CFP last date
20 May 2024
Reseach Article

Covert Image Transfer: A Secret Sharing Technique

by Subharag Sarkar, Akash Dasgupta, Aloke Bhakta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 18
Year of Publication: 2015
Authors: Subharag Sarkar, Akash Dasgupta, Aloke Bhakta
10.5120/ijca2015906729

Subharag Sarkar, Akash Dasgupta, Aloke Bhakta . Covert Image Transfer: A Secret Sharing Technique. International Journal of Computer Applications. 127, 18 ( October 2015), 10-13. DOI=10.5120/ijca2015906729

@article{ 10.5120/ijca2015906729,
author = { Subharag Sarkar, Akash Dasgupta, Aloke Bhakta },
title = { Covert Image Transfer: A Secret Sharing Technique },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 18 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number18/22828-2015906729/ },
doi = { 10.5120/ijca2015906729 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:21.372744+05:30
%A Subharag Sarkar
%A Akash Dasgupta
%A Aloke Bhakta
%T Covert Image Transfer: A Secret Sharing Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 18
%P 10-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In cryptography, the art of secret sharing, is to share among a group of selected few an individual share of the secret. Individual shares are of no use on their own. The multifaceted implementation of this scheme in literature including Shamir, Blakley and Asmuth-Bloom to name a few, has led to the emergence of higher computational complexity during both sharing and reconstruction and generates noise like shares. In order to come up with a meaningful sharing scheme, Lin and Tsai proposed a method that uses Steganography using Shamir’s secret sharing scheme; again which led to high computational complexity. Therefore, in order to overcome the above problem, a new scheme is suggested which deploys simple graphical masking, done by simply ANDing, value substitution for share generation and reconstruction can be done by value re-substitution and then ORing the qualified set of shares. Also, this proposed method finally creates, meaningful shares by using Steganography; instead of noise like shares.

References
  1. Shamir, Adi (1979). "How to share a secret".Communications of the ACM 22 (11): 612–613.
  2. Blakley, G. R. (1979). "Safeguarding cryptographic keys". Proceedings of the National Computer Conference 48: 313–317.
  3. Krawczyk, Hugo (1993). Secret Sharing Made Short (PDF). CRYPTO '93.
  4. Rabin, Michael O. (1989). "Efficient dispersal of information for security, load balancing, and fault tolerance". Journal of the ACM 36 (2).
  5. Resch, Jason; Plank, James (February 15, 2011).
  6. Parakh, A. and Kak, S. Space efficient secret sharing for implicit data security. Information Sciences, vol. 181, pp. 335-341, 2011.
  7. Parakh, A. and Kak, S. Online data storage using implicit security. Information Sciences, vol. 179, pp. 3323-3331, 2009.
  8. ‘'Unvanish: Reconstructing Self-Destructing Data'
  9. Liddell, Henry George; Scott, Robert; Jones, Henry Stuart; McKenzie, Roderick (1984). A Greek-English Lexicon. Oxford University Press.
  10. Rivest, Ronald L. (1990). "Cryptology". In J. Van Leeuwen. Handbook of Theoretical Computer Science 1. Elsevier.
  11. Bellare, Mihir; Rogaway, Phillip (21 September 2005). "Introduction". Introduction to Modern Cryptography. p. 10.
  12. Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. A. Handbook of Applied Cryptography. ISBN 0-8493-8523-7.
  13. "Overview per country". Crypto Law Survey. February 2013. Retrieved 26 March2015.
  14. "UK Data Encryption Disclosure Law Takes Effect". PC World. 1 October 2007. Retrieved 26 March 2015.
  15. Doctorow, Cory (2 May 2007). "Digg users revolt over AACS key". Boing Boing. Retrieved 26 March 2015.
  16. Kahn, David (1967).  The Codebreakers. ISBN 0-684-83130-9.
  17. Oded Goldreich, Foundations of Cryptography, Volume 1: Basic Tools, Cambridge University Press, 2001, ISBN 0-521-79172-3
  18. "Cryptology (definition)". Merriam-Webster's Collegiate Dictionary (11th ed.). Merriam-Webster. Retrieved 26 March 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Secret Sharing Steganography Low computational complexity High level encryption