An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix

被引:15
作者
Gao, Kai [1 ]
Horng, Ji-Hwei [2 ]
Chang, Chin-Chen [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Quemoy Univ, Dept Elect Engn, Kinmen 89250, Taiwan
关键词
Fractals; Authentication; Visualization; Data mining; Licenses; Information security; Encryption; Secret image sharing; fractal matrix; data hiding; steganography; authentication; DATA-HIDING SCHEME;
D O I
10.1109/ACCESS.2021.3069008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing (SIS) scheme is an important technology to protect secret information. It distributes the secret data into multiple shares so that the participants can obtain the embedded secret by sharing their authenticated shares. Through a simple process of these shares, the secret data can be extracted. In this paper, we propose a (2, 3) SIS scheme based on a fractal matrix. Through guidance of the proposed fractal matrix, the secret data can be distributed into three shares which are indistinguishable from their corresponding cover images. Any two of the three distinct shares can cooperate to extract the exact secret data. Moreover, we devise two authentication mechanisms to prevent from tampering. Experimental results show that our proposed scheme can provide efficient payloads with shares of good visual quality. The authentications are also effective and easy to implement.
引用
收藏
页码:50112 / 50125
页数:14
相关论文
共 37 条
[1]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[2]  
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[3]  
Chang CC, 2007, TENCON 2007 2007 IEE, P1, DOI DOI 10.1109/TENCON.2007.4483783
[4]  
Chang Chin-Chen, 2013, 2013 9 INT C INFORM
[5]   Adversarial Learning for Invertible Steganography [J].
Chang, Ching-Chun .
IEEE ACCESS, 2020, 8 :198425-198435
[6]   A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection [J].
Chang, Ching-Chun ;
Horng, Ji-Hwei ;
Shih, Chia-Shou ;
Chang, Chin-Chen .
SENSORS, 2020, 20 (13) :1-18
[7]   Fast turtle shell-based data embedding mechanisms with good visual quality [J].
Chang, Ching-Chun ;
Liu, Yanjun .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 16 (03) :589-599
[8]   Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quandratic Residues [J].
Chang, Ching-Chun ;
Li, Chang-Tsun ;
Chen, Kaimeng .
IEEE ACCESS, 2019, 7 :54117-54132
[9]   Privacy-Aware ReversibIe Watermarking in Cloud Computing Environments [J].
Chang, Ching-Chun ;
Li, Chang-Tsun ;
Shi, Yun-Qing .
IEEE ACCESS, 2018, 6 :70720-70733
[10]   A Novel Turtle Shell Based Scheme for Data Hiding [J].
Chang, Ching-Chun ;
Liu, Yanjun ;
Thai-Son Nguyen .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :89-93