Next Article in Journal
Hydraulic Losses in Systems of Conduits with Flow from Laminar to Fully Turbulent: A New Symbolic Regression Formulation
Previous Article in Journal
Existence and Stability of Weakly Cooperative Equilibria and Strong Cooperative Equilibria of Multi-Objective Population Games
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Boolean-Based (k, n, m) Multi-Secret Image Sharing

Department of Computer Science and Information Engineering, Tamkang University, New Taipei City 25137, Taiwan
*
Author to whom correspondence should be addressed.
Axioms 2022, 11(5), 197; https://doi.org/10.3390/axioms11050197
Submission received: 22 March 2022 / Revised: 20 April 2022 / Accepted: 21 April 2022 / Published: 23 April 2022

Abstract

:
Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property. Simultaneously, the adopted Boolean method preserves high performance. The proposed (k, n, m) multi-secret image sharing scheme shares m secret images among n participants and gathering k participants’ shared images perfectly recovers these m secret images. The proposed scheme exhibits high performance because of the usage of Boolean-based processing. Moreover, the usage of a sharing matrix based strategy acquires perfect reconstruction of the secret images under (k, n) thresholds. Two proposed schemes, the source-random-mixed (SRM) and the source-random-separate (SRS) methods, are presented in this study from different strategies of sharing the random image mixed with the secret images or separated to the secret images, respectively. Moreover, the proposed SRS method exhibits the better sharing capacity. Experimental results show that the proposed schemes perform well on sharing efficiency and security.

1. Introduction

The popular usage of multimedia content leads to a security problem on transmission or storage being increasingly more important. Secret image sharing technique, aiming to protect the multimedia content among participants, is one of the protection methods and has become an important research field [1].
The secret image sharing problem was first presented by Thien and Lin [2] with solving by the Shamir–Lagrange method [3]. The secret image sharing technique is then extended to various research areas, such as sharing among host images [4,5], sharing using Boolean operations [6,7], progressive sharing [8,9,10], sharing with visual cryptography property [11], multiple sharing [12,13], and scalable sharing [14]. Among these research topics, sharing multiple secret images efficiently is an important topic in real cases. Moreover, the Boolean-based scheme outperforms the functional-based schemes on computational complexity but is hard to achieve various properties such as (k, n) partial recovery, multiple sharing, or progressive sharing. Therefore, a Boolean-based secret image sharing scheme with (k, n) thresholds on multiple secret images sharing is very important and merits our study.
The Boolean-based approaches can be classified into two categories, the stacking-based and the XOR-based methods. The stacking-based methods [15,16,17,18], which are based on visual cryptography [19], are the least computational Boolean-based methods. However, the stacking-based methods always lead to a rough visual effect. Consequently, the XOR-based methods are the key technique having both efficient computation complexity and perfect recovered results. Therefore, our proposed method is based on XOR-based technique. Moreover, sharing matrix strategy [20] is an efficient method to achieve perfect recovery. Therefore, the proposed scheme is based on XOR operations and the concept of sharing matrix.
Over the past years, several Boolean-based approaches have been presented. Wang et al. [6] adopted simple Boolean operations to present an (n, n) threshold scheme. Chen and Wu [12] proposed a Boolean-based multiple secret image sharing method which used n − 1 secret images to generate n shared images. Collecting all shared images is the requirement of their proposed method. The Boolean-based multiple secret image sharing method [12] was then improved by Chen and Wu [13] by using a random number image generation function, which obtains the same random image from secret images or shared images. Therefore, the sharing capacity is increased due to the no random image requirement. Chen et al. [21] further modified the usage of random image generation to a Boolean-based symmetric recovery function. Notice that most previous Boolean-based schemes are mainly for (n, n) thresholds. Bao et al. [20] proposed the sharing matrix to acquire Boolean-based (k, n) secret image sharing. Prasetyo and Jing [22] present the Chinese remainder theorem and XOR-based (n, n) secret image sharing. Chattopadhyay et al. [23] acquired (n, n) secret image sharing with scalable shared images. Kabirirad and Eslami [24] present (k, n) secret image sharing with recovery by consecutive k shared images. Kabirirad and Eslami [25] proposed a Boolean-based multiple secret image sharing scheme. However, the size of the generated shared image must be the same as the secret image. Azza and Lian [26] present a multi-secret image sharing scheme using cellular automaton with steganography. Chen and Wu [27] proposed a multi-secret sharing scheme based on Boolean operation. Based on the proposed predefined access structure, the recovery of secret images does not require collection of all the shared images. Moreover, the way to construct multi-secret image sharing with general (k, n) thresholds is still not well solved.
This paper proposes a secure Boolean-based (k, n, m) multiple secret image sharing approach that shares m secret images among n shared images, and collecting k shared images perfectly recovers these m secret images. Two schemes are presented in this study: the source-random-mixed scheme (SRM) sharing the XOR result among each shared image and the random image, and the source-random-separate scheme (SRS) that shares the random image individually. Experimental results show the novel properties of the two proposed approaches. Moreover, the proposed SRS scheme outperforms others for its usage of sharing matrix on secret images distribution.
The paper is organized into the following sections. Section 2 gives a brief review of related works [20,21]. Section 3 presents details of two proposed sharing and recovery approaches, the source-random-mixed scheme (SRM) and the source-random-separate scheme (SRS). Section 4 presents the experimental results. Section 5 offers concluding remarks.

2. Review of Related Literature

This section briefly reviews the state-of-art in Boolean-based secret sharing schemes with the function of multiple images sharing. Section 2.1 introduces the secret sharing of multiple images based on the Boolean function proposed by Chen et al. [21]. Section 2.2 introduces the sharing matrix-based (k, n) secret image sharing method by Bao et al. [20].

2.1. Multiple Secret Images Sharing Scheme

Chen et al. [21] proposed a Boolean-based (n, n) secret image sharing scheme, in which n secret images are shared among n shared images and by Boolean operation. The sharing steps are introduced as follows.
1.
Acquire the random image R with the secret images I i ( 0 i n 1 ) by Equation (1):
h = H ( I 0     I 1     I 2     I n 1 ) , SI = image _ synthesis ( h ) , R = bit _ reverse ( I 0     I 1     I 2         I n - 1 )     SI ,
where H() represents the SHA-256 hash function, image_synthesis(h) synthesizes the random image from the seed h, and bit_reverse(I) reverses the image I on the bit plane.
2.
Shift the random image with different pixels to acquire a series of random images R i ( 0 i n 1 ) , as given in Equation (2):
R i ( x , y ) = R ( x   -   i , y   -   i ) .
3.
Acquire shared images O i for participant i from Equation (3):
O i =   {             I 0 R 0 R 1 ,                         i   =   0 ,             I 1 R 1 R 2 ,                     i   =   1 ,             I 2 R 2 R 3 ,               i   =   2 ,                                                                                           I n   -   2 R n   -   2 R n   -   1 ,                 i   =   n   -   2 , I n   -   1 R n   -   1 R 0 ,                   i   =   n   -   1 .
The recovery steps are introduced as follows.
1.
Collect all n shared images O i and perform XOR operation O 0 O n 2 O n 1 on all shared images, as defined by Equation (4):
O 0 O n   -   2 O n   -   1 = ( I 0 R 0 R 1 ) ( I n   -   1 R n   -   1 R 0 ) , = I 0 I n   -   2 I n   -   1 .
2.
Apply the result of Equation (4) to Equations (1) and (2) to obtain a series of random images R i ( 0 i n 1 ) .
3.
Acquire the recovered secret images I i by applying O i and R i to Equation (5):
I i = { O 0 R 0 R 1 , i = 0 , O 1 R 1 R 2 , i = 1 , O 2 R 2 R 3 , i = 2 ,   O n 2 R n 2 R n 1 , i = n 2 O n 1 R n 1 R 0 , i = n 1 .
The recovered secret images I i and original secret images I i are consistent when all the shared images O i are correctly acquired. Moreover, Chen et al.’s scheme [21] only exhibits (n, n) secret image sharing for sharing among n shared images and recovery requirement is all n shared images. For acquiring a Boolean-based and robust (k, n) secret image sharing scheme, Bao et al. [22] presented sharing an important matrix-based method, which is introduced in the next section.

2.2. Boolean-Based (k, n) Secret Image Sharing Scheme

The Boolean-based scheme is difficult to achieve with (k, n) secret image sharing when k n . Bao et al. [20] present a novel (k, n) secret image sharing scheme by using the proposed sharing matrix to achieve the recovery of only acquiring k shared images rather than n shared images. Assume that a secret image with size r × c is shared among n shared images with recovery thresholds (k, n); their sharing algorithm is introduced as follows.
  • Generate a series of n binary sharing matrices Mi(0 ≤ in − 1) with size r × c, in which each matrix should satisfy the following two criteria:
    • Gathering k sharing matrices leads to each entry containing at least a 1 among these sharing matrices.
    • Gathering less than k sharing matrices leads to at least an entry without finding a 1 among these sharing matrices.
  • Encrypt the secret image I to acquire a randomlike image R.
  • For a sharing matrix Mi, each entry Mi(j,k)(0 ≤ jr − 1,0 ≤ kc − 1) determines the corresponding shared image entry Si(j,k), as defined in Equation (6):
S i ( j , k ) = { R ( j , k ) ,   if   M i ( j , k ) = 1 , Rand ( ) ,   if   M i ( j , k ) = 0 ,
where Rand() represents a random number generation function.
Since the encrypted image R in Step 2 is a randomlike image, Step 3 acquires a shared image that is also randomlike because part of the entries of R are S i and other entries are random numbers. According to the novel arrangement of the sharing matrices M i , gathering k shared images S i can acquire all entries Si(j,k)(0 ≤ jr − 1, 0 ≤ kc − 1) of R and then decrypt to the secret image I perfectly. However, gathering less than k shared images cannot acquire all entries of R and the secret image cannot then be decrypted.
The recovery algorithm is introduced as follows.
  • Reconstruct the same series of n binary sharing matrices Mi(0 ≤ In − 1) as applied in the sharing algorithm.
  • Acquire the encrypted image R from M i and S i by applying Equation (7)
R ( j , k ) = S i ( j , k ) if   M i ( j , k ) = 1 .
3.
Decrypt the secret image from R to acquire the recovered secret image.
In Step 2, each entry of the randomlike image R will be correctly recovered because of the property of binary sharing matrices Mi, as introduced in Step 1 of the sharing algorithm.

3. The Proposed Approach

This section introduces our proposed XOR-based (k, n, m) multi-secret image sharing scheme, in which m secret images are shared among n participants with k thresholds for perfectly recovering all secret images.
Section 3.1 introduces the generation of the sharing matrix, Section 3.2 and Section 3.3 introduce two proposed XOR-based (k, n, m) multi-secret image sharing algorithms: the source-random-mixed method (SRM) and source-random-separate method (SRS), respectively. Examples of the proposed SRS sharing and recovery with thresholds (2, 3, 2) are demonstrated in Section 3.4.

3.1. Sharing Matrix Generation

Since the sharing matrix has to acquire the property of (k, n) thresholds, all secret images are consistent in size and the sharing matrices Pi(i = 1, 2, …, n) have the following properties:
  • Each sharing matrix Pi has the same size with secret images.
  • Each element in Pi are either 0 or 1.
  • Selecting p matrices of Pi, for example, i = 1, 2, …, p, the following criteria should be satisfied.
    3.1
    When pk, at least one matrix has the value of 1 in all entries among these p matrices.
    3.2
    When p < k, at least one entry has the value of 0 in all p matrices.
Above three properties construct the sharing matrices Pi(i = 1, 2, …, n) that will be used in our two proposed methods. Without loss of generality, an example of (k, n) using threshold (3, 4) and matrix size 4 × 6 is illustrated in Figure 1. The predetermined selection of n = 4 acquires 4 sharing matrices P1 to P4 and k = 3 shows that selecting 3 sharing matrices should fit the above criterion 3.1. For example, the selection of P1, P2, and P3 fits the requirement of 3.1 being at least one matrix having the value of 1 in all entries. However, the selection of P 1 , and P 2 fits the criterion of Step 3.2, with entries such as P1(1,1) = P2(1,1) = 0 or P1(2,6) = P2(2,6) = 0. Therefore, the (k, n) thresholds determine the collection of k sharing matrices acquires at least one matrix that has the value of 1 in all entries and the collection of k − 1 sharing matrices at least have the value of 0 in one entry among sharing matrices.
The sharing matrix generation algorithm, a modification of Bao et al.’s method [20], is illustrated as follows for obtaining sharing matrices Pi(i = 1, 2, …, n) for (k, n, m) thresholds with r × c secret image size.
1.
Use Equation (8) to acquire an n × 1 binary vector M:
M = createVector ( k , n ) ,
where M includes (k − 1) number of value 0 and (nk + 1) number of value 1.
2.
Acquire initial matrix N by permuting through M as Equation (9):
N = permuteMatrix ( M ) ,
where permuteMatrix(M) duplicates vector M  t = n ! ( k 1 ) ! ( n k + 1 ) ! times to acquire matrix N with size n × t.
3.
Extend one row vector of N, denoted by N(i,:), to acquire an extended matrix Ni with size r × t by using Equation (10):
N i ( x , : ) = shiftVector ( N ( i , : ) , x ) ,   1     x     r   and   1     i     n ,
where the function s h i f t V e c t o r ( V , x ) circularly shifts the vector V to x positions.
4.
Exchange rows of N i to acquire exchanged matrix N i :
N i = exchangeRows ( N i , b ) ,
where the function e x c h a n g e R o w s ( A , b ) randomly permutes matrix A on rows by the seed b.
5.
Extend the matrix N i to fit the sizes of secret image for obtaining sharing matrix P i :
P i = repeatMatrix ( N i , w ) ,     w = c t , i = 1 , 2 , , n ,
where the function repeatMatrix(A,w) duplicates the A matrix w times for acquiring the required size, which is the same size as the secret images.
Figure 2 shows sharing matrices generation step by step. Since the (k, n) thresholds are (3, 4), the generated binary vector M, as shown in Figure 2a, is 4 × 1 and 2 of these 4 elements are 1, as denoted in Step 1 of Equation (8). Figure 2b shows the generated initial matrix N, as defined in Step 2 and Equation (9). Figure 2c–e shows a series of extended matrix N1, exchanged matrix N 1 , and sharing matrix P 1 , respectively. These matrices are acquired from Steps 3–5. In Figure 2c, N1 is acquired from the first row of N with one position circular shift. Moreover, Figure 2f of N2 is acquired from the second row of N with one positioned circular shift.
Figure 3 shows the sharing strategy of the proposed algorithms. The input images Ii are processed to acquire temporary images Ei. On the other hand, sharing matrices Pi are calculated from thresholds (k, n), as introduced in Equations (8)–(12). At last, shared images Sj are acquired from temporary images Ei and sharing matrices Pi.

