Skip to main content

Concealing Additional Secrets Using Sharing Approach in Steganography

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016)

Abstract

This paper describes a method of concealing additional secret data in fuzzy vault cryptosystem. The hidden information is placed on the second level of the system, what means that it is impossible to reveal higher level secret before decoding all related data from lower level. This property gives an opportunity of using presented technique as a secret sharing system in which information from previous step is used in the next part of the algorithm (no additional keys are required). As the existence of second-level secrets is not obvious for external observer, this idea may be applied for steganography purposes. The format of concealed secret is two-dimensional point (x, y), thus the method presented in this paper is suitable for protecting all data that can be presented as a pair of numbers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koptyra, K., Ogiela, M.R.: Fuzzy vault schemes in multi-secret digital steganography. In: 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, Krakow, Poland, November 4-6, 2015. (2015) 183–186

    Google Scholar 

  2. Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft Comput. 19(11) (2015) 3331–3339

    Google Scholar 

  3. Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography 38(2) (2006) 237–257

    Google Scholar 

  4. Nandakumar, A.K.J.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. In: IEEE Transactions on Information Forensics and Security. Volume 2. (December 2007) 744–757

    Google Scholar 

  5. Hani, M.K., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Generation Comp. Syst. (2013) 800–810

    Google Scholar 

  6. Nguyen, T.H., Wang, Y., Nguyen, T.N., Li, R.: A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference on, IEEE (2013) 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ogiela, M.R., Koptyra, K. (2017). Concealing Additional Secrets Using Sharing Approach in Steganography. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics