Previous Article in Journal
Interpretation of AI-Generated vs. Human-Made Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Essential Multi-Secret Image Sharing for Sensor Images

Department of Computer Science & Engineering, Yuan Ze University, Taoyuan 32003, Taiwan
J. Imaging 2025, 11(7), 228; https://doi.org/10.3390/jimaging11070228
Submission received: 14 May 2025 / Revised: 7 June 2025 / Accepted: 20 June 2025 / Published: 8 July 2025
(This article belongs to the Section Computational Imaging and Computational Photography)

Abstract

In this paper, we propose an innovative essential multi-secret image sharing (EMSIS) scheme that integrates sensor data to securely and efficiently share multiple secret images of varying importance. Secret images are categorized into hierarchical levels and encoded into essential shadows and fault-tolerant non-essential shares, with access to higher-level secrets requiring higher-level essential shadows. By incorporating sensor data, such as location, time, or biometric input, into the encoding and access process, the scheme enables the context-aware and adaptive reconstruction of secrets based on real-world conditions. Experimental results demonstrate that the proposed method not only strengthens hierarchical access control, but also enhances robustness, flexibility, and situational awareness in secure image distribution systems.

1. Introduction

In the research field of image sharing, there are currently two branches: visual cryptography [1,2,3] and secret image sharing [4,5]. In visual cryptography, research has focused on the design of binary image encoding, whose decoding does not need computational devices. Currently, there are various applications in winding on a printed circuit board. In secret image sharing, research has focused on the fault-tolerant encoding of gray and color images, which benefits the distributed preservation of secret images. There are several extended studies on secret image sharing: progressive secret image sharing [6,7,8], secret image sharing with meaningful shadows [9,10,11], scalable secret image sharing [12,13,14,15], and essential secret image sharing [16,17,18,19,20,21,22,23,24].
The essential image sharing mechanism, first proposed by Li et al. [16] in 2013, is called (t, s, k, n)-essential secret image sharing, and it divides secret images into two groups, namely, s essential shadows and ns non-essential shadows. A secret image can only be restored if k shadows are received, including at least t essential shadows. However, in this work, the essential and non-essential shadows do not have the same size. Following on from this work, many researchers have worked on improving shadow size [17,18,19,20] and adjusting essential and non-essential shadows with the same size [21,22,23]. In 2018, Li et al. [24] proposed an improvement in essential secret image sharing. They argued that, under reasonable circumstances, as the essential shadow is essential, the importance of its owner must be higher than that of the owner of the non-essential shadow. Therefore, considering the confidentiality of information security management, it is necessary to obtain all essential shadows, and the additional shadows required to solve the secret image should be filled by non-essential shadows.
In this paper, a (t1, t2, … , tr, k, n)-essential multi-secret image sharing scheme is proposed. In this scheme, r + 1 secret images are concurrently shared into r + 1-leveled essential shadows and several non-leveled fault-tolerant non-essential shadows. If the first m-leveled essential shadows are obtained, then the first m-leveled secret images can be restored. Moreover, if all essential shadows are completely obtained and enough (but not all) non-essential shadows are also obtained, all secret images can be restored.
The remainder of this paper is organized as follows: The related work and motivation are presented in Section 2. The proposed (t1, t2, … , tr, k, n)-essential multi-secret image sharing scheme is described in Section 3. Section 4 presents the experimental results. Section 5 contains a security analysis. In Section 6, performance consideration and a comparative analysis are carried out. Finally, the conclusions are provided in Section 7.

2. Related Work and Motivation

Recent developments in secret image sharing have extended beyond traditional fixed-threshold schemes, emphasizing security, usability, and contextual adaptability. While early essential secret image sharing schemes (e.g., Li et al. 2013 [16]) laid the groundwork for distinguishing between essential and non-essential shadows, more recent studies have expanded these ideas toward greater functionality and robustness.
For instance, Yadav et al. [23] proposed meaningful essential secret sharing with uniform-sized shares, aiming to improve the visual friendliness and simplicity of implementation. Similarly, Wang et al. [8] introduced a hierarchical multi-level sharing scheme capable of progressive recovery using structured shadows. These approaches reflect the growing interest in stepwise image reconstruction and priority-based access.
Moreover, recent research has also explored verifiability and cryptographic guarantees. Dehkordi et al. [25] employed LWE-based techniques to ensure shadow authenticity in essential image sharing. On another front, Chattopadhyay et al. [26] designed a DNA-encrypted verifiable multi-secret sharing scheme, blending biomimetic encryption with share verification.
However, these works still lack two important features that our proposed EMSIS (essential multi-secret image sharing) scheme provides: (1) the ability to support multi-level contextual restoration based on sensor data; and (2) the flexible, fault-tolerant integration of non-essential shadows without sacrificing the security of higher-level secrets.

