An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

被引:3
作者
Sharobim, Bishoy K. [1 ]
Fetteha, Marwan A. [1 ]
Abd-El-Hafiz, Salwa K. [2 ]
Sayed, Wafaa S. [2 ]
Said, Lobna A. [1 ]
Radwan, Ahmed G. [2 ,3 ]
机构
[1] Nile Univ, Nanoelect Integrated Syst Ctr NISC, Giza 12588, Egypt
[2] Cairo Univ, Fac Engn, Engn Math Dept, Giza 12613, Egypt
[3] Nile Univ, Sch Engn & Appl Sci, Giza 12588, Egypt
关键词
Security; Field programmable gate arrays; Cryptography; Information security; Encryption; Image processing; Information sharing; System recovery; Image color analysis; Chinese remainder theorem; field programmable gate array; multi-secret image sharing; secret sharing; ENCRYPTION; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2023.3240202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes a simple and efficient (n, n)-MSIS system for colored images based on XOR and Chinese Remainder Theorem (CRT), where all the n share are required in the recovery. The system improves the security by adding dependency on the input images to be robust against differential attacks, and by using several delay units. It works with even and odd number of inputs, and has a long sensitive system key design for the CRT. Security analysis and a comparison with related literature are introduced with good results including statistical tests, differential attack measures, and key sensitivity tests as well as performance analysis tests such as time and space complexity. In addition, Field Programmable Gate Array (FPGA) realization of the proposed system is presented with throughput 530 Mbits/sec. Finally, the proposed MSIS system is validated through software and hardware with all statistical analyses and proper hardware resources with low power consumption, high throughput and high level of security.
引用
收藏
页码:9511 / 9520
页数:10
相关论文
共 36 条
[1]   A fractal-based image encryption system [J].
Abd-El-Hafiz, Salwa Kamal ;
Radwan, Ahmed G. ;
Haleem, Sherif H. Abdel ;
Barakat, Mohamed L. .
IET IMAGE PROCESSING, 2014, 8 (12) :742-752
[2]   A generalized framework for elliptic curves based PRNG and its utilization in image encryption [J].
AbdElHaleem, Sherif H. ;
Abd-El-Hafiz, Salwa K. ;
Radwan, Ahmed G. .
SCIENTIFIC REPORTS, 2022, 12 (01)
[3]  
Abdullah Hamsa A., 2019, Indonesian Journal of Electrical Engineering and Computer Science, V13, P129, DOI DOI 10.11591/IJEECS.V13.I1
[4]  
[Anonymous], 2017, GENESYS 2 FPGA BOARD
[5]   Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images [J].
Chen, Jinrui ;
Liu, Kesheng ;
Yan, Xuehu ;
Liu, Lintao ;
Zhou, Xuan ;
Tan, Longdan .
SYMMETRY-BASEL, 2018, 10 (08)
[6]   Improved Visual Secret Sharing Scheme for QR Code Applications [J].
Cheng, Yuqiao ;
Fu, Zhengxin ;
Yu, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2393-2403
[7]  
Chervyakov Nikolay Ivanovich, 2015, Advances in Swarm and Computational Intelligence. 6th International Conference, ICSI 2015 held in conjunction with the Second BRICS Congress, CCI 2015. Proceedings: LNCS 9142, P3, DOI 10.1007/978-3-319-20469-7_1
[8]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
[9]   A novel approach for sharing multiple color images by employing Chinese Remainder Theorem [J].
Deshmukh, Maroti ;
Nain, Neeta ;
Ahmed, Mushtaq .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 49 :291-302
[10]   Enhanced hardware implementation of a mixed-order nonlinear chaotic system and speech encryption application [J].
Elsafty, Abdulaziz H. ;
Tolba, Mohammed F. ;
Said, Lobna A. ;
Madian, Ahmed H. ;
Radwan, Ahmed G. .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2020, 125