Abstract
Many email communications remain unencrypted between end points, raising the need for additional encryption. This paper addresses the need by proposing a new cryptographic scheme, which first encrypts a message using key-based Shamir’s secret sharing (using multiple polynomial terms as opposed to only the constant) and discretely hides the shares throughout a cover image using a steganographic technique with number padding. It thus employs multi-layer security requiring the key, the original cover image and the decryption algorithm implementation to unlock the message. Its security is analysed, confirmed and an example given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carnegie Mellon University: Interception. http://www.mysecurecyberspace.com/secure/email/threats/interception.html (2007)
Farrell, S.: Why don’t we encrypt our email?. IEEE Internet Comput. 13(1), 82–85 (2009)
Ge, L., Tang, S.: Sharing multi-secret based on circle properties. In: CIS 2008, pp. 340–344 (2008)
Gupta, R., Jain, A.: Integrating steganography using genetic algorithm and visual cryptography for robust encryption in computer forensics. Int. J. Electron. Comput. Sci. Eng. 7436, 794–801 (2012)
Hawkes, L.W., Yasinsac, A., Cline, C.: An Application of Visual Cryptography to Financial Documents, pp. 1–7. Florida State University, Florida (2000)
James, D., Philip, M.: A novel anti phishing framework based on visual cryptography. Int. J. Distrib. Parellel Syst. 3(1), 207–218 (2012)
Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94, pp. 1–12 (1994)
Rishiwal, V., Yadav, M., Arya, K.V.: A robust secret image sharing scheme. In: 5th ICETET, pp. 11–14 (2008)
Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)
Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Syst. Softw. 84(3), 341–353 (2011)
Wu, C., Kao, S., Hwang, M.: Reversible secret image sharing based on Shamir’s scheme. In: 5th International Conference on Intelligent Information Hiding and Multimedia. Signal Process, pp. 1014–1017 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Buckley, N., Nagar, A.K., Arumugam, S. (2014). Key-Based Steganographic Textual Secret Sharing for Confidential Messaging. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_3
Download citation
DOI: https://doi.org/10.1007/978-81-322-1771-8_3
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1770-1
Online ISBN: 978-81-322-1771-8
eBook Packages: EngineeringEngineering (R0)