Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares
Abstract
:1. Introduction
2. Related Work
3. Preliminary
3.1. General Access Structure
3.2. Relationship between the Operation on GF(2m) and Bit-Wise XOR Operation
4. Proposed Scheme
4.1. Multi Secret Sharing Process
Algorithm 1: The secret sharing process of the proposed scheme. |
Input: The secret images OS1, OS2, …, OSn; for the general access structure, the qualified part is , , and the forbidden part is , |
Output: The personal shares PS1, PS2, …, PSn; the universal shares US1, US2, …, USn. |
Step 1: Suppose the size of each secret image OSi is A × B, the pixel value in the th row and the th column of OSi is , and is integer, , , and . As each pixel can be expressed into an element with 8 bits in GF(28), suppose , split the bits of each pixel into the 4 MSB bits and the 4 LSB bits, , and . Thus, the MSB part of the secret image OSi can be regarded as the matrix .
And the LSB part of the secret image OSi can be regarded as the matrix . |
Step 2: Select n gray images {PO1, PO2, …, POn} from a mass of images randomly which are the same size and the same gray level with the secret images, and select another n gray images {UO1, UO2, …, UOn} from a mass of images randomly which are the same size and the same gray level with the secret images, {UO1, UO2, …, UOn} need to be different with {PO1, PO2, …, POn}. |
Step 3: Find out the essential id for each qualified subset in by Algorithm 2, , , the essential id is specific element of the set , denote it as . |
Step 4: For the images {PO1, PO2, …, POn}, for each image POi with the size A × B, suppose the pixel value in the th row and the th column of POi is , and is the integer, , , and . Each pixel can be expressed as , separate 4 MSB bits and the 4 LSB bits of each pixel, , and . Thus, the matrix of the MSB is denoted as .
And the matrix about LSB is denoted as .
|
Step 5: For the images {UO1, UO2, …, UOn}, suppose the pixel value in the th row and the th column of POi is , and is integer, , , and . Each pixel can be expressed as , separate 4 MSB bits and the 4 LSB bits of each pixel, , and . The matrices are denoted as the for the MSB part and for the LSB part.
And the matrix of LSB is as below.
|
Step 6: For the secret image OSi and the qualified subset is , perform the following operation about the MSB part of the secret image OSi: The addition operation is defined as in Section 3.2. Suppose is shown as below, Apply the Arnold transform [48] method to each matrix to realize the element scrambling, and the scrambled matrix is denoted as ,
Perform another operation for the LSB part of the secret image OSi: |
where , , .
Suppose is shown as below, Apply the Arnold transform method to each matrix to realize the element scrambling, and the scrambled matrix is denoted as , |
Step 7: For the images {UO1, UO2, …, UOn}, replace the 4 LSBs of each pixel of UOi with the element of in the same position, which means join each element of and of together, and get the pixel matrix expression of USi, Suppose , and , so The renewed images are the universal shares {US1, US2, …, USn}. |
Step 8: For the images {PO1, PO2, …, POn}, replace the 4 LSBs of each pixel of POi with the element of in the same position, which means join each element of and of together, and get the pixel matrix expression of PSi, The element joint operation is the similar as the last step, and the renewed images are the personal shares {PS1, PS2, …, PSn}. |
Algorithm 2: The essential id selection process for the qualified subset of the general access. |
Input: The general access structure, the qualified part is , , where is the ith qualified subset , , . |
Output: The essential id |
Step 1: For each qualified subset , , , denote the essential id of the set as . Construct the vector of length n where all the elements are 0, set the th, th, …, th elements according to to be 1, the vector is denoted as . As such, the vector is the logical presentation of the qualified subset . |
Step 2: Regard the vector as the ith row of the matrix , so the matrix is the presentation of the qualified access subsets. |
Step 3: is the start point of the searching, and .
