A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix

The (<i>k</i>, <i>n</i>)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces <i>n</i> shadow versions. While <i>k</i> (<i>k</i><inline-formula><math xmlns="...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/e3cd801a84e147d098fd40a5a1fff1de
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:e3cd801a84e147d098fd40a5a1fff1de
record_format dspace
spelling oai:doaj.org-article:e3cd801a84e147d098fd40a5a1fff1de2021-11-25T19:06:26ZA Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix10.3390/sym131120632073-8994https://doaj.org/article/e3cd801a84e147d098fd40a5a1fff1de2021-11-01T00:00:00Zhttps://www.mdpi.com/2073-8994/13/11/2063https://doaj.org/toc/2073-8994The (<i>k</i>, <i>n</i>)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces <i>n</i> shadow versions. While <i>k</i> (<i>k</i><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo> </mo><mo>≤</mo><mo> </mo></mrow></semantics></math></inline-formula><i>n</i>) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.Jiang-Yi LinJi-Hwei HorngChin-Chen ChangMDPI AGarticle(2, 3) secret image sharingreversible data hidingcrystal-lattice matrixauthenticationMathematicsQA1-939ENSymmetry, Vol 13, Iss 2063, p 2063 (2021)
institution DOAJ
collection DOAJ
language EN
topic (2, 3) secret image sharing
reversible data hiding
crystal-lattice matrix
authentication
Mathematics
QA1-939
spellingShingle (2, 3) secret image sharing
reversible data hiding
crystal-lattice matrix
authentication
Mathematics
QA1-939
Jiang-Yi Lin
Ji-Hwei Horng
Chin-Chen Chang
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
description The (<i>k</i>, <i>n</i>)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces <i>n</i> shadow versions. While <i>k</i> (<i>k</i><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo> </mo><mo>≤</mo><mo> </mo></mrow></semantics></math></inline-formula><i>n</i>) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.
format article
author Jiang-Yi Lin
Ji-Hwei Horng
Chin-Chen Chang
author_facet Jiang-Yi Lin
Ji-Hwei Horng
Chin-Chen Chang
author_sort Jiang-Yi Lin
title A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
title_short A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
title_full A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
title_fullStr A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
title_full_unstemmed A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
title_sort novel (2, 3)-threshold reversible secret image sharing scheme based on optimized crystal-lattice matrix
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/e3cd801a84e147d098fd40a5a1fff1de
work_keys_str_mv AT jiangyilin anovel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix
AT jihweihorng anovel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix
AT chinchenchang anovel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix
AT jiangyilin novel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix
AT jihweihorng novel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix
AT chinchenchang novel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix
_version_ 1718410311412744192