A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Analyzing the Impact of the Secret Sharing on Stego Images
2022
ICIC Express Letters
The improvement of information transmission technology not only benefits our day-to-day life but also causes a risk in privacy and data security. There are two commonly used methods to protect the transmitted data, cryptography and data hiding. In this paper, we analyze the combination of these two methods to secure data. For the data hiding method, we utilize the histogram of the prediction error (PE) to embed data. We use Shamir's secret sharing to secure the produced stego image further.
doi:10.24507/icicel.16.03.307
fatcat:ejful7iygfciri3vmygkgzyfo4