Analyzing the Impact of the Secret Sharing on Stego Images

Chaidir Chalaf Islamy, Tohari Ahmad
2022 ICIC Express Letters  
The improvement of information transmission technology not only benefits our day-to-day life but also causes a risk in privacy and data security. There are two commonly used methods to protect the transmitted data, cryptography and data hiding. In this paper, we analyze the combination of these two methods to secure data. For the data hiding method, we utilize the histogram of the prediction error (PE) to embed data. We use Shamir's secret sharing to secure the produced stego image further.
more » ... r that, we measure the quality of the share images. The result of the experiment shows that the quality of the generated shares relies on the number of generated images and the number required to reconstruct the stego image.
doi:10.24507/icicel.16.03.307 fatcat:ejful7iygfciri3vmygkgzyfo4