veal and use the actual secrets to faithfully reproduce
I
1
,...,I
t−1
as the adversary expect. Likewise, for
I
t+1
,...,I
n
, the user can openly construct fake shares
and reproduce these pictures to the attacker’s expec-
tation. Now, the user can claim the resulting ran-
dom value S
′
to be nothing else than a legitimate fake
message that, with the choice of J
′
that the aversary
cannot recognize as being ̸= J (as it does not know
J), would reproduce exactly the residue R that the at-
tacker may have recovered from I
t
.
6 DISCUSSION
The oblivious secret sharing uses the feature of plausi-
ble deniability to provide additional security for both
mechanisms. It enhances steganography by prevent-
ing an attacker from accessing confidential informa-
tion even if they can detect the presence of a hidden
message. And for secret sharing, the added value of
steganography is to prevent enforced processing of
shares, since we can plausibly deny to possess them.
A demo implementation of our method is available
for download at https://github.com/shahzadssg/How-
to-plausibly-deny-steganographic-secrets.git.
The future research in this area could be the de-
velopment of more efficient and secure protocols for
oblivious secret sharing in the context of plausible
deniability. This could involve exploring new cryp-
tographic techniques, optimizing existing protocols,
and exploring the trade-offs between security, effi-
ciency, and usability. Another area of research could
be the application of oblivious secret sharing to new
and emerging technologies, such as blockchain and
distributed ledger systems. These technologies often
require secure and decentralized methods for sharing
and storing sensitive information, making oblivious
secret sharing a potentially valuable tool. Addition-
ally, the research could focus on integrating obliv-
ious secret sharing with other cryptographic tech-
niques, such as homomorphic encryption and zero-
knowledge proofs, to provide even more robust levels
of security and privacy. Finally, the research could
explore the potential applications of oblivious secret
sharing outside of traditional cryptographic settings,
such as social networks, online voting systems, and
other areas where secure and private information shar-
ing is essential.
REFERENCES
Asokan, N., Niemi, V., and Nyberg, K. (1999). Man-in-the-
middle in tunnelled authentication protocols. In Proc.
8th USENIX Security Symp., pages 111–120, USA.
Baluja, S. (2017). Hiding Images in Plain Sight: Deep
Steganography. In ANIPS, volume 30.
Bellare, M. and Kohno, T. (2003). Cryptographic random
oracle utilities and proofs. In CRYPTO 2003, pages
452–469. Springer.
Blakley, G. R. (1979). Safeguarding cryptographic keys. In
Proc. of NCS, volume 48, pages 313–317.
Canetti, R., Dwork, C., Naor, M., and Ostrovsky, R. (1997).
Deniable Encryption. Lecture Notes in Computer Sci-
ence, pages 90–104, Berlin, Heidelberg. Springer.
Goldberg, I., Wagner, D., Thomas, R., and Brewer, E. A.
(1996). A secure environment for untrusted helper ap-
plications (confining the wily hacker). In Proc. 6th
USENIX Security Symposium, pages 113–128, USA.
Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B.,
Warde-Farley, D., Ozair, S., Courville, A., and Ben-
gio, Y. (2014). Generative adversarial nets. In Proc.
27th ICNIPS - Vol 2, pages 2672–2680. MIT Press.
Jaya Nirmala, S. (2012). A Comparative Study of the Se-
cret Sharing Algorithms for Secure Data in the Cloud.
International Journal on Cloud Computing: Services
and Architecture, 2(4):63–71.
Keller, J. and Wendzel, S. (2021). Reversible and Plausibly
Deniable Covert Channels in One-Time Passwords
Based on Hash Chains. Applied Sciences, 11(2):731.
Radford, A., Metz, L., and Chintala, S. (2015).
Unsupervised Representation Learning with Deep
Convolutional Generative Adversarial Networks.
arXiv:1511.06434.
Rajput, M., Deshmukh, M., Nain, N., and Ahmed, M.
(2018). Securing Data Through Steganography and
Secret Sharing Schemes: Trapping and Misleading
Potential Attackers. IEEE Consumer Electronics
Magazine, 7(5).
Rass, S., K
¨
onig, S., Wachter, J., Egger, M., and Hobisch, M.
(2022). Supervised machine learning with plausible
deniability. Comput. Secur., 112:102506.
Tao, J., Li, S., Zhang, X., and Wang, Z. (2019). To-
wards Robust Image Steganography. IEEE TCSVT,
29(2):594–600.
Vaidya, S. (2023). OpenStego.
https://github.com/syvaidya/openstego.
Volkhonskiy, D., Nazarov, I., and Burnaev, E. (2020).
Steganographic generative adversarial networks. In
12th ICMV, volume 11433, pages 991–1005. SPIE.
Wang, X. and Wang, W. (2010). Secret sharing scheme
based on steganography. In IEEE ICNDS, pages 486–
489.
Wang, Z., Feng, G., and Zhang, X. (2022). Repeatable Data
Hiding: Towards the Reusability of Digital Images.
IEEE TCSVT, 32(1):135–146.
Xu, Y., Xia, Z., Wang, Z., Zhang, X., and Weng, J. (2022).
Deniable Steganography. arXiv:2205.12587 [cs].
Yao, J. and Xiang, Y. (2013). Secret sharing and steganogra-
phy scheme based on visual cryptography. Multimedia
Tools and Applications, 63(2):405–415.
How to Plausibly Deny Steganographic Secrets
737