Abstract
Most of today’s secret image sharing (SIS) schemes are based on Shamir’s polynomial-based secret sharing (SS), which cannot recover pixels larger than 250. Many exiting methods of lossless recovery are not perfect, because several problems arise, such as large computational costs, pixel expansion and uneven pixel distribution of shadow image. In order to solve these problems and achieve perfect lossless recovery and efficiency, we propose a scheme based on matrix theory modulo 256, which satisfies and thresholds. Firstly, a sharing matrix is generated by the filter operation, which is used to encrypt the secret image into n shadow images, and then the secret image can be obtained by matrix inverse and matrix multiplication with k or more shadows in the recovery phase. Both theoretical analyses and experiments are conducted to demonstrate the effectiveness of the proposed scheme.
1. Introduction
Shamir [1] and Blakley [2] proposed secret sharing (SS) in 1979, respectively. Due to the characteristics of the image, SS is applied to the image to achieve secret image sharing (SIS). A threshold SIS encrypts a secret image into n shadows (also called shares or shadow images) and distributes them among n participants, where any k or more shadows can reconstruct the secret while less than k shadows can obtain nothing of the secret. Unlike traditional encryption and information hiding, SIS has the feature of loss tolerance. SS has many application scenarios, such as access control, transmitting passwords, cloud computing security, block chain security, distributed storage system, etc. [3,4,5,6].
There are two primary branches in SIS, visual cryptography scheme (VCS) [7,8,9,10] and Shamir’s polynomial-based SIS scheme.
The original visual cryptography scheme was introduced by Naor and Shamir in 1995. The best advantage of VCS is that the secret image can be recovered by superposing shadows and human visual system (HVS) without cryptographic computation. It also has several drawbacks, such as lossy recovery and low visual quality of recovered images.
Original Shamir’s polynomial-based scheme is based on a -degree polynomial, whose constant coefficients are used to cover secret pixels. In the recovery phase, the secret image can be obtained by k or more shadows modulo 251 based on Lagrange interpolation. The modular arithmetic is in a Galois Field of . p is a prime number to ensure that each element in has a unique multiplicative inverse. Thien and Lin [11] applied original polynomial-based SS to an image for the first time, they employed all the coefficients of the polynomial for embedding secret, so the shadow size is reduced to times to the original image. However, because the adjacent pixels of the image are correlated, encryption must be performed before sharing to ensure that there is no information leakage in the shadow image, so this method permuted the pixels of the secret image before the sharing phase. Meanwhile, there is another disadvantage in their scheme that it cannot actually achieve lossless recovery, because the grayscale pixel value range is [0,255] and modulo 251 cannot cover it. Therefore, the pixel values of secret image between [251,255] are truncated as 250. Inspired by Thien and Lin’s research, some polynomial-based schemes [12,13] were proposed to obtain more features, such as meaningful shares [14], two-in-one recovery [15,16] and shares with different priorities [17]. The advantage of polynomial-based scheme is the secret can be recovered with high quality. Unfortunately, most polynomial-based SIS schemes suffer from lossy recovery.
To deal with lossy recovery and to obtain more features, the following polynomial-based schemes were therefore proposed [18,19,20]. In Thien-and-Lin’s scheme with lossless recovery [11], they divided a pixel larger than 250 into two parts and encrypted them separately, but it has the problem of random shape changes. When p is 257, it is possible that the shared value might be calculated as 256, but the maximum shadow pixel value is 255, so a part of the secret value is lost. Zhou et al. [21] mentioned a method to solve this problem with the help of a screening operation, which reperforms the sharing phase when the shared value is calculated as 256. However, the screening operation not only increases the calculation amount in the sharing phase but also results in uneven pixel distribution of shadow image. Some previous studies mentioned or used Galois Field , but they did not give a specific implementation and analysis, Gong et al. [22] first theoretically analyze and its arithmetic operations, and then achieved SIS with lossless recovery. As a result that polynomial multiplication suffered from high computational complexity, they decided to use table lookup to do the multiplication, but this increased the space usage.
