ANALYZING THE IMPACT OF THE SECRET SHARING ON STEGO IMAGES

Chaidir Chalaf Islamy, Tohari Ahmad*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

The improvement of information transmission technology not only bene_ts our day-to-day life but also causes a risk in privacy and data security. There are two commonly used methods to protect the transmitted data, cryptography and data hiding. In this paper, we analyze the combination of these two methods to secure data. For the data hiding method, we utilize the histogram of the prediction error (PE) to embed data. We use Shamir's secret sharing to secure the produced stego image further. After that, we measure the quality of the share images. The result of the experiment shows that the quality of the generated shares relies on the number of generated images and the number required to reconstruct the stego image.

Original languageEnglish
Pages (from-to)307-315
Number of pages9
JournalICIC Express Letters
Volume16
Issue number3
DOIs
Publication statusPublished - Mar 2022

Keywords

  • Data hiding
  • Data protection
  • Secret sharing
  • Security

Fingerprint

Dive into the research topics of 'ANALYZING THE IMPACT OF THE SECRET SHARING ON STEGO IMAGES'. Together they form a unique fingerprint.

Cite this