Abstract

Secret image sharing (SIS) scheme is an important technology to protect secret information. It distributes the secret data into multiple shares so that the participants can obtain the embedded secret by sharing their authenticated shares. Through a simple process of these shares, the secret data can be extracted. In this paper, we propose a (2, 3) SIS scheme based on a fractal matrix. Through guidance of the proposed fractal matrix, the secret data can be distributed into three shares which are indistinguishable from their corresponding cover images. Any two of the three distinct shares can cooperate to extract the exact secret data. Moreover, we devise two authentication mechanisms to prevent from tampering. Experimental results show that our proposed scheme can provide efficient payloads with shares of good visual quality. The authentications are also effective and easy to implement.

Highlights

  • Nowadays, with the rapid development of the Internet, people can continuously enjoy the fruits of the latest technological revolution

  • In order to reduce the risk of tampering attacks, Gao et al [36] proposed a (2, 3) reversible Secret image sharing (SIS) scheme based on the fractal matrix

  • EXPERIMENTAL RESULTS In this experimental section, we will evaluate the performance of our SIS scheme

Read more

Summary

INTRODUCTION

With the rapid development of the Internet, people can continuously enjoy the fruits of the latest technological revolution. In 2020, Gao et al [33] designed a new reference matrix called the stick insect matrix to further improve the SIS schemes These reversible SIS schemes use only a single cover image to generate multiple shares, where each share has a very slight and invisible difference. In order to reduce the risk of tampering attacks, Gao et al [36] proposed a (2, 3) reversible SIS scheme based on the fractal matrix. Through ingenious design of the fractal matrix, any two out of the three shares can cooperate to retrieve the secret data This scheme uses a single cover image to generate two shares and suffers from the steganalysis risk mentioned above. We propose a (2, 3) SIS scheme which is based on the new fractal reference matrix and which uses three distinct share images.

THE PROPOSED FRACTAL MATRIX
EXPERIMENTAL RESULTS
AUTHENTICATION ABILITY
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call