Abstract
This paper first proposes a generation algorithm of a stick insect matrix. Then, a novel reversible secret image sharing scheme based on the stick insect matrix is presented. With the help of our matrix, secret data can be embedded in a cover image to generate two meaningful shadows. It is worth mentioning that the stick insect structure of the proposed matrix can be extended according to the embedding rate of the secret data, meanwhile the generating rules of the stick insect matrix can guarantee optimal visual quality of the generated shadows. Moreover, our scheme also provides an authentication mechanism. The embedded secret data can be retrieved and the cover image can be recovered exactly after successful authentication of two shadows. Experimental results show that our proposed scheme provides excellent visual quality and good authentication ability.
Highlights
With the development of science and technology, we have come to the era of big data [1]
EXPERIMENTAL RESULTS We used two sets of experiments to demonstrate the visual quality of the image shadows produced by our scheme under different embedding rates
We find that when the embedding rate is 1.12bpp, as long as one of the shadow images is tampered, our scheme has a detection rate of more than 97 percent, and when the embedding rate is 1.56bpp, all the DR values are above 95 percent, which indicates that our scheme has a good performance in detecting the tampered area of the image
Summary
With the development of science and technology, we have come to the era of big data [1]. In 2018, Liu and Chang [28] proposed a data hiding method using a turtle shell reference matrix It introduced the concept of authentication for the first time in VSS, producing excellent visual-quality image shadows. All basic structures are disjointed and have the same shape of size 8 By leveraging this reference matrix, each pair of cover pixels can embed 3 bits of secret data with reversibility. Each shared pixel pair (pi, pi2) according to the following rules: Case 1+: By Referring to Fig. 11, if MSI (pi, pi2) is a circled element outside the basic structures, record ‘1’ to the buffer, set (pi, pi2) = (pi, pi1), and go to Case 1. Case 1: If MSI (pi, pi2) is within a stick insect basic structure, extract 3 bits of data according to the element’s value.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.