3.2. The Proposed (k, n, m) Source-Random-Mixed (SRM) Algorithm

This section shows our first proposed (k, n, m) SRM sharing algorithm, in which m secret images with identical size are shared among n shared images and collecting k shared images perfectly recover these n secret images. Assume all the secret images are denoted by Ii(1 ≤ i ≤ m) with the same size r × c, and the generated shared images are Sj(1 ≤ j ≤ n). The sharing matrices introduced in Section 3.1 are needed in the proposed sharing and recovery algorithms. Figure 4 shows the proposed SRM sharing steps and the proposed SRM sharing algorithm is introduced as follows.
1.
Apply m secret images Ii (1 ≤ i ≤ m) to XOR operation for acquiring IXOR by Equation (13):
I XOR   = I 1 I 2 I m ,
where   denotes bit-based XOR operation.
2.
Generate a random image R by Equation (14):
h = hash ( I XOR ) , R = image _ synthesis ( h , r , c ) ,
where the hash() is performed by SHA-256 hash function and the image_synthesis(h,r,c) synthesizes a randomlike image with size r × c from the seed h.
3.
Generate a series of randomlike images Ri (1 ≤ i ≤ m) from Equation (15):
R i = pixel _ shift ( R , i ) , 1     i     m ,
where pixel_shift(R,i) right circularly shifts the image R with i pixels.
4.
A series of temporary images Ei (1 ≤ i ≤ m) are acquired from Ii and Ri by Equation (16):
E i =   { I 1 R 1 R 2 ,                         i   =   1 , I 2 R 2 R 3 ,                         i   =   2 , I 3 R 3 R 4 ,                         i   =   3 ,                                                                                           I m   -   1 R m   -   1 R m ,                 i   =   m   -   1 , I m R m R 1 ,                   i   =   m .
5.
Based on (k, n) thresholds, generate sharing matrix Pj (1 ≤ jn) from Equations (8)–(12).
6.
Calculate initial shared images Sji by images Ei (1 ≤ im) and Pj (1 ≤ jn), which is defined as:
S j i ( x , y ) = { E i ( x , y ) ,     i f   P j ( x , y ) = 1 , 0 , i f   P j ( x , y ) = 0 ,
where the number and size of S j i are m × n and r × c, respectively.
7.
Obtain shared images Sj (1 ≤ jn) by concatenating initial shared images Sji(1 ≤ Im), as shown in Equation (18):
S j = [ S j 1 S j 2 S j m ] .
At last, the size of Sj is m × (r × c).
Figure 5 shows a shared image example of (3, 4, 5) thresholds. In the proposed (3, 4, 5) SRM sharing method, 5 secret images are shared to 4 shared images and collecting 3 shared images perfectly recovers these 5 secret images. Figure 5a–e shows 5 secret images and Figure 5f shows one of shared image S 1 , which is a concatenation of 5 initial shared images S 1 1 ~ S 1 5 as virtually segmented by dotted lines.
The recovery algorithm requires k shared images with the same size m × r × c. The proposed recovery algorithm of SRM is introduced as follows.
  • Collect k shared images and denote them by S1, S2, …, Sk.
  • Separate all collected shared images Si(1 ≤ ik) to recovered shared images Sij(1 ≤ jm) with size r × c.
  • Check all entries (k, l)(1 ≤ jk, 1 ≤ lc) among the images Sij(1 ≤ jk) to acquire the temporary image S j r e ( 1 j m ) . For the entry (k, l) with one of the pixel S i j ( k , l ) 0 , assign S j r e ( k , l ) by the value of S i j ( k , l ) . If all values in the entry (k, l) are 0, then assign S i j ( k , l ) by 0.
  • Acquire the temporary image I X O R r e by Equation (19):
I XOR re = S 1 re S 2 re S m re .
5.
Apply I X O R r e to Equation (14) for acquiring the random image R r e .
6.
Apply R r e to Equation (15) for acquiring randomlike images R i r e (1 ≤ im).
7.
Apply S i r e and R i r e to Equation (20) for obtaining recovered secret images I i r e :
I i r e   =   { S 1 r e R 1 r e R 2 r e ,               i   =   1 , S 2 r e R 2 r e R 3 r e ,                 i   =   2 , S 3 r e R 3 r e R 4 r e ,               i   =   3 ,                                         S m   -   1 r e R m   -   1 r e R m r e ,     i   =   m   -   1 , S m r e R m r e R 1 r e ,               i   =   m ,
After applying the above recovery algorithm by k correct shared images, the recovered secret images I i r e (1 ≤ im) are consistent with the original secret images. For the recovery of less than k correct shared images, all randomlike images are acquired. Moreover, in Step 3, the nonzero values of all S i j (k,l)(1 ≤ ik) should be consistent when no malicious attacks on shared images are applied.
Furthermore, the proposed SRM method assigns 0 to pixels of shared images when the corresponding coordinates of the sharing matrix are 0, as shown in Equation (17). Therefore, each shared image appears dark, as shown in Figure 5f.

3.3. The Proposed (k, n, m) Source-Random-Separate (SRS) Algorithm

This section introduces our second proposed (k, n, m) source-random-separate (SRS) algorithm. The sharing matrices introduced in Section 3.1 are also needed in the proposed sharing and recovery algorithms. Figure 6 shows the proposed SRS sharing steps, and the proposed SRS sharing algorithm is introduced as follows.
  • Apply m secret images Ii(1 ≤ im) to XOR operation for acquiring IXOR by Equation (13).
  • Generate a randomlike image Z with size r × c by the function image_synthesis(b,r,c) defined in Equation (14). The seed b is the same seed as used to generate the exchanged matrix in Equation (11).
  • Apply the XOR operation between IXOR and Z to acquire the randomlike image S R 0 by Equation (21):
SR 0 = I XOR Z .
4.
Based on (k, n) thresholds, generate sharing matrix Pj(1 ≤ jn) by Equations (8)–(12).
5.
Use Equation (22) to calculate images SRj(1 ≤ jn) by sharing matrix Pj.
S R j ( x , y ) = { S R 0 ( x , y ) ,               i f   P j ( x , y ) = 1 , r a n d i ( 255 ) ,       i f   P j ( x , y ) = 0 ,
where j ranges between 1 and n, and randi(255) acquires a random integer between 0 and 255.
6.
Apply IXOR and Equation (14) to generate the random image R.
7.
Generate a series of randomlike images Ri(1 ≤ im) from the random image R by Equation (15).
8.
Apply Ii and Ri by Equation (16) to obtain encrypted images Ei(1 ≤ im).
9.
Randomly select m columns from the initial matrix N in Equation (9) to acquire matrix Npart, i.e.,
N part = randSelect ( N , m , h ) ,
where h is acquired from Equation (14) and matrix N is acquired from Equations (8) and (9) with size n × m.
10.
Use Equation (24) to acquire share E j i by the matrix value of Npart:
E j i = { E i ,                     i f   N p a r t ( j ,   i ) = 1 , ,     i f   N p a r t ( j , i ) = 0 ,
where two coordinates i and j are ranged as 1 i m and 1 j n .
11.
Concatenate SRj and E j i (1 ≤ im) to acquire shared images Sj, i.e.,
S j = SR j E j 1   E j m .
Figure 6. Processes of the second proposed source-random-separate (SRS) algorithm.
Figure 6. Processes of the second proposed source-random-separate (SRS) algorithm.
Axioms 11 00197 g006
The proposed SRS method shares XOR result IXOR and the randomlike images Ri(1 ≤ im) with secret images Ii (1 ≤ im) separately. Especially, in Step 10, the images E i are selected according to the N p a r t matrix. Assume in the proposed (3, 4, 5) SRS method with the encrypted images Ei(1 ≤ i ≤ 5) and the matrix N p a r t = [ 1 0 1 0 0 1 0 0 1 1 0 1 0 1 0 0 1 1 0 1 ] ,   the concatenation of images E i is acquired from the matrix element of N p a r t . In the first row, the 1st and 3rd elements being 1 leads to share E 1 i ( 1 i     5 ) = { E 1 , , E 3 , , } . From the Npart matrix, we can also acquire shares E 2 i = { E 1 , , , E 4 , E 5 } ,   E 3 i = { , E 2 , , E 4 , } ,   and E 4 i = { , E 2 , E 3 , , E 5 } . Therefore, gathering 3 shares among E j i ( 1 j 4 ) acquires all E i ( 1 i 5 )   for the further recovery processing. Furthermore, size of the shared images is determined by the number of elements containing 1 in each row of the N p a r t matrix. Therefore, size of shared image S j is t × r × c, in which t is equal to 1 + | N p a r t j | and | N p a r t j | denoted number of elements with 1 in the j rows of matrix N p a r t .
The recovery algorithm of the proposed (k, n, m) SRS is introduced as follows.
  • Collect k shared images and denote them by Sj(1 ≤ jk).
  • Extract each shared image S j with size r × c to acquire SRj(1 ≤ jk).
  • Generate an initial matrix N and sharing matrix P j ( 1 j k ) through Equations (8)–(12).
  • Generate a randomlike image Z with size r × c by the function image_synthesis(b,r,c) defined in Equation (14), in which the seed b is the same seed as used to generate the exchanged matrix in sharing matrix generation step of Equation (11).
  • Use Equation (26) to acquire S R 0 :
SR 0 ( x , y ) = SR j ( x , y ) ,   if   P j ( x , y ) = 1 ,
where 1 x r ,   1 y c   and   1 j k .
6.
Apply XOR operation between the S R 0 and the randomlike image Z to acquire random image IXOR, i.e.,
I XOR = SR 0 Z .
7.
Apply Equations (14) and (15) with IXOR to acquire h, R, and R j ( 1 i m ) .
8.
Apply the initial matrix N and coefficient h with Equation (23) to acquire the matrix Npart.
9.
Split the remaining shared image S j in Step 2 to groups of r × c matrices and assign each r × c share to E j i ( 1 i m ) by Equation (28):
E j i = { new   r × c   matrix ,       i f   N p a r t ( j , i ) = 1 , ,                                                                   i f   N p a r t ( j , i ) = 0 .
10.
Replace E i by extracting the nonempty r × c matrix to share E j i ( 1 j k ) . Moreover, two nonempty elements among r × c share E j 1 i ,   and   E j 2 i ( j 1 j 2 ) should be identical.
11.
Apply E i and R i to Equation (29) for covering the secret images I i r e ( 1 i m ) , i.e.,
I i re = { E 1 R 1 R 2 ,           i = 1 , E 2 R 2 R 3 ,           i = 2 , E 3 R 3 R 4 ,             i = 3 ,         E m   -   1 R m   -   1 R m ,           i = m   -   1 , E m R m R 1 ,           i = m .
In Step 10, if two nonempty r × c sharing E j 1 i   and   E j 2 i ( j 1 j 2 ) are not identical, at least one of the r × c shares E j 1 i   or   E j 2 i is maliciously modified.

