This paper demonstrates the feasibility of combining the use of secret sharing in conjunction with audio steganography to provide a robust way to store and transmit secret data. Storage of secret information is a constant security concern in the corporate and military environment. Cryptography and steganography are two known techniques that deal with this concern. Recently, the combination of the two techniques has been used in conjunction to improve data security. However, a weakness of this technique is that storage is centralized. The hidden information is stored in a single information carrier of location. If the information carrier or location becomes inaccessible, the hidden information becomes irretrievable. This article proposes the use of a threshold scheme in conjunction with steganography to provide a robust method of hiding information in MP3 audio files. This approach addresses the weakness existing in storage and transmission of secret data as abovementioned. The article concludes with the results of such an application and recommendation for future work. Keywords-Steganography; cryptography; information carrier; threshold sharing scheme; mp3 audio files
[1]
Adi Shamir,et al.
How to share a secret
,
1979,
CACM.
[2]
Scot Hacker,et al.
MP3: The Definitive Guide
,
2000
.
[3]
Ja-Chen Lin,et al.
Secret image sharing
,
2002,
Comput. Graph..
[4]
Chang-Chou Lin,et al.
Secret image sharing with steganography and authentication
,
2004,
J. Syst. Softw..
[5]
Chin-Chen Chang,et al.
Sharing secrets in stego images with authentication
,
2008,
Pattern Recognit..
[6]
Paresh Marwaha,et al.
Visual cryptographic steganography in images
,
2010,
2010 Second International conference on Computing, Communication and Networking Technologies.
[7]
G. R. Blakley,et al.
Safeguarding cryptographic keys
,
1899,
1979 International Workshop on Managing Requirements Knowledge (MARK).
[8]
P. V. Oorschot.
Overview of Cryptography
,
.
[9]
Ching-Nung Yang,et al.
Improvements of image sharing with steganography and authentication
,
2007,
J. Syst. Softw..