Commenced in January 2007
Paper Count: 30302
A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites
Abstract:A new steganographic method via the use of numeric data on public websites with a self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the numeric items to be disguised as part of the website’s numeric content, yielding the stego numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego numeric content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1106897Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1303
 Shailender Gupta, Ankur Goyal, Bharat Bhushan,”Information Hiding Using Least Significant Bit Steganography and Cryptography.” International Journal of Modern Education and Computer Science, vol.4, no.6, pp.27-34, 2012.
 Khan, M. K., Naseem, M., Hussain, I. M. and Ajmal, A., “Distributed Least Significant Bit technique for data hiding in images.” 2011 IEEE 14th International Multitopic Conference (INMIC), pp. 149-154, 2011.
 Darabkh, K. A., Jafar, I. F., Al-Zubi, R. T., and Hawa, M., “An improved image least significant bit replacement method.” In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014 37th International Convention on. IEEE. pp. 1182-1186, 2014.
 Da-Chun Wu and Wen-Hsiang Tsai, “A steganographic method for images by pixel-value differencing”, Pattern Recognition Letters, vol. 24, no. 9-10, pp. 1613–1626, 2003.
 Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai and Min-Shiang Hwang, “A high quality steganographic method with pixel-value differencing and modulus function.” Journal of Systems and Software, vol. 81, no. 1, pp. 150-158, 2008.
 Zhang, Xinpeng, and Shuozhong Wang. “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security.” Pattern Recognition Letters, vol. 25, no. 3, pp. 331-339, 2004.
 Lee, I-Shi, and Wen-Hsiang Tsai. “A new approach to covert communication via PDF files.” Signal Processing, vol. 90, no. 2, pp. 557-565, 2010.
 Park, Bora, Jungheum Park, and Sangjin Lee. “Data concealment and detection in Microsoft Office 2007 files.” Digital Investigation, vol. 5, no. 3-4, pp. 104-114, 2009.
 Gopalan, Kaliappan. “Audio steganography using bit modification.” Multimedia and Expo, 2003. ICME'03. Proceedings. 2003 International Conference on. IEEE, vol. 1, pp. I-629-32, 2003.
 Qazanfari, Kazem, and Reza Safabakhsh. “A new steganography method which preserves histogram: Generalization of LSB++.” Information Sciences, vol. 277, pp. 90-101, 2014.
 Lee, Yeuan-Kuen, and Ling-Hwei Chen. "An adaptive image steganographic model based on minimum-error lsb replacement." Nineth National Conference on Information Security. pp. 8-15, 1999.
 Chang, Chin-Chen, and Hsien-Wen Tseng. "A steganographic method for digital images using side match." Pattern Recognition Letters, vol. 25, no.12, pp. 1431-1437, 2004.
 Holub, Vojtěch, and Jessica Fridrich. "Digital image steganography using universal distortion." Proceedings of the first ACM workshop on Information hiding and multimedia security. ACM, pp. 59-68, 2013.
 Xinpeng Zhang. “Reversible data hiding in encrypted image.” Signal Processing Letters, IEEE, vol. 18, no. 4, pp. 255-258, 2011.
 C. W. Lee and W. H. Tsai, “A Covert Communication Method via Spreadsheets by Secret Sharing with a Self-Authentication Capability,” Journal of Systems and Software, vol. 86, no. 2, pp. 324-334, 2013.
 A. Shamir, “How to share a secret,” Communication of ACM, vol. 22, pp. 612–613, 1979.