Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing

被引:0
作者
Wang, Rui [1 ]
Li, Longlong [2 ]
Yang, Guozheng
Yan, Xuehu
Yan, Wei [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cryptography; Encryption; Image segmentation; Steganography; Propagation losses; Polynomials; Information leakage; Image reconstruction; Transforms; Secret image sharing; Chinese remainder theorem; vulnerability exploitation; chain obfuscation; security enhancement; CHINESE REMAINDER THEOREM; LOSSLESS (K; DOMAIN;
D O I
10.1109/TIFS.2024.3477265
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity compared to other branches of secret sharing. For decades, numerous schemes have been proposed for practical applications of AB-SS, such as secret image sharing (SIS). However, in terms of security, AB-SS has proved to be neither ideal nor perfect, and its derivatives in image sharing exhibit vulnerabilities associated with secret leakage. This paper studies the security issues in the SIS schemes derived from AB-SS and improves the core sharing principle of AB-SS to enhance security in image protection. First, for (2, n)-CRTSIS schemes, we exploit the vulnerability in a single share image to crack the confidential information of the original image, including secret pixel values and the ratio of different pixels. Then, by employing the XOR operation, we introduce a chain obfuscation technology and propose a secure image sharing scheme based on the Chinese remainder theorem (COxor-CRTSIS). The COxor-CRTSIS scheme utilizes integer linear programming for achieving lossless recovery without segmentation and eliminates potential secret disclosure risks without additional encryption. Furthermore, to comprehensively evaluate the security of existing schemes, this paper presents three metrics, information loss rate, fluctuation degree, and coverage rate, enabling a quantitative comparison of security for the first time. Theoretical analyses and experiments are conducted to validate the effectiveness of our scheme.
引用
收藏
页码:9819 / 9834
页数:16
相关论文
共 50 条
  • [21] Weighted Threshold Secret Image Sharing
    Shyu, Shyong Jian
    Chuang, Chun-Chieh
    Chen, Ying-Ru
    Lai, Ah-Fur
    ADVANCES IN IMAGE AND VIDEO TECHNOLOGY, PROCEEDINGS, 2009, 5414 : 988 - +
  • [22] CRT based threshold multi secret sharing scheme
    Subba Rao, Y.V.
    Bhagvati, Chakravarthy
    International Journal of Network Security, 2014, 16 (04) : 249 - 255
  • [23] Meaningful secret image sharing with improved visual quality
    Wang, Rui
    Li, Longlong
    Yan, Xuehu
    Yan, Wei
    Liu, Yali
    Yang, Guozheng
    SIGNAL PROCESSING, 2025, 230
  • [24] Practical Secret Image Sharing Based on the Chinese Remainder Theorem
    Li, Longlong
    Lu, Yuliang
    Liu, Lintao
    Sun, Yuyuan
    Wang, Jiayu
    MATHEMATICS, 2022, 10 (12)
  • [25] Secret Image Sharing Safety
    Fang, Wen-Pinn
    2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 77 - 80
  • [26] Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image
    Naskar, P. K.
    Chaudhuri, A.
    IMAGING SCIENCE JOURNAL, 2016, 64 (08) : 460 - 470
  • [27] Reversible Image Secret Sharing
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Song, Xianhua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3848 - 3858
  • [28] A Universal Secret Sharing Scheme with General Access Structure Based on CRT
    Meng, Keju
    Miao, Fuyou
    Yu, Yue
    Lu, Changbin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 142 - 148
  • [29] An Image Secret Sharing Technique with Block Based Image Coding
    Das, Sujit Kumar
    Dhara, Bibhas Chandra
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 648 - 652
  • [30] Renewal of secret and shadows in secret image sharing
    Yu, Yongqiang
    Yan, Xuehu
    Li, Longlong
    Wang, Jiayu
    IET INFORMATION SECURITY, 2022, 16 (06) : 432 - 441