Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = rule singular (RS)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 2724 KB  
Article
MRA-VSS: A Matrix-Based Reversible and Authenticable Visual Secret-Sharing Scheme Using Dual Meaningful Images
by Chia-Chen Lin, En-Ting Chu, Ya-Fen Chang and Ersin Elbasi
Mathematics 2024, 12(22), 3532; https://doi.org/10.3390/math12223532 - 12 Nov 2024
Viewed by 1031
Abstract
Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crossover data hiding strategy and [...] Read more.
Reversible data hiding (RDH) is an approach that emphasizes the imperceptibility of hidden confidential data and the restoration of the original cover image. To achieve these objectives at the same time, in this paper, we design a matrix-based crossover data hiding strategy and then propose a novel matrix-based RDH scheme with dual meaningful image shadows, called MRA-VSS (matrix-based reversible and authenticable visual secret-sharing). Each pixel in a secret image is divided into two parts, and each part is embedded into a cover pixel pair by referring to the intersection point of four overlapping frames. During the share construction phase, not only partial information of the pixel in a secret image but also authentication codes are embedded into the corresponding cover pixel pair. Finally, two meaningful image shadows are derived. The experimental results confirm that our designed MRA-VSS successfully embeds pixels’ partial information and authentication code into cover pixel pairs at the cost of slight distortion during data hiding. Nevertheless, the robustness of our scheme under the steganalysis attack and the authentication capability of our scheme are also proven. Full article
(This article belongs to the Section E2: Control Theory and Mechanics)
Show Figures

Figure 1

Back to TopTop