For k = 1: n, calculate the hamming weights of each column and row of the matrix , the hamming wights of the columns are denoted as {}, and the hamming weights of the rows are denoted as {}, search for the smallest hamming weight of the column vector. There are different cases. Case 1: If the smallest hamming weight of the column is 1 and unique, the non-zero element is the () element in the matrix , it shows that the essential id for the srth qualified subset is . Case 2: If the smallest hamming weight is not 1 and unique, compare the rows’ hamming weights of the non-zero elements, select the element () which has the smallest hamming weight; if the rows’ hamming weights are the same, select the element in which the row number is smaller, so the essential id for the srth qualified subset is . Case 3: If the smallest hamming weight is not 1 and not unique, compare all the rows’ hamming weights of the non-zero elements in the different columns, select the element () which has the smallest hamming weight; if the rows’ hamming weights are the same, select the element in which the row number is smallest, so the essential id for the srth qualified subset is . |
Step 4: Set all the elements of the srth row and the scth column to be zero, is renewed as . |
Step 5: For the renewed matrix , execute the same operations as in Step 3 to fix the essential id for the other row, it is stopped when all the essential id for all the rows are fixed. |
Step 6: The final essential id is denoted as , which means the idith element is the essential element for the ith qualified subset . |
- For the secret images, suppose the matrices of the pixel value is shown as below:
- For each , there is one corresponding essential id idi and universal share, so we take the generation of the personal share and the universal for example. First, turn the pixel value of the first secret image OS1 into 8 bits, to get:
- Divide the MSB part and the LSB part of , So about the MSB parts and about LSB is shown below:
- Select 4 gray images randomly {PO1, PO2, PO3, PO4} with the same size as the secret image from a set of thousands of images, and select another 4 gray images randomly {UO1, UO2, UO3, UO4} with the same size as the secret image.
- Find out the essential id for the qualified subset based on Algorithm 2, the essential id for the qualified subsets is {} = {2, 1, 4, 3}.
- For the image {PO1, PO2, PO3, PO4}, suppose is the matrix for the MSB part of POi. As such, the matrices of the MSB parts of the images are as below:
- For the image UO1, the matrix of the MSB parts is as below:
- Thus, according to Equation (15) we can get :
- Apply the Arnold transform method to each matrix to realize the element scrambling, and the scrambled matrix is denoted as ,
- Similarly, we can get:
- Apply the Arnold transform method to each matrix to realize the element scrambling, and the scrambled matrix is denoted as ,
- So, for the image UO1, replace the 4 LSBs of each pixel with the element in to obtain the matrix of the universal share US1 as below:
- The pixel presentation matrix is:
- For the images {PO1, PO2, PO3, PO4}, select the essential id id1 for the qualified subset (the algorithm about the essential id for the qualified subset is shown in Algorithm 2), as id1 = 2, so for the image PO2, replace the 4 LSBs with , to get one personal share PS2.
- The other universal shares UO2, UO3, UO4 and the personal shares PO1, PO3, PO4 can be obtained in the same way.
- The vectors of the are shown as below:
- As such, the matrix of the qualified access is shown as below:
- Let as the start point, calculate the hamming weight of each column, {} = {2, 2, 2, 3}, and the hamming weight of each row is {} = {3, 2, 2, 2}. As 2 is the smallest column hamming weight and not unique, compare all the {1, 2, 3} rows’ hamming weights, {} = {3, 2, 2, 2}, since the element (2, 1) element has the row number that is smallest in the rows with a smaller row hamming weight of 2, the essential id for the qualified subset is 1;
- Then all the elements in the 2th row and the 1th column are set to be zero, the renewed matrix is as below:
- Compare the hamming weight of the non-zero columns in , {} = {2, 2, 2}, as all the columns hamming weight is the same, so compare the row hamming weight, {} = {2, 2, 2}, so select the (1, 2) element whose row number is smallest in the rows with hamming weight 2, which means the essential id for the qualified subset is 2;
- Then, the 1th row and the 2rd column is set to be zero, the renewed matrix is as blow:
- The hamming weight of the non-zero columns {} = {1, 2}, the smallest rows’ hamming weight is 1 and unique, so select the element (4, 3), the essential id for the qualified subset is 3;
- Then the 4th row and the 3th column is set to be zero, the renewed matrix is as blow:
- Thus, it is easy to confirm the essential id for the qualified subset is 4;
- At last, we can obtain the essential id .
