Practical Secret Image Sharing Based on the Chinese Remainder Theorem

Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS is neither perfect nor ideal, resulting in a narrower range of share pixels than that of secret pixels. In this paper, we propose a practical and lossless CRTSIS based on Asmuth and Bloom’s threshold algorithm. To adapt the original scheme for grayscale images, our scheme shares the high seven bits of each pixel and utilizes the least significant bit (LSB) matching technique to embed the LSBs into the random integer that is generated in the sharing phase. The chosen moduli are all greater than 255 and the share pixels are in the range of [0, 255] by a screening operation. The generated share pixel values are evenly distributed in the range of [0, 255] and the selection of (k,n) threshold is much more flexible, which significantly improves the practicality of CRTSIS. Since color images in RGB mode are made up of three channels, it is easy to extend the scheme to color images. Theoretical analysis and experiments are given to validate the effectiveness of the proposed scheme.

[1]  Chih-Hsien Hsia,et al.  Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction , 2021, J. Imaging.

[2]  Ching-Nung Yang,et al.  Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.

[3]  Yuliang Lu,et al.  Chinese remainder theorem-based two-in-one image secret sharing with three decoding options , 2018, Digit. Signal Process..

[4]  Song Wan,et al.  Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold , 2017, ICCCS.

[5]  Yuliang Lu,et al.  Progressive visual secret sharing for general access structure with multiple decryptions , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).

[6]  Ting-Wei Chuang,et al.  Image Sharing and Recovering Based on Chinese Remainder Theorem , 2016, 2016 International Symposium on Computer, Consumer and Control (IS3C).

[7]  Peng Li,et al.  A novel two-in-one image secret sharing scheme based on perfect black visual cryptography , 2016, Journal of Real-Time Image Processing.

[8]  Himanshu S. Mazumdar,et al.  Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology , 2015 .

[9]  Xuehu Yan,et al.  Meaningful visual secret sharing based on error diffusion and random grids , 2015, Multimedia Tools and Applications.

[10]  Ferucio Laurentiu Tiplea,et al.  On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme , 2018, IACR Cryptol. ePrint Arch..

[11]  Bin Yu,et al.  Visual Cryptography and Random Grids Schemes , 2013, IWDW.

[12]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[13]  Feng Liu,et al.  Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..

[14]  Xiaofeng Liao,et al.  Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem , 2012, Int. J. Wavelets Multiresolution Inf. Process..

[15]  Ching-Nung Yang,et al.  Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..

[16]  Vasif V. Nabiyev,et al.  A new secret image sharing technique based on Asmuth Bloom's scheme , 2009, 2009 International Conference on Application of Information and Communication Technologies.

[17]  Shyong Jian Shyu,et al.  Threshold Secret Image Sharing by Chinese Remainder Theorem , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[18]  Andrew D. Ker Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.

[19]  Bart Preneel,et al.  On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.

[20]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.