To sum up, the existing lossless recovery schemes have problems such as pixel expansion, uneven pixel distribution of shadow image and large computational costs. In order to solve the above problems and achieve perfect lossless recovery and high efficiency, we conduct this research.
In this paper, a lossless and efficient threshold SIS scheme based on matrix theory is presented. Denote the integer space of modulo 256 by . We take the modulo as 256, ensuring that the elements in can one-to-one correspond to 256 pixel values, thus achieving lossless recovery. However, 256 is not a prime number, and there is no guarantee that all elements in have inverses, so Lagrange interpolation cannot be used in the recovery phase. Ding et al. [23] proved that Shamir’s sharing polynomial constructed by the Vandermonde matrix is only a special case of constructing a sharing polynomial satisfying threshold, therefore, we design our method from a broader perspective based on matrix theory. In the sharing phase, a sharing matrix is generated by a filter operation, which is used to encrypt the secret image into n shadows. The secret image can be reconstructed by matrix inverse and matrix multiplication with k or more shadows in the recovery phase. There is only one inversion operation in the whole process. Using matrix multiplication can also reduce the computational complexity of the recovery phase compared with Lagrange interpolation. Both theoretical analyses and experiments are conducted to demonstrate the effectiveness of the proposed scheme.
The rest of the paper is organized as follows. Section 2 introduces some preliminary techniques as the basis of the proposed scheme. The proposed SIS scheme is explicitly presented in Section 3. Furthermore, theoretical analyses are given in Section 4. Section 5 gives experimental results and analyses. Finally, the conclusions and our future work are drawn in Section 6.
2. Preliminaries
In this section, we introduce some previous studies as the basis for the proposed method. First, we introduce the implementation process of Shamir’s polynomial-based SS. Second we describe matrix method for polynomial-based SS. Then the common method solving inverse matrix is given.
The main notations used in this paper are as Table 1.
Table 1.
Notations and descriptions.
2.1. Shamir’s Polynomial-Based SS
Shamir’s polynomial-based SS for threshold generates secret data s into n pieces based on a -degree polynomial as Equation (1), in which , are assigned randomly in and p is a prime number greater than . All modulo operations are performed in a finite field of .
In the sharing phase, given n different random x, we can obtain n pieces by calculating and take as a secret pair, where i serves as an identifying index or an order label corresponding to the i-th participants. These n pairs are distributed to n participants.
In the recovery phase, given any k pairs of the n shared pairs , we can obtain the coefficients of by Lagrange interpolation as shown in Equation (2), and then .
Obviously, there are a large number of division operations in Lagrange interpolation, while all modular arithmetic is in a finite field in polynomial-based scheme and division operation must be converted to multiply the inverse. Therefore, p should be a prime to ensure that all elements in have multiplication inverses.
2.2. Matrix Method for Polynomial-Based SS
We mentioned Shamir’s polynomial-based SS in the previous subsection. In this subsection, we introduce the matrix method for polynomial-based SS. Without loss of generality, we can assume that the shared pairs are . Therefore, we have n equations as follows:
The above equation can be simplified as:
It has been proved that linear equations in Equation (3) and vector equation in Equation (5) is equivalent and K is a Vandermonde matrix [23], which has a property that the rank of any submatrix is k, that is, any k order submatrix of K is invertible. Therefore, we can use inverse matrix to obtain a. Randomly select k row vectors of K to form K, which is a full rank matrix, and compute a using Equation (6) with f(k corresponding ). Then is easy to obtain.
2.3. The Method to Solve Inverse Matrix
The most common way to solve the inverse matrix is as follows [24]:
is the adjoint matrix of K. The value of the -th entry of is that times the determinant of the matrix obtained by deleting the j-th row and i-th column of K. Note that the adjoint matrix can be computed without division, so there is only one division operation in the recovery phase through the matrix method. is the determinant of K. Since K is a full-rank matrix, the determinant value is not zero.