4.2. Secret Recovery Process
Algorithm 3: The secret recovery process of the proposed scheme. |
Input: The personal shares PS1, PS2, …, PSn; the universal shares US1, US2, …, USn.; the general access structure, the qualified part is , and the forbidden part is . |
Output: The secret images RS1, RS2, …, RSn |
Step 1: Take the recovery of the ith secret image as the example. Retrieve the universal image UOi from the committee after verification, or else the committee members can participate in the recovery taking the universal share UOi. Extract the 4 LSBs of the each pixel to get the matrix over GF(24), and 4 MSBs of the pixels of UOi form the matrix ; |
Step 2: Collect the qualified personal shares {PSi1, PSi2, …, PSit} based on the qualified subset , , . For each qualified personal share, extract the 4 MSBs of each pixel of the share, as in Algorithm 1. Obtain the matrix over GF(24), , as , so we can get the matrices ; |
Step 3: Apply the Arnold inverse transform on to get , and perform the following operation:
|
is shown as below: |
Step 4: Calculate the essential id for the qualified set using Algorithm 2, and extract the 4 LSBs of each pixel in the th personal share to get the matrix , and apply the Arnold inverse transform on to get ; |
Step 5: From the construction of , perform the following operation to get : |
Step 6: For each element in matrix and , join the element of the matrix and the element of the matrix in the same position to form a new matrix : |
Step 7: Transform each element of the matrix into the decimal number, which is the pixel value of the ith recovered secret image RSi which is 256 gray level. For example, if the element of is , the pixel value is in fact . Finally, we can get the recovered ith secret image, and the recovery of other secret images can be realized in the same manner. |
5. Proof and Analysis
5.1. Correctness Proof
5.2. Security Analysis
6. Experiments
6.1. Secret Sharing and Recovery
6.2. Analysis about the Experiments
7. Discussion
8. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA, 4–7 June 1979; IEEE Computer Society: Washington, DC, USA, 1979. [Google Scholar]
- Harn, L.; Lin, C. Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Comput. 2010, 59, 842–846. [Google Scholar] [CrossRef]
- Naor, M.; Wool, A. Access control and signatures via quorum secret sharing. IEEE Trans. Parallel Distrib. Syst. 1998, 9, 909–922. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Yang, C.; Sun, Q. Thresholds based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management. IEEE Trans. Intell. Transp. Syst. 2020. [Google Scholar] [CrossRef]
- Ermakova, T.; Fabian, B. Secret Sharing for Health Data in Multi-provider Clouds. IEEE Conf. Bus. Inform. 2013, 93–100. [Google Scholar] [CrossRef]
- Ogiela, M.R.; Ogiela, L. Cognitive Keys in Personalized Cryptography. IEEE Int. Conf. Adv. Inf. Netw. Appl. 2017, 1050–1054. [Google Scholar] [CrossRef]
- Ogiela, M.R.; Ogiela, L. Cognitive cryptography techniques for intelligent information management. Int. J. Inf. Manag. 2018, 40, 21–27. [Google Scholar] [CrossRef]
- Ogiela, L.; Ogiela, M.R. Bio-Inspired Cryptographic Techniques in Information Management Applications. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 1059–1063. [Google Scholar] [CrossRef]
- Ogiela, M.R.; Ogiela, L. On using cognitive models in cryptography. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, 23–25 March 2016. [Google Scholar]
- Naor, M.; Shamir, A. Visual Cryptography. Lect. Notes Comput. ENCE 1994, 950, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Yang, C.N. New visual secret sharing schemes using pro babilistic method. Pattern Recognit. Lett. 2004, 25, 481–494. [Google Scholar] [CrossRef]
- Shyu, S.J. Image encryption by random grids. Pattern Recognit. 2007, 40, 1014–1031. [Google Scholar] [CrossRef]
- Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
