1. Introduction
Multimedia security technology is used to prevent unauthorized users from copying, sharing, and modifying media content. To prevent this problem, encryption and information hiding are often used to protect media content. As far as information hiding technology is concerned, traditional information hiding technology will destroy the content of the cover image. However, in some exceptional cases, such as military, medical, and legal document images, the slight distortion of the image is entirely unacceptable. Therefore, whether these images can be completely restored is very important. Reversible data hiding scheme (RDH) can correspond with the requirement of being lossless. RDH methods applied the methodology of changing context to hide the secret data in cover media. After data extracting, the changing context will be fully recovered to the cover media. On the other hand, RDHEI (Reversible Data Hiding in Encrypted Images) technology can combine encryption technology with RDH technology, which can not only hide secret information in the image, but can also encrypt the image to protect the image content.
RDH techniques can be broadly classified into three types: (1) Difference Expansion [
1,
2,
3]: Difference expansion is performed by expanding the difference between adjacent pixels, and then secret information is embedded into the difference. Since the difference will be expanded after the secret information is embedded, this technique will inevitably produce a larger distortion; (2) Histogram Shift [
4,
5,
6]: through Histogram Shift, the histogram is shifted by the original image or the histogram of the predicted discrepancy, and the empty position after the shift is used to embed the secret information; (3) Lossless Compression [
7,
8]: The secret information is hidden in the extra space after compressing the original image. Since lossless compression may lead to significant degradation of visual quality, it has received less attention. By and large, the RDH approach is based on the above with some other added strategies. For example, in 2019, Zhao et al. proposed a method of histogram displacement [
9]. First, the secret information is converted into a message with only −1, 0, and 1 by encoding. Then, the middle segment bin is selected for embedding on the histogram displacement. These bins can all be used to embed a −1, 0, or 1 message by shifting them left and right. Finally, the band size is adjusted using the Threshold, and the histogram is created using the prediction error values generated by the Chess Board Prediction method. In 2021, Gao et al. proposed a histogram displacement method for embedding medical images [
10]. By dividing medical images into ROI and NROI, the embedding process will stretch the histogram created by the pixel values of ROI to the left and right, which expands the embedding capacity of ROI and enhance the contrast of the image.
RDHEI techniques can be divided into two categories: (1) Vacating Room before Encryption, VRBE [
11,
12,
13,
14,
15,
16,
17]: the original image is first vacated and then encrypted; and (2) Vacating Room after Encryption, VRAE [
18,
19,
20,
21]: The image is first encrypted, and because the encrypted image retains certain properties, the encrypted image can be hidden. VRBE technology mainly focuses on reversible information hiding or compression of the original image to free up space. It encrypts the image, so there is space to hide information in the encrypted image. For example, in 2013, Ma et al.’s RDHEI method belongs to the technology of Vacating Room before Encryption [
11]. They performed reversible information hiding in the original image beforehand and embedded the LSB part of a block into the image. As a result, the encrypted image can use the LSB part of this block to hide data. In 2018, Puteaux et al. performed MSB prediction and compression on the original image so that the MSB part could vacate most of the space, and the encrypted image could use this MSB part to embed the data [
13]. In 2021, Yin et al. proposed a method based on pixel prediction and multi-MSB plane, which belongs to Vacating Room before Encryption [
17]. First, it used the MED predictor to obtain the predicted value, and to calculate the predicted error (PE) between the predicted value and original value. Next, the sign bit of PE is stored in bit-plane 8, and the absolute value of PE is represented in bit-plane 7 (bit-plane 7) and bit-plane 1 (bit-plane 1). The bit plane is then divided into Uniform Blocks and Non-Uniform Blocks, and these blocks are rearranged. Since prediction errors are usually concentrated around zero, these bit planes, which have a large number of uniform blocks, can be encoded and compressed to free up space. On the other hand, VRAE technology mainly uses a specific encryption technique to maintain the dependency of the neighboring pixels in the encrypted image. Therefore, this feature can be used to hide the information in the encrypted image. Commonly used encryption techniques include Block-Level Scrambling [
18] or Block-Level Encryption [
19], in which pixels in the same block use the same random value for XOR (Exclusively-OR). For example, in 2019, Qin et al. proposed a VRAE method [
18] that first encrypts the image by stirring the image between bit-planes, between blocks, and within blocks so that the pixels within the blocks retain their dependency. Then, block classification and encoding compression are used to generate the embedding space when embedding information. In 2019, Wang et al. proposed a VRAE approach, where their encryption uses inter- and intra-block stirring so that pixels within a block retain dependency [
19]. Then, for the information embedding, they use the 3-LSB of all pixels in the flip block to divide the block into EB (Embeddable Block), and NEB (Non-Embeddable Block), and only the secret information is embedded in the EB. The location map of the block is embedded using the RDH method to hide 5-MSB of all pixels.
