganography. Correlation-based steganography embeds pseudo-random number as a secret information in DCT (discrete cosine transform) coefficient of an image and extracts the secret information by correlating the pseudo-random number and DCT coefficient. Since it is necessary to obtain a good correlation at the time of extracting, each value of the pseudorandom number sequence is increased by coefficient. This increasing of values causes image quality deterioration. In this paper, we propose a steganography with an error-correcting code. Our proposed method can improve the embedding capacity without deterioration the image quality.

Original languageEnglish
Title of host publication2020 3rd International Conference on Signal Processing and Information Security, ICSPIS 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728189987
DOIs
Publication statusPublished - 2020 Nov 25
Event3rd International Conference on Signal Processing and Information Security, ICSPIS 2020 - Virtual, Dubai, United Arab Emirates
Duration: 2020 Nov 252020 Nov 26

Publication series

Name2020 3rd International Conference on Signal Processing and Information Security, ICSPIS 2020

Conference

Conference3rd International Conference on Signal Processing and Information Security, ICSPIS 2020
Country/TerritoryUnited Arab Emirates
CityVirtual, Dubai
Period20/11/2520/11/26

Keywords

  • Information Hiding
  • Reed-Solomon Code
  • Shamir's Secret Sharing Scheme
  • Spread Spectrum Method

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Signal Processing
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme'. Together they form a unique fingerprint.

Cite this