A Novel (2,3) Reversible Secret Image Sharing Based on Fractal Matrix

被引:10
|
作者
Gao, Kai [1 ]
Horng, Ji-Hwei [2 ]
Chang, Chin-Chen [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Quemoy Univ, Dept Elect Engn, Kinmen 89250, Taiwan
关键词
Authentication; Data mining; Fractals; Cryptography; Insects; Visualization; Image edge detection; Fractal matrix; secret image sharing; data hiding; authentication mechanism; SCHEME;
D O I
10.1109/ACCESS.2020.3025960
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generate three meaningful shadow images. It is worth mentioning that these two types of fractal matrices are designed for different hiding capacity, meanwhile the characteristics of the fractal matrix can guarantee good visual quality of the generated shadow images. Moreover, we provide two authentication mechanisms according to different situations, one of the authentication mechanisms can achieve 100% ability cheat detection. When the authentication is passed, we only need two of the three shadow images to extract the correct secret data and perfectly restore the original image. Experimental results show that our proposed scheme provides excellent authentication ability and good visual quality.
引用
收藏
页码:174325 / 174341
页数:17
相关论文
共 50 条
  • [41] Practical Secret Image Sharing Based on the Chinese Remainder Theorem
    Li, Longlong
    Lu, Yuliang
    Liu, Lintao
    Sun, Yuyuan
    Wang, Jiayu
    MATHEMATICS, 2022, 10 (12)
  • [42] Progressive Reconstruction on Region-Based Secret Image Sharing
    Liu, Yanxiao
    Sun, Qindong
    Yang, Zhihai
    Zhou, Yongluan
    Zhao, Weihua
    Shi, Dantong
    ELECTRONICS, 2024, 13 (08)
  • [43] A secret image sharing based on neighborhood configurations of 2-D cellular automata
    Jin, Jun
    Wu, Zhi-hong
    OPTICS AND LASER TECHNOLOGY, 2012, 44 (03) : 538 - 548
  • [44] A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix Theory
    Ding, Wanmeng
    Liu, Kesheng
    Yan, Xuehu
    Liu, Lintao
    DATA SCIENCE, PT 1, 2017, 727 : 331 - 340
  • [45] Boolean operation based lossless threshold secret image sharing
    Paul, Aakash
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (24) : 35293 - 35316
  • [46] Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing
    Wang, Rui
    Li, Longlong
    Yang, Guozheng
    Yan, Xuehu
    Yan, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9819 - 9834
  • [47] Partial secret image sharing for (k,n) threshold based on image inpainting
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wang, Shen
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 50 : 135 - 144
  • [48] A New Secret Image Sharing Scheme Based on Compressed Sensing
    Yang, Fuqiang
    Dang, Na
    Zhang, Junxing
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 321 - 327
  • [49] Novel quantum secret image-sharing scheme
    罗高峰
    周日贵
    胡文文
    Chinese Physics B, 2019, (04) : 65 - 73
  • [50] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093