3. The Proposed Scheme
3.1. The Basic Idea
Most polynomial-based schemes specify 251 or 257 as the prime in the sharing polynomial, because which are the closest prime numbers to 256, while the pixel value range of grayscale image is [0,255], the elements in or cannot perfectly fit the grayscale pixels.
In our scheme, we take the modulo as 256, and share and recover based on matrix theory. We make K a random matrix by a filter operation in the sharing phase as Equation (8), which satisfies two conditions:
- Condition 1:
- Any k row vectors of the matrix K are linearly independent.
- Condition 2:
- The determinant of any submatrix is coprime with 256.
In the recovery phase, the secret image can be recovered with the help of matrix inversion, but there is a division operation, that is, the determinant value is divided. Condition 1 guarantees the rank of any submatrix is k and any k order submatrix of K is invertible.
It cannot guarantee that all elements in are coprime with 256, and only the elements that are coprime with 256 have multiplicative inverses, therefore, K should satisfy condition 2 such that the determinant of any submatrix has a multiplicative inverse.
We can encrypt a secret image into n shadows with K and distribute them among n participants. Any k or more shadows can reconstruct the secret while less than k shadows can obtain nothing of the secret image.
3.2. The Sharing Phase
At first, to divide the secret pixel s into pieces , we generate a vector a in which and are generated randomly in [0,255], and an matrix K, which satisfies the two conditions mentioned in Section 3.1. Then we can obtain a shares vector f by Ka = f as follows:
is a pixel value of the i-th shadow image , which is corresponding to the i-th row vector of K and the i-th participant. Then put into the corresponding position of . We take as a shared pair and distribute them to n participants. The steps are described in Algorithm 1.
| Algorithm 1 The sharing phase of the proposed scheme. |
| Input: The threshold parameters , or , and a grayscale secret image S with size of . Output: n shadows and matrix K. Step 1: Generate an matrix K randomly, and determine that the determinant of any submatrix is not zero and is coprime with 256. If not, repeat Step 1. Step 2: For every secret pixel s in each position , , repeat Step 3–4. Step 3: Generate a vector a, set , and generate randomly in [0,255]. Step 4: Compute f = Ka (mod 256), where . Step 5: Output n shadows and matrix K. |
In order to satisfy the conditions of K, we set a filter condition in Step 1 to obtain a suitable matrix. The condition that the determinant of any submatrix is not zero is equivalent to any k row vectors of the matrix K being linearly independent.
For more applicable situations, some matrices that meet the conditions can be generated in advance, and the matrices can be directly used when encrypting, so as to save real-time computational overhead. The matrix itself does not need to be kept secret and can be made public.
To illustrate the sharing phase of our method more intuitively, we give Example 1 as follows.
Example 1.
Given the first pixel of secret image, whose value is 66, and threshold parameters .
Firstly, we generate a matrix K satisfying the conditions mentioned in Section 3.1. We suppose that . Secondly, we generate a vector a in which , and are generated randomly in [0,255], so we suppose and . Then f can be obtained by f = Ka = . Then put the four elements of f into the first pixel position of four shadow images and , respectively. Finally, distribute to the corresponding four participants.
3.3. The Recovery Phase
In the recovery phase, randomly select k participants to get their shadows and row vectors , we can combine their vectors into a matrix K. Then compute the adjoint matrix and determinant of matrix K. Subsequently, concatenate k pixels in the same position in k shadows to generate f. Thus, we can finally obtain the vector a by , is the pixel value of original secret image. The steps are described in Algorithm 2.
| Algorithm 2 The recovery phase of the proposed scheme. |
| Input: The k shadows which are randomly selected from n shadows and corresponding k vectors . Output:The original secret image S. Step 1: Construct a matrix K by k vectors . Step 2: Calculate the adjoint matrix and determinant of matrix K. Compute the inverse matrix according to Equation (7). Step 3: For each position , , repeat Step 4–5. Step 4: Get a by . Step 5: Set the pixel . Step 6: Output the secret image S. |
Obviously, if there are fewer than k participants getting together, the matrix K cannot be formed, and the secret image cannot be recovered.
