Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix

被引:4
作者
Lin, Yijie [1 ]
Lin, Chia-Chen [2 ]
Liu, Jui-Chuan [1 ]
Chang, Chin-Chen [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
[2] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
关键词
Secret image sharing; (t; n)-SIS; turtle shell; adaptive data hiding capacity; verifiability; message digest; EXPANSION;
D O I
10.1016/j.jisa.2023.103679
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet technology advances rapidly, safeguarding confidential messages has become an increasingly pressing concern. Among the various schemes available, secret image sharing (SIS) has gained considerable attention. Particularly, the (t, n) secret sharing scheme offers robust protection for hidden secret messages. However, it remains challenging to expand the quality of t and n while maintaining acceptable image quality for the share images and enhancing security features. To address these challenges, we have developed a variant turtle shell known as the slim turtle shell, which we incorporate into our innovative (t, n)-SIS scheme. The slim turtle shell technique not only facilitates the creation of meaningful shares but also ensures that the resulting meaningful shares maintain a high level of visual quality, thanks to its impressive embedding capabilities. Additionally, we have devised two authentication mechanisms to validate the integrity of both shares and secret images. These mechanisms facilitate the detection of tampering during the secret message extraction and verification phase, should the integrity be compromised. Empirical results from our experiments demonstrate an impressive embedding capacity of 1,572,864 bits in our proposed scheme, coupled with an average PSNR (Peak Signal-to-Noise Ratio) of 45.80 dB. Furthermore, our scheme demonstrates superior authentication capabilities when compared to other existing schemes.
引用
收藏
页数:15
相关论文
共 40 条
[1]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[2]  
[Anonymous], 2009, Int J Smart Home
[3]  
Bas P., Image Database of BOWS-2
[4]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[5]  
Chang C., 2007, TENCON 2007 2007 IEE, P1
[6]   Information hiding in dual images with reversibility [J].
Chang, Chin-Chen ;
Chou, Yung-Chen ;
The Duc Kieu .
THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, :145-+
[7]  
Chang Chin-Chen., 2008, 2008 3 INT C INN COM, P17, DOI 10.1109/ICICIC.2008.149
[8]   A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection [J].
Chang, Ching-Chun ;
Horng, Ji-Hwei ;
Shih, Chia-Shou ;
Chang, Chin-Chen .
SENSORS, 2020, 20 (13) :1-18
[9]   A Novel Turtle Shell Based Scheme for Data Hiding [J].
Chang, Ching-Chun ;
Liu, Yanjun ;
Thai-Son Nguyen .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :89-93
[10]   Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix [J].
Chen, Yi-Hui ;
Lee, Jia-Ye ;
Chiang, Min-Hsien ;
Chen, Shih-Hsin .
SYMMETRY-BASEL, 2022, 14 (07)