A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix

被引:13
|
作者
Gao, Kai [1 ]
Horng, Ji-Hwei [2 ]
Liu, Yanjun [1 ]
Chang, Chin-Chen [1 ,3 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Quemoy Univ, Dept Elect Engn, Kinmen 89250, Taiwan
[3] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Insects; Authentication; Data mining; Visualization; Internet; Encryption; Stick insect matrix; secret image sharing; data hiding; authentication;
D O I
10.1109/ACCESS.2020.3009410
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented. With the help of our matrix, secret data can be embedded in a cover image to generate two meaningful shadows. It is worth mentioning that the stick insect structure of the proposed matrix can be extended according to the embedding rate of the secret data, meanwhile the generating rules of the stick insect matrix can guarantee optimal visual quality of the generated shadows. Moreover, our scheme also provides an authentication mechanism. The embedded secret data can be retrieved and the cover image can be recovered exactly after successful authentication of two shadows. Experimental results show that our proposed scheme provides excellent visual quality and good authentication ability.
引用
收藏
页码:130405 / 130416
页数:12
相关论文
共 50 条
  • [41] Pixel Position Based Efficient Image Secret Sharing Scheme
    Sagar, P. Reshma
    Chakra, J. Pruthvi Sri
    Purushothama, B. R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 527 - 533
  • [42] Enhanced Modulo Based Multi Secret Image Sharing Scheme
    Deshmukh, Maroti
    Nain, Neeta
    Ahmed, Mushtaq
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 212 - 224
  • [43] A sudoku-based secret image sharing scheme with reversibility
    Chang C.-C.
    Lin P.-Y.
    Wang Z.H.
    Li M.C.
    Journal of Communications, 2010, 5 (01): : 5 - 12
  • [44] A New Secret Image Sharing Scheme Based on Compressed Sensing
    Yang, Fuqiang
    Dang, Na
    Zhang, Junxing
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 321 - 327
  • [45] A Randomized Kernel-Based Secret Image Sharing Scheme
    Tej, Akella Ravi
    Raviteja, Rekula
    Pankajakshan, Vinod
    2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2018,
  • [46] A novel proactive secret image sharing scheme based on LISS
    Guo, Cheng
    Zhang, Huan
    Fu, Zhangjie
    Feng, Bin
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 19569 - 19590
  • [47] A secret image sharing scheme based on Vector Quantization mechanism
    Chang, Chin-Chen
    Chan, Chi-Shiang
    Fan, Yi-Hsuan
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, 4096 : 469 - 478
  • [48] XOR Based Secret Image Sharing Scheme with Security Improvement
    Ratnam, Javvaji V. K.
    Reddy, T. Sreenivasulu
    Reddy, P. Ramana
    HELIX, 2018, 8 (05): : 3588 - 3592
  • [49] The Secret Image Sharing Scheme Based On Improved LSB Algorithm
    Li, Xiaohong
    Chen, Yuan
    Wang, Feng
    Tao Qinqin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [50] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420