An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

被引:3
作者
Sharobim, Bishoy K. [1 ]
Fetteha, Marwan A. [1 ]
Abd-El-Hafiz, Salwa K. [2 ]
Sayed, Wafaa S. [2 ]
Said, Lobna A. [1 ]
Radwan, Ahmed G. [2 ,3 ]
机构
[1] Nile Univ, Nanoelect Integrated Syst Ctr NISC, Giza 12588, Egypt
[2] Cairo Univ, Fac Engn, Engn Math Dept, Giza 12613, Egypt
[3] Nile Univ, Sch Engn & Appl Sci, Giza 12588, Egypt
关键词
Security; Field programmable gate arrays; Cryptography; Information security; Encryption; Image processing; Information sharing; System recovery; Image color analysis; Chinese remainder theorem; field programmable gate array; multi-secret image sharing; secret sharing; ENCRYPTION; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2023.3240202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes a simple and efficient (n, n)-MSIS system for colored images based on XOR and Chinese Remainder Theorem (CRT), where all the n share are required in the recovery. The system improves the security by adding dependency on the input images to be robust against differential attacks, and by using several delay units. It works with even and odd number of inputs, and has a long sensitive system key design for the CRT. Security analysis and a comparison with related literature are introduced with good results including statistical tests, differential attack measures, and key sensitivity tests as well as performance analysis tests such as time and space complexity. In addition, Field Programmable Gate Array (FPGA) realization of the proposed system is presented with throughput 530 Mbits/sec. Finally, the proposed MSIS system is validated through software and hardware with all statistical analyses and proper hardware resources with low power consumption, high throughput and high level of security.
引用
收藏
页码:9511 / 9520
页数:10
相关论文
共 36 条
[11]   Hardware realization of a secure and enhanced s-box based speech encryption engine [J].
ElSafty, Abdulaziz H. ;
Tolba, Mohammed F. ;
Said, Lobna A. ;
Madian, Ahmed H. ;
Radwan, Ahmed G. .
ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2021, 106 (02) :385-397
[12]   An Authenticatable (2,3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix [J].
Gao, Kai ;
Horng, Ji-Hwei ;
Chang, Chin-Chen .
IEEE ACCESS, 2021, 9 :50112-50125
[13]   Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images [J].
Gong, Qinghong ;
Wang, Yongjie ;
Yan, Xuehu ;
Liu, Lintao .
IEEE ACCESS, 2019, 7 :113216-113222
[14]   Improved Beta Chaotic Image Encryption for Multiple Secret Sharing [J].
Guo, Jing-Ming ;
Riyono, Dwi ;
Prasetyo, Heri .
IEEE ACCESS, 2018, 6 :46297-46321
[15]   An overview of visual cryptography techniques [J].
Ibrahim, Dyala R. ;
Teh, Je Sen ;
Abdullah, Rosni .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) :31927-31952
[16]  
Kraft J., 2018, Introduction to Number Theory with Cryptography
[17]  
Lian S., 2008, Multimedia content encryption: techniques and applications
[18]   A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets [J].
Liu, Lintao ;
Lu, Yuliang ;
Yan, Xuehu .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2021, 74
[19]   A novel multiple-level secret image sharing scheme [J].
Liu, Yi-Ning ;
Zhong, Qi ;
Xie, Ming ;
Chen, Zu-Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :6017-6031
[20]   Infrared and visible image fusion methods and applications: A survey [J].
Ma, Jiayi ;
Ma, Yong ;
Li, Chang .
INFORMATION FUSION, 2019, 45 :153-178