- Wang, D.; Zhang, L.; Ma, N. Two secret sharing schemes based on Boolean operations. Pattern Recognit. 2007, 40, 2776–2785. [Google Scholar] [CrossRef]
- Liu, Y.; Yang, C.; Wu, S.; Chou, Y. Progressive (k,n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process. Image Commun. 2018, 77–86. [Google Scholar] [CrossRef]
- Yan, X.; Wang, S.; Abd El-Latif, A.A.; Niu, X. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimed. Tools Appl. 2015, 74, 3231–3252. [Google Scholar] [CrossRef]
- Han, Y.; He, W.; Dong, H. A verifiable visual cryptography scheme based on XOR algorithm. In Proceedings of the 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China, 9–11 November 2012. [Google Scholar]
- Verma, M.; Rani, R. Strong threshold secret image sharing based on Boolean operation. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, 29–30 April 2016. [Google Scholar]
- Wang, Z.; Jin, H.; Wang, X. An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation. Int. J. Netw. Secur. 2014, 16, 487–493. [Google Scholar]
- Isha, M.P.; Dadvi, G.D. Encrypting multiple images using visual secret sharing scheme. Int. J. Sci. Res. (IJSR) 2014, 3, 107–111. [Google Scholar]
- Weir, J.; Yan, W. Sharing multiple secrets using visual cryptography. IEEE Int. Symp. Circuits Syst. IEEE 2009. [Google Scholar] [CrossRef]
- Aarti, A. Multiple Secret Sharing Scheme with Gray-Level Mixing using EVCS. In Proceedings of the International Conference on Issues and Challenges in Networking, Intelligence and Computing Technologies (ICNICT-2012), Ghaziabad, India, 7–8 September 2012. [Google Scholar]
- Wang, K.; Zou, X.; Sui, Y. A Multiple Secret Sharing Scheme based on Matrix Projection. IEEE Int. Comput. Softw. Appl. Conf. IEEE Comput. Soc. 2009, 400–405. [Google Scholar] [CrossRef]
- Fereshte, S. Reviewing multiple secret image sharing scheme based on matrix multiplication. Int. J. Comput. Technol. Appl. 2013, 4, 494–501. [Google Scholar]
- Yang, C.-C.; Chang, T.-Y.; Hwang, M.-S. A (t,n) multi-secret sharing scheme. Appl. Math. Comput. 2004, 151, 483–490. [Google Scholar] [CrossRef]
- Adachi, T.; Okazaki, C. A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation. J. Appl. Math. Phys. 2014, 2, 1196–1201. [Google Scholar] [CrossRef] [Green Version]
- Harn, L.; Hsu, C.-F. (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial. Wirel. Pers. Commun. 2017. [Google Scholar] [CrossRef]
- Chang, C.C.; Huynh, N.T.; Le, H.D. Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process. 2014, 99, 159–170. [Google Scholar] [CrossRef]
- Deshmukh, M.; Nain, N.; Ahmed, M. A Novel Approach for Sharing Multiple Color Images by Employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 2017, 49, 291–302. [Google Scholar] [CrossRef]
- Rajput, M.; Deshmukh, M. Secure (n, n + 1)-Multi Secret Image Sharing Scheme Using Additive Modulo. Procedia Comput. ENCE 2016, 89, 677–683. [Google Scholar] [CrossRef] [Green Version]
- Chen, T.H.; Wu, C.S. Efficient multi-secret image sharing based on Boolean operations. Signal Process. 2011, 91, 90–97. [Google Scholar] [CrossRef]
- Chen, C.C.; Wu, W.J. A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 2014, 92, 107–114. [Google Scholar] [CrossRef]
- Yang, C.-N.; Hua, C. Enhanced Boolean-based multi secret image sharing scheme. J. Syst. Softw. 2016. [Google Scholar] [CrossRef]
- Chen, C.C.; Chen, J.L. A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J. Inf. Secur. Appl. 2017, 33, 45–54. [Google Scholar] [CrossRef]
- Deshmukh, M.; Nain, N.; Ahmed, M. Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimed. Tools Appl. 2016. [Google Scholar] [CrossRef]
- Kabirirad, S.; Eslami, Z. Improvement of (n,n)-Multi-Secret Image Sharing Schemes Based on Boolean Operations. J. Inf. Secur. Appl. 2019, 47, 16–27. [Google Scholar] [CrossRef]
- Prasetyo, H.; Guo, J.M. A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR. IEEE Access 2019, 7, 37473–37497. [Google Scholar] [CrossRef]
- Wu, X.; Lai, Z.R. Random grid based color visual cryptography scheme for black and white secret images with general access structures. Signal Process. Image Commun. 2019, 75, 100–110. [Google Scholar] [CrossRef]
- Lian, C.; Pang, L.; Liang, J. Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. Comput. J. 2015, 58, 2426. [Google Scholar] [CrossRef]
- Das, A.; Adhikari, A. An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 2010, 23, 993–996. [Google Scholar] [CrossRef] [Green Version]
- Yan, X.; Lu, Y. Progressive visual secret sharing for general access structure with multiple decryptions. Multimed. Tools Appl. 2017, 77, 1–20. [Google Scholar] [CrossRef]
- Nag, A.; Singh, J.P.; Singh, A.K. An efficient Boolean based multi-secret image sharing scheme. Multimed. Tools Appl. 2019, 1–25. [Google Scholar] [CrossRef]
- Fang, W.; Lin, J. Universal share for the sharing of multiple images. J. Chin. Inst. Eng. 2007, 30, 753–757. [Google Scholar] [CrossRef]
- Meghrajani, Y.K.; Mazumdar, H.S. Universal Share for Multisecret Image Sharing Scheme Based on Boolean Operation. IEEE Signal Process. Lett. 2016, 23, 1429–1433. [Google Scholar] [CrossRef]
- Chen, T.; Wu, X. Multiple secret image sharing with general access structure. Multimed. Tools Appl. 2020, 1–19. [Google Scholar] [CrossRef]
- Rudolf, L.; Harald, N. Finite Fields, 2nd ed.; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
- Arnol’d, V.I. Ergodic Problems of Classical Mechanics; Benjamin: New York, NY, USA, 1968. [Google Scholar]
- Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
The Personal Share | PSNR |
---|---|
PS1 | 31.62 dB |
PS2 | 32.02 dB |
PS3 | 31.84 dB |
PS4 | 30.58 dB |
The Universal Share | PSNR |
---|---|
US1 | 31.83 dB |
US2 | 31.84 dB |
US3 | 31.75 dB |
US4 | 31.63 dB |
The Recovered Secret Images | PSNR |
---|---|
RS1 | |
RS2 | |
RS3 | |
RS4 |
PS1 | PS2 | PS3 | PS4 | US1 | US2 | US3 | US4 | |
---|---|---|---|---|---|---|---|---|
OS1 | 0.0421 | 0.0591 | 0.0528 | 0.0231 | 0.0560 | 0.0620 | 0.0543 | 0.0602 |
OS2 | 0.0163 | 0.0250 | 0.0342 | 0.0196 | 0.0280 | 0.0776 | 0.0322 | 0.0261 |
OS3 | 0.0678 | 0.0782 | 0.0874 | 0.0406 | 0.0992 | 0.0715 | 0.0882 | 0.0842 |
OS4 | 0.0816 | 0.0679 | 0.0811 | 0.0445 | 0.0758 | 0.0693 | 0.0841 | 0.0883 |
The Schemes | Secret Image | Pixel Expansion | Access type | Operation | Meaningful Share | Lossless Recovery |
---|---|---|---|---|---|---|
Weir, J [22] | Binary | yes | (n, n) | OR | no | no (low quality) |
Chang C C [29] | Gray or color | no | (k, n) | Chinese remainder mathod and Lagrange interpolation | no | yes |
Rajput M [31] | Gray or color | no | (n, n+1) | Additive Modulo(256) | no | no |
Chen [32] | Binary or gray | no | (n+1, n+1) | XOR | no | yes |
Chen [33] | Gray | no | (n, n) | XOR | no | yes |
Yang C N [34] | Gray | no | (n, n) | XOR and bit shift | no | yes |
Chen C C [35] | Gray (different size) | no | (n, n) | XOR and hash | no | yes |
Deshmukh M [36] | Gray | no | (n, n) | XOR and arithmetic modulo | no | yes |
Kabirirad S [37] | Gray | no | (n, n) | XOR | no | yes |
Nag A [43] | Gray | no | General access | XOR | no | yes |
Chen T [46] | Gray | no | General access | XOR | no | yes |
Proposed scheme | Gray or color | no | General access | XOR | yes (good enough) | yes |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cai, H.; Tang, D. Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares. Mathematics 2020, 8, 1582. https://doi.org/10.3390/math8091582
Cai H, Tang D. Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares. Mathematics. 2020; 8(9):1582. https://doi.org/10.3390/math8091582
Chicago/Turabian StyleCai, Hongliang, and Dan Tang. 2020. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares" Mathematics 8, no. 9: 1582. https://doi.org/10.3390/math8091582
APA StyleCai, H., & Tang, D. (2020). Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares. Mathematics, 8(9), 1582. https://doi.org/10.3390/math8091582