Recently, some scholars have proposed the RDHEI approach based on Secret Sharing [
20,
21,
22]. In 2018, Wu et al. proposed an RDHEI method based on Secret Sharing [
20]. However, their encrypted image size was more than twice the size of the original image. In 2019, Chen and other scholars proposed a secret sharing-based RDHEI method that converts original images into encrypted images via the sharing technique of Shamir’s Secret Sharing and distributes the encrypted images to information hiders for information hiding [
21]. Since the size of the generated encrypted image is the same as that of the original image, no information inflation occurs. All of the above methods are targeted at a single information supporter. In 2020, Chen and other scholars proposed a new secret-sharing RDHEI approach [
22], which expands the original single information hider into multiple information hiders. The total embedding volume of Chen et al.’s method is fixed, so the embedding rate decreases as the number of shared images increases.
In this study, we propose a new RDHEI technique where we hide the pixel values into the polynomial coefficients by dividing multiple pixels into a group. First, the image owner confidentially shares the image, generating a shared image and leaving space in each shared image for information embedding. Then, the information recipient can embed a confidential message after receiving the shared image. Finally, the recipient can decrypt the image and remove the hidden information. The recipient needs to obtain at least a Threshold before the original image can be recovered. Our approach enables multiple information hiders and has a more suitable fixed embedding rate. Furthermore, it solves the problem that the embedding rate becomes smaller as the number of shared images becomes larger and successfully improves the embedding rate compared with the previous method.
The remaining sections of this study are organized as follows.
Section 2 reviews Chen’s existing work [
22].
Section 3 describes our novel secret sharing images with multiple data hiders method. This is followed by its experimental results along with the analysis and the existing works comparisons in
Section 4. Finally, the conclusion is drawn in
Section 5.
2. Preliminary
This section introduces Chen et al.’s approach, which develops RDHEI techniques through Shamir’s Secret Sharing method. Chen et al.’s method has the role of multiple information hiders, but their total embedding is fixed, so the embedding rate decreases as the number of shared images increases. Chen et al.’s approach is introduced in the following.
Figure 1 shows the flowchart of encryption, embedding, extraction, and decryption by Chen et al. First, the content-owner encrypts the image and uses the key
ke to encrypt the original image into
n. Each encrypted image is the same size as the original image. Then, each encrypted image is assigned to a different information hider. Each information hider, Data-hider
t, hides the confidential information in the encrypted image
t through the key
kht. Finally, the
receiver simply collects any
k encrypted images with embedded information and related keys to extract the embedded information and decrypt it to obtain the original image.
The content-owner performs the image encryption by first dividing image
I into parts A and B. Part A is the first 10 pixels of the image, and the remaining part is part B.