Here, we give Example 2 to illustrate the recovery phase of the proposed scheme.
Example 2.
Given three shadow images and three corresponding row vectors ,,.
Firstly, we combine three row vectors into a matrix . Secondly, we compute the adjoint matrix and determinant value . Then we calculate the inverse of 105. Then the inverse matrix can be obtained by . Next we take the pixel values from the first pixel position of the three shadow images to form vector f = . Finally, we can obtain vector a through = = , the first element 66 is the secret pixel value.
4. Theoretical Analysis
4.1. Threshold Analysis
In this section, we analyze the threshold of our scheme to find out the relationship between k and n.
As mentioned in Section 3, we use the matrix K to encrypt the image, which satisfies the determinant of any submatrix is not zero and is coprime with 256. All odd numbers in are coprime with 256, obviously the other even numbers including zero are not coprime with 256. The condition becomes that the determinant of any submatrix is odd.
We first consider the case of , that is, K is a square matrix. The formula for calculating the determinant is as follows:
Take a square matrix of as an example:
Theorem 1.
The determinant parity is only related to the parity of the square matrix elements, not to the size of the square matrix elements. We can use 1 for any odd number, and 0 for any even number, to compute the determinant in [25].
Proof of Theorem 1.
The value of the k-order integer determinant is the sum of product terms, each of which has k integer factors.
- To make the determinant odd, we need to add an odd number of product terms with odd products. Corresponding to: to make the determinant to be 1, we need to add an odd number of product terms whose product is 1.
- To make the product term odd, all the factors need to be odd. Corresponding to: to make the product term to be 1, we need all 1 in the factor.
- There is one even number in the factor, then the product is even. Corresponding to: there is one 0 in the factor, then the product is 0.
□
The question becomes to find the non-singular matrix in . Each such matrix corresponds to k linearly independent vectors, which are all non-zero vectors. There are possibilities for the first row vector. The second row vector must be outside the linear subspace generated by the first row vector, so there are possibilities. By analogy, the i-th row vector should be outside of the linear subspace generated by the first row vectors, and there are possibilities. When there exist matrixes that satisfy the conditions mentioned in Section 3. Hence, the probability that the k-order determinant is odd is:
is the probability that a randomly generated matrix meets the two conditions.
When , add another non-zero row vector below the square matrix, to satisfy that the -th line is outside the linear subspace composed of any previous lines, there is only one possibility left. When there exist matrixes that satisfy the condition mentioned in Section 3. Hence, the probability that a matrix is the matrix we need is:
When , there is no matrix for our scheme. Therefore, the proposed scheme can achieve and thresholds.
Next we discuss how and change when k is very large. For the case of , when k tends to infinity, . For the case of , when k tends to infinity, . This is because when discussing in , the number of all random matrices is , but there is only one -th row vector that makes the matrix K satisfy the conditions, and with the increase of k, the denominator of is growing rapidly. For large k, decreases rapidly to zero. Although tends to 0 when k tends to infinity, this does not mean that there is no matrix K that satisfies the conditions.
The size of the random matrix generated in the sharing phase is . Since each element of the matrix is randomly selected from [0,255], the total number of random matrices is .
When , the probability of the matrix satisfying the conditions is , so the number of matrix K satisfying the conditins is . It can be seen that as k increases, the number of K grows rapidly. For (3,3) threshold, 1549526502191602335744, and for (7,7) threshold, .
When , the probability of the matrix satisfying the conditions is , so the number of matrix K satisfying the conditins is . It can be seen that as k increases, the number of K grows rapidly. For (3,4) threshold, 3249592603124123221610201088, and for (7,8) threshold, .
In practical applications, generally , so the number of matrix K satisfying the conditions can fully meets the actual needs.
4.2. Security Analysis
In the previous subsection, we explained that the number of matrix K can fully meet the actual needs, and as the threshold increases, the number of K increases rapidly, so the probability of an attacker finding the corresponding sharing matrix is extremely small.
