An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization

被引:3
|
作者
Sharobim, Bishoy K. [1 ]
Fetteha, Marwan A. [1 ]
Abd-El-Hafiz, Salwa K. [2 ]
Sayed, Wafaa S. [2 ]
Said, Lobna A. [1 ]
Radwan, Ahmed G. [2 ,3 ]
机构
[1] Nile Univ, Nanoelect Integrated Syst Ctr NISC, Giza 12588, Egypt
[2] Cairo Univ, Fac Engn, Engn Math Dept, Giza 12613, Egypt
[3] Nile Univ, Sch Engn & Appl Sci, Giza 12588, Egypt
关键词
Security; Field programmable gate arrays; Cryptography; Information security; Encryption; Image processing; Information sharing; System recovery; Image color analysis; Chinese remainder theorem; field programmable gate array; multi-secret image sharing; secret sharing; ENCRYPTION; SCHEME; DESIGN;
D O I
10.1109/ACCESS.2023.3240202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-Secret Image Sharing (MSIS) is important in information security when multiple images are shared in an unintelligible form to different participants, where the images can only be recovered using the shares from participants. This paper proposes a simple and efficient (n, n)-MSIS system for colored images based on XOR and Chinese Remainder Theorem (CRT), where all the n share are required in the recovery. The system improves the security by adding dependency on the input images to be robust against differential attacks, and by using several delay units. It works with even and odd number of inputs, and has a long sensitive system key design for the CRT. Security analysis and a comparison with related literature are introduced with good results including statistical tests, differential attack measures, and key sensitivity tests as well as performance analysis tests such as time and space complexity. In addition, Field Programmable Gate Array (FPGA) realization of the proposed system is presented with throughput 530 Mbits/sec. Finally, the proposed MSIS system is validated through software and hardware with all statistical analyses and proper hardware resources with low power consumption, high throughput and high level of security.
引用
收藏
页码:9511 / 9520
页数:10
相关论文
共 50 条
  • [41] Highly efficient and secure multi-secret image sharing scheme
    Chen, Chien-Chang
    Wu, Wei-Jie
    Chen, Jun-Long
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (12) : 7113 - 7128
  • [42] Image Sharing and Recovering Based on Chinese Remainder Theorem
    Chuang, Ting-Wei
    Chen, Chaur-Chin
    Chien, Betty
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 817 - 820
  • [43] A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem
    Wei Hua
    Xiaofeng Liao
    Multimedia Tools and Applications, 2017, 76 : 7087 - 7103
  • [44] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Hu, Fei
    Li, Weihai
    Yu, Nenghai
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40713 - 40732
  • [45] A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem
    Hua, Wei
    Liao, Xiaofeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 7087 - 7103
  • [46] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Fei Hu
    Weihai Li
    Nenghai Yu
    Multimedia Tools and Applications, 2024, 83 : 40713 - 40732
  • [47] Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem
    Wang, Chaoying
    Peng, Yong
    Liang, Zhibiao
    Wang, Yu
    Ke, Gang
    Jin, Zhiping
    HELIYON, 2023, 9 (04)
  • [48] A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem
    Hilmi, Asmaa
    Mezroui, Soufiane
    El Oualkadi, Ahmed
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2023, 31 (01) : 86 - 110
  • [49] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem
    Lu, Dianjun
    Wang, Yu
    Zhang, Xiaoqin
    Ji, Lanfen
    PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
  • [50] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62