A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix

This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generat...

Full description

Bibliographic Details
Main Authors: Kai Gao, Ji-Hwei Horng, Chin-Chen Chang
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9203881/
id doaj-f4776bb00c50440883a06f647fd8b7ee
record_format Article
spelling doaj-f4776bb00c50440883a06f647fd8b7ee2021-03-30T04:44:47ZengIEEEIEEE Access2169-35362020-01-01817432517434110.1109/ACCESS.2020.30259609203881A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal MatrixKai Gao0https://orcid.org/0000-0002-7505-9037Ji-Hwei Horng1https://orcid.org/0000-0002-2134-5257Chin-Chen Chang2https://orcid.org/0000-0002-7319-5780Department of Information Engineering and Computer Science, Feng Chia University, Taichung, TaiwanDepartment of Electronic Engineering, National Quemoy University, Kinmen, TaiwanDepartment of Information Engineering and Computer Science, Feng Chia University, Taichung, TaiwanThis article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generate three meaningful shadow images. It is worth mentioning that these two types of fractal matrices are designed for different hiding capacity, meanwhile the characteristics of the fractal matrix can guarantee good visual quality of the generated shadow images. Moreover, we provide two authentication mechanisms according to different situations, one of the authentication mechanisms can achieve 100% ability cheat detection. When the authentication is passed, we only need two of the three shadow images to extract the correct secret data and perfectly restore the original image. Experimental results show that our proposed scheme provides excellent authentication ability and good visual quality.https://ieeexplore.ieee.org/document/9203881/Fractal matrixsecret image sharingdata hidingauthentication mechanism
collection DOAJ
language English
format Article
sources DOAJ
author Kai Gao
Ji-Hwei Horng
Chin-Chen Chang
spellingShingle Kai Gao
Ji-Hwei Horng
Chin-Chen Chang
A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
IEEE Access
Fractal matrix
secret image sharing
data hiding
authentication mechanism
author_facet Kai Gao
Ji-Hwei Horng
Chin-Chen Chang
author_sort Kai Gao
title A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
title_short A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
title_full A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
title_fullStr A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
title_full_unstemmed A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix
title_sort novel (2, 3) reversible secret image sharing based on fractal matrix
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description This article first proposes two types of three-dimensional (3D) fractal reference matrices. Then, a new reversible (2, 3) secret image sharing scheme based on a fractal matrix is presented. With the help of the fractal reference matrix, the secret data can be embedded in an original image to generate three meaningful shadow images. It is worth mentioning that these two types of fractal matrices are designed for different hiding capacity, meanwhile the characteristics of the fractal matrix can guarantee good visual quality of the generated shadow images. Moreover, we provide two authentication mechanisms according to different situations, one of the authentication mechanisms can achieve 100% ability cheat detection. When the authentication is passed, we only need two of the three shadow images to extract the correct secret data and perfectly restore the original image. Experimental results show that our proposed scheme provides excellent authentication ability and good visual quality.
topic Fractal matrix
secret image sharing
data hiding
authentication mechanism
url https://ieeexplore.ieee.org/document/9203881/
work_keys_str_mv AT kaigao anovel23reversiblesecretimagesharingbasedonfractalmatrix
AT jihweihorng anovel23reversiblesecretimagesharingbasedonfractalmatrix
AT chinchenchang anovel23reversiblesecretimagesharingbasedonfractalmatrix
AT kaigao novel23reversiblesecretimagesharingbasedonfractalmatrix
AT jihweihorng novel23reversiblesecretimagesharingbasedonfractalmatrix
AT chinchenchang novel23reversiblesecretimagesharingbasedonfractalmatrix
_version_ 1724181391389753344