Skip to main content

Key-Based Steganographic Textual Secret Sharing for Confidential Messaging

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 258))

Abstract

Many email communications remain unencrypted between end points, raising the need for additional encryption. This paper addresses the need by proposing a new cryptographic scheme, which first encrypts a message using key-based Shamir’s secret sharing (using multiple polynomial terms as opposed to only the constant) and discretely hides the shares throughout a cover image using a steganographic technique with number padding. It thus employs multi-layer security requiring the key, the original cover image and the decryption algorithm implementation to unlock the message. Its security is analysed, confirmed and an example given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Carnegie Mellon University: Interception. http://www.mysecurecyberspace.com/secure/email/threats/interception.html (2007)

  2. Farrell, S.: Why don’t we encrypt our email?. IEEE Internet Comput. 13(1), 82–85 (2009)

    Google Scholar 

  3. Ge, L., Tang, S.: Sharing multi-secret based on circle properties. In: CIS 2008, pp. 340–344 (2008)

    Google Scholar 

  4. Gupta, R., Jain, A.: Integrating steganography using genetic algorithm and visual cryptography for robust encryption in computer forensics. Int. J. Electron. Comput. Sci. Eng. 7436, 794–801 (2012)

    Google Scholar 

  5. Hawkes, L.W., Yasinsac, A., Cline, C.: An Application of Visual Cryptography to Financial Documents, pp. 1–7. Florida State University, Florida (2000)

    Google Scholar 

  6. James, D., Philip, M.: A novel anti phishing framework based on visual cryptography. Int. J. Distrib. Parellel Syst. 3(1), 207–218 (2012)

    Google Scholar 

  7. Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94, pp. 1–12 (1994)

    Google Scholar 

  8. Rishiwal, V., Yadav, M., Arya, K.V.: A robust secret image sharing scheme. In: 5th ICETET, pp. 11–14 (2008)

    Google Scholar 

  9. Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  10. Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Syst. Softw. 84(3), 341–353 (2011)

    Article  Google Scholar 

  11. Wu, C., Kao, S., Hwang, M.: Reversible secret image sharing based on Shamir’s scheme. In: 5th International Conference on Intelligent Information Hiding and Multimedia. Signal Process, pp. 1014–1017 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neil Buckley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Buckley, N., Nagar, A.K., Arumugam, S. (2014). Key-Based Steganographic Textual Secret Sharing for Confidential Messaging. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1771-8_3

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1770-1

  • Online ISBN: 978-81-322-1771-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics