{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:13Z","timestamp":1747224073984,"version":"3.40.5"},"reference-count":21,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>This article proposes a novel behavior steganography model based on secret sharing, the main idea of which is to use secret messages as random elements in the secret sharing process to generate shadow images. Based on the introduced model and analyzing two secret image sharing algorithms \u2014 threshold secret image sharing (SIS) and threshold visual secret sharing (VSS), two specific behavior steganography schemes are presented, which are implemented by utilizing secret sharing behavior. In the embedding phase, the random selection behavior is employed to hide secret messages. In the extraction phase, when the secret image is recovered from shadow images, secret messages can also be extracted successfully. The contribution of the authors model is that two secret information transmission channels are opened, which provides a large amount of hidden capacity and has loss tolerance and so on. Experimental results and analyses demonstrate the effectiveness of the proposed scheme. It has both good imperceptibility and large capacity, but the robustness of their scheme is poor.<\/jats:p>","DOI":"10.4018\/ijdcf.2019100107","type":"journal-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T10:10:22Z","timestamp":1569579022000},"page":"97-117","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Behavior Steganography Model Based on Secret Sharing"],"prefix":"10.4018","volume":"11","author":[{"given":"Hanlin","family":"Liu","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]},{"given":"Jingju","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6388-1720","authenticated-orcid":true,"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]},{"given":"Lintao","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]},{"given":"Wanmeng","family":"Ding","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]},{"given":"Yue","family":"Jiang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019100107-0","article-title":"Secret sharing using 3 level dwt method of image steganography based on lorenz chaotic encryption and visual cryptography.","author":"B. G.Banik","year":"2016","journal-title":"International Conference on Computational Intelligence and Communication Networks"},{"key":"IJDCF.2019100107-1","first-page":"270","article-title":"Binary image hiding algorithm based on multi-secret sharing and dct.","volume":"38","author":"R.BCao","year":"2011","journal-title":"Computer Science"},{"key":"IJDCF.2019100107-2","unstructured":"Divya, S. S., & Reddy, M. R. M. (2012). Hiding text in audio using multiple LSB steganography and provide security using cryptography. International journal of scientific & technology research, 1(6), 68-70."},{"key":"IJDCF.2019100107-3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22714-1_50"},{"journal-title":"Information Hiding: Steganography and Watermarking-Attacks and Countermeasures","year":"2012","author":"N. F.Johnson","key":"IJDCF.2019100107-4"},{"key":"IJDCF.2019100107-5","doi-asserted-by":"publisher","DOI":"10.1364\/OL.12.000377"},{"key":"IJDCF.2019100107-6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2011.6122823"},{"key":"IJDCF.2019100107-7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74769-7_78"},{"key":"IJDCF.2019100107-8","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2012.293"},{"key":"IJDCF.2019100107-9","unstructured":"Li, P., Ma, P., Su, X., & Liu, F. (2012). Multi-threshold image secret sharing scheme. Acta Electronica Sinica, 40, 518\u2013524."},{"key":"IJDCF.2019100107-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.07.005"},{"key":"IJDCF.2019100107-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.04.001"},{"key":"IJDCF.2019100107-12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"IJDCF.2019100107-13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"IJDCF.2019100107-14","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"IJDCF.2019100107-15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2024721"},{"key":"IJDCF.2019100107-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.06.011"},{"key":"IJDCF.2019100107-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2010.04.003"},{"journal-title":"Behavior Steganography in Social Network","year":"2017","author":"X.Zhang","key":"IJDCF.2019100107-18"},{"key":"IJDCF.2019100107-19","unstructured":"Zhang, X. P., Qian, Z. X., & Li, S. (2016). Prospect of digital steganography research."},{"key":"IJDCF.2019100107-20","doi-asserted-by":"publisher","DOI":"10.1145\/2566590.2566610"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=238887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:02:34Z","timestamp":1651838554000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019100107"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":21,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019100107","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"type":"print","value":"1941-6210"},{"type":"electronic","value":"1941-6229"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}