DOI QR코드

DOI QR Code

Secret Sharing based on DCT using XOR

배타적 논리합을 사용한 DCT 기반의 비밀공유

  • Kim, Cheonshik (Dept. of Digital Medial Engineering, Anyang University)
  • 김천식 (안양대학교 디지털미디어공학과)
  • Received : 2014.06.18
  • Accepted : 2014.08.08
  • Published : 2014.08.31

Abstract

In general, if a secret of company is owned by a person, the secret is the most vulnerable to attack of hacking. Secret sharing is a solution to solve such a problem. To share the secret to many people not one, it is possible to restore secret when the secret is being stolen by someone. That is, secret sharing, a strong method, was proposed to keep secret information from the robbery. Until now, most secret sharing schemes were based on spatial domain. The hidden data based on spatial domain is easily deleted since a transformation of digital formats (i.e., jpeg to bmp or vise versa). In this paper, we proposed our scheme for complement to resist various attack of cover image as distributing secrets based on DCT of JPEG using exclusive-or operation. The result of experiments proved that the proposed scheme restore original secret.

일반적으로 회사의 중요한 비밀을 한명이 소유하고 있다면 해킹과 같은 방법에 매우 취약할 수밖에 없다. 이와같은 문제를 해결할 수 있는 방안으로 탄생한 것이 비밀공유이다. 비밀을 중요한 한사람이 아닌 여러 명이 나누어 보관함으로써 한명이 누군가에 의해서 비밀을 도난당하더라도 복구할 수 있다는 개념에서 출발하였다. 즉, 비밀 정보를 도난으로부터 지킬 수 있는 강한 방법으로 비밀공유 방법이 제안되었다. 지금까지의 대부분의 방법은 공간영역에 기반을 둔 방법이었다. 이 방법은 간단한 포맷 변환만으로 쉽게 영상의 변형이 일어나므로 원래 은닉된 데이터가 제거된다. 본 논문에서는 JPG의 DCT 기반에 의해서 비밀을 배타적 논리합에 의해서 분배함으로써 이미지에 대한 공격에 보다 강한 면을 보완하고자 제안 하였다. 실험결과 원본 비밀을 정확해 복구할 수 있음을 실험을 통해서 입증하였다.

Keywords

References

  1. Blakley, G.R., 1979. Safeguarding cryptographic keys. In: Proc. AFIPS National Computer Conf., vol. 48, pp. 313-317.
  2. Shamir, A., 1979. How to share a secret. Comm. ACM 22 (11), 612-613. https://doi.org/10.1145/359168.359176
  3. Naor, M., Shamir, A., 1995. Visual Cryptography. Advances in Cryptology: Eurocrypt'94. Spring-Verlag, Berlin. pp. 1-12.
  4. Chen, T.H., Tsao, K.H., 2009. Visual secret sharing by random grids revisited. Pattern Recognition 42 (9), 2203-2217. https://doi.org/10.1016/j.patcog.2008.11.015
  5. Shamir, A., Naor, M., 1996. Visual cryptography II: Improving the contrast via the cover base. Security Comm. Networks, 16-17.
  6. Lin, C.C., Tsai, W.H., 2004. Secret image sharing with steganography and authentication. J. Syst. Software 73 (3), 405-414. https://doi.org/10.1016/S0164-1212(03)00239-5
  7. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C., 2007. Improvements of image sharing with steganography and authentication. J. Syst. Software 80 (7), 1070-1076. https://doi.org/10.1016/j.jss.2006.11.022
  8. Beimel, A., Chor, B., 1998. Secret sharing with public reconstruction. IEEE Trans. Inform. Theory 44 (5), 1887-1896. https://doi.org/10.1109/TIT.1998.705566
  9. Park, Y. B., Park, J. I., 2002. A Study on the Cipher JPEG Img, Journal of the Korea Academia-Industrial cooperation Society, vol.3, no.4, pp.308-312, 2002.
  10. Chang, C.C., Lin, C.C., Lin, C.H., Chen, Y.H., 2008. A novel secret image sharing scheme in color images using small shadow images. Inform. Sci. 178 (11), 2433-2447. https://doi.org/10.1016/j.ins.2007.12.016
  11. Chang, C.C., Hsieh, Y.P., Lin, C.H., 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41 (10), 3130-3137. https://doi.org/10.1016/j.patcog.2008.04.006
  12. Lin, P.Y., Lee, J.S., Chang, C.C., 2009. Distortion-free secret image sharing mechanism using modulus operator. Pattern Recognition 42 (5), 886-895. https://doi.org/10.1016/j.patcog.2008.09.014
  13. Thien, C.C., Lin, J.C., 2002. Secret image sharing. Comput. Graphics 26 (1), 765-770. https://doi.org/10.1016/S0097-8493(02)00131-0
  14. Wang, R.Z., Su, C.H., 2006. Secret image sharing with smaller shadow images. Pattern Recognition Lett. 27 (6), 551-555. https://doi.org/10.1016/j.patrec.2005.09.021
  15. Wang, D., Zhang, L., Ma, N., Li, X., 2007. Two secret sharing schemes based on Boolean operations. Pattern Recognition 40 (10), 2776-2785. https://doi.org/10.1016/j.patcog.2006.11.018
  16. Kim, C., 2013. (2, 2) Secret Sharing Using Data Hiding and Multiplexer Technique, The Journal of The Institute of Internet, Broadcasting and Communication, vol.13, no.4, pp.75-81. https://doi.org/10.7236/JIIBC.2013.13.4.75
  17. Wu, Y.S., Thien, C.C., Lin, J.C., 2004. Sharing and hiding secret images with size constraint. Pattern Recognition 37 (7), 1377-1385. https://doi.org/10.1016/j.patcog.2004.01.002
  18. Kim, C., 2014. Data hiding by an improved exploiting modification direction, Multimedia Tools and Applications, vol.69, no.3, pp 569-584. https://doi.org/10.1007/s11042-012-1114-0