
Citation: Théo Lebeaupin, Hafida Sellou, Gyula Timinszky, Sébastien Huet. Chromatin dynamics at DNA breaks: what, how and why?[J]. AIMS Biophysics, 2015, 2(4): 458-475. doi: 10.3934/biophy.2015.4.458
[1] | Lina Zhang, Jing Zhang, Jiaqi Sun, Qingpeng Chen . A global progressive image secret sharing scheme under multi-group joint management. Mathematical Biosciences and Engineering, 2024, 21(1): 1286-1304. doi: 10.3934/mbe.2024055 |
[2] | Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang . A novel secret sharing scheme using multiple share images. Mathematical Biosciences and Engineering, 2019, 16(6): 6350-6366. doi: 10.3934/mbe.2019317 |
[3] | Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan . Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287 |
[4] | Guozheng Yang, Lintao Liu, Xuehu Yan . A compressed secret image sharing method with shadow image verification capability. Mathematical Biosciences and Engineering, 2020, 17(4): 4295-4316. doi: 10.3934/mbe.2020237 |
[5] | Li-na Zhang, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, Jing Zhang . Two-level QR code scheme based on region matrix image secret sharing algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16678-16704. doi: 10.3934/mbe.2023743 |
[6] | Jingju Liu, Lei Sun, Jinrui Liu, Xuehu Yan . Fake and dishonest participant location scheme in secret image sharing. Mathematical Biosciences and Engineering, 2021, 18(3): 2473-2495. doi: 10.3934/mbe.2021126 |
[7] | Li-na Zhang, Chen-yu Cui, Xiao-yu Zhang, Wei Wu . Adaptive visual cryptography scheme design based on QR codes. Mathematical Biosciences and Engineering, 2022, 19(12): 12160-12179. doi: 10.3934/mbe.2022566 |
[8] | Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang . Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093 |
[9] | Xingxing Jia, Yixuan Song, Daoshun Wang, Daxin Nie, Jinzhao Wu . A collaborative secret sharing scheme based on the Chinese Remainder Theorem. Mathematical Biosciences and Engineering, 2019, 16(3): 1280-1299. doi: 10.3934/mbe.2019062 |
[10] | Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu . Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318 |
Secret image sharing (SIS) belongs to but differs from secret sharing, and image is widely used and covers many privacies [2,1], thus, SIS should be specially studied and designed. In a $ (k, n) $ threshold SIS scheme, it aims at splitting a secret image into $ n $ shadows, i.e., shares or shadow images, which are then assigned to $ n $ participants. The secret can be disclosed by any $ k $ or more shadows while less than $ k $ shadows gain nothing of the secret. SIS can be applied to many scenarios, such as key management, access control, information hiding, authentication, watermarking, transmitting passwords, and distributed storage and computing in cloud computing [3,4,5,6,7,8]. In the field of SIS research, there are mainly Shamir's polynomial-based scheme [9] and visual secret sharing (VSS) [10] also called visual cryptography scheme (VCS) [11].
Shamir's original polynomial-based SIS [9,12] for $ (k, n) $ threshold splits a secret image into the constant coefficient of a random $ (k-1) $-degree polynomial to generate $ n $ shadows, which are then assigned to $ n $ participants. The secret image can be disclosed with high-resolution by means of Lagrange interpolation with any $ k $ or more shadows. Inspired by Shamir's original scheme, some researchers [13,14,15,16,17,18] proposed more polynomial-based schemes to possess more features. Although polynomial-based SIS only needs $ k $ shadows for disclosing the distortion-less secret image, it has high computational complexity because of Lagrange interpolation and "all-or-nothing".
In $ (k, n) $ threshold VSS [19,20,21,22,23,24], the outputted $ n $ shadows are printed onto transparencies and then assigned to $ n $ participants. The beauty of VSS is that the secret image is disclosed by superposing any $ k $ or more shadows with human native eyes and no cryptographic computation. Collecting less than $ k $ shadows will in general give no clue about the secret image even a watchdog owns infinite computation power. Unfortunately, original VSS suffers from codebook design, pixel expansion problem, low contrast and "all-or-nothing", which are taken into account by the following works [23,25,26,27,28,29,30,31,32]. Furthermore, most of the existing VSS schemes have limitations of lossy recovery and "all-or-nothing" [29,33,34].
In contrast to "all-or-nothing", progressive secret image sharing (PSIS) [33,35,36,37,38] achieves the characteristic that the more shadows the better disclosed secret image quality. PSIS is useful in many multimedia applications, such as art work image vending, Pay-TV/Music, multi-level representation and degraded encryption, where we need to intentionally disclose the multimedia with a degraded but recognizable quality so as to protect the details in addition to multimedia content. Unfortunately, conventional PSIS may be lossy recovery. Progressiveness can be divided into global progressiveness and regional progressiveness. Global progressive PSIS mainly protects the detail of the secret image progressively, while regional progressive PSIS mainly protects the secret image region by region. Since the paper intends to protect the detail of the secret image, we focus on global progressiveness in this article. However, PSIS is mainly for $ (k, n) $ threshold, where lossless recovery is seldom achieved.
Based on above analyses, conventional SIS has the drawback of "all-or-nothing" and conventional PSIS has the limitation of lossy recovery. Thus, we intend to propose ramp SIS which achieves both progressive and lossless recovery by a unique disclosing method.
In this article, first we introduce ramp SIS definition according to image features and ramp secret sharing [39,40,41]. Then we propose $ (k_1, k_2, n) $ ramp SIS based on the Chinese remainder theorem (CRT) [42,43,44]. In the proposed ramp, i.e., $ (k_1, k_2, n) $ threshold, CRT-based SIS, when we collect any $ k_1 $ or more and less than $ k_2 $ shadows, the secret image will be disclosed in a progressive way [45]. On the other hand, when we collect any $ k_2 $ or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic resulting in ability in real-time application. We give theoretical analyses and experiments to display the effectiveness of our method.
Our method allows the purchaser to review the secret with a degraded quality by collecting less shadows prior to buying them. Then the purchaser can obtain the lossless version by collecting more shadows after he decides to buy it. Image generally differs from data, thus the progressive feature with poor quality of image makes sense to some applicable scenarios. The progressive feature achieves that the quality of the image can be partially degraded. Such perceptibility makes it possible for the potential purchasers to view low-quality copies of the image prior to buying them.
A detailed scenario is given as follows. In the process of displaying and selling an art image, since the details are very important for the art image, details should be protected. After sharing the art image once, the owner can disclose and present different image qualities to different people on different occasions, instead of sharing again. For example, in an exhibition, first the owner can demonstrate a low quality of the art image with any $ k_1 $ or more shadows to prove the copyright of the art, then after reaching a purchase agreement he shows the lossless quality with any $ k_2 $ or more shadows.
The detailed advantages and contributions of the proposed approach are as follows.
$ 1. $ A formal definition of ramp SIS is first introduced.
$ 2. $ $ (k_1, k_2, n) $ ramp SIS based on CRT is proposed. We use CRT due to the following advantages comparing to polynomial-based SIS. On one hand, CRT-based SIS can achieve lossless recovery, while most of the polynomial-based SIS schemes are in general lossy. On the other hand, the disclosed operation of polynomial-based SIS is Lagrange's interpolation ($ O(k\log ^2 k) $), while that of CRT-based SIS is only modular operation ($ O(k) $) [44], therefore, CRT-based SIS has lower computational cost than polynomial-based SIS to disclose the secret image.
$ 3. $ The secret image is decoded by only modular operation. When we collect any $ k_2 $ or more shadows, the secret image will be disclosed losslessly, which outperforms polynomial-based SIS due to lossy recovery for secret pixel value larger than 250 if 251 is selected as the prime value in polynomial-based SIS.
The rest of the paper is organized as follows. Section 2 introduces ramp SIS definition and some basic requirements for the proposed method. In section 3, the proposed method and its analyses are presented in detail. Section 4 gives the security analyses of typical SIS schemes. Section 4 is devoted to experimental results. Finally, section 5 concludes this paper.
In this section, we will give some preliminaries. In conventional $ (k, n) $ threshold SIS, an original secret image $ S $ is encrypted into $ n $ shadows $ SC_1, SC_2, \cdots SC_n $, and the decrypted secret image $ {S}' $ is disclosed from any $ t $ ($ k \le t \le n, t \in {\rm Z}^ + $) shadows.
CRT was first exploited in the Western han dynasty of China as well as formally introduced in the southern and northern dynasties. It intends to solve a set of linear congruence equations.
When we choose a set of integers $ {m_i }(i = 1, 2, \cdots, k) $ satisfying $ \gcd \left({m_i, m_j } \right) $$ = 1, i \ne j $, then there is a unique solution $ y \equiv \left({a_1 M_1 M_1^{ - 1} + a_2 M_2 M_2^{ - 1} + \cdots + a_k M_k M_k^{ - 1} } \right)\left({\bmod \; M} \right) $, $ y \in \left[ {0, M - 1} \right] $) to Eq. (2.1).
$ y≡a1(modm1)y≡a2(modm2)⋯y≡ak−1(modmk−1)y≡ak(modmk) $
|
(2.1) |
where $ M = \prod\nolimits_{i = 1}^k {m_i } $, $ {{M}_{i}}={{M}_{/{{m}_{i}}}}$ and $ M_i M_i^{ - 1} \equiv 1\left({\bmod \; m_i } \right) $.
Proof. Since $ \gcd \left({m_i, m_j } \right) = 1, i \ne j $, $ \gcd \left({m_i, M_i } \right) = 1 $ and we have $ M_i^{ - 1} $ subject to $ M_i M_i^{ - 1} \equiv 1\left({\bmod \; m_i } \right) $.
