Key-Based Steganographic Textual Secret Sharing for Confidential Messaging

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 258)

Abstract

Many email communications remain unencrypted between end points, raising the need for additional encryption. This paper addresses the need by proposing a new cryptographic scheme, which first encrypts a message using key-based Shamir’s secret sharing (using multiple polynomial terms as opposed to only the constant) and discretely hides the shares throughout a cover image using a steganographic technique with number padding. It thus employs multi-layer security requiring the key, the original cover image and the decryption algorithm implementation to unlock the message. Its security is analysed, confirmed and an example given.

Keywords

Shamir’s secret sharing Steganography Email security Internet privacy 

References

  1. 1.
    Carnegie Mellon University: Interception. http://www.mysecurecyberspace.com/secure/email/threats/interception.html (2007)
  2. 2.
    Farrell, S.: Why don’t we encrypt our email?. IEEE Internet Comput. 13(1), 82–85 (2009)Google Scholar
  3. 3.
    Ge, L., Tang, S.: Sharing multi-secret based on circle properties. In: CIS 2008, pp. 340–344 (2008)Google Scholar
  4. 4.
    Gupta, R., Jain, A.: Integrating steganography using genetic algorithm and visual cryptography for robust encryption in computer forensics. Int. J. Electron. Comput. Sci. Eng. 7436, 794–801 (2012)Google Scholar
  5. 5.
    Hawkes, L.W., Yasinsac, A., Cline, C.: An Application of Visual Cryptography to Financial Documents, pp. 1–7. Florida State University, Florida (2000)Google Scholar
  6. 6.
    James, D., Philip, M.: A novel anti phishing framework based on visual cryptography. Int. J. Distrib. Parellel Syst. 3(1), 207–218 (2012)Google Scholar
  7. 7.
    Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94, pp. 1–12 (1994)Google Scholar
  8. 8.
    Rishiwal, V., Yadav, M., Arya, K.V.: A robust secret image sharing scheme. In: 5th ICETET, pp. 11–14 (2008)Google Scholar
  9. 9.
    Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)CrossRefMATHMathSciNetGoogle Scholar
  10. 10.
    Ulutas, M., Ulutas, G., Nabiyev, V.V.: Medical image security and EPR hiding using Shamir’s secret sharing scheme. Syst. Softw. 84(3), 341–353 (2011)CrossRefGoogle Scholar
  11. 11.
    Wu, C., Kao, S., Hwang, M.: Reversible secret image sharing based on Shamir’s scheme. In: 5th International Conference on Intelligent Information Hiding and Multimedia. Signal Process, pp. 1014–1017 (2009)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Mathematics and Computer ScienceLiverpool Hope UniversityLiverpoolUK
  2. 2.National Centre for Advanced Research in Discrete MathematicsKalasalingam UniversityTamil NaduIndia

Personalised recommendations