3. The Proposed Method

In this section, the proposed (t1, t2, … , tr, k, n)-essential multi-secret image sharing method is described. First, the specifications of the input and output for encoding shadow sets are defined as follows:
Input: t1, t2, … , tr, k, n, where t 1 < t 2 < < t r < k n , the secret images SI1, SI2, … , SIr, SIr+1 with r + 1 importance decreasing levels and size w × w , and the parameters x 1 ,   x 2 , …, x n   of n shadow holders are different.
Output: Among the essential shadow sets with each shadow size r w + w t 1 × w , the first essential shadow set is E 1,1 ,   E 1,2 , ,   E 1 , t 1 , the second essential shadow set is E 2 , t 1 + 1 ,   E 2 , t 1 + 2 , ,   E 2 , t 2 , …, the rth essential shadow set is E r , t r 1 + 1 ,   E r , t r 1 + 2 , ,   E r , t r , and the non-essential shadow set is { N E 1 ,   N E 2 , ,   N E n t r } .
In the proposed (t1, t2, … , tr, k, n)-essential multi-secret image sharing, the following conditions must be met:
(1)
If the amount of shadows from the mth essential shadow set is obtained as less than t m t m 1 , then the secret images SIm, SIm+1, …, SIr+1 cannot be restored.
(2)
If for each i = 1, 2, …, m, the amount of shadows obtained from the ith essential shadow set is t i t i 1 , then the secret images SI1, SI2, …, SIm can be restored.
(3)
Obtaining all essential shadows and at least k t r non-essential shadows can restore all secret images.
In the design of (t1, t2, …, tr, k, n)-essential multi-secret image sharing, in order not to reveal the appearance of the secret image, all r + 1 secret images will be rearranged individually through an invertible matrix. For i = 1, 2, …, r + 1, the rearranged secret image is split into sectors of t1 pixels, and the encoding actions are performed sequentially.
For each sector l, a i , l , j is the jth pixel value of the secret image SIi. Let g i , l x = u i , l x x t 1 + a i , l , t 1 x t 1 1 + a i , l , t 1 1 x t 1 2 + + a i , l , 2 x + a i , l , 1 , where
u i , l = 0 ,                                                                                     i = 0 d i , l , 0 + d i , l , 1 x + + d i ,   l , t i t 1 1 x t i t 1 1 ,                           2 i r       d r + 1 , l , 0 + d r + 1 , l , 1 x + + d r + 1 , l , k t 1 1 x k t 1 1 ,                   i = r + 1
and d i , l , j is a random positive integer. Therefore, for all i = 1, 2, … , r, g i , l x is a polynomial of degree t i 1 ,   a n d   g r + 1 , l x is a polynomial of degree k 1 . For each parameter x of the shadow holder, the initial shadow is defined as T(x) = { g i , j x | 1 i r + 1 ,   1 j t h e   a m o u n t   o f   s e c t o r s }. Therefore, it can be found that, for each sector l, deg g 1 , l x < deg g 2 , l x < < deg g r , l x < deg g r + 1 , l x , where deg f x represents the degree of the polynomial f x .
The following is the generation process of essential and non-essential shadows. Let the parameters of n shadow holders be distinct x 1 ,   x 2 ,…, x n . In step 1, assign the first essential shadow set E1 = E 1,1 ,   E 1,2 , ,   E 1 , t 1 as the initial shadow subset T x 1 , T ( x 2 ) ,   , T ( x t 1 ) .   In the second step, use the exclusive-or operation on all shadows in the first essential shadow set to obtain the first cover shadow C1. Later, for each shadow in the initial shadow subset T ( x t 1 + 1 ) , T ( x t 1 + 2 ) ,   , T ( x t 2 ) , use the exclusive-or operation with the first cover shadow C1 to obtain t h e   s e c o n d   e s s e n t i a l   s h a d o w   s e t   E 2 = E 2 , t 1 + 1 ,   E 2 , t 1 + 2 , ,   E 2 , t 2 , and so on. For i = 2, … , r, use the exclusive-or operation on all shadows in the ith essential shadow set Ei = E i , t i 1 + 1 ,   E i , t i 1 + 2 , ,   E i , t i   to obtain the ith cover shadow Ci, and, then, for each shadow in the initial shadow subset T ( x t i + 1 ) , T ( x t i + 2 ) ,   , T ( x t i + 1 ) , use the exclusive-or operation with the ith cover shadow Ci to obtain t h e   ( i + 1 ) t h   e s s e n t i a l   s h a d o w   s e t   E i + 1 = E i + 1 , t i + 1 ,   E i + 1 , t i + 2 , ,   E i + 1 , t i + 1 .
