Research article Special Issues

A novel secret sharing scheme using multiple share images

  • Secret image sharing has been widely applied in numerous areas, such as military imaging systems, remote sensing, and so on. One of the problems for image sharing schemes is to efficiently recover original images from their shares preserved by the shareholders. However, most of the existing schemes are based on the assumption that the shares are distortion-free. Moreover, the correspondence between secret images and their shares is definite. To overcome these shortcomings, we propose a novel secret sharing scheme using multiple share images based on the generalized Chinese remainder theorem (CRT) in this paper, where all of the shares are needed to recover the original images. Two categories of distortions are considered. In the first category, some pairs of shares with the same moduli are exchanged, while in the second category, some of pixels in the pairs of shares with the same moduli are exchanged. Based on these two sharing methods, we propose a generalized CRT based recovery method. Compared with the existing CRT based methods as well as combinatorial based methods, the proposed approach is much more efficient and secure. Furthermore, the conditions for successful recovery of two images from the given distorted shares are obtained. Simulations are also presented to show the efficiency of the proposed scheme.

    Citation: Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang. A novel secret sharing scheme using multiple share images[J]. Mathematical Biosciences and Engineering, 2019, 16(6): 6350-6366. doi: 10.3934/mbe.2019317

    Related Papers:

    [1] Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xianhua Song . Ramp secret image sharing. Mathematical Biosciences and Engineering, 2019, 16(5): 4433-4455. doi: 10.3934/mbe.2019221
    [2] Jingju Liu, Lei Sun, Jinrui Liu, Xuehu Yan . Fake and dishonest participant location scheme in secret image sharing. Mathematical Biosciences and Engineering, 2021, 18(3): 2473-2495. doi: 10.3934/mbe.2021126
    [3] Lina Zhang, Jing Zhang, Jiaqi Sun, Qingpeng Chen . A global progressive image secret sharing scheme under multi-group joint management. Mathematical Biosciences and Engineering, 2024, 21(1): 1286-1304. doi: 10.3934/mbe.2024055
    [4] Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang . Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093
    [5] Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan . Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287
    [6] Qi Wang, John Blesswin A, T Manoranjitham, P Akilandeswari, Selva Mary G, Shubhangi Suryawanshi, Catherine Esther Karunya A . Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Mathematical Biosciences and Engineering, 2023, 20(11): 19983-20001. doi: 10.3934/mbe.2023885
    [7] Xingxing Jia, Yixuan Song, Daoshun Wang, Daxin Nie, Jinzhao Wu . A collaborative secret sharing scheme based on the Chinese Remainder Theorem. Mathematical Biosciences and Engineering, 2019, 16(3): 1280-1299. doi: 10.3934/mbe.2019062
    [8] Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu . Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318
    [9] Li-na Zhang, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, Jing Zhang . Two-level QR code scheme based on region matrix image secret sharing algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16678-16704. doi: 10.3934/mbe.2023743
    [10] Guozheng Yang, Lintao Liu, Xuehu Yan . A compressed secret image sharing method with shadow image verification capability. Mathematical Biosciences and Engineering, 2020, 17(4): 4295-4316. doi: 10.3934/mbe.2020237
  • Secret image sharing has been widely applied in numerous areas, such as military imaging systems, remote sensing, and so on. One of the problems for image sharing schemes is to efficiently recover original images from their shares preserved by the shareholders. However, most of the existing schemes are based on the assumption that the shares are distortion-free. Moreover, the correspondence between secret images and their shares is definite. To overcome these shortcomings, we propose a novel secret sharing scheme using multiple share images based on the generalized Chinese remainder theorem (CRT) in this paper, where all of the shares are needed to recover the original images. Two categories of distortions are considered. In the first category, some pairs of shares with the same moduli are exchanged, while in the second category, some of pixels in the pairs of shares with the same moduli are exchanged. Based on these two sharing methods, we propose a generalized CRT based recovery method. Compared with the existing CRT based methods as well as combinatorial based methods, the proposed approach is much more efficient and secure. Furthermore, the conditions for successful recovery of two images from the given distorted shares are obtained. Simulations are also presented to show the efficiency of the proposed scheme.


    With the rapid development of technologies of the Internet of Things (IoT) and cloud computing, the protection of information in storage as well as in transmission becomes more and more urgent. For secure transmission of digital information, various different technologies, such as steganography, encryption, secret image sharing, and digital watermarking [1,2], have been proposed to prevent lawless user causing the data leak. Among these techniques, secret sharing schemes attracted the great interest of many scientists because they are best suited for storing highly confidential and vital data. The basic idea of the secret sharing scheme is to split a secret into several parts and share them among a group of shareholders. To determine the secret, all the authorized users must pool their shares together. This scheme was first independently proposed by Shamir and Blakley [3,4] in 1979 and further studied in [5,6]. It plays a critical role in numerous applications, such as in bank accounts, missile launch codes, threshold cryptography, access control, cloud computing, and data hiding [7,8,9].