The proposed scheme provides two options, one is to generate a sharing matrix K to encrypt secret image during the sharing phase, and then distribute shadow images and corresponding row vectors. The other is to generate a large number of matrix K in advance, which is directly used to save real-time consumption during the sharing phase. In the second case, matrix K can be made public, because of the characteristics of the secret sharing scheme, even if the attacker knows the corresponding sharing matrix, the secret image cannot be recovered if k or more shadow images are not available. Therefore, the security of the second case is not on the sharing matrix, but mainly on whether a sufficient number of shadow images can be obtained.
In the proposed scheme, only one secret pixel value is encrypted per round, and the remaining elements of the vector a are randomly selected from [0,255], so there is no security problem caused by the correlation of adjacent pixels. Moreover, the elements in correspond to the grayscale pixel value range [0,255], so the shadow image pixel values are evenly distributed. All these guarantee that if the attacker gets less than k shadow images, he cannot recover the secret image. Even if the attacker gets shadow images, since grayscale pixel value range is [0,255], the secret image has a total of secret pixels, the attacker cannot guess the k-th shadow image, so the secret image will not be obtained.
4.3. Complexity Evaluation
There are a large number of pixels in an image, therefore every pixel of the secret image needs to be shared once, and every pixel of the shadow image needs to be decoded once, so time is spent on iterative operation.
For the threshold scheme, no matter whether the polynomial method or the matrix method is used, sharing a secret pixel value requires calculating n shared values. The scheme using polynomial method to calculate a shared value requires addition operations and multiplication operations. For the proposed scheme using matrix multiplication, the process of calculating a shared value is the process of multiplying a k-dimensional row vector by a k-dimensional column vector, with a total of additions and k multiplications. When k is the same, polynomial method and matrix method need the same number of addition operations to calculate a shared value. When , the polynomial method has fewer multiplication operations. When , the two methods have the same multiplication operations. When , the matrix method multiplies less times. Therefore, when , the calculation amount in the sharing phase of the polynomial method is smaller.
The scheme for reperforms the sharing phase when the shared value is calculated as 256 and there are 257 elements in , so the probability of each redo is . For a grayscale image, approximately times need to be redone during the sharing phase. Our scheme only needs to generate a matrix K by filtering before the sharing phase, which can be used in every subsequent sharing process. Take (3,3) threshold as an example, , in other words, it takes about 3 cycles to get the matrix K. Now the (3,4) threshold, , it takes about 24 cycles. All of these are far less than the number of redo of the scheme for . When , the time spent in the sharing phase of the proposed scheme is certainly less than that of the scheme for . When , we can not qualitatively analyze whether the influence of the filter operation is greater or that of the multiplication operation, so we will use experiments to quantitatively explain later.
The algorithm complexity for decryption of Shamir’s scheme is , which uses Lagrange interpolation in the recovery phase. Our scheme uses matrix multiplication during the recovery phase, a matrix is multiplied with a matrix, so the algorithm complexity is . As a result that only is the secret pixel value, only the first element of f needs to be calculated, so the complexity can be reduced to , which is a little lower than that of Shamir.
4.4. Lossless Recovery Analysis
In the sharing phase, we use f = Ka (mod 256) to encrypt the secret image, in which the operation is matrix multiplication, which can be refined into integer multiplication and addition, without involving division, so there is no inverse operation. The remainder of modulo 256 is 0 to 255, which exactly corresponds to the pixel value of the grayscale image, so the shared value can be stored in the shadow images without loss.
In the recovery phase, we construct K and recover a through a = f. The initial filter operation guarantees the determinant of any submatrix of K is not zero and is coprime with 256. K is a submatrix of K, so its determinant is not zero and is coprime with 256. is calculated by . is not zero, so it can be used as denominator. The calculation process of the adjoint matrix also does not involve division, so dividing by the determinant is the only division operation. is coprime with 256 so that it has an exact inverse of 256. Therefore, a can be correctly obtained by a = f and is the secret pixel value. Hence, the secret value is recovered losslessly and the proposed scheme is a lossless scheme.
