Abstract
The improvement of information transmission technology not only bene_ts our day-to-day life but also causes a risk in privacy and data security. There are two commonly used methods to protect the transmitted data, cryptography and data hiding. In this paper, we analyze the combination of these two methods to secure data. For the data hiding method, we utilize the histogram of the prediction error (PE) to embed data. We use Shamir's secret sharing to secure the produced stego image further. After that, we measure the quality of the share images. The result of the experiment shows that the quality of the generated shares relies on the number of generated images and the number required to reconstruct the stego image.
Original language | English |
---|---|
Pages (from-to) | 307-315 |
Number of pages | 9 |
Journal | ICIC Express Letters |
Volume | 16 |
Issue number | 3 |
DOIs | |
Publication status | Published - Mar 2022 |
Keywords
- Data hiding
- Data protection
- Secret sharing
- Security