APPLICATION OF SHAMIR SECRET SHARING ALGORITHM IN IMAGE STEGANOGRAPHY

Authors

  • Zekeriya KAYA Kocaeli Üniversitesi, Fen Bilimleri Enstitüsü, Bilişim Sistemleri Mühendisliği
  • Serdar SOLAK Kocaeli Üniversitesi, Fen Bilimleri Enstitüsü, Bilişim Sistemleri Mühendisliği

DOI:

https://doi.org/10.5281/zenodo.7220995

Keywords:

Information Security, Image Steganography, LSB, Shamir Secret Sharing Algorithm, Data Hiding

Abstract

There has been an increase in the flow of information in direct proportion to the increase in the use of the Internet. As a result of this situation, the need to protect information against cyber attacks and security vulnerabilities has arisen. Steganography and secret sharing algorithms are among the methods used to ensure information security and confidentiality. Steganography aims to hide the confidential information to be transmitted to the other party in the media such as text, sound, image and video without being hidden. At the same time, secret sharing algorithms are used to increase the protection of confidential information. Thanks to the secret sharing algorithms, the condition of keeping the information or keeping it in one person has been removed for the security of the confidential information. The information hidden in (k, n) threshold secret sharing algorithms is distributed to n shares, and the secret information is obtained by bringing together k shares. In this article, LSB and Shamir secret sharing algorithm, which is widely used in image steganography, are used together to ensure the security of confidential information. The cover image is divided into the desired number of meaningless share images by Shamir's polynomial-based secret sharing algorithm. In this way, malicious persons intervening during data transmission cannot obtain confidential data unless they can bring together k shares. As a result, the security of confidential information increases with the combined use of preferred methods. As a result of the experimental studies, it has been observed that instead of using data hiding techniques alone to increase data security, it would be appropriate to use them together with encryption and secret sharing algorithms. 

Published

2022-07-29

How to Cite

KAYA, Z., & SOLAK, S. (2022). APPLICATION OF SHAMIR SECRET SHARING ALGORITHM IN IMAGE STEGANOGRAPHY. EJONS INTERNATIONAL JOURNAL, 6(22), 399–407. https://doi.org/10.5281/zenodo.7220995