5. Experiments and Comparisons
In this section, experiments and analyses are conducted to evaluate the effectiveness of the proposed method.
5.1. Image Illustration
Figure 1 is the experimental results of our proposed scheme, where . Figure 1a is the secret image. Figure 1b–d are three shadows, which are noisy-like. Figure 1e is the result of recovery by two shadows, from which we can know nothing of the secret. Therefore, obtaining any shadow alone or less than k shadows will not reveal secret information. Figure 1f is the result of recovery by three shadows. Figure 1g is the result of subtracting the pixel matrix of secret image and the recovered image. Figure 1h is the distribution histogram of pixel values of Figure 1g. It can be seen from Figure 1g,h that the difference between the pixel matrix of the recovered image and the pixel matrix of the secret image is a zero matrix, which means that lossless recovery is achieved.

Figure 1.
Experimental results of our proposed scheme, where . (a) Secret image; (b–d) three shadows and ; (e) result of recovery by ; (f) result of recovery by and ; (g) the difference between S and ; (h) the distribution histogram of pixel values of .
Figure 2a is used as a comparison test image, whose distribution histogram of pixel values is Figure 2b. It can be seen from the histogram that the secret image has some pixels larger than 250. Figure 3, Figure 4 and Figure 5 are the results of (3,4) threshold sharing by our scheme and the other two schemes [1,21], respectively.
Figure 2.
(a) The secret image S; (b) the distribution histogram of pixel values of the secret image S.
Figure 3.
Experimental results of our proposed scheme, where . (a–d) Four shadows and ; (e) the distribution histogram of pixel values of ; (f) the latter part of (e); (g) result of recovery by ; (h) result of recovery by and ; (i) result of recovery by and ; (j) the distribution histogram of pixel values of ; (k) the difference between S and ; (l) the distribution histogram of pixel values of .
Figure 4.
Experimental results of polynomial-based SIS modulo 251, where . (a) A shadow ; (b) the distribution histogram of pixel values of ; (c) result of recovery by three shadows; (d) the distribution histogram of the recovered image.
Figure 5.
Experimental results of polynomial-based SIS modulo 257 based on screening, where . (a) A shadow ; (b) result of recovery by three shadows; (c) the distribution histogram of pixel values of ; (d) the latter part of (c).
As shown in Figure 3, Figure 3a–d are four shadows, which are noisy-like. The abscissa range of Figure 3e is [0,], which is [0,255]. In order to observe the distribution of pixel values more carefully, we take the latter part of Figure 3e as Figure 3f. The pixel values of the shadows are evenly distributed. Figure 3g is the result of recovery by two shadows. Therefore, obtaining any shadow alone or less than k shadows will not reveal secret information. From Figure 3h–l we can know that the proposed scheme can achieve lossless recovery when k or more shadows are obtained.
5.2. Comparisons with Related Works
5.2.1. Illustration Comparison
Figure 4b,d have no pixel value larger than 250. The grayscale pixel value range is [0,255] and modular 251 cannot cover it, therefore the pixel values of secret image between [251,255] are truncated as 250.
Figure 5 shows a experimental result of polynomial-based SIS modulo 257 based on screening, of which p is 257. The abscissa range of Figure 5c is [0,], which is [0,256]. From Figure 5c,d it can be seen that there are no pixel values in the shadow image at 256 points, indicating that the pixel values are unevenly distributed, so there will be security issues. If the attacker grasps the p-value and obtains such a shadow with uneven pixel distribution, he will doubt the encryption behavior.
5.2.2. Efficiency Comparison
We make statistics on the time consumption of the filter operation in the sharing phase as Table 2, the unit is second. It can be seen that the filter of matrices takes more time than that of matrices. For , the time is similar. For , the time is increasing with the increase of k, but this is within the acceptable range. For applicable situations, some matrices that meet the conditions can be generated in advance, so as to save real-time computational overhead.
