TY - GEN
T1 - A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme
AU - Onuma, Kaito
AU - Miyata, Sumiko
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/11/25
Y1 - 2020/11/25
N2 - In recent years, opportunities to exchange information on the Internet has increased. Under such circumstances, steganography is a technology for safely exchanging information. Previous studies have proposed some methods that combine Shamir's secret sharing method and correlation-based steganography. Correlation-based steganography embeds pseudo-random number as a secret information in DCT (discrete cosine transform) coefficient of an image and extracts the secret information by correlating the pseudo-random number and DCT coefficient. Since it is necessary to obtain a good correlation at the time of extracting, each value of the pseudorandom number sequence is increased by coefficient. This increasing of values causes image quality deterioration. In this paper, we propose a steganography with an error-correcting code. Our proposed method can improve the embedding capacity without deterioration the image quality.
AB - In recent years, opportunities to exchange information on the Internet has increased. Under such circumstances, steganography is a technology for safely exchanging information. Previous studies have proposed some methods that combine Shamir's secret sharing method and correlation-based steganography. Correlation-based steganography embeds pseudo-random number as a secret information in DCT (discrete cosine transform) coefficient of an image and extracts the secret information by correlating the pseudo-random number and DCT coefficient. Since it is necessary to obtain a good correlation at the time of extracting, each value of the pseudorandom number sequence is increased by coefficient. This increasing of values causes image quality deterioration. In this paper, we propose a steganography with an error-correcting code. Our proposed method can improve the embedding capacity without deterioration the image quality.
KW - Information Hiding
KW - Reed-Solomon Code
KW - Shamir's Secret Sharing Scheme
KW - Spread Spectrum Method
UR - http://www.scopus.com/inward/record.url?scp=85101158487&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85101158487&partnerID=8YFLogxK
U2 - 10.1109/ICSPIS51252.2020.9340154
DO - 10.1109/ICSPIS51252.2020.9340154
M3 - Conference contribution
AN - SCOPUS:85101158487
T3 - 2020 3rd International Conference on Signal Processing and Information Security, ICSPIS 2020
BT - 2020 3rd International Conference on Signal Processing and Information Security, ICSPIS 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Conference on Signal Processing and Information Security, ICSPIS 2020
Y2 - 25 November 2020 through 26 November 2020
ER -