A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix

被引:13
|
作者
Gao, Kai [1 ]
Horng, Ji-Hwei [2 ]
Liu, Yanjun [1 ]
Chang, Chin-Chen [1 ,3 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Quemoy Univ, Dept Elect Engn, Kinmen 89250, Taiwan
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Insects; Authentication; Data mining; Visualization; Internet; Encryption; Stick insect matrix; secret image sharing; data hiding; authentication;
D O I
10.1109/ACCESS.2020.3009410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented. With the help of our matrix, secret data can be embedded in a cover image to generate two meaningful shadows. It is worth mentioning that the stick insect structure of the proposed matrix can be extended according to the embedding rate of the secret data, meanwhile the generating rules of the stick insect matrix can guarantee optimal visual quality of the generated shadows. Moreover, our scheme also provides an authentication mechanism. The embedded secret data can be retrieved and the cover image can be recovered exactly after successful authentication of two shadows. Experimental results show that our proposed scheme provides excellent visual quality and good authentication ability.
引用
收藏
页码:130405 / 130416
页数:12
相关论文
共 50 条
  • [21] Secret image sharing scheme based solely on ADDITION
    Tsai, M. -H.
    Chen, C. -K.
    Chen, Y. -F.
    Chan, Y. -K.
    Chen, K. -C.
    Chu, Y. -P.
    IMAGING SCIENCE JOURNAL, 2008, 56 (04): : 183 - 188
  • [22] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [23] Secret Image Sharing Scheme Based on a Boolean Operation
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarka, Partha Pratim
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2014, 14 (02) : 98 - 113
  • [24] Secret Image Sharing Scheme Based on Bivariate Polynomial
    Tang, Dan
    Huang, Jian
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 193 - 195
  • [25] Secret Sharing Scheme for Image Encryption Using New Transformation Matrix
    Selvi, A. Kalai
    Sathik, M. Mohamed
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 647 - +
  • [26] An image secret sharing scheme with the capability of previvewing the secret image
    Yang, Ching-Nung
    Chen, Tse-Shih
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1535 - 1538
  • [27] An Image Secret Sharing Method Based on Matrix Theory
    Ding, Wanmeng
    Liu, Kesheng
    Yan, Xuehu
    Wang, Huaixi
    Liu, Lintao
    Gong, Qinghong
    SYMMETRY-BASEL, 2018, 10 (10):
  • [28] A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Yuan, Li-Feng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [29] A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem
    Ke, Yan
    Zhang, Minqing
    Zhang, Xinpeng
    Liu, Jia
    Su, Tingting
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (04) : 2469 - 2481
  • [30] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619