2019
DOI: 10.1007/s13319-019-0216-0
|View full text |Cite
|
Sign up to set email alerts
|

Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 65 publications
(26 citation statements)
references
References 28 publications
0
26
0
Order By: Relevance
“…The security of the modern text steganography method can be defined as its ability and strength to resist any attack to remove or destroy the hidden data [116,141]. It is achieved by increasing the level of algorithm complexity, such as random or non-sequence embedding positions [106,142], randomly selecting secret bits [143][144][145], and generating a strong stego key [116,121,[144][145][146][147][148]. As a result, using one or more of these complexity techniques makes the hidden data extremely difficult to extract.…”
Section: Securitymentioning
confidence: 99%
“…The security of the modern text steganography method can be defined as its ability and strength to resist any attack to remove or destroy the hidden data [116,141]. It is achieved by increasing the level of algorithm complexity, such as random or non-sequence embedding positions [106,142], randomly selecting secret bits [143][144][145], and generating a strong stego key [116,121,[144][145][146][147][148]. As a result, using one or more of these complexity techniques makes the hidden data extremely difficult to extract.…”
Section: Securitymentioning
confidence: 99%
“…The generated share thus obtained, improves the security of access to the system [30,31]. The generated secret keys are generally concealed in texts [32][33][34] and images [35,36] using steganographic schemes.…”
Section: Distributed Steganographymentioning
confidence: 99%
“…Moreover, they are also used in steganography to hide in a distributed manner the share keys of each participant. To this end, methods are provided for concealing the target key in specific covert media such as text [45,46] or images [47,48]. Distributed steganography is interesting because it makes detection task more complicated by spreading the secret in various media and store them in random places.…”
Section: Distributed Steganographymentioning
confidence: 99%