A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix
The (<i>k</i>, <i>n</i>)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces <i>n</i> shadow versions. While <i>k</i> (<i>k</i><inline-formula><math xmlns="...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e3cd801a84e147d098fd40a5a1fff1de |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:e3cd801a84e147d098fd40a5a1fff1de |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:e3cd801a84e147d098fd40a5a1fff1de2021-11-25T19:06:26ZA Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix10.3390/sym131120632073-8994https://doaj.org/article/e3cd801a84e147d098fd40a5a1fff1de2021-11-01T00:00:00Zhttps://www.mdpi.com/2073-8994/13/11/2063https://doaj.org/toc/2073-8994The (<i>k</i>, <i>n</i>)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces <i>n</i> shadow versions. While <i>k</i> (<i>k</i><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo> </mo><mo>≤</mo><mo> </mo></mrow></semantics></math></inline-formula><i>n</i>) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.Jiang-Yi LinJi-Hwei HorngChin-Chen ChangMDPI AGarticle(2, 3) secret image sharingreversible data hidingcrystal-lattice matrixauthenticationMathematicsQA1-939ENSymmetry, Vol 13, Iss 2063, p 2063 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
(2, 3) secret image sharing reversible data hiding crystal-lattice matrix authentication Mathematics QA1-939 |
spellingShingle |
(2, 3) secret image sharing reversible data hiding crystal-lattice matrix authentication Mathematics QA1-939 Jiang-Yi Lin Ji-Hwei Horng Chin-Chen Chang A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
description |
The (<i>k</i>, <i>n</i>)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces <i>n</i> shadow versions. While <i>k</i> (<i>k</i><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo> </mo><mo>≤</mo><mo> </mo></mrow></semantics></math></inline-formula><i>n</i>) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works. |
format |
article |
author |
Jiang-Yi Lin Ji-Hwei Horng Chin-Chen Chang |
author_facet |
Jiang-Yi Lin Ji-Hwei Horng Chin-Chen Chang |
author_sort |
Jiang-Yi Lin |
title |
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
title_short |
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
title_full |
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
title_fullStr |
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
title_full_unstemmed |
A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix |
title_sort |
novel (2, 3)-threshold reversible secret image sharing scheme based on optimized crystal-lattice matrix |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/e3cd801a84e147d098fd40a5a1fff1de |
work_keys_str_mv |
AT jiangyilin anovel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix AT jihweihorng anovel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix AT chinchenchang anovel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix AT jiangyilin novel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix AT jihweihorng novel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix AT chinchenchang novel23thresholdreversiblesecretimagesharingschemebasedonoptimizedcrystallatticematrix |
_version_ |
1718410311412744192 |