A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generat...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9203881/ |
id |
doaj-f4776bb00c50440883a06f647fd8b7ee |
---|---|
record_format |
Article |
spelling |
doaj-f4776bb00c50440883a06f647fd8b7ee2021-03-30T04:44:47ZengIEEEIEEE Access2169-35362020-01-01817432517434110.1109/ACCESS.2020.30259609203881A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal MatrixKai Gao0https://orcid.org/0000-0002-7505-9037Ji-Hwei Horng1https://orcid.org/0000-0002-2134-5257Chin-Chen Chang2https://orcid.org/0000-0002-7319-5780Department of Information Engineering and Computer Science, Feng Chia University, Taichung, TaiwanDepartment of Electronic Engineering, National Quemoy University, Kinmen, TaiwanDepartment of Information Engineering and Computer Science, Feng Chia University, Taichung, TaiwanThis article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generate three meaningful shadow images. It is worth mentioning that these two types of fractal matrices are designed for different hiding capacity, meanwhile the characteristics of the fractal matrix can guarantee good visual quality of the generated shadow images. Moreover, we provide two authentication mechanisms according to different situations, one of the authentication mechanisms can achieve 100% ability cheat detection. When the authentication is passed, we only need two of the three shadow images to extract the correct secret data and perfectly restore the original image. Experimental results show that our proposed scheme provides excellent authentication ability and good visual quality.https://ieeexplore.ieee.org/document/9203881/Fractal matrixsecret image sharingdata hidingauthentication mechanism |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kai Gao Ji-Hwei Horng Chin-Chen Chang |
spellingShingle |
Kai Gao Ji-Hwei Horng Chin-Chen Chang A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix IEEE Access Fractal matrix secret image sharing data hiding authentication mechanism |
author_facet |
Kai Gao Ji-Hwei Horng Chin-Chen Chang |
author_sort |
Kai Gao |
title |
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix |
title_short |
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix |
title_full |
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix |
title_fullStr |
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix |
title_full_unstemmed |
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix |
title_sort |
novel (2, 3) reversible secret image sharing based on fractal matrix |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generate three meaningful shadow images. It is worth mentioning that these two types of fractal matrices are designed for different hiding capacity, meanwhile the characteristics of the fractal matrix can guarantee good visual quality of the generated shadow images. Moreover, we provide two authentication mechanisms according to different situations, one of the authentication mechanisms can achieve 100% ability cheat detection. When the authentication is passed, we only need two of the three shadow images to extract the correct secret data and perfectly restore the original image. Experimental results show that our proposed scheme provides excellent authentication ability and good visual quality. |
topic |
Fractal matrix secret image sharing data hiding authentication mechanism |
url |
https://ieeexplore.ieee.org/document/9203881/ |
work_keys_str_mv |
AT kaigao anovel23reversiblesecretimagesharingbasedonfractalmatrix AT jihweihorng anovel23reversiblesecretimagesharingbasedonfractalmatrix AT chinchenchang anovel23reversiblesecretimagesharingbasedonfractalmatrix AT kaigao novel23reversiblesecretimagesharingbasedonfractalmatrix AT jihweihorng novel23reversiblesecretimagesharingbasedonfractalmatrix AT chinchenchang novel23reversiblesecretimagesharingbasedonfractalmatrix |
_version_ |
1724181391389753344 |