Finally, use the exclusive-or operation on all shadows in the rth essential shadow set E r = E r , t r 1 + 1 ,   E r , t r 1 + 2 , ,   E r , t r   to obtain the rth cover shadow Cr, and, then, for each shadow in the initial shadow subset T ( x t r + 1 ) , T ( x t r + 2 ) ,   , T ( x t n ) , use the exclusive-or operation with the rth cover shadow Cr to obtain the non-essential shadow set N E = { N E 1 ,   N E 2 , ,   N E n t r } .
The recovery process of essential multi-secret image sharing is phased. The rearranged secret images can be restored one after another by recovering the initial shadow set progressively. When the first essential shadow set E 1 = E 1,1 ,   E 1,2 , ,   E 1 , t 1   is available, this means that the initial shadow subset T x 1 , T ( x 2 ) ,   , T ( x t 1 ) is obtained by duplicating the first essential shadow set. Because there is only t 1   initial shadows, for each sector l, only g 1 , l x with degree t 1 1   can be solved. Therefore, only the rearranged secret image S I 1   can be recovered. Later, t h e   X O R process is performed on all essential shadows in the first essential shadow set t o   o b t a i n   t h e   f i r s t   c o v e r   s h a d o w   C 1 .  When the second essential shadow set E 2 = E 2 , t 1 + 1 ,   E 2 , t 1 + 2 , ,   E 2 , t 2   is also available, for each essential shadow in the second essential shadow set, the XOR operation is used with the first cover shadow C1 to obtain the initial shadow subset T ( x t 1 + 1 ) , T ( x t 1 + 2 ) ,   , T ( x t 2 ) . By combining the two initial shadow subsets T ( x 1 ) , T ( x 2 ) ,   , T ( x t 1 ) and T ( x t 1 + 1 ) , T ( x t 1 + 2 ) ,   , T ( x t 2 ) for each sector l, g 2 , l x   w i t h   d e g r e e   t 2 1   can be solved. Therefore, the rearranged secret image   S I 2   can be recovered.
For i = 2 to r, when taking the essential shadow sets E1 ~ Ei, the cover shadows C1 ~ Ci can thus be obtained by performing the XOR process on all essential shadows in the essential shadow set E1 ~ Ei, respectively. Then, for each essential shadow in the essential shadow set Ei, the XOR operation can be performed with the cover shadow Ci-1 to obtain the initial shadow subset T ( x t i 1 + 1 ) , T ( x t i 1 + 2 ) ,   , T ( x t i ) . Therefore, the initial shadow subset T ( x 1 ) , T ( x 2 ) ,   , T ( x t i ) can be obtained.
For the secret image recovery process, when receiving the union of the essential shadow sets E 1,1 , E 1,2 , , E 1 , t 1 E 2 , t 1 + 1 , E 2 , t 1 + 2 , , E 2 , t 2 E i , t i 1 + 1 , E i , t i 1 + 2 , , E i , t i , the shadows can be obtained from each stage, along with their corresponding essential shadow sets. By performing XOR operations, part of the initial shadow set T x 1 , T ( x 2 ) , , T ( x t i ) can be calculated, thereby restoring the rearranged secret images S I 1 ~ S I i . Finally, the restored rearranged secret images S I 1 , S I 2 , , S I i are rearranged by applying the inverse of the reversible matrix used during encoding to all pixel positions of the rearranged secret images, resulting in the distortion-free secret images S I 1 , S I 2 , , S I i .
Moreover, when the union of all essential sets E 1,1 , E 1,2 , , E 1 , t 1 E 2 , t 1 + 1 , E 2 , t 1 + 2 , , E 2 , t 2 E r , t r 1 + 1 , E r , t r 1 + 2 , , E r , t r is obtained, and k t r non-essential shadows are arbitrarily selected from the non-essential shadow set { N E 1 , N E 2 , , N E n t r } , the rearranged secret images S I 1 ~ S I r + 1 can be restored sequentially. Finally, the restored rearranged secret images S I 1 , S I 2 , , S I r + 1 are rearranged by applying the inverse of the reversible matrix used during encoding to all pixel positions of the rearranged secret images, resulting in the complete, distortion-free secret images S I 1 , S I 2 , , S I r + 1 .
Based on the above description, the image shadow encoding algorithm for (t1, t2, …, tr, k, n)-essential multi-secret image sharing is as follows:
Input: t 1 < t 2 < < t r < k n secret images of decreasing importance, each of size w × w , denoted as SI1, SI2, …, SIr, and SIr+1, and the parameters of n image shadow holders, each with a unique value   x 1 ,   x 2 ,…, x n .
Output: Image shadows with each size r w t 1 + t 2 + + t r + k × w , including t 1 shadows of the first essential shadow set E 1,1 ,   E 1,2 , ,   E 1 , t 1 , t 2 t 1 shadows of the second essential shadow set E 2 , t 1 + 1 ,   E 2 , t 1 + 2 , ,   E 2 , t 2 , …, t r t r 1 shadows of the rth essential shadow set E r , t r 1 + 1 ,   E r , t r 1 + 2 , ,   E r , t r , and n t r shadows of the non-essential shadow set { N E 1 ,   N E 2 , ,   N E n t r } .
The steps are as follows:
  • For each secret image S I 1 ,   S I 2 , , S I r + 1 , an invertible rearranging matrix is used to rearrange all pixel positions, resulting in the rearranged images S I 1 , S I 2 , , S I r + 1 . Each rearranged image is then segmented into several sectors, each containing t1 pixels.
  • For each shadow holder’s parameter x, the corresponding initial image segment T(x)= { g i , j x | 1 i r + 1 ,   1 j n u m b e r   o f   s e c t o r s } is generated.
  • The first essential shadow set E 1,1 ,   E 1,2 , ,   E 1 , t 1 is assigned as the first initial shadow subset T x 1 , T ( x 2 ) ,   , T ( x t 1 ) . XOR operations are performed on all the shadows in the first essential shadow subset E 1,1 ,   E 1,2 , ,   E 1 , t 1 , and the result is the first masked shadow. Let j = 1.
  • XOR operations are performed between the jth initial shadow set T ( x t j + 1 ) , T ( x t j + 2 ) ,   , T ( x t j + 1 ) and the jth cover shadow to obtain the (j + 1)th essential shadow set E j + 1 , t j + 1 ,   E j + 1 , t j + 2 , ,   E j + 1 , t j + 1 . XOR operations are performed on all the shadows in the (j + 1)th essential shadow set E j + 1 , t j + 1 ,   E j + 1 , t j + 2 , ,   E j + 1 , t j + 1 , and the result is the (j + 1)th cover shadow.
  • The value of j is added to 1, and step (4) is returned to if j is less than r.
  • The XOR operation is performed between the initial shadow set T ( x t r + 1 ) , T ( x t r + 2 ) ,   , T ( x n ) with the rth cover shadow to obtain the non-essential image storage { N E 1 ,   N E 2 , ,   N E n t r } .
In (t1, t2, …, tr, k, n)-essential multiple-secret image sharing, when the union of the first i essential shadows is obtained, the restoration algorithm of the secret image SI1, SI2, …, SIi is as follows:
Input: The union of the first i shadow sets E 1,1 , E 1,2 , , E 1 , t 1 E 2 , t 1 + 1 , E 2 , t 1 + 2 , , E 2 , t 2 E i , t i 1 + 1 , E i , t i 1 + 2 , , E i , t i with each shadow size r w t 1 + t 2 + + t r + k × w .
Output: The secret image SI1, SI2, …, SIi, each of size w × w.
The steps are as follows:
  • The first shadow set E 1,1 ,   E 1,2 , ,   E 1 , t 1 , i.e., the initial shadow set T x 1 , T ( x 2 ) ,   , T ( x t 1 ) , is used to restore the rearranged secret image, S I 1 . The XOR operation is performed on all shadows in the initial shadow set to obtain the first cover shadow. Let j = 1.
  • The XOR operation is performed on the jth cover shadow with the (j + 1)th essential shadow set E 2 , t j + 1 ,   E 2 , t j + 2 , ,   E 2 , t j + 1 to obtain the initial shadow set T ( x t j + 1 ) , T ( x t j + 2 ) ,   , T ( x t j + 1 ) . Then, the obtained initial shadow set T x 1 , T ( x 2 ) ,   , T ( x t j ) is combined to gain T x 1 , T ( x 2 ) ,   , T ( x t j + 1 ) .   Next, T x 1 , T ( x 2 ) ,   , T ( x t j + 1 ) is used to restore the secret images   S I j + 1 . The XOR operation is performed on the (j + 1)th essential shadow set to obtain the (j + 1)th cover shadows.
  • The value of j is added to 1, and if j is less than i, step 2 is repeated.
  • The restored rearranged secret images S I 1 , S I 2 , , S I i use the inverse of the invertible rearranging matrix during encoding to obtain the distortion-free secret images S I 1 ,   S I 2 , , S I i .
In (t1, t2, …, tr, k, n)-essential multiple-secret image sharing, when the union of all essential shadows is obtained, as well as the k t r   non-essential shadows, the restoration algorithm of the secret image SI1, SI2, …, SIr+1 is as follows:
Input: The union of all essential shadow sets E 1,1 ,   E 1,2 , ,   E 1 , t 1 E 2 , t 1 + 1 ,   E 2 , t 1 + 2 , ,   E 2 , t 2 E r , t r 1 + 1 ,   E r , t r 1 + 2 , ,   E r , t r with each shadow size r w t 1 + t 2 + + t r + k × w and any k t r   s h a d o w s   o f   the non-essential shadow set { N E 1 ,   N E 2 , ,   N E n t r } .
Output: The secret images SI1, SI2, …, SIr+1, each of size w × w.
The steps are as follows:
  • The first shadow set E 1,1 ,   E 1,2 , ,   E 1 , t 1 , i.e., the initial shadow set T x 1 , T ( x 2 ) ,   , T ( x t 1 ) , is used to restore the rearranged secret image, S I 1 . The XOR operation is performed on all shadows in the initial shadow set to obtain the first cover shadow. Let j = 1.
  • The XOR operation is performed on the jth cover shadow with the (j + 1)th essential shadow set E j + 1 , t j + 1 ,   E j + 1 , t j + 2 , ,   E j + 1 , t j + 1 to obtain the initial shadow set T ( x t j + 1 ) , T ( x t j + 2 ) ,   , T ( x t j + 1 ) . Then, the obtained initial shadow sets T x 1 , T ( x 2 ) ,   , T ( x t j ) are combined. Next, T x 1 , T ( x 2 ) ,   , T ( x t j + 1 ) is used to restore the secret images   S I j + 1 . The XOR operation is performed on the (j + 1)th essential shadow set to obtain the (j + 1)th cover shadows.
  • The value of j is added to 1, and if j is less than r, step 2 is repeated.
  • The XOR operation is performed on the rth cover shadow with any k t r   s h a d o w s   o f the non-essential shadow set N E 1 ,   N E 2 , ,   N E n t r ,   W . L . O . G .   s a y i n g   N E 1 ,   N E 2 , ,   N E k t r to obtain the corresponding subset   W . L . O . G .   s a y i n g   T ( x t r + 1 ) , T ( x t r + 2 ) ,   , T ( x k )   o f   k t r   s h a d o w s in the initial shadow set T ( x t r + 1 ) , T ( x t r + 2 ) ,   , T ( x n ) . Then, this is combined with the previously obtained initial shadow set T x 1 , T ( x 2 ) ,   , T ( x t r )   t o   g a i n   T x 1 , T ( x 2 ) ,   , T ( x k ) . Next, T x 1 , T ( x 2 ) ,   , T ( x k ) is used to restore the secret images S I r + 1 .
  • The restored rearranged secret images S I 1 , S I 2 , , S I r + 1 use the inverse of the invertible rearranging matrix during encoding to obtain the distortion-free secret images S I 1 ,   S I 2 , , S I r + 1 .
In the design of the (t1, t2, …, tr, k, n)-multi-secret essential secret image sharing mechanism, the essential shadow is completely non-tolerant, and only the non-essential shadow is fault-tolerant. Because essential shadows often represent a higher level of important information, non-fault tolerance means that the secrets can only be reconstructed if the conditions are fully met, such as the sufficient and correct participation of the shadow holder. Such restrictions are effective in preventing information leakage or rebuilding under false authorization, ensuring that high-level information is only available under strict authorization. For an attacker, if the essential shadows are not fault-tolerant, even if some of the essential shadows are obtained, the secret image cannot be restored. This is equivalent to increasing the difficulty and cost of cracking high-end secret content, as well as enhancing the defense of the overall mechanism.