For $ a_1 M_1 M_1^{ - 1} $, we have
$ aiMiM−1i≡ai(modmi),i≠j $
|
(2.2) |
$ aiMiM−1i≡ai(modmj), $
|
(2.3) |
According to Eqs. (2.2) and (2.3), $ y \equiv \left({a_1 M_1 M_1^{ - 1} + a_2 M_2 M_2^{ - 1} + \cdots + a_k M_k M_k^{ - 1} } \right)\left({\bmod \; M} \right) $, $ y \in \left[ {0, M - 1} \right] $ subject to Eq. (2.1).
Thus, on one hand, $ y $ is one solution to Eq. (2.1).
On the other hand, if both $ y_1 $ and $ y_2 $ are solutions to Eq. (2.1), we have $ y_1 -y_2 \equiv 0\left({\bmod \; m_i } \right) $. Since $ \gcd \left({m_i, m_j } \right) = 1, i \ne j $, $ M $ is exactly divided by $ y_1 -y_2 $. In addition, $ y $ is one solution to Eq. (2.1), thus, the set of solutions to Eq. (2.1) is $ \left\{ {zM + y\left| {z \in \bf{Z}} \right.} \right\} $.
Therefore, there is a unique solution $ y \equiv \left({a_1 M_1 M_1^{ - 1} + a_2 M_2 M_2^{ - 1} + \cdots + a_k M_k M_k^{ - 1} } \right)\left({\bmod \; M} \right) $, $ y \in \left[ {0, M - 1} \right] $) to Eq. (2.1).
CRT will be utilized in the proposed scheme to possess $ (k_x, n) $ threshold, where $ 2 \le k_1 \le k_x \le k_2 \le n $. Both Polynomial-based SIS and CRT-based SIS are well studied. We use CRT in our scheme due to the following advantages and differences.
● The shadow size of polynomial-based SIS is easier to be reduced.
● CRT-based SIS easily achieves lossless reconstruction, while most polynomial-based SIS schemes are not lossless.
● The disclosing operation is Lagrange's interpolation ($ O(k log^2 k) $ in polynomial-based SIS, while that is modular operation ($ O(k) $ [46]) in CRT-based SIS, thus CRT-based SIS has lower computational complexity than polynomial-based SIS to disclose the secret image.
● The principle of CRT-based SIS is complex and hard to be understood.
● The number of owners is in general not limited in polynomial-based SIS, while that in CRT-based SIS is small like n ≤ 6, because as n increases the available value of mi decreases, which will affect the distribution of the values of the shadow pixels and therefore further may lead to secure issue.
Digital image differs from pure electronic data, where the differences mainly have:
● An image includes many pixels, which have correlations between adjacent ones, such as structure, texture, edge and other related information. The correlations are important to security and hence need to be considered in SIS algorithm design. Thus, SIS should encrypt not only the pixel values but also the correlations between adjacent pixels.
● There are lots of pixels in an image so that computational complexity of SIS should be considered.
● An image owns special file storage structure. Using grayscale image as an example, its pixel value is in the range of $ \left[ {0,255} \right] $, which should be satisfied in SIS design, e.g., the output value, the input value, and other relative parameters, should lie in the range. For example, the secret pixel value range and the shadow pixel value range should not exceed the range. In addition, we have $ {m_i } \le 256 $ when applying to CRT.
● An image is a specific form of the data, where each grayscale (binary) pixel is represented as one byte (bit), so SIS is easily to be applied to secret sharing.
● In general, secret data is available only if it is losslessly recovered. Whereas, an image may be useful when recovered with some errors because of human eyes' low pass filter feature, thus, progressiveness makes sense to SIS.
The above differences lead to that in general traditional secret sharing cannot be directly applied to SIS. In particular, CRT-based ramp secret sharing cannot be directly applied to CRT-based ramp SIS.
Definition 1. A SIS splits a secret image, denoted as $ S $, into $ n $ shadow images, denoted as $ SC_1, SC_2, \cdots SC_n $. We say the SIS is a $ (k_1, k_2, n) $ ramp SIS subject to:
● security condition. The secret image cannot be reconstructed with any less than $ k_1 $ shares.
● ramp recovery condition. The secret image will be reconstructed progressively with any $ k_1 $ or more and less than $ k_2 $ shares. The reconstructed image quality increases with the number of shares from $ k_1 $ to $ k_2 $.
● decodable condition. The secret image is decoded with any $ k_2 $ or more shares.
If $ k_1 = k_2 = k $, $ (k_1, k_2, n) $ ramp SIS will reduce to $ (k, n) $-threshold SIS. The ramp SIS is called linear ramp SIS if the reconstructed image quality increases linearly with the number of shares from $ k_1 $ to $ k_2 $.
In VSS, contrast is generally used, which is also adopted in this paper to evaluate the quality in VSS. In polynomial-based SIS, in general due to lossless recovery the metrics are seldom considered. In the research field of image processing, there are many metrics to evaluate image quality, where some typical metrics will be directly adopted in this paper.
The visual quality in VSS, which can decide how well human eyes can recognize the disclosed image, of the disclosed secret image $ S' $ corresponding to secret image $ S $ can be overall evaluated by contrast as follows [28].
Definition 2.
$ α=P0−P11+P1=P(S′[AS0]=0)−P(S′[AS1]=0)1+P(S′[AS1]=0) $
|
(2.4) |
Where $ \alpha $ is contrast, $ P_0 $ (resp., $ P_1 $) means the probability of white pixels in the disclosed image $ {S}' $ for the corresponding white (resp., black) area in secret image $ S $, that is, $ P_0 $ denotes correctly decrypted probability corresponding to white area in secret image $ S $, and $ P_1 $ denotes wrongly decrypted probability corresponding to black area in secret image $ S $.
Since lossless disclose or nothing, i.e., "all-or-nothing", conventional SIS for grayscale image omits to discuss quality evaluation of disclosed secret image. Progressiveness differs from "all-or-nothing", therefore, we should discuss the quality evaluation of the disclosed gray secret image. The following typical objective metrics will be adopted to evaluate the image quality between $ S' $ and $ S $.
$ 1. $ Peak signal-to-noise-ratio (PSNR): PSNR, in Eq. (2.5), between the primary image $ I $ with size of M$ \times $N and modified image $ I' $ is adopted to measure the image similarity, where MSE as Eq. (2.6) denotes the mean square error.
$ PSNR=10log10(2552MSE)dB $
|
(2.5) |
$ MSE=1M×NM∑i=1N∑j=1[I′(i,j)−I(i,j)]2 $
|
(2.6) |
$ 2. $ Structural similarity index measure (SSIM) [47] is to assess the visual impact of three characteristics in an image, i.e., luminance, contrast and structure, which gains a multiplicative combination of the above three terms, as Eq. (2.7). The value of SSIM is in -1 and 1. The larger SSIM results in higher image similarity.
$ SSIM(x,y)=[l(x,y)]α⋅[c(x,y)]β⋅[s(x,y)]γ $
|
(2.7) |
where
$ l\left({x, y} \right) = \frac{{2\mu _x \mu _y + C_1 }}{{\mu _x^2 + \mu _y^2 + C_1 }} \\ c\left({x, y} \right) = \frac{{2\sigma _x \sigma _y + C_2 }}{{\sigma _x^2 + \sigma _y^2 + C_2 }} \\ s\left({x, y} \right) = \frac{{2\sigma _{xy} + C_3 }}{{\sigma _x \sigma _y + C_3 }} \\ $
$ \mu _x, \mu_y, \sigma_x, \sigma_y, and\; \sigma_{xy} $ are the local means, standard deviations, and cross-covariance for images $ x, y $. In this paper, we set $ C_3 = \frac{{C_2 }}{2}, \alpha = \beta = \gamma = 1 $.
$ 3. $ NC is to evaluate the quality between the original secret image and the disclosed secret image, as Eq. (2.8).
$ NC(I,I′)=1M∑i=1N∑j=1I2(i,j)M∑i=1N∑j=1I(i,j)×I′(i,j) $
|
(2.8) |
$ 4. $ The universal quality index (UQI) [48] can reflect the distortion of the disclosed secret image with its original secret image, whose value is between -1 and 1. The larger UQI means better quality. The block size of UQI is 8 in this paper. For details please refer to [48].
In addition, contrast can decide how well human eyes recognize the disclosed binary secret, so that it is expected to be as great as possible to obtain better visual quality. About how the contrast values map to the quality of the disclosed image, please refer to [49]. Herein, in order to show some intuitions about the expected performance, we have the followings.
$ 1. $ When $ \alpha \in $ [0, 0.03], one cannot recognize the secret image.
$ 2. $ When $ \alpha \in $ (0.03, 0.14], one can see a little information of the secret image.
$3. $ When $ \alpha \in $ (0.14, 0.21], the secret image is recognized with acceptable quality.
$ 4. $ When $ \alpha \in $ (0.21, 1], the secret image is fast recognized with good quality.
About how the PSNR values map to the image quality [50], we may refer to the followings.
$ 1. $ When PSNR $ \in $ [28.5, $ + \infty $], the image quality is very good.
$ 2. $ When PSNR $ \in $ [23.0, 28.5), the image quality is good.
$ 3. $ When PSNR $ \in $ [19.5, 23.0), the image quality is medium.
$ 4. $ When PSNR $ \in $ [17.0, 19.5), the image quality is poor.
$ 5. $ When PSNR $ \in $ [0, 17.0), the image quality is bad.
