Secret Sharing based on DCT using XOR
Journal: The Journal of the Institute of Internet, Broadcasting and Communication (Vol.14, No. 4)Publication Date: 2014-08-31
Authors : Cheonshik Kim;
Page : 13-19
Keywords : Secret Sharing; Cryptographic; DCT; JPEG; XOR;
Abstract
In general, if a secret of company is owned by a person, the secret is the most vulnerable to attack of hacking. Secret sharing is a solution to solve such a problem. To share the secret to many people not one, it is possible to restore secret when the secret is being stolen by someone. That is, secret sharing, a strong method, was proposed to keep secret information from the robbery. Until now, most secret sharing schemes were based on spatial domain. The hidden data based on spatial domain is easily deleted since a transformation of digital formats (i.e., jpeg to bmp or vise versa). In this paper, we proposed our scheme for complement to resist various attack of cover image as distributing secrets based on DCT of JPEG using exclusive-or operation. The result of experiments proved that the proposed scheme restore original secret.
Other Latest Articles
- Implementation and Experiment of CoAP Protocol Based on IoT for Verification of Interoperability
- Mobile Content Curation Service Based on Real-Time Request/Response Model
- Hamdullah Suphi’nin Haleb Hatıraları I
- İslam Dünyası Bilim’de Neden Geri kaldı?
- 1911-1913 (1329-1331) Tarihli Osmanlı Hilâl-i Ahmer Sâlnâmesine Göre Balkan Savaşları Sırasında Hint Müslüman Halkının Osmanlı'ya Yardımları
Last modified: 2016-01-20 14:36:22