4. Experimental Results

Figure 1 illustrates the experimental results of the (2, 4, 6, 8)-essential multi-secret image sharing mechanism with the sensor data. Figure 1a is a secret thermal image (Image1) captured by a thermal sensor. Figure 1b shows the recoverable image obtained by rearranging Image1 with the reversible rearrangement matrix 30 29 31 29 . Figure 1c is a secret fingerprint (Image2) captured by a fingerprint sensor. Figure 1d shows the recoverable image obtained by rearranging Image2 with the same reversible rearrangement matrix 30 29 31 29 . Figure 1e is a secret MRI image (Image3) taken by a medical imaging sensor (an MRI scanner) and marked with abnormal areas (e.g., lesions). Figure 1f shows the recoverable image obtained by rearranging Image3 with the reversible rearrangement matrix 30 29 31 29 . Subsequently, Figure 1g,h shows the level 1 essential shadows, Figure 1i,j shows the level 2 essential shadows, and Figure 1k–n shows the non-essential shadows, all generated by implementing the (2, 4, 6, 8)-essential multi-secret image sharing procedure in Figure 1b,d,f. Figure 1o is the rearranged thermal image obtained by restoring all the essential shadows of the first level, while Figure 1p is the recovered thermal secret image obtained by using the inverse rearrangement matrix 30 29 31 30   to rearrange Figure 1o. Figure 1q is the rearranged fingerprint image obtained by restoring all the essential shadows of the first and second levels, while Figure 1r is the recovered fingerprint secret image obtained by using the inverse rearrangement matrix 30 29 31 30   to rearrange Figure 1q.
Figure 1s is the rearranged MRI image obtained by restoring all the essential shadows of the first and second levels and any two of the non-essential shadows, while Figure 1t is the recovered MRI secret image obtained by using the inverse rearrangement matrix 30 29 31 30 to rearrange Figure 1s. Notably, the proposed recovery process restores the original MRI classified image with the anomalous area markers intact.
In the above figure, as the proposed method ensures exact pixel-level recovery through reversible transformations and deterministic reconstruction, the restored secret images are bitwise identical to the original secret images. This lossless nature leads to a mean squared error (MSE) of zero, resulting in a PSNR that tends toward infinity and a structural similarity index (SSIM) of 1.0. These outcomes confirm that the reconstructed images are distortion-free.
As essential multi-secret image sharing is a novel approach, there are no articles on the topic. In comparison with essential secret sharing schemes [25], the proposed method benefits from staged recovery with multiple security levels. However, in comparison with a multi-secret sharing scheme, for example, that in [26], the proposed essential multi-secret sharing scheme provides the partial and fault-tolerant recovery of secret images rather than completely no fault tolerance and no progressive recovery, as in [26].
In the essential multi-secret image sharing scheme proposed in this paper, a method is designed to share multiple secret sensor images, and multiple secret sensor images can be restored according to the obtained essential or non-essential shadows. Multiple secret sensor images can be restored in stages, which can create specific application scenarios for image security.

5. Security Analysis

In this section, the proposed (t1, t2, …, tᵣ, k, n)-essential multi-secret image sharing scheme is analyzed from a security perspective, focusing on common threat models such as shadow interception, collusion, and unauthorized reconstruction.
(1)
Shadow interception
Essential shadows are strictly non-fault-tolerant, which means that, unless the complete set of required essential shadows for a given level is obtained, the corresponding secret image cannot be reconstructed. Intercepting fewer essential shadows yields no partial recovery due to the threshold enforcement and a lack of redundancy.
(2)
Collusion attacks
Even if multiple parties collude and combine their non-essential shadows or partial sets of essential shadows, the structure of the polynomial-based encoding prevents successful interpolation unless the number of required linearly independent shares is satisfied. This property ensures that incomplete collaboration does not lead to data leakage.
(3)
Rearrangement obfuscation
All secret images are obfuscated using a reversible rearrangement matrix before encoding. This transformation eliminates spatial coherence in the original images, rendering the shadows visually meaningless and resistant to visual pattern attacks or heuristic analysis.
(4)
Unauthorized reconstruction
The scheme’s hierarchical design ensures that lower-level secrets may be restored only with their corresponding level of essential shadows. Higher-level secrets are cryptographically protected and inaccessible without the complete higher-level shadow sets. This enforces access control and limits information exposure in the case of partial compromise.
Through these mechanisms, the proposed scheme exhibits strong resilience against passive eavesdropping, shadow interception, and active collusion, making it suitable for secure, context-aware image distribution applications in real-world environments.

6. Performance Consideration and Comparative Analysis

(1)
Computational complexity:
The proposed EMSIS scheme involves two main computational stages: (1) pixel rearrangement using an invertible matrix, and (2) polynomial-based encoding for shadow generation. The rearrangement process operates in linear time with respect to the number of pixels O(w2), and the polynomial encoding per sector of t pixels and n shadow holders has complexity O(nt). All XOR operations are low-cost and can be efficiently computed. As the image is segmented into sectors, these operations are highly parallelizable, making the scheme scalable for large sensor images.
(2)
Scalability:
The design is modular and allows for parallel processing per sector and per image level. This means that high-resolution images (e.g., 1024 × 1024) can be split and processed in parallel threads or distributed environments, such as edge servers or GPUs, thereby reducing the total encoding and decoding time.
(3)
Storage and transmission overhead:
Each generated shadow represents only a portion of the image data and is not a full duplication of the image. For r+1 secret images with s essential and n−s non-essential shadows, the total storage requirement is approximately proportional to (r+1)w2, which increases linearly with the number of images and shadow count. This redundancy is deliberately introduced to provide fault tolerance and access control. In deployment, only the minimum required shadows need to be stored or transmitted, balancing efficiency and security.
To clarify the differences and advantages of the proposed EMSIS scheme over traditional essential and multi-secret image sharing methods, a comparative summary is provided in Table 1.
The results demonstrate that the proposed method provides unique advantages in flexibility, security, and staged image reconstruction, which are not supported by earlier approaches. While all schemes support lossless recovery, only EMSIS supports multi-level access, selective restoration, and context integration.

