Abstract
The (k, n)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces n shadow versions. While k (k ≤ n) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.
Highlights
We introduce an optimal (2, 3) reversible secret sharing scheme based on a crystal-lattice matrix
This paper uses a crystal-lattice matrix to improve the visual quality of image shadows of the (2, 3) threshold reversible secret image sharing (RSIS) scheme
A greedy algorithm is proposed to automatically generate the lattice modFel, which is the fundamental unit of the crystal-lattice matrix
Summary
With the rapid development of the information technology, people can transmit data to each other through the internet. The dual-image-based reversible data hiding (RDH) scheme [18,19,20,21] can be regarded as a special case, with k = n = 2, of the (k, n) secret image sharing. Proposed a (2, 3) reversible secret image sharing scheme based on a fractal matrix. In their method, the secret data is embedded in three shadows of the cover image through the guidance of a fractal matrix. Method steps,secret including thescheme fractal proposed matrix construction phase, the image shad. The (2, 3) reversible secret sharing scheme proposed by Gao et al [30] is composed of in Sections 2.1–2.3, respectively. Construction phase, and theMatrix data extraction togetherPhase with the image recovery phase, as introduced in
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.