Practical Secret Image Sharing Based on the Chinese Remainder Theorem

被引:5
作者
Li, Longlong [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Liu, Lintao [1 ,2 ]
Sun, Yuyuan [1 ,2 ]
Wang, Jiayu [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Key Lab Cyberspace Secur Situat Awareness &, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
secret image sharing; Chinese remainder theorem; (k; n); threshold; practical; lossless; SCHEME;
D O I
10.3390/math10121959
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Compared with Shamir's original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS is neither perfect nor ideal, resulting in a narrower range of share pixels than that of secret pixels. In this paper, we propose a practical and lossless CRTSIS based on Asmuth and Bloom's threshold algorithm. To adapt the original scheme for grayscale images, our scheme shares the high seven bits of each pixel and utilizes the least significant bit (LSB) matching technique to embed the LSBs into the random integer that is generated in the sharing phase. The chosen moduli are all greater than 255 and the share pixels are in the range of [0, 255] by a screening operation. The generated share pixel values are evenly distributed in the range of [0, 255] and the selection of (k,n) threshold is much more flexible, which significantly improves the practicality of CRTSIS. Since color images in RGB mode are made up of three channels, it is easy to extend the scheme to color images. Theoretical analysis and experiments are given to validate the effectiveness of the proposed scheme.
引用
收藏
页数:18
相关论文
共 38 条
[1]   Efficient Quantum Information Hiding for Remote Medical Image Sharing [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Rahman, Md. Abdur ;
Alamri, Atif ;
Gupta, B. B. .
IEEE ACCESS, 2018, 6 :21075-21083
[2]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[3]   Format-Compliant Selective Secret 3-D Object Sharing Scheme [J].
Beugnon, Sebastien ;
Puech, William ;
Pedeboy, Jean-Pierre .
IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (09) :2171-2183
[4]  
Chavan PV, 2014, 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS)
[5]   Improved Visual Secret Sharing Scheme for QR Code Applications [J].
Cheng, Yuqiao ;
Fu, Zhengxin ;
Yu, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2393-2403
[6]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
[7]   Image Sharing and Recovering Based on Chinese Remainder Theorem [J].
Chuang, Ting-Wei ;
Chen, Chaur-Chin ;
Chien, Betty .
2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, :817-820
[8]   On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme [J].
Dragan, Constantin Catalin ;
Tiplea, Ferucio Laurentiu .
INFORMATION SCIENCES, 2018, 463 :75-85
[9]   Visual Cryptography and Random Grids Schemes [J].
Fu, Zheng-xin ;
Yu, Bin .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 :109-122
[10]   A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain [J].
Fukumitsu, Masayuki ;
Hasegawa, Shingo ;
Iwazaki, Jun-Ya ;
Sakai, Masao ;
Takahashi, Daiki .
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, :803-810