IBM Systems Journal
Communications of the ACM
Secure Steganographic Methods for Palette Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Secret image sharing with steganography and authentication
Journal of Systems and Software
A new approach to covert communication via PDF files
Signal Processing
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
A new covert communication method with a self-authentication capability for secret data hiding in spreadsheets using the information sharing technique is proposed. At the sender site, a secret message is transformed into shares by Shamir's (k, n)-threshold secret sharing scheme with n=k+1, and the generated k+1 shares are embedded into the number items in a spreadsheet as if they are part of the spreadsheet content. And at the receiver site, every k shares among the k+1 ones then are extracted from the stego-spreadsheet to recover k+1 copies of the secret, and the consistency of the k+1 copies in value is checked to determine whether the embedded shares are intact or not, achieving a new type of blind self-authentication of the embedded secret. By dividing the secret message into segments and applying to each segment the secret sharing scheme, the integrity and fidelity of the hidden secret message can be verified, achieving a covert communication process with the double functions of information hiding and self-authentication. Experimental results and discussions on data embedding capacity, authentication precision, and steganalysis issues are also included to show the feasibility of the proposed method.