Algorithm 1. The proposed $ (k_1, k_2, n) $ ramp SIS |
Input: A secret image $ S $ with size of H$ \times W $ and threshold parameters $ (k_1, k_2, n) $, where $ 2 \le k_1 \le k_2 \le n $. Output: $ n $ shadows $ SC_1, SC_2, \cdots SC_n $ and corresponding private integers $ m_1, m_2, \cdots m_n $. |
Step 1: Choose a set of integers $ \left\{ {128 \le p < m_1 < m_2 \cdots < m_n \le 256} \right\} $ to satisfy $ 1.$ $ \gcd \left({m_i, m_j } \right) = 1, i \ne j $. $ 2.$ $ \gcd \left({m_i, p} \right) = 1 $ for $ i = 1, 2, \cdots, n $. $ 3.$ $ M_{k_x} > pN_{k_x} $ for any $ 2 \le k_1 \le k_x \le k_2 $. where $ M_{k_x} = \prod\nolimits_{i = 1}^{k_x} {m_i } $, $ N_{k_x} = \prod\nolimits_{i = 1}^{{k_x} - 1} {m_{n - i + 1} } $ and $ p $ is public. Step 2: Calculate $ T_{k_x} = \left[ {\frac{{\left\lfloor {\frac{M_{k_x}}{p} - 1} \right\rfloor - \left\lceil {\frac{N_{k_x}}{p}} \right\rceil }}{2} + \left\lceil {\frac{N_{k_x}}{p}} \right\rceil } \right] $ for $ k_x = k_1, k_1+1, \cdots k_2 $ and $ T_{k_x} $ is public as well among all the participants. For each coordinate $ (h, w)\in \{(h, w)\vert 1 \le h \le H, 1 \le w \le W\} $, repeat Steps 3-5. Step 3:For now processing pixel value $ s = S(h, w) $, we select randomly a threshold $ {{k_x}^*} $ in $ [k_1, k_2] $. Step 4:If $ 0 \le x < p $, randomly pick up an integer $ A $ in $ \left[ {T_{{k_x}^*} + 1, \left\lfloor {\frac{M_{{k_x}^*}}{p} - 1} \right\rfloor } \right] $ and compute $ y = s + Ap $. Else randomly pick up an integer $ A $ in $ \left[ {\left\lceil {\frac{N_{{k_x}^*}}{p}} \right\rceil, T_{{k_x}^*}} \right) $ and $ y = s-p + Ap $. Step 5:Calculate $ a_i \equiv y\left({\bmod \; m_i } \right) $ and compute $ SC_{i}(h, w) = a_i $ for $ i = 1, 2, \cdots, n $. Step 6: Output $ n $ shadows $ SC_{1}, SC_{2}, \cdots SC_{n} $ and their private corresponding integers $ m_1, m_2, \cdots m_n $. |
We give the proposed $ (k_1, k_2, n) $ ramp SIS based on CRT in Algorithm 1 with an original secret image $ S $ leading to $ n $ output shadows $ SC_1, SC_2, \cdots SC_n $ and private corresponding integers $ m_1, m_2, \cdots m_n $. The recovery Steps are described in Algorithm 2.
In Algorithm 1 and Algorithm 2, we find that.
$ 1. $ In Step 1 of the proposed Algorithm 1, $ \left\{ {128 \le p < m_1 < m_2 \cdots < m_n \le 256} \right\} $ is given due to image pixel value range and $ pN_{k_x} < M_{k_x} $. We suggest here that $ p $ is as small as possible for security and $ m_i $ is as large as possible, thus, the pixel values of shadow will be randomly distributed in large range.
$ 2. $ $ \gcd \left({m_i, m_j } \right) = 1 $ and $ \gcd \left({m_i, p} \right) = 1 $ intend to satisfy CRT conditions, where $ m_i $ may be preserved as the private key for participant $ i $ or may be public. $ \gcd \left({m_i, p} \right) = 1 $ is on account of not only applicable CRT but also containing all possible pixel values in range $ [0, m_i) $ for shadow $ SC_i $. We note that, our method can accommodate only a constant number of participants because in Step 1 of Algorithm 1 one has to choose $ n+1 $ integers between 128 and 256, which must be pairwise relatively prime and whose available numbers are more than 23 but less than 128. However, these numbers can satisfy general applications.
Algorithm 2. Recovery for the proposed scheme. |
Input: $ t $ shadows $ SC_{i_1}, SC_{i_2 }, \cdots SC_{i_t } $, their corresponding private integers $ m_{i_1}, m_{i_2}, \cdots m_{i_t} $, $ p $ and $ T_{k_x} $ for $ k_x = k_1, k_1+1, \cdots k_2 $, where $ k_1 \le t $. Output: A H $ \times $ W disclosed secret image $ S' $. |
Step 1:For each coordinate $ (h, w) \in \left\{ {(h, w)\vert 1 \le h \le H, 1 \le w \le W} \right\} $, repeat Steps 2-5. Step 2:Calculate $ a_{i_j} = SC_{i_j}(h, w) $ for $ j = 1, 2, \cdots, t $. Let's solve the following linear equations according to CRT. $y ≡ai1(modmi1)y ≡ai2(modmi2) ⋯y ≡ail−1(modmit−1)y ≡ait(modmit) (3.1) $ Step 3:Calculate $ T^* = \left\lfloor {\frac{y}{p}} \right\rfloor $. Step 4:For $ k_x = k_1, k_1+1, \cdots k_2 $, if $ T^* \ge T_{k_x} $, let $ s_{k_x} \equiv y\left({\bmod \; p} \right) $; otherwise let $ s_{k_x} = y\left({\bmod \; p} \right)+p $. Step 5:$ {k_x}^* = \mathop {\arg \; \min }\limits_{k_x \in [k_1, k_2]} \left\{ {\left. {k_x } \right|s_{k_x } = s_{k_x + 1} = \cdots = s_{min(t, k_2)} } \right\} $. Set $ S'(h, w) = s_{{k_x}^*} $. Step 6:Output the disclosed secret image $ S' $. |
$ 3. $ In Step 2 of Algorithm 1, $ T_{k_x} $ divides interval $ \left[ {\left\lceil {\frac{N_{k_x}}{p}} \right\rceil, \left\lfloor {\frac{M_{k_x}}{p} - 1} \right\rfloor } \right] $ into two parts with a view to classify $ 0 \le x < p $ or $ p \le x \le 255 $ according to Step 4 of Algorithm 2. As a result, $ s $ can be losslessly disclosed for arbitrary $ x \in \left[ {0,255} \right] $.
$4. $ In Step 4 of our Algorithm 1, we know $ A $ is randomly picked up from $ \left[ {\left\lceil {\frac{N_{k_x}}{p}} \right\rceil, \left\lfloor {\frac{M_{k_x}}{p} - 1} \right\rfloor } \right] $, thus, $ N_{k_x} \le y < M_{k_x} $ in order to obtain $ (k_x, n) $ threshold for $ y $ as explained in Section 2.1.
$ 5. $ In Step 4 of Algorithm 1, $ A $ is randomly selected for every secret pixel $ s $, hence $ y = s + Ap $ can enlarge $ s $ value in order to scramble both the correlations between adjacent pixels and the secret pixel value without auxiliary encryption.
$ 6. $ In Step 4 of Algorithm 1, $ y = s + Ap $ and $ s < p $ will determine a unique $ s $ according to $ s \equiv y\left({\bmod \; p} \right) $.
$ 7. $ In the recovery phase, for the current processing location $ (h, w) $, we do not know its threshold, thus, in Steps 4–5 of Algorithm 2 we search for the minimum threshold satisfying losslessly recovering the original secret pixel $ s $, denoted as $ {k_x}^* $.
$ 8. $ Our $ (k_1, k_2, n) $ threshold extension method may be also suitable for other SIS, such as polynomial-based SIS.
Moreover, we explain the differences between Algorithm 1 and the classical ones as follows.
$ 1. $ Ramp SIS has not been formally introduced before our work.
$ 2. $ CRT is first applied to Algorithm 1 to achieve ramp SIS.
$ 3. $ Steps 1–4 of Algorithm 1 are different from the classical CRT-based SIS schemes since Steps 1–4 will achieve ramp SIS proved in Section 3.2.
We will show performances of the proposed method by theoretically analyzing the security, visual recognition and valid ramp threshold construction. In Theorem 1, we will prove that the proposed scheme is a valid $ (k_1, k_2, n) $ ramp SIS construction. Prior to the proof of Theorem 1, some Lemmas are given. Without loss of generality, in the following analyses, we assume that $ {{k_x}^*} = {{k_0}} $ threshold is selected in Step 3 of Algorithm 1 for now processing pixel value $ s = S(h, w) $.
Lemma 1. Each shadow generated by our method gives no clue about the secret image.
Proof.
From $ y = s + Ap $ or $ y = s-p + Ap $ and $ a_i \equiv y\left({\bmod \; m_i } \right) $, we will prove $ SC_i(h, w) = a_i $ is random in range $ [0, m_i) $.
If $ A $ is fixed, since $ s $ represents the pixel value of secret image, we assume $ s $ and $ s-p $ is random in range $ [0,255] $. Due to $ a_i \equiv (s + Ap)\left({\bmod \; m_i } \right) $, we have $ a_i $ is random in range $ [0, m_i) $.
On the other hand, if $ s $ is fixed, $ \gcd \left({m_i, p} \right) = 1 $, thus, $ Ap\left({\bmod \; m_i} \right) $ will cover all possible values in range $ [0, m_i) $. We have $ s+Ap\left({\bmod \; m_i} \right) $ will cover all possible values in range $ [0, m_i) $ as well. As a result, we have $ a_i $ is random in range $ [0, m_i) $.
Thus, the Lemma is proved to be met.
Lemma 2. In the proposed scheme, any $ k_0 $ or more shadow pixels can disclose the secret pixel losslessly.
Proof. Since $ s $ represents the pixel value of secret image, we will prove any $ k_0 $ or more shadows can disclose $ s $ losslessly.
In order to disclose $ s $, we only need to find $ y $ due to $ s \equiv y\left({\bmod \; p} \right) $ or $ s \equiv y\left({\bmod \; p} \right)+p $.
When $ a_{i_1}, a_{i_2 }, \cdots a_{i_{k_0} } $ are given, according to CRT, there exists only solution $ y $ modulo $ N_1 = \prod\nolimits_{j = 1}^{k_0} {m_{i_j } } $ since $ N_1 \ge M_{k_0} $. Finally we can uniquely determine $ y $ and thus, $ s $ based on Steps 4-5 of our Algorithm 2.
Lemma 3. In the proposed scheme, any $ k_0-1 $ or less shadows give no clue about secret.