Figure 2 is the representation. Part A is used to store the parameters of the information hiding and the parameters of the histogram displacement process. First, the following bits are extracted from part A: all bits of the first two pixels and 3 LSBs of the last 8 pixels. Next, all the extracted bits are defined as AP. Then, scan all pixels in the part B, recording the location of the pixel values
250 with the location map, modify these pixel values to 249, and create a histogram of part B. From the histogram, we found the most suitable embedding point for embedding the location map and AP, which was defined as PP. In the histogram, all the values between o PP + 1 and 249 are shifted one place to the right so that the location map and AP can be using PP for 0 and for 1, as shown in
Figure 3. Finally, the PP value is embedded into the 3-LSB part of the last 8 pixels of the A part. After the above pre-processing, image
I is modified to image
I′.
Using Equation (1), the B part of the image
I′ is shared confidentially via Shamir’s Secret Sharing, where
Ti,j(0) is a constant,
ai,j(α) is an integer random number, and
I′i,j is the pixel value of position (
i,
j). The image owner uses key
ke to generate
n non-zero random integers
xi,j(t),
, to bring
xi,j(t) into Equation (1) within
x to obtain the confidential sharing result
Fi,j (
xi,j(t)),
. It then hides the parameters
t and
n into the first two pixels of part A. From this we can obtain
n encrypted images
E(t),
.
Data embedding is performed using the n information hiders separately. The t-th information hider obtains the shared encrypted image E(t) by scanning the first 2 pixels to obtain the t and n values. It divides the pixels into groups. Each group contains n pixels and replaces the l of the t-th pixel in each group with the secret information. As a result, the n encrypted images Em(t), with the secret information embedded can be obtained. The embedding rate of this method is bpp (bit per pixel), where W and H are the width and height of the image, respectively.
In this part of information extraction and image decryption, it is assumed that the first k shared images are Em(t), and the key is kd. In the information extraction phase, for any shared image Em(t), . By sharing the first 2 pixels of the image, t and n can be obtained. Next, divide all the pixels in the B part of Em(t) into a group, and extract the l-LSB of the t-th pixel in each group to obtain the secret information of the shared image Em(t). In image decryption, for the pixel Em(t)i,j, at the coordinates (i,j), and the non-zero random integers xi,j(t), and generated by the key kd, equation can be obtained through the Lagrange polynomial. (1) Polynomial Fi,j(x) = , where Xa is substituted using xi,j(a). However, Em(t)i,j, may not be able to obtain the correct Fi,j(x) because l bits are hidden into l-LSB. Without a loss of generality, assuming that the first pixel to share an image is hidden in l-bit, i.e., Em(1)i,j is hidden in l-bits, then when the Em(1)i,j of l-LSB is modified to 0, 1, 2, ..., 2l − 1, one of them must be Em(1)i,j before embedding l-LSB, which is called the correct Em(1)i,j. The correct Em(1)i,j can be identified by using Fi,j (0) = Ti,j (0), where Ti,j (0) is the constant used in the encryption step. After constructing Fi,j (x), from Equation (1) pixel I′i,j of the coordinates (i,j) can be obtained and therefore the image I′ can also be obtained. Finally, the image I′ is restored to the original image I using the information in part A.
3. Proposed Method
In this section, we propose a new approach to the interplay of confidential image sharing and information hiding. Our approach is also based on Shamir’s Secret Sharing technique of confidential sharing. The traditional Shamir (
k,
n)-threshold secret sharing technique shares confidential information
D into
n shared information and the original confidential information
D can be calculated by taking out
k of the shared information. This method requires the construction of a
k polynomial, as follows:
where
,
is a prime, constant, or coefficient
. If this mechanism is applied to image sharing, for example, for a grayscale image with a gray scale of 256, to share a pixel value
P, the above polynomial is usually used with
and
= 251. Because the value range of pixel value
P is 0~255, all pixel values of the image must be pre-processed so that the range of all pixel values becomes 0~250.
We propose the finite field (
) strategy, modifying Shamir’s polynomial formulation, as follows:
where the constants or coefficients are
and both multiplication and addition are performed using the
operator. Since the
quadrature is closed, i.e., if
, then
,
,
, and
, the polynomial can be directly applied to image sharing, and in the case of grayscale images with 256 (=
) gray levels, no pixel-specific pre-processing is required at all.
