### Mathematical Biosciences and Engineering

2019, Issue 5: 4433-4455. doi: 10.3934/mbe.2019221
Research article Special Issues

# Ramp secret image sharing

• Received: 09 January 2019 Accepted: 25 April 2019 Published: 20 May 2019
• Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k, n) threshold SIS has the shortcoming of pall-or-nothingq. In this article, first we introduce ramp SIS definition. Then we propose a $(k_1, k_2, n)$ ramp SIS based on the Chinese remainder theorem (CRT). In the proposed scheme, on the one hand, when we collect any $k_1$ or more and less than $k_2$ shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any $k_2$ or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic, which can be used in some real-time applications. We give theoretical analyses and experiments to show the effectiveness of the proposed scheme.

Citation: Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xianhua Song. Ramp secret image sharing[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4433-4455. doi: 10.3934/mbe.2019221

### Related Papers:

• Secret image sharing (SIS) belongs to but differs from secret sharing. In general, conventional (k, n) threshold SIS has the shortcoming of pall-or-nothingq. In this article, first we introduce ramp SIS definition. Then we propose a $(k_1, k_2, n)$ ramp SIS based on the Chinese remainder theorem (CRT). In the proposed scheme, on the one hand, when we collect any $k_1$ or more and less than $k_2$ shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any $k_2$ or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic, which can be used in some real-time applications. We give theoretical analyses and experiments to show the effectiveness of the proposed scheme.

 [1] Z. Qian, H. Xu, X. Luo, et al., New framework of reversible data hiding in encrypted jpeg bitstreams, IEEE Trans. Circuit Syst. Video Tech., 29 (2019), 351–362. [2] Y. Zhang, C. Qin, W. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, Signal Process., 146 (2018), 99–111, [3] A. Belazi and A. A. A. El-Latif, A simple yet efficient s-box method based on chaotic sine map, Optik-Int. J. Light Electron Opt., 130 (2017), 1438–1444. [4] Y. Cheng, Z. Fu and B. Yu, Improved visual secret sharing scheme for qr code applications, IEEE Trans. Inf. Forensics Security., 13 (2018), 2393–2403. [5] C. Kim, D. Shin, L. Leng, et al., Separable reversible data hiding in encrypted halftone image, Displays, 55 (2018), 71–79. [6] Y. Ma, X. Luo, X. Li, et al., Selection of rich model steganalysis features based on decision rough set α -positive region reduction, IEEE Trans. Circuit Syst. Video Tech., 29 (2019), 336–350. [7] G. Wang, F. Liu and W. Q. Yan, Basic visual cryptography using braille, Int. J. Digital Crime Forensics (IJDCF), 8 (2016), 85–93. [8] X. Yan, S. Wang, X. Niu, et al., Generalized random grids-based threshold visual cryptography with meaningful shares, Signal Process., 109 (2015), 317–333. [9] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613. [10] M. Naor and A. Shamir, Visual cryptography, in Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, (A DeSantis), Springer, 1995, 1–12. [11] L. Liu, Y. Lu, X. Yan, et al., A progressive threshold secret image sharing with meaningful shares for gray-scale image, in Mobile Ad-Hoc and Sensor Networks (MSN), 2016 12th International Conference on, IEEE, 2016, 380–385. [12] W. Ding, K. Liu, X. Yan, et al., Polynomial-based secret image sharing scheme with fully lossless recovery, Int. J. Digital Crime Forensics (IJDCF), 10 (2018), 120–136. [13] L. Bao, S. Yi and Y. Zhou, Combination of sharing matrix and image encryption for lossless (k,n) -secret image sharing, IEEE Trans. Image Process., 26 (2017), 5618–5631. [14] W. Ding, K. Liu, X. Yan, et al., A general (k,n) threshold secret image sharing construction based on matrix theory, Data Science: Third International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2017, Proceedings, Part I, (2017), 331–340. [15] P. Li, Z. Liu and C. N. Yang, A construction method of (t,k,n)-essential secret image sharing scheme, Signal Process. Image Commun., 65 (2018), 210–220. [16] Y. Liu and C. Yang, Scalable secret image sharing scheme with essential shadows, Signal Process. Image Commun., 58 (2017), 49–55. [17] Y. Liu, C. Yang, Y. Wang, et al., Cheating identifiable secret sharing scheme using symmetric bivariate polynomial, Inf. Sci., 453 (2018), 21–29. [18] X. Wu, C. N. Yang, Y. T. Zhuang, et al., Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Process. Image Commun., 66 (2018), 42–49. [19] H. Chao and T. Fan, Generating random grid-based visual secret sharing with multi-level encoding, Signal Process. Image Commun., 57 (2017), 60–67. [20] T. Guo and L. Zhou, Constructing visual cryptography scheme by hypergraph decomposition, Procedia Comput. Sci., 131 (2018), 336–343, [21] Y. Ren, F. Liu, T. Guo, et al., Cheating prevention visual cryptography scheme using latin square, IET Inf. Secur., 11 (2017), 211–219. [22] M. Sasaki and Y. Watanabe, Visual secret sharing schemes encrypting multiple images, IEEE Trans. Inf. Forensics Security, 13 (2018), 356–365. [23] Z. Wang, G. R. Arce and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Security, 4 (2009), 383–396. [24] J. Weir and W. Yan, A comprehensive study of visual cryptography, in Transactions on DHMS V, LNCS 6010, Springer-Verlag, Springer, Berlin, Heidelberg, 2010, 70–105. [25] Z. X. Fu and B. Yu, Visual cryptography and random grids schemes, in Digital-Forensics and Watermarking, Springer, Auckland, New Zealand, 2014, 109–122. [26] F. Liu and C. Wu, Embedded extended visual cryptography schemes, IEEE Trans. Inf. Forensics Security, 6 (2011), 307–322. [27] X. Wu and W. Sun, Visual secret sharing for general access structures by random grids, IET Inf. Secur., 6 (2012), 299–309. [28] X. Yan, X. Liu and C. N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Proc., 14 (2018), 61–73. [29] X. Yan and Y. Lu, Progressive visual secret sharing for general access structure with multiple decryptions, Multimed. Tools Appl., 77 (2018), 2653–2672. [30] X. Yan, Y. Lu and L. Liu, General meaningful shadow construction in secret image sharing, IEEE Access, 6 (2018), 45246–45255. [31] X. Yan, S. Wang and X. Niu, Threshold construction from specific cases in visual cryptography without the pixel expansion, Signal Process., 105 (2014), 389–398. [32] C. N. Yang, C. C. Wu, et al., A discussion on the relationship between probabilistic visual cryptography and random grid, Inf. Sci., 278 (2014), 141–173. [33] Y. C. Hou, Z. Y. Quan, C. F. Tsai, et al., Block-based progressive visual secret sharing, Inf. Sci., 233 (2013), 290–304. [34] X. Yan and Y. Lu, Generalized general access structure in secret image sharing, J. Vis. Commun. Image Represent., 58 (2019), 89–101, [35] S. K. Chen, Friendly progressive visual secret sharing using generalized random grids, Optical Engineer., 48 (2009), 117001–117001–7. [36] W. P. Fang, Friendly progressive visual secret sharing, Pattern Recognit., 41 (2008), 1410–1414. [37] C. P. Huang, C. H. Hsieh and P. S. Huang, Progressive sharing for a secret image, J. Syst. Softw., 83 (2010), 517–527. [38] C.H.Lin, Y.S.Leeand T.H.Chen, Friendly progressive random-grid-basedvisualsecretsharing with adaptive contrast, J. Vis. Commun. Image Represent., 33 (2015), 31–41, [39] G. R. Blakley and C. Meadows, Security of ramp schemes, Proc. Crypto, 196 (1984), 242–268. [40] Q. Chen, D. Pei, C. Tang, et al., A note on ramp secret sharing schemes from error-correcting codes, Math. Com. Model., 57 (2013), 2695–2702. [41] X. Gong, P. Hu, K. W. Shum, et al., A zigzag-decodable ramp secret sharing scheme, IEEETrans. Inf. Forensics Security., 13 (2018), 1906–1916. [42] X. Jia, D. Wang, D. Nie, et al., A new threshold changeable secret sharing scheme based on thechinese remainder theorem, Inf. Sci., 473 (2019), 13–30, [43] X. Yan, Y. Lu, L. Liu, et al., Chinese remainder theorem-based secret image sharing for (k, n)threshold, Cloud Computing and Security: Third International Conference, ICCCS 2017,RevisedSelected Papers, Part II, (2017), 433–440, [44] C. Asmuth and J. Bloom, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 29(1983), 208–210. [45] X. Yan, Y. Lu and L. Liu, A general progressive secret image sharing construction method, SignalProcess., Image Commun., 71 (2019), 66–75, [46] C. Asmuth and J. Bloom, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 30(1983), 208–210. [47] Z. Wang, A. C. Bovik, H. R. Sheikh, et al., Image quality assessment: from error visibility tostructural similarity, IEEE Trans. Image Process., 13 (2004), 600–612. [48] Z. Wang and A. C. Bovik, A universal image quality index, IEEE Signal Process. Lett., 9 (2002),81–84. [49] X. Yan, Y. Lu, H. Huang, et al., Clarity corresponding to contrast in visual cryptography, Social Computing: Second International Conference of Young Computer Scientists, Engineersand Educators, ICYCSEE 2016, Proceedings, Part I, (2016), 249–257. [50] J. Huang, C. Wang and Y. Wang, A snr method of evaluating image quality based on the hvsmodel, J. HEBEI Uni. Sci. Tech., 23 (2002), 80–85. [51] X. Yan, Y. Lu, L. Liu, et al., Random grids-based threshold visual secret sharing with improved visual quality, Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Revised Selected Papers, (2016), 209–222. [52] X. Zhou, Y. Lu, X. Yan, et al., Lossless and efficient polynomial-based secret image sharing with reduced shadow size, Symmetry, 10 (2018), 249. [53] R. Z. Wang and C. H. Su, Secret image sharing with smaller shadow images, Pattern Recognit. Lett., 27 (2006), 551–555.

###### 通讯作者: 陈斌, bchen63@163.com
• 1.

沈阳化工大学材料科学与工程学院 沈阳 110142

1.285 1.3

Article outline

## Figures and Tables

Figures(7)  /  Tables(2)

• On This Site