Proof. When $ {k_0}-1 $ shadow pixels $ a_{i_1}, a_{i_2 }, \cdots a_{i_{{k_0}-1} } $ are given, according to CRT then all we have is $ y_0 $ modulo $ N_2 = \prod\nolimits_{j = 1}^{{k_0} - 1} {m_{i_j } } $, where $ y_0 \in [0, N_2-1] $. On one hand, the true $ y \in [N_{k_0}, M_{k_0}-1] $, which is absolutely different from $ y_0 $. On the other hand, since $ N_{k_0} \ge N_2 $, $ N_{k_0} \le y < M_{k_0} $ and $ \gcd \left({N_2, p} \right) = 1 $, in $ [N_2, M_{k_0}-1] $, $ y_0+b\prod\nolimits_{j = 1}^{{k_0}-1} {m_{i_j} } $ for $ b = 1, 2, \cdots, {m_{i_{k_0}} -1} $ are also the solutions for the collected $ {k_0}-1 $ equations in Eq. (3.1). Thus, there are another $ {m_{i_{k_0}} -1} $ solutions in $ [N_2, M_{k_0}-1] $, other than only one. Thus $ {k_0}-1 $ or less shadows give no clue about secret.
Theorem 1. Our method is a valid $ (k_1, k_2, n) $ ramp SIS construction.
Proof. Based on the above Lemmas, we know for now processing pixel value $ s = S(h, w) $ $ (k_0, n) $ threshold is achieved by our method.
Since $ {{sc}_{1}}, {{sc}_{2}}, \cdots{{sc}_{{n}}} $ are generated according to the secret pixel $ s $ with $ (k_0, n) $ threshold, we can disclose the secret $ s $ when we collect any $ k_0 $ or more shadow pixels.
Since in Step 3 of Algorithm 1, for every processing pixel value $ s = S(h, w) $, a threshold $ k_x $ in $ [k_1, k_2] $ is selected randomly, when we collect more than $ k_1 $ shadows, more secret pixels will be disclosed losslessly so that the progressive quality of disclosed secret image will be gained. On the other hand, when we collect any $ k_2 $ or more shadows, every pixel of the secret image is disclosed losslessly, thus, the secret image is disclosed losslessly. As a result, our method is a valid $ (k_1, k_2, n) $ ramp SIS construction.
In this section, experiments and analyses are taken into account to evaluate the effectiveness of the proposed scheme.
Figure 1 is one experimental result of our proposed $ (k_1, k_2, n) $ ramp CRT-based SIS, where $ p = 128, m_1 = 245, m_2 = 247, m_3 = 249, m_4 = 251, m_5 = 253 $, $ k_1 = 2, k_2 = 4, n = 5 $ and its employed grayscale secret image is in Figure 1(a). Figures 1(b–f) are the generated 5 shadows, which are noise-like. Figures 1(g–j) display the disclosed grayscale secret image with any $ t\left({2 \le t \le 5} \right) $ shadows by our recovery method, where $ S'_{1, 2, \cdots, t} $ is the disclosed secret image $ S' $ from $ SC _{1}, SC_{2}, \cdots, SC_{t} $ and for saving pages we only give the disclosed results with the first $ t $th shadows. When more shadows are used, better disclosed secret image is obtained in $ [k_1, k_2] $, thus, the proposed $ (k_1, k_2, n) $ ramp SIS is progressive in $ [k_1, k_2] $. The disclosed secret images with any $ k_2 $ or more shadows, as Figures 1 (i)-(j), are the same as the original secret image in Figure 1 (a), since $ \sum\limits_{h = 1}^H {\sum\limits_{w = 1}^W {\left| {S(h, w) - S'(h, w)} \right|} } = 0 $.
Furthermore, progressive rate can be adopted to evaluate the progressive effect of the disclosed secret image [51]. In Figure 1, taking PSNR as an example, the progressive rate at $ t = 2 $ is 3.0746 and the progressive rate at $ t = 3 $ is $ + \infty $.
In addition, Figure 2 shows shadows histogram analyses of proposed $ (k_1, k_2, n) $ ramp SIS corresponding to Figure 1. For each shadow, the pixel values are approximately uniformly distributed in range $ [0, m_i-1] $, which tells that each shadow gives no clue about the secret image. In the following experiments, we will omit the shadows histogram analyses for saving pages.
Figure 3 is the further experimental result of our proposed $ (k_1, k_2, n) $ ramp CRT-based SIS, where $ p = 128, m_1 = 245, m_2 = 247, m_3 = 249, m_4 = 251, m_5 = 253 $, $ k_1 = 3, k_2 = 5, n = 5 $ and its employed grayscale secret image is in Figure 3(a). Figures 3(b–f) are the generated 5 shadows, which are noise-like. Figures 3(g–j) display the disclosed grayscale secret image with any $ t\left({2 \le t \le 5} \right) $ shadows by our recovery method. When less than $ k_1 $ shadows are inspected, nothing of the secret image can be obtained. When $ k_1 $ or more shadows are collected, the secret image can be disclosed in a degree. When more shadows are used, better disclosed secret image is obtained as well in $ [k_1, k_2] $, thus, the proposed $ (k_1, k_2, n) $ ramp SIS is progressive in $ [k_1, k_2] $ as well. The disclosed secret images with any $ k_2 $ shadows as Figure 3(j) is the same as the original secret image Figure 3(a) as well.
Based on the above results we conclude that:
$ 1. $ The shadows are noise-like, thus, every single shadow is secure.
$ 2. $ When any $ t < k_1 $ shadows are inspected, there is no information on the secret image is leaked except for image size, which shows security of our method.
$ 3. $ When any $ t (k_1 \le t \le k_2) $ shadows are collected, the secret image will be disclosed by our recovery method in a progressive way.
$ 4. $ When we collect any $ k_2 $ or more shadows, the secret image is disclosed losslessly by our recovery method.
$5. $ $ (k_1, k_2, n) $ ramp SIS is achieved.
Some available parameters of $ {p, m_1, m_2 \cdots, m_n } $ for different participant numbers are suggested in Table 1, some of which are applied to our experiments as well. The user can also search other parameters according to specific applications.
$n$ | $p$ | ${m_1, m_2 \cdots, m_n }$ |
2 | 128 | 253,255 |
2 | 131 | 253,254 |
3 | 128 | 251,253,255 |
3 | 131 | 253,254,255 |
4 | 128 | 247,251,253,255 |
4 | 131 | 251,253,254,255 |
5 | 128 | 245,247,249,251,253 |
5 | 131 | 247,251,253,254,255 |
Herein, we compare the proposed scheme with other related schemes especially VSS [28] and polynomial-based scheme [12], since they are typical SIS schemes. Furthermore, VSS in [28] is progressive without codebook design and pixel expansion based on stacking recovery. Polynomial-based scheme in [12] is fully lossless.
We note that, as stated in section 2.2, in general secret sharing is hard to be directly applied to SIS, thus, we omit the comparisons to ramp secret sharing.
Figure 4 is one experimental result of our proposed $ (k_1, k_2, n) $ ramp CRT-based SIS, where $ p = 131, m_1 = 251, m_2 = 253, m_3 = 254, m_4 = 255 $, $ k_1 = 2, k_2 = 4, n = 4 $ and its employed grayscale secret image is in Figure 4(a). Figures 4(b–e) are the generated 4 shadows, which are noise-like. Figures 4(f–h) display the disclosed grayscale secret image with any $ t\left({2 \le t \le 4} \right) $ shadows by our recovery method. When more shadows are used, better disclosed secret image is obtained as well in $ [k_1, k_2] $, thus, the proposed $ (k_1, k_2, n) $ ramp SIS is progressive in $ [k_1, k_2] $. The disclosed secret image with $ k_2 $ shadows as Figure 4 (h) is the same as the original secret image Figure 4 (a), since $ \sum\limits_{h = 1}^H {\sum\limits_{w = 1}^W {\left| {S(h, w) - S'(h, w)} \right|} } = 0 $ as well.
Figure 5 is further experimental result of our proposed $ (k_1, k_2, n) $ ramp CRT-based SIS, where $ p = 131, m_1 = 251, m_2 = 253, m_3 = 254, m_4 = 255 $, $ k_1 = 2, k_2 = 2, n = 4 $ and its employed grayscale secret image is in Figure 5(a). Figures 5(b–e) are the generated 4 shadows, which are noise-like. Figures 5(f–h) display the disclosed grayscale secret image with any $ t\left({2 \le t \le 4} \right) $ shadows by our recovery method. When two or more shadows are used, the secret image is losslessly disclosed so that our proposed $ (k_1, k_2, n) $ ramp SIS reduces to $ (k, n) $ ramp SIS if $ k_1 = k_2 $.
Then Figure 6 illustrates one experimental result of VSS for $ (k, n) $ threshold in [28], where $ k = 2, n = 4 $ and its employed binary secret image is in Figure 6(a). Figures 6(b–e) are the generated 4 shadows, which are noise-like as well. Figures 6(f–h) display the disclosed grayscale secret image with any $ t\left({2 \le t \le 4} \right) $ shadows by stacking recovery. When 2 or more shadows are used, better disclosed secret image is obtained as well in $ [k, n] $, thus, VSS for $ (k, n) $ threshold in [28] is progressive in $ [k, n] $.
According to Figure 4, Figure 5 and Figure 6, comparisons between VSS and our method are given as follows.
$1. $ Our method is for $ (k_1, k_2, n) $ ramp threshold due to random threshold selection in Step 3 of our method while VSS is only for $ (k, n) $ threshold, where $ (k, n) $ threshold is one special case of our method.
$ 2. $ Our disclosing method is modular arithmetic since CRT while VSS is stacking, thus, our disclosing method needs more computation than VSS.
$ 3. $ The secret image is disclosed in a progressive way by our method when $ t(k_1 \le t \le k_2) $ shadows are collected due to random threshold selection in Step 3 of our method, while VSS is progressive in $ [k, n] $.
$ 4. $ Our method discloses the secret image losslessly when we collect any $ k_2 $ or more shadows since Steps 4–5 of our method, while VSS is lossy.
$ 5. $ Our method is suitable for grayscale secret image as well as possible color secret image due to image characteristic analyses and CRT parameters design, while VSS is for binary secret image.
Figure 7 is one experimental result of $ (k, n) $ threshold polynomial-based SIS [12], where $ k = 2, n = 4 $ and its employed grayscale secret image is in Figure 7(a). Figures 7(b–e) are the generated 4 shadows, which are noise-like. Figures 7(f–h) display the same disclosed grayscale secret images with high-resolution with any $ k = 2 $ or more shadows by Lagrange interpolation.
According to Figure 4, Figure 5 and Figure 7, comparisons between our method and polynomial-based SIS are given as follows.
$ 1. $ Our method is for $ (k_1, k_2, n) $ ramp threshold due to random threshold selection in Step 3 of our method while polynomial-based SIS is only for $ (k, n) $ threshold, where $ (k, n) $ threshold is one special case of our method.
$ 2. $ Our disclosing method is modular arithmetic ($ O(k) $ operations [44]) since CRT while polynomial-based SIS is Lagrange interpolation ($ O(k\log ^2 k) $ operations [44]), thus, our disclosing method needs less computation than polynomial-based SIS.
$3. $ The secret image is disclosed in a progressive way by our method when any $ t(k_1 \le t \le k_2) $ shadows are gained due to random threshold selection in Step 3 of our method, while polynomial-based SIS is "all-or-nothing".
$4. $ In some polynomial-based SIS schemes, it is generally lossy recovery since secret image is decoded by modular 251 which is less than max grayscale value 255. The recovering image will be lossy if the pixel value of the secret image exceeds 251 and some polynomial-based SIS schemes have a little bit of loss. By contrast, our method is lossless because of CRT. We further analyze this issue as follows. In polynomial-based SIS, the primes near 255 are 257 and 251. In most polynomial-based SIS, 251 is used. If 257 is used, we cannot store the i-th shadow pixel for the value of 256; otherwise 251 is used, we cannot disclose the value of the secret pixel greater than 250. Although some methods are given to solve the 251 problem, such as selecting the prime 257 [52], primitive polynomial for $ GF(2^8) $, splitting the secret pixel greater than 250 into two pixels and so on, they are achieved at some other costs. Taking [53] as one example, Huffman coding and image differencing process are employed to reduce the size of each shadow and to avoid auxiliary encryption. Primitive polynomial for $ GF(2^8) $ is adopted to avoid quality degradation. However, primitive polynomial for $ GF(2^8) $ has larger computational complexity.
In addition, actually, when $ k_1 = k_2 = k $, the $ (k_1, k_2, n) $ ramp SIS will be a $ (k, n) $-SIS. Progressiveness is studied in some degree in VSS while that is seldom discussed in polynomial-based SIS. However, VSS is only suitable for binary image rather than grayscale image.
In a word, based on image characteristics and CRT, the proposed $ (k_1, k_2, n) $ ramp SIS has the features of $ (k_1, k_2, n) $ threshold with only modular arithmetic recovery method and no auxiliary encryption, which outperforms conventional $ (k, n) $ threshold SIS.
For the above experiments, the quality evaluation metrics of the disclosed secret image are given in Table 2. According to Table 2, the proposed method achieves progressive characteristic in general $ (k_1, k_2, n) $ threshold when more shadows are collected, which outperforms conventional SIS as well.
Schemes | Metrics | $ t=2 $ | $ t=3 $ | $ t=4 $ | $ t=5 $ |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | PSNR | 10.4435 | $ 13.5181 $ | $ + \infty $ | $ + \infty $ |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | SSIM | 0.0545 | 0.1500 | 1 | 1 |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | UQI | 0.0566 | 0.1609 | 1 | 1 |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | NC | 0.9351 | 0.9679 | 1 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 3 | PSNR | - | 10.2597 | 13.2965 | $ + \infty $ |
Our $ (3, 5, 5) $ ramp SIS in Figure 3 | SSIM | - | 0.1224 | 0.3198 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 1 | UQI | - | 0.1204 | 0.3234 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 1 | NC | - | 0.9133 | 0.9577 | 1 |
Our $ (2, 4, 4) $ ramp SIS in Figure 4 | PSNR | 10.2811 | 13.2348 | $ + \infty $ | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 4 | SSIM | 0.0528 | 0.1403 | 1 | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 1 | UQI | 0.0544 | 0.1511 | 1 | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 1 | NC | 0.9482 | 0.9745 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 5 | PSNR | $ + \infty $ | $ + \infty $ | $ + \infty $ | |
Our $ (2, 2, 4) $ ramp SIS in Figure 5 | SSIM | 1 | 1 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 1 | UQI | 1 | 1 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 1 | NC | 1 | 1 | 1 | - |
$ (2, 4) $ threshold RGVSS in Figure 6 | $ \alpha $ | 0.2886 | 0.5018 | 0.5018 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | PSNR | $ + \infty $ | $ + \infty $ | $ + \infty $ | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | SSIM | 1 | 1 | 1 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | UQI | 1 | 1 | 1 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | NC | 1 | 1 | 1 | - |
In this paper, based on the study of image characteristics, the Chinese remainder theorem (CRT) and secret image sharing (SIS), we proposed $ (k_1, k_2, n) $ ramp SIS. Our method realizes $ (k_1, k_2, n) $ threshold and lossless recovery for grayscale image without auxiliary encryption. When we collect any $ k_1 $ or more shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any $ k_2 $ or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic resulting in ability in real-time application. Theoretical analyses and experiments are performed to display the effectiveness of our method. Applying our method to other SIS schemes like polynomial-based SIS and comparing to related ramp secret sharing will be our future work.
The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Numbers: 61602491, 61501148) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).
We have no conflicts of interest to declare.
[1] | Woodcock CL, Ghosh RP (2010) Chromatin higher-order structure and dynamics. Cold Spring Harb Perspect Biol 2: a000596. |
[2] |
Sexton T, Cavalli G (2015) The role of chromosome domains in shaping the functional genome. Cell 160: 1049–1059. doi: 10.1016/j.cell.2015.02.040
![]() |
[3] |
Miné-Hattab J, Rothstein R (2012) Increased chromosome mobility facilitates homology search during recombination. Nat Cell Biol 14: 510–517. doi: 10.1038/ncb2472
![]() |
[4] |
Khurana S, Kruhlak MJ, Kim J, et al. (2014) A macrohistone variant links dynamic chromatin compaction to BRCA1-dependent genome maintenance. Cell Rep 8: 1049–1062. doi: 10.1016/j.celrep.2014.07.024
![]() |
[5] |
Robinson PJJ, Fairall L, Huynh VAT, et al. (2006) EM measurements define the dimensions of the “30-nm” chromatin fiber: evidence for a compact, interdigitated structure. Proc Natl Acad Sci U S A 103: 6506–6511. doi: 10.1073/pnas.0601212103
![]() |
[6] |
Schalch T, Duda S, Sargent DF, et al. (2005) X-ray structure of a tetranucleosome and its implications for the chromatin fibre. Nature 436: 138–141. doi: 10.1038/nature03686
![]() |
[7] | Joti Y, Hikima T, Nishino, et al. (2012) Chromosomes without a 30-nm chromatin fiber. Nucl Austin Tex 3: 404–410. |
[8] |
Fussner E, Ahmed K, Dehghani, et al. (2010) Changes in chromatin fiber density as a marker for pluripotency. Cold Spring Harb Symp Quant. Biol 75: 245–249. doi: 10.1101/sqb.2010.75.012
![]() |
[9] |
Yokota H, van den Engh G, Hearst JE, et al. (1995) Evidence for the organization of chromatin in megabase pair-sized loops arranged along a random walk path in the human G0/G1 interphase nucleus. J Cell Biol 130: 1239–1249. doi: 10.1083/jcb.130.6.1239
![]() |
[10] |
Petrascheck M, Escher D, Mahmoudi T et al. (2005) DNA looping induced by a transcriptional enhancer in vivo. Nucleic Acids Res. 33: 3743–3750. doi: 10.1093/nar/gki689
![]() |
[11] | Pombo A, Dillon N (2015) Three-dimensional genome architecture: players and mechanisms. Nat Rev Mol Cell Biol 16: 245–257. |
[12] |
Dixon JR, Selvaraj S, Yue F, et al. (2012) Topological domains in mammalian genomes identified by analysis of chromatin interactions. Nature 485: 376–380. doi: 10.1038/nature11082
![]() |
[13] |
Nora EP, Lajoie BR, Schulz EG, et al. (2012) Spatial partitioning of the regulatory landscape of the X-inactivation centre. Nature 485: 381–385. doi: 10.1038/nature11049
![]() |
[14] |
Sexton T, Yaffe E, Kenigsberg E, et al. (2012) Three-dimensional folding and functional organization principles of the Drosophila genome. Cell 148: 458–472. doi: 10.1016/j.cell.2012.01.010
![]() |
[15] |
Lieberman-Aiden E, van Berkum NL, Williams L, et al. (2009) Comprehensive mapping of long-range interactions reveals folding principles of the human genome. Science 326: 289–293. doi: 10.1126/science.1181369
![]() |
[16] |
Bolzer A, Kreth G, Solovei I, et al. (2005) Three-dimensional maps of all chromosomes in human male fibroblast nuclei and prometaphase rosettes. PLoS Biol 3: e157. doi: 10.1371/journal.pbio.0030157
![]() |
[17] | Cremer T, Cremer M (2010) Chromosome territories. Cold Spring Harb Perspect Biol 2: a003889. |
[18] | Kinney NA, Onufriev AV, Sharakhov IV (2015) Quantified effects of chromosome-nuclear envelope attachments on 3D organization of chromosomes. Nucl Austin Tex 6: 212–224. |
[19] |
Heun P, Laroche T, Shimada K, et al. (2001) Chromosome dynamics in the yeast interphase nucleus. Science 294: 2181–2186. doi: 10.1126/science.1065366
![]() |
[20] |
Levi V, Ruan Q, Plutz M, et al. (2005) Chromatin dynamics in interphase cells revealed by tracking in a two-photon excitation microscope. Biophys J 89: 4275–4285. doi: 10.1529/biophysj.105.066670
![]() |
[21] | Hubner M, Spector D (2010) Chromatin Dynamics. Annu Rev Biophys 39: 471–489. |
[22] | Javer A, Long Z, Nugent E, et al. (2013) Short-time movement of E. coli chromosomal loci depends on coordinate and subcellular localization. Nat Commun. 4: 3003. |
[23] |
Gibcus JH, Dekker J (2013) The hierarchy of the 3D genome. Mol Cell 49: 773–782. doi: 10.1016/j.molcel.2013.02.011
![]() |
[24] |
Weber SC, Spakowitz AJ, Theriot JA (2012) Nonthermal ATP-dependent fluctuations contribute to the in vivo motion of chromosomal loci. Proc Natl Acad Sci U S A 109: 7338–7343. doi: 10.1073/pnas.1119505109
![]() |
[25] | Pliss A, Malyavantham KS, Bhattacharya S, et al. (2013) Chromatin dynamics in living cells: identification of oscillatory motion. J Cell Physiol 228, 609–616. |
[26] |
Gerlich D, Beaudouin J, Kalbfuss B, et al. (2003) Global chromosome positions are transmitted through mitosis in mammalian cells. Cell 112: 751–764. doi: 10.1016/S0092-8674(03)00189-2
![]() |
[27] |
Walter J, Schermelleh L, Cremer M, et al. (2003) Chromosome order in HeLa cells changes during mitosis and early G1, but is stably maintained during subsequent interphase stages. J Cell Biol 160: 685–697. doi: 10.1083/jcb.200211103
![]() |
[28] |
Müller I, Boyle S, Singer RH, et al. (2010) Stable morphology, but dynamic internal reorganisation, of interphase human chromosomes in living cells. PloS One 5: e11560. doi: 10.1371/journal.pone.0011560
![]() |
[29] |
Kruhlak MJ, Celeste A, Dellaire G, et al. (2006) Changes in chromatin structure and mobility in living cells at sites of DNA double-strand breaks. J Cell Biol 172: 823–834. doi: 10.1083/jcb.200510015
![]() |
[30] |
Zink D, Cremer T, Saffrich R, et al. (1998) Structure and dynamics of human interphase chromosome territories in vivo. Hum Genet 102: 241–251. doi: 10.1007/s004390050686
![]() |
[31] |
Jackson DA, Pombo A (1998) Replicon clusters are stable units of chromosome structure: evidence that nuclear organization contributes to the efficient activation and propagation of S phase in human cells. J Cell Biol 140: 1285–1295. doi: 10.1083/jcb.140.6.1285
![]() |
[32] |
Robinett CC, Straight A, Li G, et al. (1996) In vivo localization of DNA sequences and visualization of large-scale chromatin organization using lac operator/repressor recognition. J Cell Biol 135: 1685–1700. doi: 10.1083/jcb.135.6.1685
![]() |
[33] |
Jacome A, Fernandez-Capetillo O (2011) Lac operator repeats generate a traceable fragile site in mammalian cells. EMBO Rep 12: 1032–1038. doi: 10.1038/embor.2011.158
![]() |
[34] |
Dubarry M, Loïodice I, Chen CL, et al. (2011) Tight protein-DNA interactions favor gene silencing. Genes Dev 25: 1365–1370. doi: 10.1101/gad.611011
![]() |
[35] |
Saad H, Gallardo F, Dalvai M, et al. (2014) DNA dynamics during early double-strand break processing revealed by non-intrusive imaging of living cells. PLoS Genet 10: e1004187. doi: 10.1371/journal.pgen.1004187
![]() |
[36] |
Chen B, Gilbert LA, Cimini BA, et al. (2013) Dynamic imaging of genomic loci in living human cells by an optimized CRISPR/Cas system. Cell 155: 1479–1491. doi: 10.1016/j.cell.2013.12.001
![]() |
[37] |
Miyanari Y, Ziegler-Birling C, Torres-Padilla M-E (2013) Live visualization of chromatin dynamics with fluorescent TALEs. Nat Struct Mol Biol 20: 1321–1324. doi: 10.1038/nsmb.2680
![]() |
[38] |
Zidovska A, Weitz DA, Mitchison TJ (2013) Micron-scale coherence in interphase chromatin dynamics. Proc Natl Acad Sci U S A 110: 15555–15560. doi: 10.1073/pnas.1220313110
![]() |
[39] |
Hinde E, Kong X, Yokomori K, et al. (2014) Chromatin dynamics during DNA repair revealed by pair correlation analysis of molecular flow in the nucleus. Biophys J 107: 55–65. doi: 10.1016/j.bpj.2014.05.027
![]() |
[40] |
Marshall WF, Straight A, Marko JF, et al. (1997) Interphase chromosomes undergo constrained diffusional motion in living cells. Curr Biol CB 7: 930–939. doi: 10.1016/S0960-9822(06)00412-X
![]() |
[41] |
Bornfleth H, Edelmann P, Zink D, et al. (1999) Quantitative motion analysis of subchromosomal foci in living cells using four-dimensional microscopy. Biophys J 77: 2871–2886. doi: 10.1016/S0006-3495(99)77119-5
![]() |
[42] | Qian H, Sheetz MP, Elson EL (1991) Single particle tracking. Analysis of diffusion and flow in two-dimensional systems. Biophys J 60: 910–921. |
[43] |
Rosa A, Everaers R (2008) Structure and dynamics of interphase chromosomes. PLoS Comput Biol 4: e1000153. doi: 10.1371/journal.pcbi.1000153
![]() |
[44] | Hajjoul H, Mathon J, Ranchon H, et al. (2013) High-throughput chromatin motion tracking in living yeast reveals the flexibility of the fiber throughout the genome. Genome Res 23: 1829–1838. |
[45] |
Havlin S, Ben-Avraham D (2002) Diffusion in disordered media. Adv Phys 51: 187–292. doi: 10.1080/00018730110116353
![]() |
[46] | Doi M (1996) Introduction to polymer physics Oxford University Press. |
[47] |
Bronstein I, Israel Y, Kepten E, et al. (2009) Transient anomalous diffusion of telomeres in the nucleus of mammalian cells. Phys Rev Lett 103: 018102. doi: 10.1103/PhysRevLett.103.018102
![]() |
[48] |
Dion V, Kalck V, Seeber A, et al. (2013) Cohesin and the nucleolus constrain the mobility of spontaneous repair foci. EMBO Rep 14: 984–991. doi: 10.1038/embor.2013.142
![]() |
[49] |
Gartenberg MR, Neumann FR, Laroche T, et al. (2004) Sir-mediated repression can occur independently of chromosomal and subnuclear contexts. Cell 119: 955–967. doi: 10.1016/j.cell.2004.11.008
![]() |
[50] |
Hu Y, Kireev I, Plutz M, et al. (2009) Large-scale chromatin structure of inducible genes: transcription on a condensed, linear template. J Cell Biol 185: 87–100. doi: 10.1083/jcb.200809196
![]() |
[51] |
Neumann FR, Dion V, Gehlen LR, et al. (2012) Targeted INO80 enhances subnuclear chromatin movement and ectopic homologous recombination. Genes Dev 26: 369–383. doi: 10.1101/gad.176156.111
![]() |
[52] | Chuang C-H, Carpenter AE, Fuchsova B, et al. (2006) Long-range directional movement of an interphase chromosome site. Curr Biol 16: 825–831. |
[53] | Khanna N, Hu Y, Belmont AS (2014) HSP70 transgene directed motion to nuclear speckles facilitates heat shock activation. Curr Biol 24: 1138–1144. |
[54] | Chubb JR, Boyle S, Perry P, et al. (2002) Chromatin motion is constrained by association with nuclear compartments in human cells. Curr Biol 12: 439–445. |
[55] |
Lucas JS, Zhang Y, Dudko OK, et al. (2014) 3D trajectories adopted by coding and regulatory DNA elements: first-passage times for genomic interactions. Cell 158: 339–352. doi: 10.1016/j.cell.2014.05.036
![]() |
[56] |
Daley JM, Gaines WA, Kwon Y, et al. (2014) Regulation of DNA pairing in homologous recombination. Cold Spring Harb Perspect Biol 6: a017954. doi: 10.1101/cshperspect.a017954
![]() |
[57] |
Lieber MR (2010) The mechanism of double-strand DNA break repair by the nonhomologous DNA end-joining pathway. Annu Rev Biochem 79: 181–211. doi: 10.1146/annurev.biochem.052308.093131
![]() |
[58] |
Sonoda E, Hochegger H, Saberi A, et al. (2006) Differential usage of non-homologous end-joining and homologous recombination in double strand break repair. DNA Repair 5: 1021–1029. doi: 10.1016/j.dnarep.2006.05.022
![]() |
[59] |
Dion V, Kalck V, Horigome C, et al. (2012) Increased mobility of double-strand breaks requires Mec1, Rad9 and the homologous recombination machinery. Nat Cell Biol 14: 502–509. doi: 10.1038/ncb2465
![]() |
[60] |
Seeber A, Dion V, Gasser SM (2013) Checkpoint kinases and the INO80 nucleosome remodeling complex enhance global chromatin mobility in response to DNA damage. Genes Dev 27: 1999–2008. doi: 10.1101/gad.222992.113
![]() |
[61] |
Lisby M, Mortensen UH, Rothstein R (2003) Colocalization of multiple DNA double-strand breaks at a single Rad52 repair centre. Nat Cell Biol 5: 572–577. doi: 10.1038/ncb997
![]() |
[62] |
Nagai S, Dubrana K, Tsai-Pflugfelder M, et al. (2008) Functional targeting of DNA damage to a nuclear pore-associated SUMO-dependent ubiquitin ligase. Science 322: 597–602. doi: 10.1126/science.1162790
![]() |
[63] | Kalocsay M, Hiller NJ, Jentsch S (2009) Chromosome-wide Rad51 spreading and SUMO-H2A.Z-dependent chromosome fixation in response to a persistent DNA double-strand break. Mol Cell 33: 335–343. |
[64] |
Krawczyk PM, Borovski T, Stap J, et al. (2012) Chromatin mobility is increased at sites of DNA double-strand breaks. J Cell Sci 125: 2127–2133. doi: 10.1242/jcs.089847
![]() |
[65] |
Aten JA, Stap J, Krawczyk PM, et al. (2004) Dynamics of DNA double-strand breaks revealed by clustering of damaged chromosome domains. Science 303: 92–95. doi: 10.1126/science.1088845
![]() |
[66] |
Dimitrova N, Chen Y-CM, Spector DL, et al. (2008) 53BP1 promotes non-homologous end joining of telomeres by increasing chromatin mobility. Nature 456: 524–528. doi: 10.1038/nature07433
![]() |
[67] |
Jakob B, Splinter J, Conrad S, et al. (2011) DNA double-strand breaks in heterochromatin elicit fast repair protein recruitment, histone H2AX phosphorylation and relocation to euchromatin. Nucleic Acids Res 39: 6489–6499. doi: 10.1093/nar/gkr230
![]() |
[68] | Ježková L, Falk M, Falková I, et al. (2014) Function of chromatin structure and dynamics in DNA damage, repair and misrepair: γ-rays and protons in action. Appl Radiat Isot Data Instrum Methods Use Agric Ind Med 83: 128–136. |
[69] |
Chiolo I, Minoda A, Colmenares SU, et al. (2011) Double-strand breaks in heterochromatin move outside of a dynamic HP1a domain to complete recombinational repair. Cell 144: 732–744. doi: 10.1016/j.cell.2011.02.012
![]() |
[70] |
Nelms BE, Maser RS, MacKay JF, et al. (1998) In situ visualization of DNA double-strand break repair in human fibroblasts. Science 280: 590–592. doi: 10.1126/science.280.5363.590
![]() |
[71] |
Jakob B, Splinter J, Durante M, et al. (2009) Live cell microscopy analysis of radiation-induced DNA double-strand break motion. Proc Natl Acad Sci U S A 106: 3172–3177. doi: 10.1073/pnas.0810987106
![]() |
[72] |
Soutoglou E, Dorn JF, Sengupta K, et al. (2007) Positional stability of single double-strand breaks in mammalian cells. Nat Cell Biol 9: 675–682. doi: 10.1038/ncb1591
![]() |
[73] |
Roukos V, Voss TC, Schmidt CK, et al. (2013) Spatial dynamics of chromosome translocations in living cells. Science 341: 660–664. doi: 10.1126/science.1237150
![]() |
[74] |
Smerdon MJ, Lieberman MW (1978) Nucleosome rearrangement in human chromatin during UV-induced DNA- reapir synthesis. Proc Natl Acad Sci U S A 75: 4238–4241. doi: 10.1073/pnas.75.9.4238
![]() |
[75] |
Ziv Y, Bielopolski D, Galanty Y, et al. (2006) Chromatin relaxation in response to DNA double-strand breaks is modulated by a novel ATM- and KAP-1 dependent pathway. Nat Cell Biol 8: 870–876. doi: 10.1038/ncb1446
![]() |
[76] |
Burgess RC, Burman B, Kruhlak MJ, et al. (2014) Activation of DNA damage response signaling by condensed chromatin. Cell Rep 9: 1703–1717. doi: 10.1016/j.celrep.2014.10.060
![]() |
[77] |
Smeenk G, Wiegant WW, Marteijn JA, et al. (2013) Poly(ADP-ribosyl)ation links the chromatin remodeler SMARCA5/SNF2H to RNF168-dependent DNA damage signaling. J Cell Sci 126: 889–903. doi: 10.1242/jcs.109413
![]() |
[78] |
Baldeyron C, Soria G, Roche D, et al. (2011) HP1alpha recruitment to DNA damage by p150CAF-1 promotes homologous recombination repair. J Cell Biol 193: 81–95. doi: 10.1083/jcb.201101030
![]() |
[79] |
Ayrapetov MK, Gursoy-Yuzugullu O, Xu C, et al. (2014) DNA double-strand breaks promote methylation of histone H3 on lysine 9 and transient formation of repressive chromatin. Proc Natl Acad Sci U S A 111: 9169–9174. doi: 10.1073/pnas.1403565111
![]() |
[80] |
Zhu L, Brangwynne CP (2015) Nuclear bodies: the emerging biophysics of nucleoplasmic phases. Curr Opin Cell Biol 34: 23–30. doi: 10.1016/j.ceb.2015.04.003
![]() |
[81] |
Chubb JR, Bickmore WA (2003) Considering nuclear compartmentalization in the light of nuclear dynamics. Cell 112: 403–406. doi: 10.1016/S0092-8674(03)00078-3
![]() |
[82] |
Lemaître C, Soutoglou E (2015) DSB (Im)mobility and DNA repair compartmentalization in mammalian cells. J Mol Biol 427: 652–658. doi: 10.1016/j.jmb.2014.11.014
![]() |
[83] |
Klein IA, Resch W, Jankovic M, et al. (2011) Translocation-capture sequencing reveals the extent and nature of chromosomal rearrangements in B lymphocytes. Cell 147: 95–106. doi: 10.1016/j.cell.2011.07.048
![]() |
[84] |
Murr R, Loizou JI, Yang Y-G, et al. (2006) Histone acetylation by Trrap-Tip60 modulates loading of repair proteins and repair of DNA double-strand breaks. Nat Cell Biol 8: 91–99. doi: 10.1038/ncb1343
![]() |
[85] |
Verschure PJ, van der Kraan I, Manders EMM, et al. (2003) Condensed chromatin domains in the mammalian nucleus are accessible to large macromolecules. EMBO Rep 4: 861–866. doi: 10.1038/sj.embor.embor922
![]() |
[86] |
Bancaud A, Huet S, Daigle N, et al. (2009) Molecular crowding affects diffusion and binding of nuclear proteins in heterochromatin and reveals the fractal organization of chromatin. EMBO J 28: 3785–3798. doi: 10.1038/emboj.2009.340
![]() |
[87] |
Dinant C, de Jager M, Essers J, et al. (2007) Activation of multiple DNA repair pathways by sub-nuclear damage induction methods. J Cell Sci 120: 2731–2740. doi: 10.1242/jcs.004523
![]() |
[88] |
Kong X, Mohanty SK, Stephens J, et al. (2009) Comparative analysis of different laser systems to study cellular responses to DNA damage in mammalian cells. Nucleic Acids Res 37: e68. doi: 10.1093/nar/gkp221
![]() |
[89] |
Gilbert N, Allan J (2014) Supercoiling in DNA and chromatin. Curr Opin Genet Dev 25: 15–21. doi: 10.1016/j.gde.2013.10.013
![]() |
[90] |
Elbel T, Langowski J (2015) The effect of DNA supercoiling on nucleosome structure and stability. J Phys Condens Matter Inst Phys J 27: 064105. doi: 10.1088/0953-8984/27/6/064105
![]() |
[91] |
Polo SE (2015) Reshaping chromatin after DNA damage: the choreography of histone proteins. J Mol Biol 427: 626–636. doi: 10.1016/j.jmb.2014.05.025
![]() |
[92] |
Downs JA, Lowndes NF, Jackson SP (2000) A role for Saccharomyces cerevisiae histone H2A in DNA repair. Nature 408: 1001–1004. doi: 10.1038/35050000
![]() |
[93] |
Heo K, Kim H, Choi SH, et al. (2008) FACT-mediated exchange of histone variant H2AX regulated by phosphorylation of H2AX and ADP-ribosylation of Spt16. Mol Cell 30: 86–97. doi: 10.1016/j.molcel.2008.02.029
![]() |
[94] | Li A, Yu Y, Lee S-C, et al. (2010) Phosphorylation of histone H2A.X by DNA-dependent protein kinase is not affected by core histone acetylation, but it alters nucleosome stability and histone H1 binding. J Biol Chem 285: 17778–17788. |
[95] |
Golia B, Singh HR, Timinszky G (2015) Poly-ADP-ribosylation signaling during DNA damage repair. Front Biosci Landmark Ed 20: 440–457. doi: 10.2741/4318
![]() |
[96] |
Poirier GG, de Murcia G, Jongstra-Bilen J, et al. (1982) Poly(ADP-ribosyl)ation of polynucleosomes causes relaxation of chromatin structure. Proc Natl Acad Sci U S A 79: 3423–3427. doi: 10.1073/pnas.79.11.3423
![]() |
[97] | de Murcia G, Huletsky A, Lamarre D, et al. (1986) Modulation of chromatin superstructure induced by poly(ADP-ribose) synthesis and degradation. J Biol Chem 261: 7011–7017. |
[98] | Xu Y, Ayrapetov MK, Xu C, et al. (2012) Histone H2A.Z controls a critical chromatin remodeling step required for DNA double-strand break repair. Mol Cell 48: 723–733. |
[99] |
Clapier CR, Cairns BR (2009) The biology of chromatin remodeling complexes. Annu Rev Biochem 78: 273–304. doi: 10.1146/annurev.biochem.77.062706.153223
![]() |
[100] |
Cheezum MK, Walker WF, Guilford WH (2001) Quantitative comparison of algorithms for tracking single fluorescent particles. Biophys J 81: 2378–2388. doi: 10.1016/S0006-3495(01)75884-5
![]() |
[101] |