3.4. Examples of Sharing and Recovery of the Proposed SRS with Thresholds (2, 3, 2)

In this section, examples of the (2, 3, 2) SRS sharing and recovery processes are introduced. The first way is to generate sharing matrix by the predefined (2, 3, 2) thresholds as follows.
  • Use Equation (8) to generate matrix M = [ 0 1 1 ] by threshold k = 2, n = 3.
  • Apply matrix M to Equation (9) for acquiring matrix N, i.e.,
N = [ 0 1 1 1 0 1 1 1 0 ]
3.
Acquire matrices N1, N2, and N3 by applying matrix N to Equation (10), i.e.,
N 1 = [ 1 0 1 1 1 0 0 1 1 1 0 1 ] 256 × 3 , N 2 = [ 1 1 0 0 1 1 1 0 1 1 1 0 ] 256 × 3 , N 3 = [ 0 1 1 1 0 1 1 1 0 0 1 1 ] 256 × 3
4.
Acquire exchanged matrix N 1 ,   N 2 , and   N 3 by applying matrices N i ( 1 i 3 ) to Equation (11), i.e.,
N 1 = [ 0 1 1 1 0 1 0 1 1 1 1 0 ] ,   N 2 = [ 1 0 1 1 1 0 1 0 1 0 1 1 ] , N 3 = [ 1 1 0 0 1 1 1 1 0 1 0 1 ]
5.
Acquire sharing matrices P1, P2, and P3 by applying matrices N i ( 1 i 3 ) to Equation (12):
P 1 = [ 0 1 1 0 1 1 1 0 1 1 0 1 0 1 1 0 1 1 1 1 0 1 1 0 ] 256 × 258 ,   P 2 = [ 1 0 1 1 0 1 1 1 0 1 1 0 1 0 1 1 0 1 0 1 1 0 1 0 ] 256 × 258 , P 3 = [ 1 1 0 1 1 0 0 1 1 0 1 1 1 1 0 1 1 0 1 0 1 1 0 1 ] 256 × 258 .
Figure 7 shows an example of the proposed SRS method with thresholds (2, 3, 2). In the proposed (2, 3, 2) method, 2 secret images are shared among 3 shared images with XOR operations and gathering 2 of these 3 shared images perfectly recover these 2 secret images. Figure 7a,b shows two secret images with size 256 × 256 and Figure 7c,d shows two encrypted images in Step 8 of sharing algorithm. Figure 7e–g shows three generated shared images with size 256 × 512, 256 × 512, 256 × 768, respectively. The recovery of acquiring two secret images should collect 2 shared images. Applying Figure 7e,f to the proposed recovery algorithm acquires 2 secret images, as shown in Figure 7a,b.
The sharing processes of the proposed (2, 3, 2) SRS method is introduced as follows.
  • Apply secret images I 1 and I 2 to Equation (13) for obtaining I X O R .
  • Generate randomlike image Z by Equation (14).
  • Generate randomlike image S R 0 by Equation (21).
  • Generate the sharing matrices Pi(1 ≤ i ≤ 3) above by thresholds (2, 3, 2) with size 256 × 256 by Equations (8)–(12).
  • Applying S R 0 and P i ( 1 i 3 ) to Equation (22) acquires S R i ( 1 i 3 ) .
  • Apply I X O R and Equation (14) to generate the random image R .
  • Generate randomlike images R 1 and R 2 from the random image R by Equation (15).
  • Apply I 1 ,   I 2 and R 1 ,   R 2 by Equation (16) to obtain encrypted images E 1 ,   E 2 , as shown in Figure 7c,d, respectively.
  • Randomly select two columns of N = [ 0 1 1 1 0 1 1 1 0 ] to acquire matrix N p a r t = [ 0 1 1 0 1 1 ] .
  • Apply N p a r t and E 1 , E 2 to Equation (24) to generate E 1 i = { , E 2 } , E 2 i = { E 1 , } ,   E 3 i = { E 1 , E 2 } .
  • Acquire shared images by S 1 = [ S R 1 E 2 ] , S 2 = [ S R 2 E 1 ] , S 3 = [ S R 3 E 1 E 2 ] , as shown in Figure 7e–g, respectively.
The recovery processes of the proposed (2, 3, 2) SRS method is introduced as follows.
  • Collect two shared images S1 and S2.
  • Extract SR1, SR2 from S1, S2 with size of 256 × 256.
  • Generate the initial matrix N = [ 0 1 1 1 0 1 1 1 0 ] and sharing matrix P1, P2, P3 from Equations (8)–(12).
  • Generate a randomlike image Z with size r × c by Equation (14).
  • Use Equation (26) with P1, P2 and SR1, SR2 to recover S R 0 .
  • Use Equation (27) with SR0 and Z to acquire IXOR.
  • Apply Equations (14) and (15) with IXOR to acquire R1 and R2.
  • Acquire the matrix N p a r t = [ 0 1 1 0 1 1 ] .
  • Assign the remaining part of shared images S1 and S2 to E1 and E2, respectively.
  • Apply Equation (29) with R1, R2 and E1, E2 to recover secret images I1, I2.

4. Experimental Results and Discussions

This section demonstrates the experimental results of our proposed (k, n, m) approach. Section 4.1 presents experimental results of the proposed approach with different thresholds and recovery of attacked shared images. All experiments are performed on a PC with an Intel i7-4720HQ CPU, and 16 G RAM, using MATLAB 9.10 software. The size of all secret images is 256 × 256. Section 4.2 presents the performance of the proposed approach with comparing other multiple secret image sharing methods.

4.1. Experimental Results

Figure 8 and Figure 9 show the experimental results of two proposed schemes, the SRM and SRS methods, by sharing with thresholds (k, n, m) = (3, 4, 5) for sharing 5 secret images among 4 shared images and collecting 3 shared images that perfectly recover these 5 secret images. Figure 8 shows the results of our SRM method presented first. Figure 8a–e shows the 5 secret images: Lenna, Baboon, House, Cameraman, and Barbara with size 256 × 256. Figure 8f–i shows 4 shared images with size 256 × 1280, in which each shared image is the combination of five parts for every secret image with size 256 × 256. Therefore, the size of the shared images is proportional to the number of secret images as 5 times 256 × 256 in this example. Two kinds of recovered secret images are provided. Figure 8j–n shows 5 recovered secret images from Figure 8f–h, and Figure 8o–s shows 5 recovered secret images from the Figure 8f,g collection. Figure 8f–h fits the recovery threshold k = 3 for perfectly acquiring the images in Figure 8j–n that are identical to the original secret images. However, the collection shown in Figure 8f,g cannot satisfy the recovery threshold k = 3 and the recovered secret images all appear as noise images because of the failed acquisition of I X O R r e in Equation (19). Moreover, the proposed SRM method uses a sharing matrix to assign part of pixels in shared images to 0, as defined in Equation (17). Therefore, the shared images all appear darker than the random images. Moreover, because of the large usage of 0 pixels, some kinds of regularity can also be found.
Figure 9 shows the results of our second proposed SRS method. Figure 9a–e shows the same 5 secret images with size 256 × 256. Figure 9f–i shows 4 shared images of the parameter b = 1 in step 2 of sharing algorithm and generating matrix of size 4 × 5 as N p a r t = [ 1 0 1 0 0 0 1 0 1 0 0 0 1 1 1 1 1 0 0 1 ] in Equation (23). The first and third elements in the first row of the matrix N p a r t exhibit the element 1 and it leads the shares of E 1 and E 3 as defined in Equation (24). These two shares with the sharing of S R 1 lead to the shared image with a size that is three times that of the secret image. Therefore, the first shared image is shown in Figure 9f with the size 256 × 768, which is three times the secret image size 256 × 256. Moreover, the third row of N p a r t leads to the share of E 3 , E 4 , and E 5 that are needed. Consequently, four times the secret image size is obtained, as shown in Figure 9h, with the size 256 × 1024. Therefore, sizes of shared images are according to the number of elements with 1, as shown in Figure 9f–i, being 256 × 768, 256 × 768, 256 × 1024, and 256 × 1024, respectively. In the recovery process, collecting k = 3 number of shared images is needed for perfect recovery. Collecting shared images shown in Figure 9f–h recovers the reconstructed images, as shown in Figure 9j–n. The collected shared images less than k, as shown in Figure 9g,i, recover the reconstructed images, as shown in Figure 9o–s, in which all recovered images appear as noise images.
Table 1 shows the computation time of the two proposed schemes, SRM and SRS, among three different thresholds. The two proposed XOR-based schemes require limited CPU computation time, and the performances of the proposed schemes are exhibited. Moreover, the computation complexities between the two proposed schemes, SRM and SRS, are different. In our first proposed SRM method, the complexity of the sharing and recovery algorithms are O(nm) and O(km), respectively. Furthermore, the sharing and recovery complexities of our second SRS method are O(n) and O(k), respectively.
Since our second proposed SRS method outperforms our first proposed SRM method in both less computation time and smaller size of shared images, more experimental results for our second proposed SRS method are illustrated. Figure 10 shows experimental results of the proposed (3, 5, 3) SRS method by the shared images with homogeneous regions. Figure 10a–c are three generated secret images, which are constructed by simple color regions with size 256 × 256. The generated N p a r t is defined by [ 0 0 1 1 1 0 1 0 1 1 1 1 0 1 0 ] with size 5 × 3, the size that is determined by n × m under thresholds (k, n, m). From definition of the first row in N p a r t , the first shared image, shown in Figure 10d, includes the random image S R 1 and one share of the third secret image from Figure 10c. Therefore, the size of the first shared image is twice the secret images at 256 × 512. Moreover, Figure 10e shows the second shared image of the combination of the random image S R 2 and two shares of the first and the second secret images from Figure 10a,b, respectively. Therefore, the size of the second shared image is three times that of the secret images at 256 × 768. At last, the fourth shared image, shown in Figure 10g with size 256 × 1024, includes the random image S R 4 and three shares of the first, second, and third secret images from Figure 10a–c, respectively. Therefore, three different kind of sizes are found in the proposed (3, 5, 3) SRS method, as shown in Figure 10d–h, and these shared images all exhibit randomlike images. Two kinds of recovery results are also provided. Figure 10i–k are the recovered secret images from Figure 10d–f. Figure 10l–n are the recovered secret images from Figure 10g,h. Since the collected number of shared images is less than threshold k, the recovered secret images are all noiselike images that exhibit the threshold recovery property of our proposed scheme.
Figure 11 shows the recovery results of applying attacks on shared images of homogeneous secret images. Figure 11a–e exhibit five shared images, which are the same as Figure 10d–h as the shared images of Figure 11a–c. Figure 11f shows a malicious attack result on Figure 11a by replacing one small black block in the left area. Figure 11g–i shows the recovered shared image from Figure 11a–c. The recovery of Figure 11b,c,f is shown in Figure 11j–l, which shows that any attack leads to false recovery because of the incorrect random image generated. Therefore, security of the proposed scheme is identified.