Table 2.
Time consumption of the filter operation.
We conduct experiments on 20 different grayscale images, and the size of each image is . The two schemes [21,22] are chosen for comparison, which can also recover losslessly. We compare the average sharing time as Table 3, average recovery time as Table 4 and average total time as Table 5. The unit is second.
Table 3.
Average sharing time.
Table 4.
Average recovery time.
Table 5.
Average total time.
From the results, it can be observed that the higher the threshold, the more sharing time, and the more total time. The recovery time is only related to k. The larger the k, the longer the recovery time becomes, and the recovery time is close with the same k value in the same scheme. Compared with the other two lossless schemes, our scheme has obvious advantages in both sharing time and recovery time.
5.3. Brief Summary
Based on experimental results shown above, we can conclude that:
- The secret image can be reconstructed losslessly with k or more shadows and there is no leakage of secret information from the recovered image with less than k shadows.
- The shadows are noisy-like, thus every single shadow gives no clue about the secret. Pixel values of shadow are evenly distributed without security issues.
- The proposed scheme has obvious advantages in efficiency.
6. Conclusions
A lossless and efficient threshold SIS scheme based on matrix theory was presented in this paper. We also analyzed the threshold of the proposed scheme and proved that and thresholds can be achieved. Afterwards, the effectiveness and advantages of the proposed scheme compared with other schemes were demonstrated through experiments and analysis, that is, lossless recovery, efficiency and security.
We may further extend our work in the following ways.
- To further exploit the secret image sharing scheme, we can consider various recommendation mechanisms that provide content to the end users [26].
- We can use the personalized content retrieval mechanisms [27], in order to exploit the content, i.e., images, that the users consume to further improve our secret image sharing scheme.
- Big data that are available in complex systems [28] can be exploited to improve our analysis and model.
Author Contributions
Conceptualization, Z.X. and X.Y.; methodology, L.Y.; project administration, Y.L.; software, L.L.; writing—original draft, L.Y. All authors have read and agreed to the published version of the manuscript.
Funding
This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).
Acknowledgments
The authors would like to thank the editor and the anonymous reviewers for their valuable comments.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the National Computer Conference, New York, NY, USA, 4–7 June 1979; IEEE Computer Society: New York, NY, USA, 1979; pp. 313–317. [Google Scholar]
- Ciegis, R.; Starikoviăźius, V.; Tumanova, N.; Ragulskis, M. Application of distributed parallel computing for dynamic visual cryptography. J. Supercomput. 2016, 72, 4204–4220. [Google Scholar] [CrossRef]
- Palevicius, P.; Ragulskis, M. Image communication scheme based on dynamic visual cryptography and computer generated holography. Opt. Commun. 2015, 335, 161–167. [Google Scholar] [CrossRef]
- Yan, X.; Lu, Y.; Liu, L.; Wan, S.; Ding, W.; Liu, H. Exploiting the Homomorphic Property of Visual Cryptography. Int. J. Digit. Crime Forensics 2017, 9, 45–56. [Google Scholar] [CrossRef]
- Yan, X.; Lu, Y.; Liu, L.; Song, X. Reversible Image Secret Sharing. IEEE Trans. Inf. Forensics Secur. 2020, 15. [Google Scholar] [CrossRef]
- Naor, M.; Shamir, A. Visual cryptography. In Advances in Cryptology—EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 9–12 May 1994; Springer: Berlin/Heidelberg, Germany, 1995; pp. 1–12. [Google Scholar]
- Yang, C.N. New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 2004, 25, 481–494. [Google Scholar] [CrossRef]
- Yan, X.; Wang, S.; El-Latif, A.A.A.; Niu, X. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimed. Tools Appl. 2015, 74, 3231–3252. [Google Scholar] [CrossRef]
- Wang, G.; Liu, F.; Yan, W.Q. Basic Visual Cryptography Using Braille. Int. J. Digit. Crime Forensics 2016, 8, 85–93. [Google Scholar] [CrossRef]
- Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
- Bhadravati, S.; Khabbazian, M.; Atrey, P.K. On the Semantic Security of Secret Image Sharing Methods. In Proceedings of the 2013 IEEE Seventh International Conference on Semantic Computing, Irvine, CA, USA, 16–18 September 2013; pp. 302–305. [Google Scholar]
- Li, P.; Yang, C.; Kong, Q. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J. Real Time Image Process. 2018, 14, 41–50. [Google Scholar] [CrossRef]
- He, J.; Lan, W.; Tang, S. A secure image sharing scheme with high quality stego-images based on steganography. Multimed. Tools Appl. 2017, 76, 7677–7698. [Google Scholar] [CrossRef]
- Yang, C.N.; Ciou, C.B. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image Vis. Comput. 2010, 28, 1600–1610. [Google Scholar] [CrossRef]
- Li, P.; Ma, P.J.; Su, X.H.; Yang, C.N. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 2012, 23, 441–453. [Google Scholar] [CrossRef]
- Li, P.; Yang, C.N.; Wu, C.C.; Kong, Q.; Ma, Y. Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 2013, 24, 1106–1114. [Google Scholar] [CrossRef]
- Li, L.; El-Latif, A.A.A.; Yan, X.; Wang, S.; Niu, X. A Lossless Secret Image Sharing Scheme Based on Steganography. In Proceedings of the 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control, Harbin, China, 8–10 December 2012; pp. 1247–1250. [Google Scholar]
- Liu, L.; Lu, Y.; Yan, X.; Ding, W. A Novel Progressive Secret Image Sharing Method with Better Robustness. In Data Science: Third International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2017, Changsha, China, 22–24 September 2017, Part II; Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z., Eds.; Springer: Singapore, 2017; pp. 539–550. [Google Scholar] [CrossRef]
- Lin, S.J.; Lin, J.C. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit. 2007, 40, 3652–3666. [Google Scholar] [CrossRef]
- Zhou, X.; Lu, Y.; Yan, X.; Wang, Y.; Liu, L. Lossless and efficient polynomial-based secret image sharing with reduced shadow size. Symmetry 2018, 10, 249. [Google Scholar] [CrossRef]
- Gong, Q.; Yan, X.; Wang, Y.; Liu, L. Polynomial-based Secret Image Sharing in the Galois Field of GF(28). In Proceedings of the 2019 Fifteenth China Information Hiding Workshop (CIHW2019), Xiamen, China, 19–20 October 2019. [Google Scholar]
- Ding, W.; Liu, K.; Yan, X.; Wang, H.; Liu, L.; Gong, Q. An image secret sharing method based on matrix theory. Symmetry 2018, 10, 530. [Google Scholar] [CrossRef]
- Xia, Z.; Yang, X.; Xiao, M.; He, D. Provably secure threshold paillier encryption based on hyperplane geometry. In Information Security and Privacy. ACISP 2016; Springer: Cham, Switzerland, 2016. [Google Scholar]
- Guo, Z.; Qing, H. Inquiry into integer determinant parity. Math. Pract. Theory 2010, 21, 212–215. [Google Scholar]
- Stai, E.; Kafetzoglou, S.; Tsiropoulou, E.E.; Papavassiliou, S. A holistic approach for personalization, relevance feedback & recommendation in enriched multimedia content. Multimed. Tools Appl. 2018, 77, 283–326. [Google Scholar]
- Pouli, V.; Kafetzoglou, S.; Tsiropoulou, E.E.; Dimitriou, A.; Papavassiliou, S. Personalized multimedia content retrieval through relevance feedback techniques for enhanced user experience. In Proceedings of the 2015 13th International Conference on Telecommunications (ConTEL), Graz, Austria, 13–15 July 2015; pp. 1–8. [Google Scholar]
- Thai, M.; Wu, W.; Xiong, H. Big Data in Complex and Social Networks; CRC Press: New York, NY, USA, 2016; pp. 1–242. [Google Scholar] [CrossRef]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).