Our method has three roles: Content-owner, Data-hiders, and Receivers, as shown in
Figure 4, which shows the operation flow of our method in image encryption, data embedding, data extracting, and image decryption. We take Shamir’s (
k,
n)-threshold as an example, where
n means
n shared images are generated and
k means
k shared images are obtained to decrypt the original image. First of all, the image owner can generate
n shared images through Shamir’s Secret Sharing technology and Galois field 256 for confidential sharing of the original image
M. The key
are the keys required to generate
, respectively. Next, the data-hider has a separate pair of
n shared images to embed the confidential data
S (n) embedded in
n in a shared image to generate an embedded shared image
. Lastly,
n image recipients receive the embedded shared image, respectively
. Any image recipient with an embedded key
can retrieve the confidential information embedded by the data-hider from the shared image. In addition, as long as any
k of the embedded shared images can be decrypted, assuming that the
k embedded shared images are
then using the key
can decrypt the original image
M and retrieve confidential data
S. Linear operations on polynomials through a Galois domain, whose addition and multiplication are similar to normal addition and multiplication, except that the result of the operations are elements of the domain.
3.1. Image Encryption
For the image encryption part, we use Shamir’s confidential sharing and pixel grouping strategy.
Figure 5 shows our confidential sharing process. We group the original pixels, if for Shamir’s sharing (
k, n)-threshold, each group contains
k pixels, in the sharing process of group (
Pi,j, …,
Pi,j+k−1), we use these pixel values to build
k − 1 times polynomial, then use
X1,
X2, …,
Xn substituted into the polynomial to obtain the shared pixels
y(1)i,j, …,
y(n)i,j. Each shared pixel,
y(t)i,j, can be split into
k pixels to produce
C(t)i,j, …,
C(t)i,j+k−1. Since the group (
C(t)i,j, …,
C(t)i,j+k−1) holds only
y(t)i,j with 8 bits, so the group can be empty of
bits of space.
Here is our cryptographic algorithm. Our Algorithm 1 is illustrated with Shamir (
k,
n)-thresholds, so the polynomial is a (
k − 1)-
th polynomial.
Algorithm 1: Image Sharing
|
Input: Image M, Encryption keys Xt, . |
Output: Sharing images C(t), . |
Step 1: A set of pixels (Pi,j, …, Pi,j+k−1) is extracted from Image M. The polynomial is generated using the set of pixels (Pi,j, …, Pi,j+k−1). |
Step 2: Substitute the Encryption key Xt, through 256 Galois field into the polynomial to obtain n encrypted pixel values y(t)i,j, where y(t)i,j , . |
Step 3: The encrypted pixel values y(t)i,j are divided into 8-bits, and each bit is put into the pixels of the shared image C(t) in order (C(t)i,j, …, C(t)i,j+k−1), and it is called the P part, if , because cannot put all the bits at once, so the remaining bits are put in order again and the remaining vacant part is called Part B. |
Step 4: Repeat Step 2 and Step 3 until all set of pixels (Pi,j, …, Pi,j+k−1) have been processed. |
Step 5: Output n encrypted shared images C(t),. |
3.2. Data Embedding
In the image embedding part, when the
tth data-hider receives the shared image
C(t), it embeds each pixel of
C(t), and through the B part, it embeds the secret message
S(t) into
C(t) one after another.
Figure 6 shows the embedding process of data-hider
t for the pixel group (
C(t)i,j, ...,
C(t)i,j+k−1). Since group (
C(t)i,j, ...,
C(t)i,j+k−1) has a space of 8(
k − 1) bits, part of the confidential data
S(t) can be directly embedded in this space, resulting in the embedded shared group (
C′(t)i,j, ...,
C′(t)i,j+k−1). The embedding rate of our method is fixed, and the embedding rate does not decrease as the number of shared images increases. The following is our embedding Algorithm 2.
