Lossless (k, n)-Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption

被引:12
作者
Li, Longlong [1 ]
Lu, Yuliang [1 ]
Yan, Xuehu [1 ]
Liu, Lintao [1 ]
Tan, Longdan [1 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Image secret sharing; Chinese remainder theorem; lossless recovery; (k; n); threshold; VISUAL CRYPTOGRAPHY; SCHEME;
D O I
10.1109/ACCESS.2019.2921612
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A typical Chinese remainder theorem (CRT)-based secret sharing (SS) scheme has been proposed by Asmuth and Bloom for several decades, with lower computation complexity compared to Shamir's original polynomial-based SS. But when applied to images, CRT-based image secret sharing (CRTISS) shows many problems, such as lossy recovery, auxiliary encryption, and extra parameters requirement. We analyze the characteristics of images and ISS and propose a (k, n)-threshold CRTISS based on the Asmuth and Bloom's scheme by sharing the high 7 bits of a grayscale secret pixel and embedding the least significant bit (LSB) into the random integer. The pixel values of a grayscale image are divided into two parts, which make it possible to share all the secret pixels with no expansion. Our method has the advantages of (k, n) threshold, lossless recovery, and no auxiliary encryption. The parameters requirement is the same as that in the Asmuth and Bloom's original method. Analysis and experiments are provided to validate the effectiveness of the proposed method.
引用
收藏
页码:75113 / 75121
页数:9
相关论文
共 28 条
[1]  
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[2]  
[Anonymous], 2009, 2009 INT C APPL INF
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]   A simple yet efficient S-box method based on chaotic sine map [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. .
OPTIK, 2017, 130 :1438-1444
[5]   Improved Visual Secret Sharing Scheme for QR Code Applications [J].
Cheng, Yuqiao ;
Fu, Zhengxin ;
Yu, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2393-2403
[6]   Image Sharing and Recovering Based on Chinese Remainder Theorem [J].
Chuang, Ting-Wei ;
Chen, Chaur-Chin ;
Chien, Betty .
2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, :817-820
[7]   Visual Cryptography and Random Grids Schemes [J].
Fu, Zheng-xin ;
Yu, Bin .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 :109-122
[8]   Threshold visual secret sharing by random grids with improved contrast [J].
Guo, Teng ;
Liu, Feng ;
Wu, ChuanKun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (08) :2094-2109
[9]   SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM [J].
Hu, Chunqiang ;
Liao, Xiaofeng ;
Xiao, Di .
INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2012, 10 (03)
[10]   A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem [J].
Jia, Xingxing ;
Wang, Daoshun ;
Nie, Daxin ;
Luo, Xiangyang ;
Sun, Jonathan Zheng .
INFORMATION SCIENCES, 2019, 473 :13-30