    Secret sharing schemes have been widely applied in the construction of cryptographic primitives. In 1994, Naor and Shamir introduced a new cryptographic technique called visual cryptography [10], where a digital image is splitted into several meaningless share images and then distributed securely among a set of participants. The proposed secret image sharing (SIS) scheme has two advantages: firstly, it is perfectly secure; secondly, it is very easy to implement because the concealed images are without any cryptographic computations. Therefore, the SIS scheme can be applied in numerous scenarios [11,12], such as information hiding, authentication, key management, distributed storage in computing, access control, etc. In 2002, Thien and Lin [13] proposed a secret sharing scheme for digital images based on Shamir's scheme [3], where the share images are obtained by modulo a polynomial with finite degree and random coefficient for each pixel. This scheme has a loss of information when the pixels of the image are between 251 and 255 because the most suitable option of modulus is the prime 251. In 2006, Meher and Patra [14] proposed a Chinese remainder theorem (CRT) based secret image sharing scheme. This scheme not only has a low load of computation, but also provides lossless recovery of images. Besides, there are some other secret image sharing schemes, such as the scalable scheme [15], the geometry-based scheme [16], the Sudoku-based scheme [17] and the two-in-one image secret sharing [18]. All the above schemes are efficient in sharing one image and inefficient in sharing multiple images, since the participants have to keep so many shares for different secret images.

    Multiple images sharing, which aims to share more than one secret image among a set of participants, can overcome above drawback. In 2002, Tasi et al. [19] proposed a method to share multi-secret in digital images, where there are only two shares for each secret. In 2005, Wu and Chang [20] proposed a (2,2)-visual secret scheme. Although it is more efficient than some previous schemes, it works only when two secret images are shared. In 2011, Chen and Wu [21] proposed a Boolean-based algorithm to share n1 secret images among a set of n shares. Although this scheme does not require any pixel expansion, it has a poor randomness quality since the obtained shares are not completely randomized. In 2008, Alvarez [22] proposed a cellular automata based scheme. Later on, this scheme was further studied by Eslami [23]. Although these approaches have linear computational complexity, they are impractical due to the fact that they need multiple consecutive shares in order to successfully reconstruct the secret. In 2014, Chang [24] proposed a CRT and Lagrange interpolation based scheme, where the shares are errorless, and the correspondence between the shares and multiple images is assumed to be definite. Under these assumptions, any secret image can be recovered efficiently without recovering all the other images. Another advantage of this method is that it can be used for many formats, such as binary, grayscale and color images. In 2015, Guo et al. [25] proposed a multi-threshold secret image sharing scheme based on an extension of the CRT, where secret values are produced according to the associated access structures.

    The above works consider the case when the shares are without any distortion. Moreover, the correspondence between images and their shares is definite. As far as we know, there is no literature that has considered the recovery of sharing images from their distorted share groups. This paper considers a secret sharing scheme with distorted shares. In this scheme, n different share images are shared and the successful reconstruction of the original images is possible only if all the shares are pooled together. The reconstruction will fail if the number of the shares is equal to or less than n1. Two categories of distortion are considered. In the first category, some pairs of shares with the same moduli are exchanged. In the second category, some of pixels in the pairs of shares with the same moduli are exchanged. To this aim, we innovatively use generalized CRT to recover two images simultaneously from their distorted groups of shares. To be clear, two pixels of two images at the same position are determined simultaneously. The two shares with the same moduli are viewed as a pair and their pixels at the same position are viewed as the residue sets of two images modulo by some given moduli. It is noted that the correspondence between the two images and the shares is not known. Hence, the problem of recovering two images can be modeled as determining two integers (pixels) from their unordered residue sets. This problem was first studied in [26], and further studied in [27,28]. Based on these works, we propose a secret sharing scheme using multiple share images based on the generalized CRT in this paper. The sharing and recovering algorithms of the proposed approach are also given. Furthermore, we give the condition for successful recovery of two images from their two groups of shares with distortion. Compared with the existing secret image sharing schemes, the proposed scheme has four advantages. First, since the shares are obtained only by partially exchanging each remainder pairs of the pixels, the secret image sharing process is simple and convenient to implement. Second, the secret image sharing algorithm creates no redundancy at all, since no other images are introduced. Third, the recovering of two images from the distorted shares is more secure than that of a simple image. Fourth, the proposed generalized CRT recovering method is more efficient than the combinatorial based method and the searching method. In short, the proposed scheme is more effective and has a wider application in secret communication.