7. Conclusions

In this study, we proposed a (t1, t2, …, tr, k, n)-essential multi-secret image sharing mechanism integrated with sensor data and reversible rearrangement matrices to ensure the secure sharing and accurate reconstruction of sensitive images. The experimental results validate the effectiveness of the proposed approach. Secret images from various sensors—including thermal, fingerprint, and medical MRI scanners—were successfully rearranged using a reversible transformation, partitioned into essential and non-essential shadows, and subsequently recovered according to their designated security levels. Importantly, the restoration process preserved critical information, such as the anomalous region markers in MRI images, without distortion or information loss. These results demonstrate that the proposed method provides a robust, flexible, and fault-tolerant solution for multi-level essential image sharing, maintaining the high fidelity of the original secret images while accommodating the varying importance and security requirements of different types of sensor data.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The reader who wants to get the images in the paper can send email to cotachen@saturn.yzu.edu.tw.

Conflicts of Interest

The author declare no conflicts of interest.

References

  1. Naor, M.; Shamir, A. Visual Cryptography; Advances in Cryptology–Eurocrypt 94; Springer: Berlin, Germany, 1995; pp. 1–12. [Google Scholar]
  2. Ibrahim, D.R.; Teh, J.S.; Abdullah, R. An overview of visual cryptography techniques. Multimed. Tools Appl. 2021, 80, 31927–31952. [Google Scholar] [CrossRef]
  3. Wang, B.; Wang, W.; Zhao, P. A zero-watermark algorithm for multiple images based on visual cryptography and image fusion. J. Vis. Commun. Image Represent. 2022, 87, 103569. [Google Scholar] [CrossRef]
  4. Chang, C.C.; Hwang, R.J. Sharing secret images using shadow codebooks. Inf. Sci. 1998, 111, 335–345. [Google Scholar] [CrossRef]
  5. Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
  6. Chen, S.K.; Lin, J.C. Fault-tolerant and progressive transmission of images. Pattern Recognit. 2005, 38, 2466–2471. [Google Scholar] [CrossRef]
  7. Hung, K.H.; Chang, Y.J.; Lin, J.C. Progressive sharing of an image. Opt. Eng. 2008, 47, 047006. [Google Scholar] [CrossRef]
  8. Wang, X.L.; Xie, D.; Chen, F.L.; Wu, B.; Zen, Y.Y. Progressive and multi-level sharing scheme with hierarchical shadows. Multimed. Tools Appl. 2022, 81, 31039–31059. [Google Scholar] [CrossRef]
  9. Wu, Y.S.; Thien, C.C.; Lin, J.C. Sharing and hiding secret images with size constraint. Pattern Recognit. 2004, 37, 1377–1385. [Google Scholar] [CrossRef]
  10. Thien, C.C.; Lin, J.C. An Image-Sharing Method with User-Friendly Shadow Images. IEEE Trans. Circuits Syst. Video Technol. 2003, 13, 1161–1169. [Google Scholar] [CrossRef]
  11. Cheng, J.; Liu, L.; Chen, F.; Jiang, Y. Meaningful Secret Image Sharing with Uniform Image Quality. Mathematics 2022, 10, 3241. [Google Scholar] [CrossRef]
  12. Wang, R.Z.; Shyu, S.J. Scalable secret image sharing. Signal Process. Image Commun. 2007, 22, 363–373. [Google Scholar] [CrossRef]
  13. Yang, C.N.; Huang, S.M. Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 2010, 283, 1750–1762. [Google Scholar] [CrossRef]
  14. Yang, C.N.; Chu, Y.Y. A general (k, n) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 2011, 84, 1726–1733. [Google Scholar] [CrossRef]
  15. Liu, Y.X.; Yang, C.N.; Yeh, P.H. Reducing shadow size in smooth scalable secret image sharing. Secur. Commun. Netw. 2014, 7, 2237–2244. [Google Scholar] [CrossRef]
  16. Li, P.; Yang, C.N.; Wu, C.C.; Kong, Q.; Ma, Y. Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 2013, 24, 1106–1114. [Google Scholar] [CrossRef]
  17. Yang, C.N.; Li, P.; Wu, C.C.; Cai, S.R. Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process. Image Commun. 2015, 31, 1–9. [Google Scholar] [CrossRef]
  18. Chen, C.C.; Tsai, Y.H. An expandable essential secret image sharing structure. J. Inf. Hiding Multimed. Signal Process. 2016, 7, 135–144. [Google Scholar]
  19. Chen, S.K. Essential secret image sharing with increasable shadows. Opt. Eng. 2016, 55, 013103. [Google Scholar] [CrossRef]
  20. Chen, C.C.; Chen, S.C. Two-layered structure for optimally essential secret image sharing scheme. J. Vis. Commun. Image Represent. 2016, 38, 595–601. [Google Scholar] [CrossRef]
  21. Li, P.; Yang, C.N.; Zhou, Z. Essential secret image sharing scheme with the same size of shadows. Digit. Signal Process. 2016, 50, 51–60. [Google Scholar] [CrossRef]
  22. Chen, C.C. Essential Secret Image Sharing Scheme with Equal-sized Shadows Generation. J. Vis. Commun. Image Represent. 2018, 52, 143–150. [Google Scholar] [CrossRef]
  23. Yadav, M.; Singh, R. Essential secret image sharing approach with same size of meaningful shares. Multimed. Tools Appl. 2022, 81, 22677–22694. [Google Scholar] [CrossRef]
  24. Li, P.; Liu, Z.; Yang, C.N. A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process. Image Commun. 2018, 65, 210–220. [Google Scholar] [CrossRef]
  25. Dehkordi, M.H.; Farahi, S.T.; Mashhadi, S. LWE-Based Verifiable Essential Secret Image Sharing Scheme ((t, s, k, n)-VESIS). IET Image Process. 2024, 18, 1053–1072. [Google Scholar] [CrossRef]
  26. Chattopadhyay, A.K.; Saha, S.; Nag, A.; Singh, J.P. A verifiable multi-secret image sharing scheme based on DNA encryption. Multimed. Tools Appl. 2025, 84, 1967–1983. [Google Scholar] [CrossRef]
Figure 1. (2, 4, 6, 8)—Experimental results of essential multi-secret image sharing: (a) secret thermal image Image1, (b) rearranged image of Image1, (c) secret fingerprint image Image2, (d) rearranged image of Image2, (e) secret MRI image of Image3, (f) rearranged image of Image3, (g,h) first-leveled essential shadows, (i,j) second-leveled essential shadows, (kn) non-essential shadows, (o) recovered by rearranged images (g,h), (p) recovered images by rearranging (o), (q) recovered by rearranged images (gj), (r) recovered images by rearranging (q), (s) recovered by rearranged images (gj) and any two rearranged images (kn), and (t) recovered images by panel (s).
Figure 1. (2, 4, 6, 8)—Experimental results of essential multi-secret image sharing: (a) secret thermal image Image1, (b) rearranged image of Image1, (c) secret fingerprint image Image2, (d) rearranged image of Image2, (e) secret MRI image of Image3, (f) rearranged image of Image3, (g,h) first-leveled essential shadows, (i,j) second-leveled essential shadows, (kn) non-essential shadows, (o) recovered by rearranged images (g,h), (p) recovered images by rearranging (o), (q) recovered by rearranged images (gj), (r) recovered images by rearranging (q), (s) recovered by rearranged images (gj) and any two rearranged images (kn), and (t) recovered images by panel (s).
Jimaging 11 00228 g001
Table 1. Comparative summary of the proposed EMSIS scheme, an essential secret image sharing method [25], and a multi-secret image sharing method [26].
Table 1. Comparative summary of the proposed EMSIS scheme, an essential secret image sharing method [25], and a multi-secret image sharing method [26].
Feature/MethodProposed EMSIS Scheme(t, s, k, n)-ESS [25]DNA-Multi-SIS [26]
Recovery typeLosslessLosslessLossless
Hierarchical recoveryYesNoNo
Fault tolerance (non-essential shadows)YesLimitedNo
Shadow size uniformityAdjustableFixedFixed
Context-aware reconstruction (e.g., sensor data)YesNoNo
Resistance to partial shadow attackHighModerateLow
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, S.-K. Essential Multi-Secret Image Sharing for Sensor Images. J. Imaging 2025, 11, 228. https://doi.org/10.3390/jimaging11070228

AMA Style

Chen S-K. Essential Multi-Secret Image Sharing for Sensor Images. Journal of Imaging. 2025; 11(7):228. https://doi.org/10.3390/jimaging11070228

Chicago/Turabian Style

Chen, Shang-Kuan. 2025. "Essential Multi-Secret Image Sharing for Sensor Images" Journal of Imaging 11, no. 7: 228. https://doi.org/10.3390/jimaging11070228

APA Style

Chen, S.-K. (2025). Essential Multi-Secret Image Sharing for Sensor Images. Journal of Imaging, 11(7), 228. https://doi.org/10.3390/jimaging11070228

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop