Next Article in Journal
An Alternate Generalized Odd Generalized Exponential Family with Applications to Premium Data
Next Article in Special Issue
LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases
Previous Article in Journal
Dynamic Response Analysis of a Multiple Square Loops-String Dome under Seismic Excitation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix

1
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan
2
School of Computer and Information Engineering, Xiamen University of Technology, Xiamen 361024, China
3
Department of Electronic Engineering, National Quemoy University, Kinmen 89250, Taiwan
*
Authors to whom correspondence should be addressed.
Symmetry 2021, 13(11), 2063; https://doi.org/10.3390/sym13112063
Submission received: 24 September 2021 / Revised: 20 October 2021 / Accepted: 26 October 2021 / Published: 1 November 2021

Abstract

:
The (k, n)-threshold reversible secret image sharing (RSIS) is technology that conceals the secret data in a cover image and produces n shadow versions. While k (k     n) or more shadows are gathered, the embedded secret data and the cover image can be retrieved without any error. This article proposes an optimal (2, 3) RSIS algorithm based on a crystal-lattice matrix. Sized by the assigned embedding capacity, a crystal-lattice model is first generated by simulating the crystal growth phenomenon with a greedy algorithm. A three-dimensional (3D) reference matrix based on translationally symmetric alignment of crystal-lattice models is constructed to guide production of the three secret image shadows. Any two of the three different shares can cooperate to restore the secret data and the cover image. When all three image shares are available, the third share can be applied to authenticate the obtained image shares. Experimental results prove that the proposed scheme can produce secret image shares with a better visual quality than other related works.

Graphical Abstract

1. Introduction

With the rapid development of the information technology, people can transmit data to each other through the internet. However, plaintext transmitted in the network is very easy to access, duplicate, temper, or even destroy by malicious attackers. Thus, the concern of data transmission security emerged. Therefore, image steganography techniques, for instance reversible and irreversible data hiding, have been introduced to conceal the secret data in cover images. Currently we have, according to the technique core, data hiding schemes which can be roughly categorized into the LSB substation [1,2], the difference expansion (DE) [3,4], the histogram shifting (HS) [5,6], the reference matrix-based [7,8,9,10], and the pixel-value differencing (PVD) [11,12] approaches. Since the modification of the cover image is very subtle, the constructed marked images cannot be distinguished from the cover one visually. Therefore, these data hiding techniques have significantly enhanced the security level of data transmission.
Instead of hiding secret data in a single cover image, the visual cryptography proposed by Naor and Shamir [13] hides secret data in multiple image shadows. Their method consists of two phases. First, in the dealing phase, a dealer divides the secret data in n image shadows and distributes the data to different participants. Secondly, in the reconstruction phase, k or more than k shadows are gathered and stacked together. The secret data can be retrieved without any error. However, the visual cryptography suffers from two problems. First, each image share looks meaningless and may catch the eavesdroppers’ attention during transmission. Secondly, the produced image shadows are larger than the secret image in scale.
Later, many different secret image sharing (SIS) schemes [14,15,16,17] have been proposed. The method in [14] preserves the image scale and the secret image can be retrieved directly by stacking two transparencies. In [15], the binary secret image can be gained by superimposing any k of n meaningful shadows without performing any cryptographic computation. In 2020, Harn et. al. [17] proposed a secret image sharing scheme with a secure secret reconstruction process. In their method, the secret can be protected from both the attacks of insiders and outsiders. More specifically, the outsiders need to intercept all the released shares to recover the secret, which is impossible.
The dual-image-based reversible data hiding (RDH) scheme [18,19,20,21] can be regarded as a special case, with k = n = 2 , of the k , n secret image sharing. The first dual-image-based scheme was proposed by Chang et al. [18] in 2007. In their method, each cover pixel pair was used to conceal two 5-base digits along the main and the anti-diagonal direction of the EMD matrix. The embedding capacity (EC) of their method was only about 1 bit per pixel (bpp). Later, an improved version proposed by Chang et al. [19] used the horizontal and the vertical directions of the EMD matrix instead of the main and anti-diagonal directions to embed the two 5-base digits. The peak signal-to-noise ratio (PSNR) raised to 48 dB while maintaining the same EC as [18]. In 2013, Lee and Huang [21] developed a novel reversible data hiding scheme using two shadows, which utilized the combination of the orientations in the corresponding stego pixel pairs to fulfill the reversibility. The EC of their method was 1.07 bpp and the visual quality of the image shadow was improved to 49 dB. In 2021, Chen et al. [20] introduced a dual-image-based RDH scheme using a EMD reference matrix. Each pixel in the cover image is embedded with 1 + log 2 5 secret bits with the help of a random binary stream. Although the EC of that method is higher as 1.56 bpp, the PSNR of the constructed shadows is less than 42 dB.
The authentication ability has attracted the attention of many scholars, for instance, the original batch verification using summation polynomials [22,23] and batch verification based on blockchain and ECDSA technology [24]. Nevertheless, these methods are realized with the help of a key generation system or a public blockchain center. The authentication in image domain is that a tampered shadow can be detected directly by a legal one without other assistance. The first authenticable secret sharing scheme was proposed by Yang et al. [25] in 2007. However, the authentication ability and image visual quality of their scheme were not satisfactory. To improve the drawback of the method, Liu et al. [26] proposed a novel (2, 2) secret sharing scheme based on the TS reference matrix in 2018. Since the modification of the cover pixel value does not exceed two, good visual quality can be guaranteed in their method. Furthermore, the difference between pairwise generated stego pixels do not exceed two either, so the cheating detection rate based on this property can reach to 95%. Later, Lin et al. [27] proposed a novel (2, 2) secret sharing scheme with the help of the EMD reference matrix in 2019. In comparison with the method in [28], EC and cheating detection ratio are about the same, but the visual quality of image shadows has been greatly improved. Subsequently, different secret image sharing schemes with their authentication mechanisms were proposed [28,29].
The disadvantage of the (2, 2) secret sharing scheme is that it needs both shadows to be gathered to extract the secret data and restore the cover image. In 2020, Gao et al. [30] proposed a (2, 3) reversible secret image sharing scheme based on a fractal matrix. In their method, the secret data is embedded in three shadows of the cover image through the guidance of a fractal matrix. The secret data and the cover image can be retrieved by any two of the three shadows, but image distortion may occur. In this paper, we introduce an optimal (2, 3) reversible secret sharing scheme based on a crystal-lattice matrix. The advantageous features of our method are listed below:
  • Produce image shadows with least distortion;
  • Guarantee the reversibility using any two of the three image shadows;
  • Perform an excellent cheating detection ratio.
The rest of this article is organized as follows. Section 2 introduces the method proposed by Gao et al. in [30]. Section 3 presents the proposed crystal-lattice matrix and the image shadow production process in detail. Our experimental results are illustrated in Section 4. Finally, the conclusions are summarized in Section 5.

2. Review of Gao et al.’s Method

The (2, 3) reversible secret sharing scheme proposed by Gao et al. [30] is composed of three steps, including the fractal matrix construction phase, the image shadow production phase, and the data extraction together with the image recovery phase, as introduced in Section 2.1, Section 2.2 and Section 2.3, respectively.

2.1. Fractal Matrix Construction Phase

In the method implemented by Gao et al., they defined two types of fractal groups which are composed of four 2 × 2 × 2 fractal models and nine 3 × 3 × 3 fractal models, respectively, as shown in Figure 1, Figure 2 and Figure 3. The projections of both fractal models on the three axial planes are a perfect square, as shown in Figure 4 and Figure 5. As shown in the figure, each location at a square projection is occupied by a unique model element. Furthermore, the same conclusion can be found in the projections of the two fractal groups on the three axial planes, shown in Figure 6 and Figure 7.
The fractal matrix sized 256 × 256 × 256 is constructed by arranging fractal groups consecutively along the main diagonal direction. Since the sizes of Type I and Type II fractal groups are 4 × 4 × 4 and 9 × 9 × 9, respectively, the fractal matrix contains 256 / 4 = 64 adjacent Type I fractal groups or 256 / 9 = 28 adjacent Type II fractal groups, where ⌊ · ⌋ denotes the floor function. Without the loss of generality, the fractal matrix with Type II fractal model sized 3 × 3 × 3 is applied in the following description.

2.2. Image Shadow Production Phase

Based on a cover image I , their scheme produces three image shadows, S 1 , S 2 , and S 3 , with the guidance of the fractal matrix. The given cover image I sized W × H is first rearranged into a pixel sequence I V = p i , i = 1 , 2 , , W × H in the raster scan order. Then, the pixels in the sequence are consecutively processed. Each time, a pixel p i is duplicated into a triplet ( p i , p i , p i ) and the triplet is modified into ( p i 1 , p i 2 , p i 3 ) according to the given secret digit q k and the fractal matrix. The pixel values of the modified triplet are then separately recorded in the three image shadows of the corresponding spatial location.
The rules of modification are as follows. First, the triplet ( p i , p i , p i ) is treated as the 3D coordinates of an element in the fractal matrix. Since the coordinates of the three axes are identical, the located element lays on the main diagonal line of the fractal matrix. Recall that if the main diagonal line is consecutively arranged with fractal groups, the located element must be within a fractal group. The index of the located fractal group can be determined by n G = p i / 9 , where · denotes the floor operation. The 9 × 9 × 9 space occupied by a fractal group contains nine main diagonal elements as well as nine fractal models. To ensure the reversibility, a one-to-one mapping between the nine main diagonal elements and the nine fractal models is preassigned. An example of numbering the fractal models is shown in Figure 7. Thus, the target fractal model F n M x , y , z sized 3 × 3 × 3 for data embedding can be determined by n M = p i   mod   9 , where mod is the modulo operation. The exact target element of embedding is determined by the 9-based secret digit q k , which satisfies F n M x t , y t , z t = q k . Finally, the shadow pixels ( p i 1 , p i 2 , p i 3 ) can be obtained by
p i 1 = 9 × n G + x t , p i 2 = 9 × n G + y t , p i 3 = 9 × n G + z t .
A simple example is elaborated for a better understanding of the embedding phase of Gao et al.’s method. Suppose the cover pixel p i = 16 and the 9-based secret digit q k = 3 . The index of the target fractal group is n G = p i / 9 = 1 , and the number of the fractal model used for data embedding is determined by n M = 16   mod   9 = 7 . According to Figure 7, the target fractal model located by n M = 7 is F n M 3 : 5 , 6 : 8 , 6 : 8 , as circled in red in 3D and 2D projected versions. To embed the secret digit q k = 3 , the exact matched element is F n M 4 , 8 , 8 = 3 , as shown in Figure 5. Thus, the shadow pixels ( p i 1 , p i 2 , p i 3 ) can be obtained by
p i 1 = 9 × 1 + 4 = 13 , p i 2 = 9 × 1 + 8 = 17 , p i 3 = 9 × 1 + 8 = 17 .
Finally, the shadow pixels are recorded into shadow images S 1 , S 2 , and S 3 . Notice that 9 is not a factor of 256, so four pixel values are not covered by any fractal group. In their method, the pixel values 0, 1, 254, and 255 are left intact. To simplify explanation, the pixel values 0 and 1 are not excluded from fractal groups in our demonstration.

2.3. Data Extraction and Cover Image Restoration Phase

By using any two of the three shadows, Gao et al.’s method can extract secret data and restore the cover image. Without a loss of generality, suppose shadows S 1 and S 2 are applied to decrypt secret data and cover image. The pixels in both images are rearranged into vector sequences S V 1 = p 1 i , i = 1 , 2 , , W × H and S V 2 = p 2 i , i = 1 , 2 , , W × H first. Then, consecutively process the pixel pair ( p i 1 , p i 2 ) to decrypt data. Take the pixel pair ( p i 1 , p i 2 ) = 13 , 17 as an example. Its corresponding fractal group is located by n G = p 1 i / 9 = 1 . Then, its projected coordinates in the fractal group can be obtained by R x , R y = 13   mod   9 ,   17   mod   9 = 4 , 8 , which belongs to the fractal model F n M 3 : 5 , 6 : 8 , 6 : 8 . Note that the range of the z -coordinate is unique by referring to Figure 8. The coordinates 4 , 8 map to model index n M = 7 , whose range of z -coordinate can be further determined by referring to y z or x z projection. The secret digit can be extracted by applying the modulo operation R x 2 , R y 2 = 13   mod   3 ,   17   mod   3 = 1 , 2 and mapping to the fractal model, as shown in Figure 9. The mapped value at 1 ,   2 of x y -projection is q k = 3 . Finally, the cover pixel value can be restored by p i = 9 × n G + n M = 9 × 1 + 7 = 16 .
Based on the 9 × 9 × 9 fractal group, a reversible (2, 3) secret image sharing scheme can be realized. Two 9 × 9 × 9 fractal groups and their projections on the x y , y z , and z x -planes are plotted in Figure 10, where each group contains 9 fractal models displayed with different colors. Recall that the original cover pixel triplet ( p i , p i , p i ) lays on the main diagonal line. To embed secret data, the pixel values are modified into the space occupied by the fractal groups. The deviation of the target element from the main diagonal line directly influences the distortion of pixel values in the image shadows. To produce image shadows with a minimum distortion, the target elements should be arranged to the surroundings of the main diagonal line. Observe that the vicinity of the conjunction points between fractal groups are not fully exploited to embed data. It indicates that further improvement of shadow image quality is possible.

3. Proposed Scheme

The proposed reversible (2, 3) threshold secret image sharing scheme is based on the same frame structure as the fractal matrix-based scheme. The crystal-lattice matrix is proposed to address the weakness of the fractal matrix. Construction of the crystal-lattice matrix is firstly introduced in Section 3.1, where the growth of a crystal lattice and the construction of a crystal-lattice matrix are also presented. The shadow image generation phase and the decryption phase are explained in Section 3.2 and Section 3.3, respectively.

3.1. Crystal-Lattice Matrix

To reduce the distortion of secret image shadows, the fundamental model associated with each element on the main diagonal line of the 3D reference matrix should be arranged closely around it. To achieve this goal, a greedy algorithm is proposed to construct an optimal fundamental model. Inspired by the growth of a crystal material, we treated the elements on the main diagonal line as the seeds for crystallization. The fundamental models are the lattices grown simultaneously and crowdedly toward the radial directions from the stream of seeds. Meanwhile, the projections of the lattices on each axial plane should be unique to meet the requirement of (2, 3)-threshold secret sharing. Subject to these constraints, the greedy algorithm is applied to append the nearest element, one at a time, to each lattice at the same relative location until the predefined range is fully searched. Suppose the seed elements are x , y , z = p , p , p ,   p w : 255 w and w is the window width of the search range. The candidate elements to be appended are p + d x , p + d y , p + d z , p w : 255 w and d x , d y , d z w : + w . To ensure a greedy choice that minimizes the distortion each time, the candidates within the search range are fully listed and sorted in the ascending order of Euclidean distance. Table 1 lists the sorted processing queue of w = 1 together with their square Euclidean distance
D = d x 2 + d y 2 + d z 2
The crystal growth Algorithm 1 is summarized as follows.
Algorithm 1. The crystal growth algorithm
Input: The window width w , the lattice model size 2 n , the secret key K .
Output: The lattice model M = d x m , d y m , d z m | m = 0 , 1 , 2 , , 2 n , the crystal-lattice matrix C = C x , y , z | 0 x , y , z < 256 .
1.
Scan the search range, sort the candidate elements in the ascending order of Euclidean distance, and list the processing queue Q = d ^ x k , d ^ y k , d ^ z k , k = 0 , 1 , 2 , , 2 w + 1 3 1 .
2.
Initialize the counter m = 0 and the 3D matrix C sized 256 × 256 × 256 by
C x , y , z = x , x = y = z   a n d   x w : 255 w v m a x ,     otherwise
3.
Initialize the three projection matrices P x y , P y z , and P z x sized 256 × 256 by
P x y i , j , P y z i , j , P z x i , j = i ,     i = j   a n d   i w : 255 w v m a x ,     otherwise t h e r w i s e
4.
Retrieve an element d ^ x k , d ^ y k , d ^ z k from Q . If Equations (6)–(9) hold, record d ^ x k , d ^ y k , d ^ z k to M , mark the matrix elements by Equations (10)–(13), and update the counter m = m + 1 ; else, skip this element.
C p + d ^ x k , p + d ^ y k , p + d ^ z k = v m a x ,   p w : 255 w
P x y p + d ^ x k , p + d ^ y k = v m a x ,   p w : 255 w
P y z p + d ^ y k , p + d ^ z k = v m a x ,   p w : 255 w
P z x p + d ^ z k , p + d ^ x k = v m a x ,   p w : 255 w
C p + d ^ x k , p + d ^ y k , p + d ^ z k = m ,   p w : 255 w
P x y p + d ^ x k , p + d ^ y k = m ,   p w : 255 w
P y z p + d ^ y k , p + d ^ z k = m ,   p w : 255 w
P z x p + d ^ z k , p + d ^ x k = m ,   p w : 255 w
5.
Repeat Step 4 until the required queue volume 2 n is satisfied.
6.
Fill each lattice model with a random permutation of 0 to 2 n 1 generated by key K
The lattice model M and the crystal-lattice matrix 𝒞 are equivalent. The former records the deviation vectors from the seed of all elements in a crystal lattice; the latter is a fully sized matrix which labels the lattice index of each matrix element. The two versions can be converted into each other through simple manipulations.
In Step 1, switching the order of scanning the elements in the predefined search range may change the queue list and the resulting output. As shown in Table 1, the elements indexed 1 to 6 in the queue are equidistant from the seed. Switching scanning order may change the order of these elements and thus change the greedy selection. Some possible results are mutually spatial symmetric. However, this factor does not lead to significant influence on the output performance.
A fully sized matrix C is created in Step 2 to record the lattice index of each occupied element. The initial value v m a x is used to indicate an unoccupied state. Three two-dimensional matrices P x y , P y z , and P z x are created in Step 3 to record the projected locations of included elements. In Step 4, we check the simultaneous growth of all models by including the new greedy choice that do not overlap each other in 3D space and the projected axial planes first. When the choice is available, it is recorded to the lattice model and the labeling matrices. Note that Equation (6) is not necessary, since Equations (7)–(9) are stricter constraints.
The final volume of the lattice model is determined by the required payload of each cover pixel. When the payload of each cover pixel is s bits, the final lattice volume is 2 n . A proper window width w should be set to ensure a sufficient range of searching. A slightly oversized window width is alright.
Table 2 lists the set of deviation vectors for the lattice model with 2 n = 16 . The 3D view of its corresponding crystal-lattice matrix together with projections on the three axial planes are provided in Figure 11. The embeddable elements are translationally symmetric duplications of the crystal-lattice model along the main diagonal line. The distribution is approximately a cylindrical shape, as expected. In addition, the projection views demonstrate the uniqueness at each location. As shown in the figures, the elements of a crystal lattice are not connected. An element that violates any of Equations (7)–(9) is not available for embedding. This strict rule results in a sparse distribution of the lattice elements.
Recall that a lattice model is the embeddable space of its corresponding seed element. Before the crystal-lattice matrix can be applied as the 3D reference matrix for data embedding, a random permutation of distinct integer values from 0 to 2 n 1 should be assigned to the elements of each lattice model. The random permutation can be determined by a secret key K shared in advance.

3.2. Shadow Image Generation

As mentioned above, the proposed data hiding scheme shares the same scenario as the fractal matrix-based scheme proposed by Gao et al. in [30]. The system diagram of the new proposed scheme is shown in Figure 12. Through the cover of a regular image, three indistinguishable data-embedded shadows are generated and separately distributed to three participants. Any two participants can cooperate to decrypt the secret data and the cover image losslessly. When all three shadows are available, the third shadow can be exploited to check the integrity of these shadows. The shadow generation Algorithm 2 is given as follows.
Algorithm 2. The shadow generation algorithm
Input: The cover image I , the binary secret stream S , the parameters n , w , and the key K .
Output: Three image shadows S 1 , S 2 , and S 3 .
1.
Construct the crystal-lattice matrix C according to n , w , and the key K .
2.
Convert S into 2 n -ary number sequence S n = s k | k = 1 , 2 , , L .
3.
Rearrange I into a sequence I V = p i , i = 1 , 2 , , W × H in the raster scan order.
4.
For each pixel in I V , do
   If  p i w : 255 w ,
    Retrieve a secret digit s k .
    Find C p i 1 , p i 2 , p i 3 = s k subject to C p i 1 , p i 2 , p i 3 M p i , p i , p i .
    Record p i 1 , p i 2 , p i 3 to S 1 , S 2 , S 3 , respectively.
   Else
    Record p i , p i , p i to S 1 , S 2 , S 3 , respectively.
   End
5.
Terminate Step 4 when the secret sequence is exhausted.
6.
Copy the remaining cover pixel values to the image shadows directly and close all files.
The notation M p i , p i , p i represents a translated lattice model M p i , p i , p i = p i + d x m , p i + d y m , p i + d z m | m = 0 , 1 , 2 , , 2 n , whose seed element is C p i , p i , p i . To further elaborate the key process in Step 4, an example has been provided. Suppose the cover pixels are I V = 5 , 10 , 11 , n = 4 , w = 7 , and the secret digits are S 16 = 7 , 5 . The detail of processing the three cover pixels are as follows.
(1)
Pixel p i = 5 : This pixel value is not within the range of w : 255 w = 7 : 148 , it is not embeddable and the duplications 5 , 5 , 5 are recorded to S 1 , S 2 , S 3 , respectively.
(2)
Pixel p i = 10 : This pixel value belongs to the embeddable range, a secret digit s k = 7 is retrieved from S 16 . The translated lattice model M 10 , 10 , 10 is the group of red elements displayed in Figure 13a, whose projections on the three axial planes are displayed in Figure 13b–d. Its seed element valued 2 is squared in blue in the projection views. Since the secret digit to be embedded is s k = 7, the element C 10 , 8 , 13 = 7 , circled in yellow, is the targeted. The pixel values 10 , 8 , 13 are recorded to S 1 , S 2 , S 3 , respectively.
(3)
Pixel p i = 11 : This pixel value also belongs to the embeddable range, the next digit s k = 5 is retrieved from S 16 . The translated lattice model M 11 , 11 , 11 is the group of yellow elements displayed in Figure 13. Its seed element valued 10 is squared in blue in the projection views. Since the secret digit to be embedded is s k =5, the element C 11 , 6 , 16 = 5 , circled in red, is the targeted. The pixel values 11 , 6 , 16 are recorded to S 1 , S 2 , S 3 , respectively. The resulting shadows are S 1 = 5 , 10 , 11 , S 2 = 5 , 8 , 6 , S 3 = 5 , 13 , 16 .

3.3. Secret Decryption, Image Recovery, and Authentication

Recall that any two shadows among the three can decrypt the secret and restore the cover image for a (2, 3) threshold RSIS scheme. Without a loss of generality, suppose the shadows S 1 and S 2 are available; the following Algorithm 3 can be applied to decrypt the secret digits and restore the cover image.
Algorithm 3. The secret decryption and image recovery algorithm
Input: Two image shadows S 1 and S 2 , the matrix parameters n , w , the key K .
Output: The cover image I , the binary secret stream S .
1.
Construct the crystal-lattice matrix C according to n , w , and the key K .
2.
Create the projection matrix P x y and fill in the element values by referring to C .
3.
Rearrange S 1 and S 2 into pixel sequences S 1 V = p 1 i , i = 1 , 2 , , W × H and S 2 V = p 2 i , i = 1 , 2 , , W × H in the raster scan order.
4.
For each pixel pair p i 1 , p i 2 in S 1 V and S 2 V , do
   If  p i 1 = p i 2 and ( p i 1 , p i 2 0 : w 1 or 255 w 1 : 255 ),
    Record p i 1 to I .
   Else
    Find the secret digit and the cover pixel value by
s k = P x y p i 1 , p i 2
p i = p j , subject   to   P x y p i 1 , p i 2 M x y p j , p j
    Record the secret digit s k to S n ; record p i to I
   End
5.
Convert S n into the binary secret stream S .
The notation M xy p j , p j represents the projection of M p j , p j , p j onto the x y -plane. The example secret image shadows S 1 = 5 , 10 , 11 and S 2 = 5 , 8 , 6 are applied to demonstrate the key process of Step 4. Three pixel pairs 5 , 5 , 10 , 8 , and 11 , 6 are consecutively processed as follows.
(1)
Pixel pair p i 1 , p i 2 = 5 , 5 : This pixel pair is constituted by equal value pixels and the value does not belong to the embeddable range. Therefore, record the value 5 to the output image directly.
(2)
Pixel pair p i 1 , p i 2 = 10 , 8 : By using 10 , 8 as the coordinates of P x y p i 1 , p i 2 , refer to Figure 13b, the secret digit can be obtained by P x y 10 , 8 = 7 . In addition, the seed element of the P x y 10 , 8 is P x y 10 , 10 . Therefore, the cover pixel value 10 is recorded to the output image.
(3)
Pixel pair p i 1 , p i 2 = 11 , 6 : Similarly, by using 11 , 6 as the coordinates of P x y p i 1 , p i 2 , the secret digit can be obtained by P x y 11 , 6 = 5 . The seed element of the P x y 11 , 6 is P x y 11 , 11 . Therefore, the cover pixel value 11 is recorded to the output image.
In the process of secret image generation, pixel values are in fact the spatial coordinates of the model elements. Recall that the crystal-lattice models are all seeded at the main diagonal line of the crystal-lattice matrix. Therefore, the embeddable elements are confined around the line. By leveraging data integrity of the image shadows, we can authenticate a suspected shadow based on a faithful share. Suppose we hold the faithful shadow S 1 . The authentication of the suspected shadow S 2 is given in Algorithm 4.
Algorithm 4. The authentication algorithm for two image shadows
Input: Two image shadows S 1 and S 2 , the matrix parameters n , w , and the key K .
Output: Authentication report.
1.
Construct the crystal-lattice matrix C according to n , w , and the key K .
2.
Create the projection matrix P x y and fill in the element values by referring to C .
3.
Rearrange S 1 and S 2 into pixel sequences S 1 V = p 1 i , i = 1 , 2 , , W × H and S 2 V = p 2 i , i = 1 , 2 , , W × H in the raster scan order.
4.
For each pixel pair p i 1 , p i 2 in S 1 V and S 2 V , do
   If  p i 1 = p i 2 and ( p i 1 0 : w 1 or 255 w 1 : 255 ),
    Current pixel passed.
   Else
    If  P x y p i 1 , p i 2 U , current pixel passed,
U = M x y p j , p j | p j w : 255 w
      Else Authentication failed and program stop.
   End
5.
Image shadow authentication passed.
Based on the same concept, we can devise an authentication algorithm for three image shadows. Since the secret binary stream and the cover image can be restored with two secret shares, the pixel values of the additional third share are uniquely determined. The data integrity of three shares provides a strong restriction to detect tampered shadows. The authentication for three image shadows is given in Algorithm 5.
Note that the two authentication algorithms are both based on the data integrity of image shadows. The tampered shares can only be detected based on faithful shares. When we only get a faithful share in hand, Algorithm 4 can be applied first to check data integrity. In case the integrity check is failed, we can detect the tampered share by using Algorithm 5. However, the detection rate of the two-shadow version is slightly weaker, which will be further discussed in the next section.
Algorithm 5. The authentication algorithm for three image shadows
Input: Three image shadows S 1 , S 2 , and S 3 , the matrix parameters n , w , and the key K .
Output: Authentication report.
1.
Construct the crystal-lattice matrix C according to n , w , and the key K .
2.
Rearrange S 1 , S 2 , and S 3 into sequences S 1 V = p 1 i , i = 1 , 2 , , W × H , and S 2 V = p 2 i , i = 1 , 2 , , W × H , and S 3 V = p 3 i , i = 1 , 2 , , W × H in the raster scan order.
3.
For each pixel triplet p i 1 , p i 2 , p i 3 in S 1 V , S 2 V , and S 3 V , do
   If  p i 1 = p i 2 = p i 3 and ( p i 1 0 : w 1 or 255 w 1 : 255 ),
    Current pixel passed.
   Else
      If  C p i 1 , p i 2 , p i 3 U , current pixel passed,
U = M p j , p j , p j | p j w : 255 w
      Else Authentication failed and program stop.
   End
4.
Image shadow authentication passed.

4. Experimental Results

This section demonstrates the performance of the proposed scheme by some simulations. The programs are all implemented by MATLAB R2017b software running on a MacBook Pro (Retina, 15-inch, Late 2013) computer. The macOS High Sierra operating system is loaded in the computer, and its CPU and RAM are 2.3 GHZ Intel Core i7 and 16 GB, respectively. Eight standard grayscale test images of size 512 × 512 are applied in our experiment, as shown in Figure 14.
Commonly, the PSNR, defined in Equation (18), is exploited to evaluate the quality of the generated shadows.
PSNR = 10 × log 10 255 2 e M S E , dB
where e M S E , defined in Equation (19), is the mean square error between the cover image and the compared shadow.
  e M S E = 1 W × H i = 1 W j = 1 H I i j S i j 2 ,
where W and H are the width and the height of the images. I i j and S i j are the pixel values at the location i , j of the cover image and the shadow, respectively.
The metric EC, defined in Equation (20), is the embedding capacity measured in bits per pixel (bpp),
EC = N S k × W × H ,
where N S represents the total length of embedded secret stream and k is the number of shadows. Although three image shadows are generated, the restoration of secret data and cover image requires only two shares. We apply k = 2 to calculate EC in the following experimental data.

4.1. Visual Quality of Image Shadows

The matrix parameter n controls the volume of the lattice model 2 n and thus determines the embedding capacity. To embed integer number of secret bits for each cover pixel, we apply the values n = 2 , 3 , and 4 in our experiments. According to Equation (20), EC values are 1 , 1.5 , and 2 , respectively. The average PSNR values of the three image shadows, over the eight test images, are listed in Table 3. As the value n increases, the visual quality of image shadows degrades. Besides, the average PSNR values of three shadows are not the same. The worst case for n = 2 , 3 , and 4 are S 2 , S 3 , and S 2 , respectively. Note that the PSNR value is calculated from the deviation of modified pixel-value. By referring to Table 2, we can obtain the four leading entries that applied in the case of n = 2 , where the maximum deviation 2 occurs at d y . That is why the worst PSNR occurs at the shadow S 2 . The other cases can be explained in the same way. Recall that the scanning order of candidate elements may alter the queue sequence; thus the resulting list in the lattice model can affect the PSNR relationship of three shadows.

4.2. Comparison with Gao et al.’s Scheme

In this subsection, we compare our scheme with the (2, 3) threshold secret image sharing scheme proposed by Gao et al. [30]. In their scheme, two fractal models sized 2 × 2 × 2 and 3 × 3 × 3 are provided. The two models comprise four and nine embeddable elements, respectively. Fortunately, the volume of our lattice model is adjustable. To make a fair comparison, we set the same volumes and calculate experimental data as listed in Table 4 and Table 5.
As shown in the tables, the visual quality of image shadows produced by our scheme outperforms Gao et al.’s scheme with a gap about 3 dB. The improvement, as expected, can be explained by referring to Figure 10 and Figure 11, where the embeddable elements are distributed in lumped shapes and in a uniform cylindrical shape, respectively. In addition, the total embedded bits are also listed in the tables. Due to different solutions for the boundary problem of 3D reference matrices, the total payload of the proposed scheme is slightly greater than Gao et al.’s scheme.

4.3. Authentication

In this section, we conduct a series of experiments to verify the applicability of the proposed Algorithms 4 and 5 for authentication, which are based on the integrity check of two shadows and three shadows, respectively. The secret image shadows are generated with a lattice model M of 2 n = 16 .
Verification of Algorithms 4: A demonstration of two-shadow authentication is given in Figure 15. By using image Boat as the cover image, the shadow generation algorithm produces three image shadows. Suppose we hold a faithful shadow S 1 , as shown in Figure 15a, while shadow S 2 has been tampered with a window region replaced by image Cameraman, as shown in Figure 15b. The tamper detection result by applying Algorithm 4 to the shadows S 1 and S ^ 2 is displayed in Figure 15c, where black pixels in the window region fail to pass the integrity check. Only a small portion of pixels displayed in white has passed.
Verification of Algorithm 5: A demonstration of two-shadow authentication is presented in Figure 16, where real shadows S 1 , S 2 and tampered shadow S ^ 3 are displayed in Figure 16a–c, respectively. The tamper detection result by applying Algorithms 5 is displayed in Figure 16d.
The detection rate (DR) to evaluate the performance of integrity check is defined by
DR = N D N T ,  
where N T denotes the total number of tampered pixels and N D denotes the number of detected ones. To investigate the performance of our authentication algorithms, the detection rates for the eight cover images are listed in Table 6. The DR value is above 90 percent for the two-shadow version and above 99 percent for the three-shadow version. The high DR value is not surprising, since the embeddable elements just occupy a small portion of the 3D crystal-lattice matrix. As the volume of lattice model increases, the DR value slightly decreases. Nonetheless, in any case, it is almost impossible for a tampered shadow to pass the authentication algorithms.

4.4. Comparison with Other Related Schemes

In this section, we compare the features of the proposed scheme with other different secret image sharing schemes, including Chang et al.’s scheme in 2014 [10], Chang et al.’s scheme in 2020 [28], and Li et al.’s scheme [29]. As shown in Table 7, the schemes proposed in [10] and [28] use multiple cover images, and these cover images cannot be recovered after extracting secret data. While the proposed scheme and Li et al.’s scheme [29] use a single cover image to generate multiple image shares, the cover image can be recovered by the recipient. Besides, our new scheme provides two versions of authentication. When the third faithful shadow is available, the detection rate of our scheme is the highest among all. Even if one of the three shadows is not available, the proposed scheme can still reach a cheating detection ratio of 95 percent.

4.5. Time Efficiency

Table 8 shows the execution time for the embedding and extracting phases of our scheme when P is set as 4 and 9. The execution time is less than 0.2 s for the embedding phase and less than 0.4 s for the extraction phase. We can conclude that the proposed scheme is computationally efficient and suitable for real time applications.

4.6. PDH Analysis

The pixel-value differencing histogram (PDH) is a histogram which is constructed based on the frequency of the difference between every two adjacent elements in an image. For a natural image, the PDH should exhibit a peak at the zero-difference value and gradually descend outward as the blue curves, as shown in Figure 17. The PDH of four cover images together with their corresponding shadows are plotted in Figure 17, where the high embedding mode of P = 9 is applied. Obviously, the normal PDH shape of a natural image is well preserved for all the image shadows.

5. Conclusions

This paper uses a crystal-lattice matrix to improve the visual quality of image shadows of the (2, 3) threshold RSIS scheme. A greedy algorithm is proposed to automatically generate the lattice modFel, which is the fundamental unit of the crystal-lattice matrix. The volume of the lattice model is adjustable to meet the desired embedding capacity. In addition, two authentication algorithms are devised based on the data integrity. Experimental results demonstrate the applicability of the proposed scheme. Besides, the visual quality of image shadows is significantly improved, as expected.
The (k, n)-threshold RSIS schemes with k < n is a novel frame structure that is more flexible in application than the conventional approach of (n, n)-threshold RSIS. We will try to find better solutions to improve the overall performance of the secret image sharing scheme.

Author Contributions

Data curation, J.-Y.L.; software, J.-Y.L.; formal analysis, J.-H.H.; funding acquisition, J.-H.H.; investigation, J.-H.H.; methodology, J.-H.H.; writing—original draft, J.-Y.L.; writing—review and editing, J.-H.H.; project administration, C.-C.C.; supervision, C.-C.C. All authors have read and agreed to the published version of the manuscript.

Funding

The authors thank the Ministry of Science and Technology of Taiwan for its sponsorship to this research (Grant#: MOST 110-2221-E-507-003).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chan, C.K.; Cheng, L.M. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
  2. Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett. 2006, 13, 285–287. [Google Scholar] [CrossRef]
  3. Tian, J. Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video 2003, 13, 890–896. [Google Scholar] [CrossRef] [Green Version]
  4. Alattar, A.M. Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans. Image Process. 2004, 13, 1147–1156. [Google Scholar] [CrossRef] [PubMed]
  5. Ni, Z. Reversible data hiding. IEEE Trans. Circ. Syst. Video 2006, 16, 354–362. [Google Scholar]
  6. Qin, C.; Chang, C.C.; Huang, Y.-H.; Liao, L.-T. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans. Circuits Syst. Video Technol. 2013, 23, 1109–1118. [Google Scholar] [CrossRef]
  7. Zhang, X.; Wang, S. Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun. Lett. 2006, 10, 781–783. [Google Scholar] [CrossRef]
  8. Kim, H.J. Improved modification direction methods. Comput. Math. Appl. 2010, 60, 319–325. [Google Scholar] [CrossRef] [Green Version]
  9. Hong, W.; Chen, T.-S.; Shiu, C.-W. A Minimal Euclidean Distance Searching Technique for Sudoku Steganography. In Proceedings of the 2008 International Symposium on Information Science and Engineering, Shanghai, China, 20–22 December 2008; Volume 1, pp. 515–518. [Google Scholar] [CrossRef]
  10. Chang, C.C.; Liu, Y.; Nguyen, T.S. A novel turtle shell based scheme for data hiding. In Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 27–29 August 2014. [Google Scholar]
  11. Wu, D.-C.; Tsai, W.-H. A steganographic method for images by pixel-value differencing. Pattern Recognit. Lett. 2013, 24, 1613–1626. [Google Scholar] [CrossRef]
  12. Chen, J. A PVD-based data hiding scheme with histogram preserving using pixel pair matching. Signal Process. Image. Commun. 2014, 29, 375–384. [Google Scholar] [CrossRef]
  13. Naor, M.; Shamir, A. Visual cryptography. In 1994: Workshop on the Theory and Application of Cryptographic Techniques; Lofthus Norway; Springer: Berlin/Heidelberg, Germany, 1994. [Google Scholar]
  14. Fang, W.P. Non-expansion visual secret sharing in reversible style. Int. J. Univers. Comput. Sci. Netw. Secur. 2009, 9, 204–208. [Google Scholar]
  15. Tsai, D.S.; Chen, T.-H.; Horng, G. On generating meaningful shares in visual secret sharing scheme. Imaging Sci. J. 2008, 56, 49–55. [Google Scholar] [CrossRef]
  16. Shyu, S.J.; Chen, M.C. Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes. IEEE Trans. Inf. Forensics Secur. 2011, 6, 960–969. [Google Scholar] [CrossRef]
  17. Harn, L.; Xia, Z.; Hsu, C.; Liu, Y. Secret sharing with secure secret reconstruction. Inf. Sci. 2020, 519, 1–8. [Google Scholar] [CrossRef]
  18. Chang, C.C.; Kieu, T.D.; Chou, Y.-C. Reversible data hiding scheme using two steganographic images. In Proceedings of the TENCON 2007-2007 IEEE Region 10 Conference, Taipei, Taiwan, 30 October–2 November 2007; pp. 1–4. [Google Scholar] [CrossRef]
  19. Chang, C.C.; Chou, Y.C.; Kieu, D.T. Information hiding in dual images with reversibility. In Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, 4–6 June 2009. [Google Scholar]
  20. Chen, X.; Hong, C. An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction. J. Inf. Secur. Appl. 2021, 58, 102702. [Google Scholar] [CrossRef]
  21. Lee, C.-F.; Huang, Y.-L. Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 2013, 52, 2237–2247. [Google Scholar] [CrossRef]
  22. Karati, S.; Das, A. Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. In Proceedings of the International Conference on Applied Cryptography and Network Security, Lausanne, Switzerland, 10–13 June 2014; Springer: Cham, Switzerland, 2014; Volume 8479, pp. 438–456. [Google Scholar] [CrossRef]
  23. Semaev, I.A. Summation polynomials and the discrete logarithm problem on elliptic curves. IACR Cryptol. ePrint Arch. 2004, 2004, 31. [Google Scholar]
  24. Xiong, H. On the Design of Blockchain-based ECDSA with Fault-tolerant Batch Verication Protocol for Blockchain-enabled IoMT. IEEE J. Biomed. Health Informaties 2021. [Google Scholar] [CrossRef] [PubMed]
  25. Yang, C.N.; Chen, T.-S.; Yu, K.H.; Wang, C.C. Improvements of image sharing with steganography and authentication. J. Syst. Softw. 2007, 80, 1070–1076. [Google Scholar] [CrossRef]
  26. Liu, Y.; Chang, C.C. A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools Appl. 2018, 77, 25295–25310. [Google Scholar] [CrossRef]
  27. Lin, J.-Y.; Chen, Y.; Chang, C.C.; Hu, Y.C. Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction. Multimedia Tools Appl. 2019, 78, 25855–25872. [Google Scholar] [CrossRef]
  28. Chang, C.C.; Horng, J.H.; Shih, C.S.; Chang, C.C. A maze matrix-based secret image sharing scheme with cheater detection. Sensors. 2020, 20, 3802. [Google Scholar] [CrossRef]
  29. Li, X.-S.; Chang, C.C.; He, M.-X.; Lin, C.-C. A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix. Multimedia Tools Appl. 2020, 79, 453–476. [Google Scholar] [CrossRef]
  30. Gao, K.; Horng, J.-H.; Chang, C.C. A Novel (2, 3) Reversible Secret Image Sharing Based on Fractal Matrix. IEEE Access 2020, 8, 174325–174341. [Google Scholar] [CrossRef]
Figure 1. Two types of fractal models. (a) Type I: fractal model sized 2 × 2 × 2; (b) Type II: fractal model sized 3 × 3 × 3.
Figure 1. Two types of fractal models. (a) Type I: fractal model sized 2 × 2 × 2; (b) Type II: fractal model sized 3 × 3 × 3.
Symmetry 13 02063 g001
Figure 2. Fractal group constituted by Type I model.
Figure 2. Fractal group constituted by Type I model.
Symmetry 13 02063 g002
Figure 3. Fractal group constituted by Type II model.
Figure 3. Fractal group constituted by Type II model.
Symmetry 13 02063 g003
Figure 4. The projections of Type I fractal model on the axial planes.
Figure 4. The projections of Type I fractal model on the axial planes.
Symmetry 13 02063 g004
Figure 5. The projections of Type II fractal model on the axial planes.
Figure 5. The projections of Type II fractal model on the axial planes.
Symmetry 13 02063 g005
Figure 6. The projections of Type I fractal group on the axial planes.
Figure 6. The projections of Type I fractal group on the axial planes.
Symmetry 13 02063 g006
Figure 7. The projections of Type II fractal group on the axial planes.
Figure 7. The projections of Type II fractal group on the axial planes.
Symmetry 13 02063 g007
Figure 8. The x y -, y z -, and x z -projections of a fractal group.
Figure 8. The x y -, y z -, and x z -projections of a fractal group.
Symmetry 13 02063 g008
Figure 9. The x y -, y z -, and x z -projections of a fractal model.
Figure 9. The x y -, y z -, and x z -projections of a fractal model.
Symmetry 13 02063 g009
Figure 10. Two fractal groups displayed in the 3D space: (a) a 3D view, (b) the x y -projection, (c) the y z -projection, (d) the z x -projection.
Figure 10. Two fractal groups displayed in the 3D space: (a) a 3D view, (b) the x y -projection, (c) the y z -projection, (d) the z x -projection.
Symmetry 13 02063 g010
Figure 11. Partial view of the resulting crystal-lattice matrix with 2 n = 16 . (a) The crystal-lattice matrix C , (b) the projection view P x y , (c) the projection view P y z , (d) the projection view P z x .
Figure 11. Partial view of the resulting crystal-lattice matrix with 2 n = 16 . (a) The crystal-lattice matrix C , (b) the projection view P x y , (c) the projection view P y z , (d) the projection view P z x .
Symmetry 13 02063 g011
Figure 12. The system diagram of the proposed scheme.
Figure 12. The system diagram of the proposed scheme.
Symmetry 13 02063 g012
Figure 13. Separate display of two lattice models in the example. (a) The 3D view of lattice models M 10 , 10 , 10 and M 11 , 11 , 11 , (b) the projection P x y , (c) the projection P y z . (d) the projection P z x .
Figure 13. Separate display of two lattice models in the example. (a) The 3D view of lattice models M 10 , 10 , 10 and M 11 , 11 , 11 , (b) the projection P x y , (c) the projection P y z . (d) the projection P z x .
Symmetry 13 02063 g013
Figure 14. The eight test images sized 512 × 512. (a) Airplane, (b) Boat, (c) Girl, (d) Goldhill, (e) Lena, (f) Lake, (g) Tiffany, and (h) Zelda.
Figure 14. The eight test images sized 512 × 512. (a) Airplane, (b) Boat, (c) Girl, (d) Goldhill, (e) Lena, (f) Lake, (g) Tiffany, and (h) Zelda.
Symmetry 13 02063 g014
Figure 15. The detection result of Algorithms 4. (a) Real: S 1 , (b) Tampered: S ^ 2 , (c) Detection result.
Figure 15. The detection result of Algorithms 4. (a) Real: S 1 , (b) Tampered: S ^ 2 , (c) Detection result.
Symmetry 13 02063 g015
Figure 16. The detection result of Algorithms 5. (a) Real: S 1 , (b) Real: S 2 , (c) Tampered: S ^ 3 , (d) Detection result.
Figure 16. The detection result of Algorithms 5. (a) Real: S 1 , (b) Real: S 2 , (c) Tampered: S ^ 3 , (d) Detection result.
Symmetry 13 02063 g016
Figure 17. PDH diagrams of four applied cover images with their shadows.
Figure 17. PDH diagrams of four applied cover images with their shadows.
Symmetry 13 02063 g017
Table 1. The candidate elements in the processing queue.
Table 1. The candidate elements in the processing queue.
IndexdxdydzDIndexdxdydzDIndexdxdydzD
000009−1012181102
10−10110−110219−11−13
200−111101−12201−113
3−1001120−11221−1−113
4001113011222−1113
50101141−10223−1−1−13
610011510−122411−13
70−11216−10−12251−1−13
8−1−102171012261113
Table 2. The lattice model M with 2 n = 16 .
Table 2. The lattice model M with 2 n = 16 .
IndexdxdydzIndexdxdydz
00008−430
1−10194−40
2−1101040−4
31−20110−55
410−21205−5
50−2313−606
603−214−660
Table 3. The average PSNR (dB) for different ECs (bpp).
Table 3. The average PSNR (dB) for different ECs (bpp).
EC (bpp) 1   ( 2 n = 4 ) 1.5   ( 2 n = 8 ) 2   ( 2 n = 16 )
S 1 49.3844.1537.71
S 2 47.1644.6237.66
S 3 54.1542.8539.09
Table 4. Comparison with Gao et al.’s scheme (model volume 4).
Table 4. Comparison with Gao et al.’s scheme (model volume 4).
ImagesGao et al.’s SchemeProposed Scheme
S 1 S 2 S 3 EC (bits) S 1 S 2 S 3 EC (bits)
Airplane46.3844.1851.1352428949.3747.1554.18524289
Boat46.4244.1851.1452428949.3747.1554.15524289
Girl46.3644.1551.1352428949.3747.1754.13524289
Goldhill46.3744.1651.1452428949.3847.1554.15524289
Lena46.3544.1351.1352428949.3847.1554.16524289
Lake46.3644.1651.1452428949.3847.1654.13524289
Tiffany46.3644.1851.1252428949.3847.1754.17524289
Zelda46.3844.1851.1352428949.3847.1654.13524289
Average46.3744.1651.1352428949.3847.1654.15524289
47.2250.23
Table 5. Comparison with Gao et al.’s scheme (model volume 9).
Table 5. Comparison with Gao et al.’s scheme (model volume 9).
ImagesGao et al.’s SchemeProposed Scheme
S 1 S 2 S 3 EC (bits) S 1 S 2 S 3 EC (bits)
Airplane38.4536.764781950744.1543.6443.65819246
Boat38.4136.8447.0281902544.1543.6443.64819157
Girl38.4336.8647.0281904644.1543.6443.61819176
Goldhill38.4236.8747.0181921944.1243.6443.63819441
Lena38.4236.8947.0181900344.1543.6543.64819151
Lake38.4536.764781906744.1343.6343.65819255
Tiffany38.3736.947.0181904344.1743.6343.64819016
Zelda38.436.9147.0181938644.1643.6343.63819120
Average38.4236.8547.0181916244.1543.6443.64819195
40.7643.81
Table 6. DR values for the two authentication algorithms.
Table 6. DR values for the two authentication algorithms.
ImagesAlgorithm 4Algorithm 5
2 n = 4   2 n = 8   2 n = 16   2 n = 4   2 n = 8   2 n = 16  
Airplane0.9840.9680.9360.9960.9960.996
Boat0.9630.9210.8480.990.990.99
Girl0.9710.9440.8810.9930.9930.993
Goldhill0.9820.9640.9260.9950.9960.996
Lena0.9830.9670.9320.9960.9960.996
Lake0.9930.9880.9750.9990.9990.999
Tiffany0.9680.9340.8820.9930.9920.991
Zelda0.9770.9530.8990.9950.9960.993
Average0.9770.9530.9060.9940.9940.994
Table 7. Comparison of our method with some methods.
Table 7. Comparison of our method with some methods.
Features[10][28][29]Proposed
ReversibilityNoNoYesYes
Multiple cover imagesYesYesNoNo
(k, n)- SIS(2, 2)(2, 2)(3, 3)(2, 3)
Average authentication ability0.50.430.980.95/0.99
Table 8. Execution time (s) of the proposed scheme.
Table 8. Execution time (s) of the proposed scheme.
ImagesP = 4P = 9
EmbeddingExtractingEmbeddingExtracting
Airplane0.170.380.180.37
Boat0.160.380.160.35
Girl0.160.370.170.37
Goldhill0.170.380.180.38
Lena0.160.360.160.36
Lake0.170.380.170.38
Tiffany0.160.380.170.35
Zelda0.160.370.160.35
Average0.160.380.170.36
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lin, J.-Y.; Horng, J.-H.; Chang, C.-C. A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry 2021, 13, 2063. https://doi.org/10.3390/sym13112063

AMA Style

Lin J-Y, Horng J-H, Chang C-C. A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry. 2021; 13(11):2063. https://doi.org/10.3390/sym13112063

Chicago/Turabian Style

Lin, Jiang-Yi, Ji-Hwei Horng, and Chin-Chen Chang. 2021. "A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix" Symmetry 13, no. 11: 2063. https://doi.org/10.3390/sym13112063

APA Style

Lin, J. -Y., Horng, J. -H., & Chang, C. -C. (2021). A Novel (2, 3)-Threshold Reversible Secret Image Sharing Scheme Based on Optimized Crystal-Lattice Matrix. Symmetry, 13(11), 2063. https://doi.org/10.3390/sym13112063

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop