A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix

被引:14
作者
Gao, Kai [1 ]
Horng, Ji-Hwei [2 ]
Liu, Yanjun [1 ]
Chang, Chin-Chen [1 ,3 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Quemoy Univ, Dept Elect Engn, Kinmen 89250, Taiwan
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
关键词
Insects; Authentication; Data mining; Visualization; Internet; Encryption; Stick insect matrix; secret image sharing; data hiding; authentication;
D O I
10.1109/ACCESS.2020.3009410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented. With the help of our matrix, secret data can be embedded in a cover image to generate two meaningful shadows. It is worth mentioning that the stick insect structure of the proposed matrix can be extended according to the embedding rate of the secret data, meanwhile the generating rules of the stick insect matrix can guarantee optimal visual quality of the generated shadows. Moreover, our scheme also provides an authentication mechanism. The embedded secret data can be retrieved and the cover image can be recovered exactly after successful authentication of two shadows. Experimental results show that our proposed scheme provides excellent visual quality and good authentication ability.
引用
收藏
页码:130405 / 130416
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2011, Categorical Data Analysis
[2]  
[Anonymous], 1995, LECT NOTES COMPUTER
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]  
Blakley G.R., 1979, P 1979 AFIPS NAT COM, P313
[5]  
Chang C. C., 2007, P IEEE REG 10 C NOV, P1, DOI DOI 10.1109/TENCON.2007.4483783
[6]   A multiple-level visual secret-sharing scheme without image size expansion [J].
Chen, Yung-Fu ;
Chan, Yung-Kuan ;
Huang, Ching-Chun ;
Tsai, Meng-Hsiun ;
Chu, Yen-Ping .
INFORMATION SCIENCES, 2007, 177 (21) :4696-4710
[7]   A sudoku-based secret image sharing scheme with reversibility [J].
Chang C.-C. ;
Lin P.-Y. ;
Wang Z.H. ;
Li M.C. .
Journal of Communications, 2010, 5 (01) :5-12
[8]  
Daley R., 1993, Atmospheric Data Analysis
[9]  
Fang WP, 2009, INT J COMPUT SCI NET, V9, P204
[10]   Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction [J].
Gao, Xinyi ;
Pan, Zhibin ;
Gao, Erdun ;
Fan, Guojun .
SIGNAL PROCESSING, 2020, 173