    The rest of the paper is organized as follows. In Section 2, we introduce the multi-image sharing problem and then model it as the generalized CRT. In Section 3, we present the generalized CRT based secret image sharing algorithm and its improvement. In Section 4, we give an efficient reconstruction algorithm. Moreover, the conditions of leading to a successful recovery of images are also given. In Section 5, some simulations as well as security analysis of the proposed approach are presented. In Section 6, we conclude this paper.

    In this section, we first recall the basic idea of the image sharing problem based on the CRT. Then, we introduce the multiple images sharing problem and model it as the generalized CRT. Some existing results of the generalized CRT are also introduced.

    The earliest known example of CRT can be found in The Mathematical Classic of Sunzi, which is written by Chinese mathematician Sun Tzu in the fifth century. Another Chinese mathematician Jiushao Qin, in Song Dynasty, generalized this problem into a simultaneous congruence and provided the complete solution. It tells us that a positive integer N can be uniquely reconstructed from its remainders r1,r2,,rn modulo a set of moduli m1,m2,,mn if and only if N is less than the least common multiple (lcm) of the moduli [29]. To be specific, if 0<N<lcm(m1,m2,,mn), then the simultaneous congruence

    {Nr1modm1Nr2modm2Nrnmodmn (2.1)

    has a unique solution

    Nni=1Mi¯MirimodM, (2.2)

    where M=m1m2mn, Mi=M/mi, and ¯Mi satisfies Mi¯Mi1modmi for i=1,2,,n.

    It makes sense that CRT can be used to transmit information confidentially by sharing a secret to different shareholders with partial information, where the unknown integer N can be viewed as the secret, and the remainders r1,r2,,rn can be viewed as n shares for the shareholders.

    One of the extensions for this secret sharing approach is to the image domain. As shown in Figure 1, each pixel pi in the image of "Lena" (denoted as A for short) is viewed as a secret and then shared by five shareholders with the pairwise coprime moduli 4, 5, 7, 11, 13, respectively, where i=1,2,,P and P is the total number of pixels. All the remainders of pi with the same moduli mj can constitute a new image called share Aj of A. Clearly, we cannot obtain any information of the image from any share. Now, we consider the sharing problem of two images simultaneously.

    Figure 1.  Image "Lena" and its shares.

    Figure 2 gives image of "Zelda" (denoted as B for short) and its five shares B1,B2,,B5 with the same moduli as the image of "Lena". By the CRT, we know that image B can also be successfully recovered from its all shares. Also, we know that two images can be successfully recovered from their shares if the correspondence between the two images and their shares is correct. For example, given two groups of shares

    I:A1, A2, A3, A4, A5 (2.3)
    Figure 2.  Image "Zelda" and its shares.

    and

    II:B1, B2, B3, B4, B5, (2.4)

    the two images A and B can be separately recovered from their five shares by using the CRT. However, it is not easy to recover the two images when some pairs of shares with the same modulus are exchanged between the two groups. We will illustrate this by an example below. For convenience, the above two groups of shares are called the standard groups.

    Suppose that two groups of the shares are

    I:A1, B2, A3, A4, B5 (2.5)

    and

    II:B1, A2, B3, B4, A5. (2.6)

    Compared with the standard groups of shares, two pairs of shares with the same modulus are exchanged between the two groups: A2 and B2, A5 and B5. The exchanged share images are also called distorted shares. Figure 3 gives the illustration of the two groups described in (2.5) and (2.6). After recovering all the pixels of two images by using the CRT for each group, we obtain two recoveries, which are shown in Figure 4. Clearly, the recovery of two images is a failure. Hence, the CRT method is invalid to recover the two images from their shares when one or more pairs of shares with the same modulus are exchanged between the two groups. The reason is that the CRT is sensitive to the remainder error, where a small amount of errors for any remainder may lead to a large reconstruction error. Here, exchanging two shares of the two images results in errors for the remainders. Motivated by this, we propose a generalized CRT based secret image sharing scheme, which is more secure than the CRT based schemes. By using the generalized CRT proposed in [27], two pixels can be recovered from their shares even if the correspondences between two pixels and their remainders are unknown. Therefore, the two images can be successfully recovered from their shares.

    Figure 3.  Two groups of the shares in (2.5) and (2.6).
    Figure 4.  Recovery failure by the CRT.

    First, we model the secret image sharing and recovering problem as a generalized CRT. Let the pixels of the two images A and B be pi and qi, respectively. The i-th pixel of the shares A1,A2,,An of A is assumed to be ai,1,ai,2,,ai,n, and the i-th pixel of B1,B2,,Bn of B is assumed to be bi,1,bi,2,,bi,n. In order to recover the image A from the given shares A1,B2,A3,A4,B5, all the pixels pi's should be recovered from the remainders ai,1,bi,2,ai,3,ai,4,bi,5 of the shares A1,B2,A3,A4,B5, respectively. The similar processes are needed for recovering the image B.