Wombacher R, Heidbreder M, van de Linde S, et al. (2010) Live-cell super-resolution imaging with trimethoprim conjugates. Nat Methods 7: 717–719. doi: 10.1038/nmeth.1489
![]() |
[102] |
Benke A, Manley S (2012) Live-cell dSTORM of cellular DNA based on direct DNA labeling. Chembiochem Eur J Chem Biol 13: 298–301. doi: 10.1002/cbic.201100679
![]() |
[103] |
Hihara S, Pack C-G, Kaizu K, et al. (2012) Local nucleosome dynamics facilitate chromatin accessibility in living mammalian cells. Cell Rep 2: 1645–1656. doi: 10.1016/j.celrep.2012.11.008
![]() |
[104] | Récamier V, Izeddin I, Bosanac L, et al. (2014) Single cell correlation fractal dimension of chromatin: a framework to interpret 3D single molecule super-resolution. Nucl Austin Tex 5: 75–84. |
[105] |
Ricci MA, Manzo C, García-Parajo MF, et al. (2015) Chromatin fibers are formed by heterogeneous groups of nucleosomes in vivo. Cell 160: 1145–1158. doi: 10.1016/j.cell.2015.01.054
![]() |
[106] |
Zhang Y, Máté G, Müller P, et al. (2015) Radiation induced chromatin conformation changes analysed by fluorescent localization microscopy, statistical physics, and graph theory. PloS One 10: e0128555. doi: 10.1371/journal.pone.0128555
![]() |
[107] |
Llères D, James J, Swift S, et al. (2009) Quantitative analysis of chromatin compaction in living cells using FLIM-FRET. J Cell Biol 187: 481–496. doi: 10.1083/jcb.200907029
![]() |
[108] |
Emanuel M, Radja NH, Henriksson A, et al. (2009) The physics behind the larger scale organization of DNA in eukaryotes. Phys Biol 6: 025008. doi: 10.1088/1478-3975/6/2/025008
![]() |
[109] |
Rouse P (1953) A Theory of the Linear Viscoelastic Properties of Dilute Solutions of Coiling Polymers. J Chem Phys 21: 1272–1280. doi: 10.1063/1.1699180
![]() |
[110] |
Weber SC, Spakowitz AJ, Theriot JA (2010) Bacterial chromosomal loci move subdiffusively through a viscoelastic cytoplasm. Phys Rev Lett 104: 238102. doi: 10.1103/PhysRevLett.104.238102
![]() |
[111] | Metzler R, Jeon J-H, Cherstvy AG, et al. (2014) Anomalous diffusion models and their properties: non-stationarity, non-ergodicity, and ageing at the centenary of single particle tracking. Phys Chem Chem Phys 16: 24128–24164. |
[112] | Mirny LA (2011) The fractal globule as a model of chromatin architecture in the cell. Chromosome Res Int J Mol Supramol Evol Asp Chromosome Biol 19: 37–51. |
[113] |
Huet S, Lavelle C, Ranchon H, et al. (2014) Relevance and limitations of crowding, fractal, and polymer models to describe nuclear architecture. Int Rev Cell Mol Biol 307: 443–479. doi: 10.1016/B978-0-12-800046-5.00013-8
![]() |
[114] |
Barbieri M, Chotalia M, Fraser J, et al. (2012) Complexity of chromatin folding is captured by the strings and binders switch model. Proc Natl Acad Sci U S A 109: 16173–16178. doi: 10.1073/pnas.1204799109
![]() |
[115] |
Mateos-Langerak J, Bohn M, de Leeuw W, et al. (2009) Spatially confined folding of chromatin in the interphase nucleus. Proc Natl Acad Sci U S A 106: 3812–3817. doi: 10.1073/pnas.0809501106
![]() |
[116] |
Bohn M, Heermann DW (2010) Diffusion-driven looping provides a consistent framework for chromatin organization. PloS One 5: e12218. doi: 10.1371/journal.pone.0012218
![]() |
[117] |
Jerabek H, Heermann DW (2014) How chromatin looping and nuclear envelope attachment affect genome organization in eukaryotic cell nuclei. Int Rev Cell Mol Biol 307: 351–381. doi: 10.1016/B978-0-12-800046-5.00010-2
![]() |
[118] | Cook PR, Marenduzzo D (2009) Entropic organization of interphase chromosomes. J Cell Biol 186: 825–834. |
[119] |
Bohn M, Heermann DW (2011) Repulsive forces between looping chromosomes induce entropy-driven segregation. PloS One 6: e14428. doi: 10.1371/journal.pone.0014428
![]() |
[120] |
Jost D, Carrivain P, Cavalli G, et al. (2014) Modeling epigenome folding: formation and dynamics of topologically associated chromatin domains. Nucleic Acids Res 42: 9553–9561. doi: 10.1093/nar/gku698
![]() |
[121] |
Finan K, Cook PR, Marenduzzo D (2011) Non-specific (entropic) forces as major determinants of the structure of mammalian chromosomes. Chromosome Res Int J Mol Supramol Evol Asp Chromosome Biol 19: 53–61. doi: 10.1007/s10577-010-9150-y
![]() |
[122] |
Zhang B, Wolynes PG (2015) Topology, structures, and energy landscapes of human chromosomes. Proc Natl. Acad Sci U S A 112: 6062–6067. doi: 10.1073/pnas.1506257112
![]() |
1. | Atieh Mokhtari, Mohammad Taheri, 2024, Ramp Progressive Secret Image Sharing Using Ensemble of Simple Methods, 979-8-3315-1127-2, 417, 10.1109/ICCKE65377.2024.10874825 |
$n$ | $p$ | ${m_1, m_2 \cdots, m_n }$ |
2 | 128 | 253,255 |
2 | 131 | 253,254 |
3 | 128 | 251,253,255 |
3 | 131 | 253,254,255 |
4 | 128 | 247,251,253,255 |
4 | 131 | 251,253,254,255 |
5 | 128 | 245,247,249,251,253 |
5 | 131 | 247,251,253,254,255 |
Schemes | Metrics | $ t=2 $ | $ t=3 $ | $ t=4 $ | $ t=5 $ |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | PSNR | 10.4435 | $ 13.5181 $ | $ + \infty $ | $ + \infty $ |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | SSIM | 0.0545 | 0.1500 | 1 | 1 |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | UQI | 0.0566 | 0.1609 | 1 | 1 |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | NC | 0.9351 | 0.9679 | 1 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 3 | PSNR | - | 10.2597 | 13.2965 | $ + \infty $ |
Our $ (3, 5, 5) $ ramp SIS in Figure 3 | SSIM | - | 0.1224 | 0.3198 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 1 | UQI | - | 0.1204 | 0.3234 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 1 | NC | - | 0.9133 | 0.9577 | 1 |
Our $ (2, 4, 4) $ ramp SIS in Figure 4 | PSNR | 10.2811 | 13.2348 | $ + \infty $ | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 4 | SSIM | 0.0528 | 0.1403 | 1 | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 1 | UQI | 0.0544 | 0.1511 | 1 | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 1 | NC | 0.9482 | 0.9745 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 5 | PSNR | $ + \infty $ | $ + \infty $ | $ + \infty $ | |
Our $ (2, 2, 4) $ ramp SIS in Figure 5 | SSIM | 1 | 1 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 1 | UQI | 1 | 1 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 1 | NC | 1 | 1 | 1 | - |
$ (2, 4) $ threshold RGVSS in Figure 6 | $ \alpha $ | 0.2886 | 0.5018 | 0.5018 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | PSNR | $ + \infty $ | $ + \infty $ | $ + \infty $ | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | SSIM | 1 | 1 | 1 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | UQI | 1 | 1 | 1 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | NC | 1 | 1 | 1 | - |
$n$ | $p$ | ${m_1, m_2 \cdots, m_n }$ |
2 | 128 | 253,255 |
2 | 131 | 253,254 |
3 | 128 | 251,253,255 |
3 | 131 | 253,254,255 |
4 | 128 | 247,251,253,255 |
4 | 131 | 251,253,254,255 |
5 | 128 | 245,247,249,251,253 |
5 | 131 | 247,251,253,254,255 |
Schemes | Metrics | $ t=2 $ | $ t=3 $ | $ t=4 $ | $ t=5 $ |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | PSNR | 10.4435 | $ 13.5181 $ | $ + \infty $ | $ + \infty $ |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | SSIM | 0.0545 | 0.1500 | 1 | 1 |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | UQI | 0.0566 | 0.1609 | 1 | 1 |
Our $ (2, 4, 5) $ ramp SIS in Figure 1 | NC | 0.9351 | 0.9679 | 1 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 3 | PSNR | - | 10.2597 | 13.2965 | $ + \infty $ |
Our $ (3, 5, 5) $ ramp SIS in Figure 3 | SSIM | - | 0.1224 | 0.3198 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 1 | UQI | - | 0.1204 | 0.3234 | 1 |
Our $ (3, 5, 5) $ ramp SIS in Figure 1 | NC | - | 0.9133 | 0.9577 | 1 |
Our $ (2, 4, 4) $ ramp SIS in Figure 4 | PSNR | 10.2811 | 13.2348 | $ + \infty $ | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 4 | SSIM | 0.0528 | 0.1403 | 1 | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 1 | UQI | 0.0544 | 0.1511 | 1 | - |
Our $ (2, 4, 4) $ ramp SIS in Figure 1 | NC | 0.9482 | 0.9745 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 5 | PSNR | $ + \infty $ | $ + \infty $ | $ + \infty $ | |
Our $ (2, 2, 4) $ ramp SIS in Figure 5 | SSIM | 1 | 1 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 1 | UQI | 1 | 1 | 1 | - |
Our $ (2, 2, 4) $ ramp SIS in Figure 1 | NC | 1 | 1 | 1 | - |
$ (2, 4) $ threshold RGVSS in Figure 6 | $ \alpha $ | 0.2886 | 0.5018 | 0.5018 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | PSNR | $ + \infty $ | $ + \infty $ | $ + \infty $ | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | SSIM | 1 | 1 | 1 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | UQI | 1 | 1 | 1 | - |
Polynomial-based $ (2, 4) $ threshold SIS in Figure 7 | NC | 1 | 1 | 1 | - |