Abstract

The (k, n)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces n shadow versions. While k (k ≤ n) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.

Highlights

  • We introduce an optimal (2, 3) reversible secret sharing scheme based on a crystal-lattice matrix

  • This paper uses a crystal-lattice matrix to improve the visual quality of image shadows of the (2, 3) threshold reversible secret image sharing (RSIS) scheme

  • A greedy algorithm is proposed to automatically generate the lattice modFel, which is the fundamental unit of the crystal-lattice matrix

Read more

Summary

Introduction

With the rapid development of the information technology, people can transmit data to each other through the internet. The dual-image-based reversible data hiding (RDH) scheme [18,19,20,21] can be regarded as a special case, with k = n = 2, of the (k, n) secret image sharing. Proposed a (2, 3) reversible secret image sharing scheme based on a fractal matrix. In their method, the secret data is embedded in three shadows of the cover image through the guidance of a fractal matrix. Method steps,secret including thescheme fractal proposed matrix construction phase, the image shad. The (2, 3) reversible secret sharing scheme proposed by Gao et al [30] is composed of in Sections 2.1–2.3, respectively. Construction phase, and theMatrix data extraction togetherPhase with the image recovery phase, as introduced in

Fractal constituted by Type
64 Iadjacent
Image Shadow Production Phase
The of xyby applying operation mapping
Proposed Scheme
Crystal-Lattice Matrix
Shadow Image Generation
Experimental Results
Visual Quality of Image Shadows
Comparison with
Authentication
Comparison with Other Related Schemes
Time Efficiency
PDH Analysis
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.