4.2. Comparison and Discussion

This section compares the proposed method with other stacking or XOR-based secret image sharing methods. The comparison metrics include lossless recovery or not, recovery strategy, sharing threshold, multiple sharing or not, and sharing capacity. The stacking-based schemes generate visual similarity on recovered secret images. Therefore, only stacking-based schemes are not lossless recovery and other XOR-based methods can recover without loss all secret images. In sharing thresholds, the method of Kabirirad and Eslami [24] satisfies restrictively consecutive k shared images and only adopt sharing matrix strategies that satisfy the general (k, n) threshold property with k n . Other methods, such as stacking-based or XOR-based, only have (2, 2) or (n, n) thresholds. It should be noted that many related methods cannot solve the way to construct multi-secret image sharing with general (k, n) thresholds; however, the proposed multiple sharing property exhibits the structure of sharing several secret images simultaneously. In a Boolean-based (n, n) secret image sharing method, all the secret and shared images are the same size. The sharing capacity is the measurement of dividing the number of secret images by the number of shared images required to recover secret images. Therefore, in a Boolean-based (k, n) secret image sharing method, the sharing capacity is extended to dividing the size of secret images by the size of shared images required to recover secret images. Large sharing capacity means smaller shared image acquired. The sharing capacities of the proposed SRM method and SRS method are 1 k and n i = 1 k u i + 1 with u i < n, respectively. Furthermore, the value u i is determined by the matrix N p a r t as the number of elements with 1 in the corresponding row.
Table 2 shows that the proposed SRM and SRS methods are the only XOR and sharing matrix-based methods that can perform (k, n) thresholds on multiple sharing with good sharing capacity.
Table 3 shows an example of sharing capacity comparisons between the two proposed methods and other related methods. Since some conventional methods [6,12,13,15,16,17,18,21] only have the (n, n) thresholds; therefore, these methods are restricted to (2, 2) and (3, 3) sharing capacities. Moreover, only Bao et al. [20] and our two proposed methods satisfy the requirement of (k, n) thresholds. Therefore, these three methods have (2, 3) and (3, 4) sharing capacities. Although the method of Bao et al. [20] can only share one image secretly, its sharing capacity is higher because of adopting an encryption method during the sharing process. Finally, the two proposed schemes are the only methods for sharing multiple images secretly. Moreover, the proposed SRS method outperforms the proposed SRM method on more randomly shared images and better sharing capacity.

5. Conclusions

In this study, our contribution is a novel framework that can share m secret images among n participants, and gathering k participants’ shared images perfectly recover these m secret images. We propose two XOR-based (k, n, m) multi-secret image sharing schemes. The first is the source-random-mixed (SRM) method, which mixes the random image and secret images to generate shares for each secret image. The second is the source-random-separate (SRS) method, which separates the random image and secret images for constructing the shares for each secret image. Both of the proposed schemes reach the general (k, n) threshold by the usage of a sharing matrix, which is a popular property in mathematical-calculation-based methods such as the Shamir–Lagrange-based method. The proposed schemes have the properties of lossless recovery on collecting k shared images and no useful information acquired on collecting less than k shared images. The proposed schemes outperform other multiple sharing methods on the sharing rate of larger than or equal to 1. Therefore, these two proposed schemes exhibit good improvements on sharing multiple secret images through (k, n) thresholds by using XOR and a sharing matrix based Boolean operations.
In this study, we propose two efficient XOR-based (k, n, m) multi-secret image sharing schemes; however, there are several challenges and limitations to the proposed approach. First, the size of all the secret images used in the proposed approach must be equal, the multiple shared images generated are affected by the randomly generated matrix, and the sizes of each shared image are likely to be different. Second, the performance is relatively low compared to the secret image sharing method that simply uses Boolean operations. Based on these challenges and limitations, how to improve our proposed SRS method to identical size and how to apply the proposed approach in various actual applications, such as share authentication [28,29] and e-voting [30], merit our future study.

Author Contributions

Conceptualization, C.-S.L. and C.-C.C.; methodology, C.-C.C.; validation,C.-S.L., C.-C.C. and J.-Z.C.; formal analysis, C.-S.L. and C.-C.C.; investigation, J.-Z.C.; writing—original draft preparation, writing—review and editing, C.-S.L., C.-C.C. and J.-Z.C.; All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by Ministry of Science and Technology, Taiwan, Republic of China under Grants MOST-110-2221-E-032-027 and MOST-110-2221-E-032-032.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chanu, O.B.; Neelima, A. A survey paper on secret image sharing schemes. Int. J. Multimed. Inf. Retr. 2019, 8, 195–215. [Google Scholar] [CrossRef]
  2. Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
  3. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  4. Ulutas, M.; Ulutas, G.; Nabiyev, V.V. Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 2013, 86, 485–500. [Google Scholar] [CrossRef]
  5. Wu, X.; Ou, D.; Liang, Q.; Sun, W. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 2012, 85, 1852–1863. [Google Scholar] [CrossRef]
  6. Wang, D.; Zhang, L.; Ma, N.; Li, X. Two secret sharing schemes based on Boolean operations. Pattern Recognit. 2007, 40, 2776–2785. [Google Scholar] [CrossRef]
  7. Kabirirad, S.; Eslami, Z. Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. J. Inf. Secur. Appl. 2019, 47, 16–27. [Google Scholar] [CrossRef]
  8. Dhara, B.C.; Chanda, B. A fast progressive image transmission scheme using block truncation coding by pattern fitting. J. Vis. Commun. Image Represent. 2012, 23, 313–322. [Google Scholar] [CrossRef]
  9. Fang, W.-P. Friendly progressive visual secret sharing. Pattern Recognit. 2008, 41, 1410–1414. [Google Scholar] [CrossRef]
  10. Huang, C.-P.; Hsieh, C.-H.; Huang, P.S. Progressive sharing for a secret image. J. Syst. Softw. 2009, 83, 517–527. [Google Scholar] [CrossRef]
  11. Lin, S.-J.; Lin, J.-C. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit. 2007, 40, 3652–3666. [Google Scholar] [CrossRef]
  12. Chen, T.-H.; Wu, C.-S. Efficient multi-secret image sharing based on Boolean operations. Signal Process. 2011, 91, 90–97. [Google Scholar] [CrossRef]
  13. Chen, C.-C.; Wu, W.-J. A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 2014, 92, 107–114. [Google Scholar] [CrossRef]
  14. Wang, R.-Z.; Su, C.-H. Secret image sharing with smaller shadow images. Pattern Recognit. Lett. 2006, 27, 551–555. [Google Scholar] [CrossRef]
  15. Chen, J.; Chen, Y.S.; Hsu, H.C.; Chen, H.W. New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electron. Imaging 2005, 14, 033018-1–033018-5. [Google Scholar] [CrossRef]
  16. Shyu, S.J.; Huang, S.-Y.; Lee, Y.-K.; Wang, R.-Z.; Chen, K. Sharing multiple secrets in visual cryptography. Pattern Recognit. 2007, 40, 3633–3651. [Google Scholar] [CrossRef]
  17. Lin, S.-J.; Chen, S.-K.; Lin, J.-C. Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Represent. 2010, 21, 900–916. [Google Scholar] [CrossRef]
  18. Wu, H.-C.; Chang, C.-C. Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 2005, 28, 123–135. [Google Scholar] [CrossRef]
  19. Naor, M.; Shamir, A. Visual Cryptography. Proc. Int. Conf. Adv. Cryptol. 1995, 1–12. [Google Scholar]
  20. Bao, L.; Yi, S.; Zhou, Y. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing. IEEE Trans. Image Process. 2017, 26, 5618–5631. [Google Scholar] [CrossRef]
  21. Chen, C.-C.; Wu, W.-J.; Chen, J.-L. Highly efficient and secure multi-secret image sharing scheme. Multimed. Tools Appl. 2016, 75, 7113–7128. [Google Scholar] [CrossRef]
  22. Prasetyo, H.; Jing, G.J. A note on multiple secret sharing using Chinese remainder theorem and exclusive-or. IEEE Access 2019, 7, 37473–37497. [Google Scholar] [CrossRef]
  23. Chattopadhyay, A.K.; Ghosh, D.; Maitra, P.; Nag, A.; Saha, H.N. A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations. In Proceedings of the 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 8–10 November 2018; pp. 1025–1031. [Google Scholar]
  24. Kabirirad, S.; Eslami, Z. A(t,n)-multi secret image sharing scheme based on Boolean operations. J. Vis. Commun. Image Represent. 2018, 57, 39–47. [Google Scholar] [CrossRef]
  25. Bhattacharjee, T.; Maity, S.P.; Islam, S.R. Hierarchical secret image sharing scheme in compressed sensing. Signal Process. Image Commun. 2018, 61, 21–32. [Google Scholar] [CrossRef]
  26. Azza, A.A.; Lian, S. Multi-secret image sharing based on elementary cellular automata with steganography. Multimed. Tools Appl. 2020, 79, 21241–21264. [Google Scholar] [CrossRef]
  27. Chen, T.-H.; Wu, X.-W. Multiple secret image sharing with general access structure. Multimed. Tools Appl. 2020, 79, 13247–13265. [Google Scholar] [CrossRef]
  28. Yan, X.; Lu, Y.; Yang, C.-N.; Zhang, X.; Wang, S. A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 2020, 31, 2896–2908. [Google Scholar] [CrossRef]
  29. Jiang, Y.; Yan, X.; Qi, J.; Lu, Y.; Zhou, X. Secret image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics 2020, 8, 234. [Google Scholar] [CrossRef] [Green Version]
  30. Li, J.; Wang, X.; Huang, Z.; Wang, L.; Xiang, Y. Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J. Parallel Distrib. Comput. 2019, 130, 91–97. [Google Scholar] [CrossRef]
Figure 1. A sharing matrix example of (3, 4) thresholds with 4 × 6 matrix size.
Figure 1. A sharing matrix example of (3, 4) thresholds with 4 × 6 matrix size.
Axioms 11 00197 g001
Figure 2. An example of (3, 4) thresholds sharing matrix generation method size 256 × 256: (a) binary vector M, (b) initial matrix N, (c) extended matrix N1, (d) exchanged matrix N 1 , (e) sharing matrix P 1 , (f) extended matrix N2, (g) exchanged matrix N 2 , (h) sharing matrix P2.
Figure 2. An example of (3, 4) thresholds sharing matrix generation method size 256 × 256: (a) binary vector M, (b) initial matrix N, (c) extended matrix N1, (d) exchanged matrix N 1 , (e) sharing matrix P 1 , (f) extended matrix N2, (g) exchanged matrix N 2 , (h) sharing matrix P2.
Axioms 11 00197 g002
Figure 3. Sharing strategy of the proposed two algorithms.
Figure 3. Sharing strategy of the proposed two algorithms.
Axioms 11 00197 g003
Figure 4. Processes of the first proposed source-random-mixed (SRM) sharing algorithm.
Figure 4. Processes of the first proposed source-random-mixed (SRM) sharing algorithm.
Axioms 11 00197 g004
Figure 5. Example of generated shared image by (3, 4, 5) thresholds: (ae) secret images, (f) the generated shared image S1.
Figure 5. Example of generated shared image by (3, 4, 5) thresholds: (ae) secret images, (f) the generated shared image S1.
Axioms 11 00197 g005
Figure 7. A sharing example of the proposed (2, 3, 2) SRS method: (a,b) two secret images, (c,d) two encrypted images, (eg) shared images, (h,i) the recovered images from (e,f).
Figure 7. A sharing example of the proposed (2, 3, 2) SRS method: (a,b) two secret images, (c,d) two encrypted images, (eg) shared images, (h,i) the recovered images from (e,f).
Axioms 11 00197 g007
Figure 8. Results of the first proposed (3, 4, 5) SRM method. (ae): 5 secret images with size 256 × 256; (fi): 4 shared images with size 256 × 1280; (jn): 5 recovered secret images from (fh); (os): 5 recovered secret images from (f,g).
Figure 8. Results of the first proposed (3, 4, 5) SRM method. (ae): 5 secret images with size 256 × 256; (fi): 4 shared images with size 256 × 1280; (jn): 5 recovered secret images from (fh); (os): 5 recovered secret images from (f,g).
Axioms 11 00197 g008
Figure 9. Results of the second proposed (3, 4, 5) SRS method. (ae): 5 secret images with size 256 × 256; (fg): 2 shared images with size 256 × 768; (h,i): 2 shared images with size 256 × 1024; (jn): 5 recovered secret images from (fh); (os): 5 recovered secret images from (g,i).
Figure 9. Results of the second proposed (3, 4, 5) SRS method. (ae): 5 secret images with size 256 × 256; (fg): 2 shared images with size 256 × 768; (h,i): 2 shared images with size 256 × 1024; (jn): 5 recovered secret images from (fh); (os): 5 recovered secret images from (g,i).
Axioms 11 00197 g009
Figure 10. Results of the second proposed (3, 5, 3) SRS method. (ac): secret images with size 256 × 256; (d): the first shared image with size 256 × 512; (e,f): the second and third shared images with size 256 × 768; (g): the fourth shared image with size 256 × 1024; (h): the fifth shared image with size 256 × 512; (ik): recovered secret images from (df); (ln): recovered secret images from (g,h).
Figure 10. Results of the second proposed (3, 5, 3) SRS method. (ac): secret images with size 256 × 256; (d): the first shared image with size 256 × 512; (e,f): the second and third shared images with size 256 × 768; (g): the fourth shared image with size 256 × 1024; (h): the fifth shared image with size 256 × 512; (ik): recovered secret images from (df); (ln): recovered secret images from (g,h).
Axioms 11 00197 g010
Figure 11. Results of the recovery of attacked shared images in the proposed (3, 5, 3) SRS method. (ae): 5 shared images as in Figure 10d–h; (f) maliciously attacked shared image of (a); (gi): 3 recovered secret images from (ac); (jl): 3 recovered secret images from (f,b,c).
Figure 11. Results of the recovery of attacked shared images in the proposed (3, 5, 3) SRS method. (ae): 5 shared images as in Figure 10d–h; (f) maliciously attacked shared image of (a); (gi): 3 recovered secret images from (ac); (jl): 3 recovered secret images from (f,b,c).
Axioms 11 00197 g011
Table 1. Performance of sharing and recovery procedures at different thresholds.
Table 1. Performance of sharing and recovery procedures at different thresholds.
ThresholdsSharing Computation Time (s)Recovery Computation Time (s)
(k, n, m)SRMSRSSRMSRS
(2, 3, 4)1.1232220.3774840.4194780.333834
(3, 4, 5)1.8738110.5213640.5834520.415034
(3, 5, 3)1.2227630.5399600.3746550.332443
Table 2. Comparisons between the two proposed approaches and related multiple secret image sharing methods.
Table 2. Comparisons between the two proposed approaches and related multiple secret image sharing methods.
Lossless RecoveryRecovery StrategySharing ThresholdMultiple SharingSharing Capacity
Wu et al. [18]NoStacking(2, 2)No 2 2 × 4
Chen et al. [15]NoStacking(2, 2)Yes n 2 × 4
Shyu et al. [16]NoStacking(2, 2)Yes n 2 × ( 2 × n )
Lin et al. [17]NoStacking(2, 2)Yes 2 2
Wang et al. [6]YesXOR(n, n)No 1 n
Chen and Wu [12]YesXOR(n, n)Yes n 1 n
Chen and Wu [13]YesXOR(n, n)Yes n n
Chen et al. [21]YesXOR(n, n)Yes n n
Bao et al. [20]Yessharing matrix(k, n)No 2 k
Prasetyo and Jing [22]YesChinese remainder theorem(n, n)Yes n n
Chattopadhyay et. al. [23]YesXOR(n, n)Yes n n
Kabirirad and Eslami [24]YesXORConsecutive
(k, n)
Yes n n
Our proposed SRM methodYesXOR with sharing matrix(k, n)Yes 1 k
Our proposed SRS methodYesXOR with sharing matrix(k, n)Yes n i = 1 k u i + 1
Table 3. Sharing capacity comparisons among the proposed approaches and related multiple secret image sharing methods.
Table 3. Sharing capacity comparisons among the proposed approaches and related multiple secret image sharing methods.
Recovery Quality(2, 2) Sharing Capacity(2, 3) Sharing Capacity(3, 3) Sharing Capacity(3, 4) Sharing Capacity
Wu et al. [18]recognizable 0.25 ×
Chen et al. [15]recognizable 0.375 0.5
Shyu et al. [16]recognizable 0.25 0.25
Lin et al. [17]recognizable 1 ×
Wang et al. [6]100% 0.33 0.25
Chen and Wu [12]100% 0.66 0.75
Chen and Wu [13]100% 1 1
Chen et al. [21]100% 1 1
Bao et al. [20]100% 1 0.66
Our proposed SRM method100% 0.5 0.33
Our proposed SRS method100% 0.5 0.38
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Chen, C.-C.; Lin, C.-S.; Chen, J.-Z. Boolean-Based (k, n, m) Multi-Secret Image Sharing. Axioms 2022, 11, 197. https://doi.org/10.3390/axioms11050197

AMA Style

Chen C-C, Lin C-S, Chen J-Z. Boolean-Based (k, n, m) Multi-Secret Image Sharing. Axioms. 2022; 11(5):197. https://doi.org/10.3390/axioms11050197

Chicago/Turabian Style

Chen, Chien-Chang, Cheng-Shian Lin, and Jia-Zhan Chen. 2022. "Boolean-Based (k, n, m) Multi-Secret Image Sharing" Axioms 11, no. 5: 197. https://doi.org/10.3390/axioms11050197

APA Style

Chen, C. -C., Lin, C. -S., & Chen, J. -Z. (2022). Boolean-Based (k, n, m) Multi-Secret Image Sharing. Axioms, 11(5), 197. https://doi.org/10.3390/axioms11050197

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop