Abstract
This paper describes a method of concealing additional secret data in fuzzy vault cryptosystem. The hidden information is placed on the second level of the system, what means that it is impossible to reveal higher level secret before decoding all related data from lower level. This property gives an opportunity of using presented technique as a secret sharing system in which information from previous step is used in the next part of the algorithm (no additional keys are required). As the existence of second-level secrets is not obvious for external observer, this idea may be applied for steganography purposes. The format of concealed secret is two-dimensional point (x, y), thus the method presented in this paper is suitable for protecting all data that can be presented as a pair of numbers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Koptyra, K., Ogiela, M.R.: Fuzzy vault schemes in multi-secret digital steganography. In: 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, Krakow, Poland, November 4-6, 2015. (2015) 183–186
Ogiela, M.R., Koptyra, K.: False and multi-secret steganography in digital images. Soft Comput. 19(11) (2015) 3331–3339
Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography 38(2) (2006) 237–257
Nandakumar, A.K.J.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. In: IEEE Transactions on Information Forensics and Security. Volume 2. (December 2007) 744–757
Hani, M.K., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Generation Comp. Syst. (2013) 800–810
Nguyen, T.H., Wang, Y., Nguyen, T.N., Li, R.: A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: Signal Processing, Communication and Computing (ICSPCC), 2013 IEEE International Conference on, IEEE (2013) 1–6
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ogiela, M.R., Koptyra, K. (2017). Concealing Additional Secrets Using Sharing Approach in Steganography. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)