Evaluating the Impact of the Number of Secret Sharing Participants on Stego Image

Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Transmitting secret information that is constantly carried out on the internet can increase security risks. In this research, we implement the histogram-based method and prediction-error expansion scheme to work on this issue. Here, the stego image produced by these methods is processed with Shamir's secret sharing to protect further the data hidden inside it. To reconstruct the stego image, at least some participants must combine the share images. Then, the data hidden in the stego image can be retrieved. Based on the results, the lower the number of participants, the better the PSNR value of the shared images. Although a more significant number of participants can make it harder to obtain the stego image, it lowers the imperceptibility of the shared images. From the experiment, we find that all shared images have PSNR values lower than 30 dB, and further research should focus on improving the quality of the share images.

Original languageEnglish
Title of host publication2021 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665442640
DOIs
Publication statusPublished - 2021
Event13th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2021 - Depok, Indonesia
Duration: 23 Oct 202126 Oct 2021

Publication series

Name2021 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2021

Conference

Conference13th International Conference on Advanced Computer Science and Information Systems, ICACSIS 2021
Country/TerritoryIndonesia
CityDepok
Period23/10/2126/10/21

Keywords

  • Data hiding
  • data protection
  • network infrastructure
  • secret sharing
  • security

Fingerprint

Dive into the research topics of 'Evaluating the Impact of the Number of Secret Sharing Participants on Stego Image'. Together they form a unique fingerprint.

Cite this