Systems and Means of Informatics
2019, Volume 29, Issue 3, pp 180-193
THE DATA EMBEDDING METHOD BASED ON THE SECRET SHARING SCHEME
Abstract
Important characteristics of stegosystems are the relative length à of the message to be inserted and the relative effectiveness of the embedding e. Additional essential characteristics of such systems are the degree of freedom in choosing modifiable bits of the container and the ability to resist loss of part of the stegocontainer blocks. This paper is devoted to the development of the stegosystem which, on the one hand, allows recovering partially lost data and, on the other hand, gives the opportunity to choose modifiable bits. On the basis of this system, stegosystems are constructed and investigated, for which the characteristics of à and e are calculated and the degree of freedom and the number of erasures of blocks that do not distort the disseminated data are estimated.
[+] References (10)
- Fridrich, J., and D. Soukal. 2006. Matrix embedding for large payloads. IEEE T. Inf. Foren. Sec. 1(3):390-395.
- Galand, F., and G. Kabatiansky. 2003. Information hiding by coverings. IEEE Information Theory Workshop Proceedings. IEEE. 151-154.
- Zhang, W., X. Zhang, and S. Wang. 2008. Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes. Information hiding. Eds. K. Solanki, K. Sullivan, and U. Madhow. Lecture notes in computer science ser. Springer. 5284:60-71.
- Zhang, W., and X. Wang. 2009. Generalization of the ZZW embedding construction for steganography. IEEE T. Inf. Foren. Sec. 4(3):564-569.
- Ker, A. D. 2006. Batch steganography and pooled steganalysis. Information hiding. Eds. J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee. Lecture notes in computer science ser. Springer, 4437:265-281.
- Fridrich, J., M. Goljan, P. Lisonek, and D. Soukal. 2005. Writing on wet paper. IEEE T. Signal Proces. 53(10):3923-3935.
- Fridrich, J., M. Goljan, and D. Soukal. 2005. Efficient wet paper codes. Information hiding. Eds. M. Barni, J. Herrera-Joancomarti, S. Katzenbeisser, and F. Perez- Gonzalez. Lecture notes in computer science ser. Springer. 3727:204-218.
- Kosolapov, Yu. V. 2017. Skhema razdeleniya sekreta tipa skhemy Blekli, osnovannaya na peresechenii podprostranstv [Blakley type secret sharing scheme based on the intersection of subspaces]. Matematicheskie voprosy kriptografii [Mathematical Aspects of Cryptography] 8(1): 13-30.
- Ker, A.D., P. Bas, R. Bohme, R. Cogranne, S. Craver, T. Filler, J. Fridrich, and T. Pevny. 2013. Moving steganography and steganalysis from the laboratory into the real world. 1st ACM Workshop on Information Hiding and Multimedia Security Proceedings. ACM. 45-58.
- Fridrich, J. 2006. Minimizing the embedding impact in steganography. 8th Workshop on Multimedia and Security Proceedings. Geneva, Switzerland: ACM. 2-10.
[+] About this article
Title
THE DATA EMBEDDING METHOD BASED ON THE SECRET SHARING SCHEME
Journal
Systems and Means of Informatics
Volume 29, Issue 3, pp 180-193
Cover Date
2019-10-30
DOI
10.14357/08696527190316
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information embedding; a secret sharing scheme
Authors
Yu. V. Kosolapov
Author Affiliations
Institute for Mathematics, Mechanics, and Computer Science named after 1.1. Vorovich, Southern Federal University, 8a Milchakova Str. Rostov-on-Don 344090, Russian Federation
|