2021
DOI: 10.1109/access.2021.3069008
|View full text |Cite
|
Sign up to set email alerts
|

An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix

Abstract: Secret image sharing (SIS) scheme is an important technology to protect secret information. It distributes the secret data into multiple shares so that the participants can obtain the embedded secret by sharing their authenticated shares. Through a simple process of these shares, the secret data can be extracted. In this paper, we propose a (2, 3) SIS scheme based on a fractal matrix. Through guidance of the proposed fractal matrix, the secret data can be distributed into three shares which are indistinguishab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…Yan et al also used CRT to share grayscale images with lossless recovery [7]. Others used steganography techniques to embed the shares inside cover images to make them less suspicious [8], [9]. Liu et al proposed a multiple-level SIS, where participants have different levels and higher priority participants can reveal more information [10].…”
Section: Introductionmentioning
confidence: 99%
“…Yan et al also used CRT to share grayscale images with lossless recovery [7]. Others used steganography techniques to embed the shares inside cover images to make them less suspicious [8], [9]. Liu et al proposed a multiple-level SIS, where participants have different levels and higher priority participants can reveal more information [10].…”
Section: Introductionmentioning
confidence: 99%
“…However, shadow images are vulnerable to the steganalysis because they are generated based on the same cover image. Recently, some secret image sharing schemes using different meaningful cover images have been proposed [27,28]. In these methods, (k, n) is a fixed pair of predefined constants.…”
Section: Introductionmentioning
confidence: 99%
“…In 2018, Liu and Chang [33] proposed applying the authentication mechanism to secret sharing to authenticate whether the shadow images have been tampered with (modified) or not. In 2021, Gao et al [34] proposed a high-capacity secret sharing scheme with an authentication mechanism. To achieve reversibility, a reversible and verifiable SIS scheme has also been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we encode a secret image into n shares using the concept of Sudoku. The schemes [33][34][35][36]38] are not allowed more than three participants. The scheme allows n joint participants, so it is more flexible than the above schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation