An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

被引:3
|
作者
Sharobim, Bishoy K. [1 ]
Fetteha, Marwan A. [1 ]
Abd-El-Hafiz, Salwa K. [2 ]
Sayed, Wafaa S. [2 ]
Said, Lobna A. [1 ]
Radwan, Ahmed G. [2 ,3 ]
机构
[1] Nile Univ, Nanoelect Integrated Syst Ctr NISC, Giza 12588, Egypt
[2] Cairo Univ, Fac Engn, Engn Math Dept, Giza 12613, Egypt
[3] Nile Univ, Sch Engn & Appl Sci, Giza 12588, Egypt
关键词
Security; Field programmable gate arrays; Cryptography; Information security; Encryption; Image processing; Information sharing; System recovery; Image color analysis; Chinese remainder theorem; field programmable gate array; multi-secret image sharing; secret sharing; ENCRYPTION; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2023.3240202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes a simple and efficient (n, n)-MSIS system for colored images based on XOR and Chinese Remainder Theorem (CRT), where all the n share are required in the recovery. The system improves the security by adding dependency on the input images to be robust against differential attacks, and by using several delay units. It works with even and odd number of inputs, and has a long sensitive system key design for the CRT. Security analysis and a comparison with related literature are introduced with good results including statistical tests, differential attack measures, and key sensitivity tests as well as performance analysis tests such as time and space complexity. In addition, Field Programmable Gate Array (FPGA) realization of the proposed system is presented with throughput 530 Mbits/sec. Finally, the proposed MSIS system is validated through software and hardware with all statistical analyses and proper hardware resources with low power consumption, high throughput and high level of security.
引用
收藏
页码:9511 / 9520
页数:10
相关论文
共 50 条
  • [1] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [2] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Li, Lele
    Han, Zhaowei
    Li, Zhihui
    Guan, Feiting
    Zhang, Li
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [3] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601
  • [4] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Lele Li
    Zhaowei Han
    Zhihui Li
    Feiting Guan
    Li Zhang
    Quantum Information Processing, 23
  • [5] Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem
    Chanu, Oinam Bidyapati
    Tentu, Appala Naidu
    Venkaiah, V. Ch
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [6] Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
    Sheikhi-Garjan, Maryam
    Bahramian, Mojtaba
    Doche, Christophe
    IET INFORMATION SECURITY, 2019, 13 (03) : 278 - 284
  • [7] A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map
    Chanu, Oinam B.
    Neelima, Arambam
    JOURNAL OF ELECTRONIC IMAGING, 2021, 30 (02)
  • [8] Practical Secret Image Sharing Based on the Chinese Remainder Theorem
    Li, Longlong
    Lu, Yuliang
    Liu, Lintao
    Sun, Yuyuan
    Wang, Jiayu
    MATHEMATICS, 2022, 10 (12)
  • [9] Threshold Secret Image Sharing by Chinese Remainder Theorem
    Shyu, Shyong Jian
    Chen, Ying-Ru
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1332 - 1337
  • [10] A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem
    Kiasari, Mohammad Ebrahim Ebrahimi
    Pakniat, Nasrollah
    Mirghadri, Abdolrasoul
    Nazari, Mojtaba
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 125 - 135