ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secret Sharing based on DCT using XOR

Journal: The Journal of the Institute of Internet, Broadcasting and Communication (Vol.14, No. 4)

Publication Date:

Authors : ;

Page : 13-19

Keywords : Secret Sharing; Cryptographic; DCT; JPEG; XOR;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In general, if a secret of company is owned by a person, the secret is the most vulnerable to attack of hacking. Secret sharing is a solution to solve such a problem. To share the secret to many people not one, it is possible to restore secret when the secret is being stolen by someone. That is, secret sharing, a strong method, was proposed to keep secret information from the robbery. Until now, most secret sharing schemes were based on spatial domain. The hidden data based on spatial domain is easily deleted since a transformation of digital formats (i.e., jpeg to bmp or vise versa). In this paper, we proposed our scheme for complement to resist various attack of cover image as distributing secrets based on DCT of JPEG using exclusive-or operation. The result of experiments proved that the proposed scheme restore original secret.

Last modified: 2016-01-20 14:36:22