ICIEVE 2019 Conference

Securing graph steganography by using Shamir-s secret sharing
Aprianti Nanda Sari

Jurusan Teknik Komputer dan Informatika, Politeknik Negeri Bandung
Jalan Gegerkalong Hilir, Bandung


Abstract

Nowadays, information exchange becomes popular along with the development of information technology. To protect their confidential information, people usually use steganography because it hides the presence of the secret information in a media file called as cover. In 2018, Desoky et.al. proposed a method namely graphstega or graph steganography that conceals message as data points in a graph. However, this method is vulnerable since the value represented by the graph is not realistic and this will raise suspicion. To overcome the problem, this paper presents a novel approach by exploiting a graph built based on real data as the cover. To securing the position of the secret message, Shamir-s secret sharing scheme is used. The experiment showed that this method has better security than graphstega.

Keywords: graphstega; Shamirs secret sharing; steganography

Topic: Computers, Internet, Multimedia in Engineering Education

Link: https://ifory.id/abstract-plain/pczEL4XDr3hw

Web Format | Corresponding Author (Aprianti Nanda Sari)