    Notice that some pairs of shares with the same modulus are exchanged between the two groups. Hence, pixels in the two images cannot be separately recovered, as shown in Figure 4. We have two steps to recover the two images. The first step uses the generalized CRT to determine each pair of pixels {pi,qi} simultaneously from all the pairs of pixels {ai,1,bi,1}, {ai,2,bi,2}, ,{ai,5,bi,5} of the two groups. Then, determine the correspondences between the two images and their pixels {pi,qi}. For convenience, we briefly recall the basic idea of the generalized CRT below.

    Different from the CRT, two pixels {pi,qi} are simultaneously determined from their residue sets. The problem has two difficulties: one is that the correspondence between the integers {pi,qi} and their remainders in the residue sets {ai,j,bi,j} is unclear; the other is that how large the two pixels can be uniquely determined from their residue sets for the given moduli. It is known that the largest integer uniquely recovered from its remainders is the least common multiple of all the given moduli. However, this conclusion may not be true for the generalized CRT. For example, given three residue sets {1,3}, {3,5} and {4,5} and the corresponding moduli 5, 7 and 11, we have four candidates when the two integers are less than lcm(5,7,11)=385, i.e., {26,38}, {103,346}, {136,313} and {213,236}. If the two integers are less than 39, we have only one solution {26,38}. In other words, the two integers can be recovered within the range of (0,39). More generally, the definition of the dynamic range is introduced, which is a range that any multiple integers within it can be uniquely determined from their residue sets modulo the given moduli. In [27], the largest dynamic range D(M) for two integers was obtained, where M denotes the set of the moduli {m1,m2,,mn}. For convenience, we introduce two conclusions below.

    Proposition 1. Let n pairwise coprime integers be 2m1<m2<<mn. If mn13, then

    D(M)=minI{1,2,,n}{iImi+i¯Imi}, (2.7)

    where ¯I is the complement of I in {1,2,,n}.

    For example, given moduli set M={m1,m2,m3,m4,m5}={4,5,7,11,13}, we have

    D(M)=4×5×7+11×13=283. (2.8)

    Proposition 2. Let n pairwise coprime integers be m1,m2,,mn. If N1,N2<D(M), then two unordered integers {N1,N2} can be uniquely determined from their residue sets {r1,1,r2,1}, {r1,2,r2,2}, ,{r1,n,r2,n} with moduli set M={m1,m2,,mn}.

    More details we refer the readers to [27,28]. In what follows, X denotes the least integer greater than or equal to X.

    In this section, we propose a secret image sharing algorithm based on the generalized CRT. Moreover, the improved sharing algorithm is also given.

    For a given moduli set M={m1,m2,,mn}, the largest dynamic range D(M) of M can be determined. To successfully recover the two images from their shares, M should satisfy

    D(M)>256. (3.1)

    By the CRT, we can obtain the i-th pixel ai,j of the j-th share Aj, i.e.,

    ai,jpimodmj, j=1,2,,n. (3.2)

    When there is no confusion, we denote Aj as the matrix of the share Aj. Then, we have the matrix of Aj:

    Aj=(ai,j)P×1, i=1,2,,P, j=1,2,,n. (3.3)

    Similarly, the i-th pixel bi,j of the share Bj can be obtained by

    bi,jqimodmj, j=1,2,,n. (3.4)

    Hence, the matrix of the share Bj can be described as

    Bj=(bi,j)P×1, i=1,2,,P, j=1,2,,n. (3.5)

    After determining all the pixels ai,j's and bi,j's, the pair of shares Aj and Bj are obtained. For the two images A and B, the obtained shares are

    I:A1, A2,, An (3.6)

    and

    II:B1, B2,, Bn, (3.7)

    with the moduli m1,m2,,mn, respectively.

    Now, we suppose that t pairs of shares are exchanged between the two groups: Aj1 and Bj1, Aj2 and Bj2, , Ajt and Bjt. That is, the two groups of shares are

    I:A1,,Bj1,,Bjt,,An (3.8)

    and

    II:B1,,Aj1,,Ajt,,Bn, (3.9)

    with moduli m1,m2,,mn, respectively, where 1jkn for k=1,2,,t. To obtain a successful recovery of the two images, t should be restricted by t<n2, which will be proven in the following section. To sum up, we have the following generalized CRT based image sharing algorithm, which is shown in Table 1.

    Table 1.  Algorithm 1.
    Generalized CRT Based Sharing Algorithm
    Step 1. Choose positive pairwise coprime integers m1,m2,,mn satisfying (3.1).
    Step 2. For j=1,2,,n, calculate ai,jpimodmj for image A, where i=1,2,,P.
    Step 3. Obtain Aj of A from the remainders a1,j,a2,j,,aP,j.
    Step 4. For j=1,2,,n, calculate bi,jqimodmj for image B, where i=1,2,,P.
    Step 5. Obtain Bj of B from the remainders b1,j,b2,j,,bP,j.
    Step 6. Obtain n shares A1,,Bj1,,Bjt,,An of A.
    Step 7. Obtain n shares B1,,Aj1,,Ajt,,Bn of B.

     | Show Table
    DownLoad: CSV

    In Algorithm 1, some pairs of the shares with the same modulus are exchanged between the two groups. According to Proposition 2, if pi<D(M) and qi<D(M) hold simultaneously, then {pi,qi} can be recovered from their residue sets {ai,1,bi,1}, {ai,2,bi,2}, ,{ai,n,bi,n} modulo m1,m2,,mn, respectively. Note that the remainders in residue sets are unordered. Hence, exchanging the pixels in the pairs Ajk and Bjk is also leading to a successful recovery of the two pixels {pi,qi}, where 1kt. Motivated by this, we propose the following improved image sharing algorithm, where pixels in the shares Ajk and Bjk are partially exchanged. Let

    Aj=(ai,j)P×1, i=1,2,,P, j=1,2,,n (3.10)

    and

    Bj=(bi,j)P×1, i=1,2,,P, j=1,2,,n, (3.11)

    where

    ai,j{ai,j, bi,j}, bi,j{ai,j,bi,j}{ai,j}. (3.12)

    Then, Ajk and Bjk in the steps 3 and 5 of Algorithm 1 can be substituted by Ajk and Bjk, respectively. Hence, the two groups of shares are

    I:A1,,Aj1,,Ajt,,An (3.13)

    and

    II:B1,,Bj1,,Bjt,,Bn (3.14)

    with moduli m1,m2,,mn, respectively.

    Let us consider an example. Suppose the first pixels of A and B are p1=124 and q1=243, respectively. Under the modular operation, we have

    a1,1=0,a1,2=4,a1,3=5,a1,4=3,a1,5=7

    from image A with moduli 4,5,7,11,13, respectively. Similarly, we have

    b1,1=3,b1,2=3,b1,3=5,b1,4=1,b1,5=9

    from image B. Suppose the first pixels of the second and the fifth pairs of shares in (3.13) and (3.14) are exchanged. Then, the first pixels of shares in groups I and II are 0, 3, 5, 3, 9, and 3, 4, 5, 1, 7, respectively.

    To sum up, we have the following improved image sharing algorithm, which is shown in Table 2. Note that Algorithm 2 is a generalization of Algorithm 1. If all the pixels of pairs Ajk and Bjk are exchanged, then the two shares become Bjk and Ajk, respectively. If all pixels of the shares Ajk and Bjk are exchanged for j1,j2,,jt, then the two groups in (3.13) and (3.14) are changed into (3.8) and (3.9), respectively. Therefore, Algorithm 1 is a special case of Algorithm 2.

    Table 2.  Algorithm 2.
    Improved Image Sharing Algorithm
    Step 1. Choose positive pairwise coprime integers m1,m2,,mn satisfying (3.1).
    Step 2. For i=1,2,,P, calculate ai,jpimodmj for image A, where j=1,2,,n.
    Step 3. For i=1,2,,P, calculate bi,jqimodmj for image B, where j=1,2,,n.
    Step 4. Obtain Ajk with jk{j1,j2,,jt} by (3.10), while others Aj are obtained by Algorithm 1.
    Step 5. Obtain Bjk with jk{j1,j2,,jt} by (3.11), while others Bj are obtained by Algorithm 1.
    Step 6. Obtain n shares A1,,Aj1,,Ajt,,An of A.
    Step 7. Obtain n shares B1,,Bj1,,Bjt,,Bn of B.

     | Show Table
    DownLoad: CSV

    In this section, we propose a generalized CRT based secret image reconstruction method. It contains two main contents: the reconstruction algorithm and some results of successful recovery. For convenience, the remainder of x modulo y is denoted as xy.

    The proposed algorithm contains two main parts. Firstly, all of the pairs {pi,qi} of the two images are reconstructed from the given shares described in (3.13) and (3.14). To be specific, by using the generalized CRT for two unordered integers [27], the i-th pair of pixels {pi,qi} can be successfully reconstructed from {ai,1,bi,1}, {ai,2,bi,2}, , {ai,n,bi,n} with moduli m1,m2,,mn, respectively. Since the obtained two pixels {pi,qi} are unordered, we cannot determine which one belongs to A and which to B. Hence, the latter half of the proposed algorithm (steps 5-7) is to determine the correspondence between the two images and two pixels {pi,qi}. More details can be seen in Table 3, where steps 1-6 are performed for all i=1,2,,P. From Table 3 one can find that the computational complexity of the proposed reconstruction method is O(nP).

    Table 3.  Algorithm 3.
    Reconstruction Algorithm for Two Images
    Step 1. Compute ci,j=ai,j+bi,jmj for j=1,2,,n.
    Step 2. Compute ξi,1=nj=1Mj¯Mjci,jM.
    Step 3. Compute ξi,2=nj=1Mj¯Mj(ai,jsi)(bi,jsi)M, where si=max{0,ξi,12M}.
    Step 4. Obtain two solutions {xi,1,xi,2} by solving (xsi)2(ξi,12si)(xsi)+ξi,2=0.
    Step 5. For j=1,2,,n, determine ei,j={1, if xi,1mj=bi,j0, otherwise .
    Step 6. Determine two pixels: pi={xi,1, if nj=1ei,j<n2xi,2, otherwise  and qi{xi,1,xi,2}{pi}.
    Step 7. Recover the two images A and B after determining all the pixels pi and qi.

     | Show Table
    DownLoad: CSV

    Theorem 1 gives the conditions of successful recovery of two images from their shares described in (3.13) and (3.14).

    Theorem 1. Let n pairwise coprime integers be 2m1<m2<<mn satisfying (3.1). Two groups of shares for two images are given in (3.13) and (3.14), respectively. If

    t<n2 (4.1)

    holds, then the two images A and B can be successfully recovered.

    Proof. By Proposition 2, we know that the two pixels {pi,qi} can be successfully recovered from their residue sets {ai,1,bi,1}, {ai,2,bi,2}, , {ai,n,bi,n} with moduli m1,m2,,mn, respectively. Let the two reconstructions be {xi,1,xi,2}. That is,

    {pi,qi}={xi,1,xi,2}. (4.2)

    Next, we will prove that the correspondence between the two reconstructions {xi,1,xi,2} and the two images A and B can be correctly determined. We have two cases below.

    Case Ⅰ: xi,1=xi,2.

    In this case, pi=qi. Hence,

    pi=qi=xi,1=xi,2. (4.3)

    Case Ⅱ: xi,1xi,2.

    In this case, piqi. Define

    ei,j{1,if xi,1mj=bi,j,0,otherwise, (4.4)

    where j=1,2,,n. Then we have two subcases below.

    1) pi=xi,1 and qi=xi,2.

    It follows from (3.13) that

    ei,j={1,if j{j1,j2,,jt},0,otherwise. (4.5)

    Hence,

    nj=1ei,j=t<n2. (4.6)

    From (3.14), we have

    ei,j={0,if j{j1,j2,,jt},1,otherwise. (4.7)

    Hence,

    nj=1ei,j=nt>nn2. (4.8)

    2) qi=xi,1 and pi=xi,2.

    From (3.13), we can obtain (4.7) and consequently (4.8).

    From (3.14), we can obtain (4.5) and consequently (4.6).

    Thus, two pixels {pi,qi} can be correctly determined from the two reconstructions {xi,1,xi,2} by any group of the given shares, i.e., (3.13) or (3.14). We explain this below.

    Suppose that we consider the group of shares described in (3.13). If (4.6) holds, then we have pi=xi,1 and qi=xi,2; if (4.8) holds, then we have qi=xi,1 and pi=xi,2.

    Suppose that we consider the group of shares described in (3.14). If (4.8) holds, then we have pi=xi,1 and qi=xi,2; if (4.6) holds, then we have qi=xi,1 and pi=xi,2.

    Therefore, pi and qi of the images A and B can be correctly determined, respectively. After all the pixels pi and qi are determined, the two images can be successfully recovered. This completes the proof of the theorem.

    In this section, we give some simulations to show the efficiency of the proposed generalized CRT based method. Moreover, security analysis of the proposed method is given.

    We take two 512×512 images "Lena" and "Zelda" in the simulations. The moduli are set to be M={4,5,7,11,13}. By (2.8), we obtain D(M)=283>256, which satisfies the condition in (3.1). Hence, any two pixels can be recovered from their two groups of shares with the given moduli.

    First, we recover the two images from two groups of shares described in (2.5) and (2.6) in Section 2. For the CRT based method, the two recoveries are failures, as shown in Figure 4. Compared with two standard groups of shares, there are two pairs exchanged between each other. Hence, t=2 and then

    t<n2=52, (5.1)

    which satisfy the condition in (4.1). By Theorem 1, we know that the two images can be successfully recovered by using the generalized CRT. Figure 5 gives the simulation results, which show that the two images are successfully recovered and hence the proposed method is effective. In fact, for any two groups of shares with t2, the two images can be successfully recovered. Hence, the probability of recovering the two secret images from the distorted shares is

    Pr=C15+C25C15+C25+C35+C45+C55=1531. (5.2)
    Figure 5.  Recovered images by Algorithm 3 for two groups in (2.5) and (2.6).

    Now, we give the recovery of two images from the following two groups of shares:

    I:A1, A2, A3, A4, A5 (5.3)

    and

    II:B1, B2, B3, B4, B5, (5.4)

    where the positions of exchanged pixels for the shares Ai and Bi are (120,120),(120,121),,(120,380), (121,120),,(380,380). For example, assume that two pixels of A and B in the position (120,120) are 146 and 222, respectively. According to (3.2) and (3.4), we have two groups of remainder sets 2, 1, 6, 6, 3 and 2, 2, 5, 2, 1 with moduli 4,5,7,11,13, respectively. Note that three pairs of pixels are exchanged, i.e., A2 and B2; A4 and B4; A5 and B5. Hence, the pixels of the shares described in (5.3) and (5.4) in the position (120,120) are 2, 2, 6, 2, 1 and 2, 1, 5, 6, 3, respectively. Since three pairs of shares are exchanged, we have t=3 and then

    t>n2=52. (5.5)

    Since the condition in (4.1) is not satisfied, the recovery of two images will fail according to Theorem 1. Figure 6 gives two recoveries by using the proposed generalized CRT based method. Clearly, the two recoveries are consistent with theory analysis. Compared with the CRT method, all the pairs of pixels {pi,qi} of the two images are correctly reconstructed by the proposed generalized CRT based method. However, the correspondences between the two images and two reconstructions {pi,qi} can not be correctly determined in the positions of the exchanged pixels, which leads to a recovery failure. In fact, for any two groups of shares with t3, the two images can not be successfully recovered. By (5.2), we know that the failure probability is

    Pr=11531=1631.
    Figure 6.  Recovered images by Algorithm 3 for two groups in (5.3) and (5.4).

    Now, we compare the proposed scheme with two other methods on the security issue. Consider the two groups of shares described in (3.13) and (3.14). As stated above, the two images can not be successfully recovered by the CRT method in this case. We consider two other methods, i.e., the searching method and the combinatorial based method.

    Suppose that some illegal users attempt to recover the two images by using the searching method. For this kind of method, all the possible pixels (0-255) should be tested for each pixel. Hence, the probability of successfully reconstructing each image is

    Pr=1256P, (5.6)

    which is a very small number when P=512×512. In other words, the computational complexity of the searching method is O(256P).

    Suppose that some illegal users attempt to recover the two images by using the combinatorial based method. To recover the pixels pi and qi, one can firstly put the pixels of shares Ai and Bi together and obtain the residue sets

    {ai,1,bi,1}, , {ai,j,bi,j}, , {ai,n,bi,n} (5.7)

    with moduli m1,m2,,mn, respectively. Then, the residue sets are grouped into two sequences by choosing only one pixel for each set. If and only if the two sequences are

    ai,1,,ai,j,,ai,n (5.8)

    and

    bi,1,,bi,j,,bi,n, (5.9)

    the two pixels pi and qi can be separately reconstructed by the CRT. Hence, the probability of the successful reconstruction of pi and qi is

    Pr=12n (5.10)

    when the two remainders in each residue set are distinct. Note that the two secret images can be successfully recovered if all the pixels pi and qi are correctly determined. Hence, the probability of the successful recovery is

    Pr=12nP. (5.11)

    In other words, the computational complexity of the combinatorial based method is O(2nP). Clearly, the probability of successfully recovering the two images depends on both the number of moduli n and P. It is unlikely that someone will exhaustively reconstruct the two images by trying all the possible combinations of shares.

    In this paper, we considered the problem of secret image sharing scheme with distorted shares. Two categories of distortions were considered. The first category is that some pairs of the shares with the same moduli are exchanged, while the second category is that some of pixels in the pairs of shares with the same moduli are exchanged. Based on these distorted shares, we proposed a generalized CRT based recovery method, which is much more efficient and secure than the existing CRT based methods as well as combinatorial based methods. The conditions for successful recovery are obtained. Simulations are also presented to show the efficiency of the proposed scheme.

    This work was supported in part by the National Nature Science Foundation of China (No. 61701086), the Fundamental Research Funds for the Central Universities (No. ZYGX2016KYQD143), the Natural Science Foundation of Fujian Province (Nos. 2017J01761 and 2018J01537), the Project of Ministry of Science and Technology of Taiwan (No. MOST 106-2221-E-035-013-MY3).

    The authors declare no conflict of interest.



    [1] R. L. Lagendijk, Z. Erkin and M. Barni, Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation, IEEE Signal Proc. Mag., 30 (2013), 82–105.
    [2] C. C. Chang, C. T. Li and Y. Q. Shi, Privacy-aware reversible watermarking in cloud computing environments, IEEE Access, 6 (2018), 70720–70733.
    [3] A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613.
    [4] G. R. Blakley, Safeguarding cryptographic keys, in Proceedings of the National Computer Conference, (1979), 313–317.
    [5] E. Karnin, J. Greene and M. Hellman, On secret sharing systems, IEEE T. Inform. Theory, 29 (1983), 35–41.
    [6] W. T. Huang, M. Langberg, J. Kliewer, et al., Communication efficient secret sharing, IEEE T. Inform. Theory, 62 (2016), 7195–7206.
    [7] M. Naor and A. Wool, Access control and signatures via quorum secret sharing, IEEE Trans. Parallel Distrib. Syst., 9 (1998), 909–922.
    [8] M. Stadler, Publicly verifiable secret sharing, in International Conference on the Theory and Applications of Cryptographic Techniques, (1996), 190–199.
    [9] J. H. Ziegeldorf, O. G. Morchon and K. Wehrle, Privacy in the Internet of Things: threats and challenges, Security Commun. Netw., 7 (2014), 2728–2742.
    [10] M. Naor and A. Shamir, Visual cryptography, in Workshop on the Theory and Application of Cryptographic Techniques, Springer, (1994), 1–12.
    [11] X. Yan and Y. Lu, Generalized general access structure in secret image sharing, J. Vis. Commun. Image Represent., 58 (2019), 89–101.
    [12] L. Tan, Y. Lu, X. Yan, et al. Weighted secret image sharing for a (k,n) threshold based on the Chinese remainder theorem, IEEE Access, 7 (2019), 59278–59286.
    [13] C. C. Thien and J. C. Lin, Secret image sharing, Comput. Graph., 26 (2002), 765–770.
    [14] P. K. Meher and J. C. Patra, A new approach to secure distributed storage, sharing and dissemination of digital image, in International Symposium on Circuits and Systems, (2006), 373–376.
    [15] R. Z. Wang and S. J. Shyu, Scalable secret image sharing, Signal Process.-Image, 22 (2007), 363–373.
    [16] C. C. Chen, W. Y. Fu and C. C. Chen, A geometry-based secret image sharing approach, J. Inf. Sci. Eng., 24 (2008), 1567–1577.
    [17] C. C. Chen, W. Y. Fu and C. C. Chen, A sudoku-based secret image sharing scheme with reversibility, J. Commun., 5 (2010), 5–12.
    [18] X. Yan, Y. Lu, L. Liu, et al., Chinese remainder theorem-based two-in-one image secret sharing with three decoding options, Digit. Signal Process., 82 (2018), 80–90.
    [19] C. S. Tsai, C. C. Chang and T. S. Chen, Sharing multiple secrets in digital images, J. Syst. Softw., 64 (2002), 163–170.
    [20] H. C. Wu and C. C. Chang, Sharing visual multi-secret using circle shares, Comput. Stand. Interfaces, 28 (2005), 123–135.
    [21] T. H. Chen and C. S. Wu, Efficient multi-secret image sharing based on Boolean operations, Signal Process., 91 (2011), 90–97.
    [22] G. Alvarez, L. H. Encinas and A. M. Del Rey, A multisecret sharing scheme for color images based on cellular automata, Inf. Sci., 178 (2008), 4382–4395.
    [23] Z. Eslami, S. Razzaghi and J. Z. Ahmadabadi, Secret image sharing based on cellular automata and steganography, Pattern Recognit., 43 (2010), 397–404.
    [24] C. C. Chang, N. T. Huynh and H. D. Le, Lossless and unlimitted multi-image sharing based on Chinese remainder theorem and Lagrange interpolation, Signal Process., 99 (2014), 159–170.
    [25] C. Guo, H. Zhang, Q. Q. Song, et al., A multi-threshold secret sharing scheme based on the Chiense remainder theorem, Multimed. Tools Appl., 75 (2016), 11577–11594.
    [26] B. Arazi, A generalization of the Chinese remainder theorem, Pac. J. Math., 70 (1977), 289–296.
    [27] W. Wang, X. P. Li, X. G. Xia, et al., The largest dynamic range of a generalized Chinese remainder theorem for two integers, IEEE Signal Process. Lett., 22 (2015), 254–258.
    [28] X. P. Li, X. G. Xia, W. J. Wang, et al., A robust generalized Chinese remainder theorem for two integers, IEEE T. Inform. Theory, 62 (2016), 7491–7504.
    [29] K. H. Rosen, Elementary Number Theory and Its Applications, 5th edition, Addison-Wesley, Mass., 2010.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4945) PDF downloads(580) Cited by(0)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog