完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lee, Che-Wei | en_US |
dc.contributor.author | Tsai, Wen-Hsiang | en_US |
dc.date.accessioned | 2014-12-08T15:29:11Z | - |
dc.date.available | 2014-12-08T15:29:11Z | - |
dc.date.issued | 2013-02-01 | en_US |
dc.identifier.issn | 0164-1212 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.jss.2012.08.048 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/21025 | - |
dc.description.abstract | A new covert communication method with a self-authentication capability for secret data hiding in spreadsheets using the information sharing technique is proposed. At the sender site, a secret message is transformed into shares by Shamir's (k, n)-threshold secret sharing scheme with n = k + 1, and the generated k + 1 shares are embedded into the number items in a spreadsheet as if they are part of the spreadsheet content. And at the receiver site, every k shares among the k + 1 ones then are extracted from the stego-spreadsheet to recover k + 1 copies of the secret, and the consistency of the k + 1 copies in value is checked to determine whether the embedded shares are intact or not, achieving a new type of blind self-authentication of the embedded secret. By dividing the secret message into segments and applying to each segment the secret sharing scheme, the integrity and fidelity of the hidden secret message can be verified, achieving a covert communication process with the double functions of information hiding and self-authentication. Experimental results and discussions on data embedding capacity, authentication precision, and steganalysis issues are also included to show the feasibility of the proposed method. (c) 2012 Elsevier Inc. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Covert communication | en_US |
dc.subject | Secret sharing | en_US |
dc.subject | Information hiding | en_US |
dc.subject | Self-authentication | en_US |
dc.subject | Spreadsheet | en_US |
dc.title | A covert communication method via spreadsheets by secret sharing with a self-authentication capability | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.jss.2012.08.048 | en_US |
dc.identifier.journal | JOURNAL OF SYSTEMS AND SOFTWARE | en_US |
dc.citation.volume | 86 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 324 | en_US |
dc.citation.epage | 334 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000313600700006 | - |
dc.citation.woscount | 0 | - |
顯示於類別: | 期刊論文 |