Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix

Yi Hui Chen, Jia Ye Lee, Min Hsien Chiang, Shih Hsin Chen*

*此作品的通信作者

研究成果: 期刊稿件文章同行評審

3 引文 斯高帕斯(Scopus)

摘要

As Internet technology continues to profoundly impact our lives, techniques for information protection have become increasingly advanced and become a common discussion topic. With the aim to protect private images, this paper splits a secret image into n individual shares using a Sudoku matrix with authentication features. Later, the shares can be compiled to completely reconstruct the secret image. The shares are meaningful ones in order to avoid detection and suspicion among malicious users. Our proposed matrix is unique because the embedding rate of the secret data is very high, while the visual quality of the shares can be well guaranteed. In addition, the embedded authentication codes can be retrieved to authenticate the integrity of the secret image. Experimental results prove the advantages of our approach in terms of visual quality and authentication ability.

原文英語
文章編號1445
期刊Symmetry
14
發行號7
DOIs
出版狀態已出版 - 07 2022

文獻附註

Publisher Copyright:
© 2022 by the authors.

指紋

深入研究「Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix」主題。共同形成了獨特的指紋。

引用此