Algorithm 2: Data Embedding
|
Input: Sharing images C(t), , Data S(t) |
Output: Marked sharing images C′(t) |
Step 1: For a pixel C(t)i,j of Sharing images C(t), the message is taken from the secret message S(t) and embedded in the B part of pixel C(t)i,j. |
Step 2: Repeat Step 1 until all the B parts of C(t)i,j are embedded in the secret message. |
Step 3: The output of the embedded shared image C′(t). |
3.3. Data Extracting and Image Decryption
In the part of data extraction and image decryption, the tth image recipient receives the shared image , and can extract the confidential information S(t) embedded by the tth data-hider. In addition, by collecting the shared images and decryption keys above the Threshold, a polynomial can be constructed for each set of pixels, through which the pixels of the original image and the secret information of the image owner can be extracted and the original image M can be recovered.
Figure 7 shows the process of extracting the cluster (
C′(t)i,j, ...,
C′(t)i,j+k−1) by Receiver
t. The pixel group (
C′(t)i,j, ...,
C′(t)i,j+k−1) has been embedded in a confidential message of 8 (
k − 1) bits and can be taken out directly into a partial
S(t). After extraction, there is no need to reduce this group to (
C(t)i,j, ...,
C(t)i,j+k−1), because the group can obtain
y(t)i,j whether it is reduced or not.
Figure 8 shows the response flow diagram of the pixel group (
Pi,j, …,
Pi,j+k−1). Assuming that the first
k shared images are obtained from
, the pixels of each shared image are also grouped, and each group contains
k pixels. For the 7th shared image
C(t) for which the pixel group (
C(t)i,j, ...,
C(t)i,j+k−1) can be taken out to share pixels
y(t)i,j. Using
y(t)i,j,
t = 1, 2, ...,
k and
,
t = 1, 2, ...,
k and Lagrange polynomials, the originally constructed (
k − 1)-
th polynomial can be recovered, and therefore the pixel group (
Pi,j, …,
Pi,j+k−1) can be recovered.
The following is our Algorithm 3 for recovering images and extracting secret information. For the sake of illustration, we assume that we obtain the first
k marked shared images
and use the key
to decrypt the original images
M and extract the secret information
S(1), ...,
S(k).
where
,
, and add, subtract, multiply, and divide are all in
GF(256).
Algorithm 3: Data extracting and image decryption
|
Input: Marked sharing images , Decryption keys |
Output: Data S(1), S(2),…, S(k), Original image M |
Step 1. Take part B of the image to obtain the secret information S(1), ..., S(k). |
Step 2. For sharing a set of pixels of the image (i,j, ..., i,j+k−1), extract the P part of the pixel set and merge it into the encrypted pixel values y(t)i,j, . |
Step 3. Bring the encrypted pixel values y(1)i,j,, y(2)i,j, ..., y(k)i,j with the decryption keys into Lagrange polynomial of Equation (4), build the polynomial . |
Step 4. The coefficients of the polynomial are used to obtain the pixel sets (Pi,j, …, Pi,j+k−1) of the original images. |
Step 5. Repeat Step 2 to Step 4 until all pixel groups (Pi,j, …, Pi,j+k−1) have been processed. |
Step 6. Combine all pixel groups (Pi,j, …, Pi,j+k−1) into the original image M. |
Step 7. Output the original image M and the secret information S(1), S(2),..., S(k). |
3.4. Example
We give an example of Shamir’s (3, 3)-threshold. Assuming the secret information S(1)= 10000 10000 010000 (2), S(2) = 01000 01000 001000 (2), S(3)= 00100 00100 000100 (2), the pixel values of the pixel group (Pi,j, …, Pi,j+k−1) of the original image are P(i,j) = 2 (10), P(i,j+k) = 4 (10), P(i,j+2) = 8 (10). The pixel group (Pi,j, …, Pi,j+k−1) generates 3 pixel groups of shared images after embedding secret information (C′(1)i,j, …, C′(1)i,j+k−1), (C′(2)i,j, …, C′(2)i,j+k−1), (C′(3)i,j, …, C′(3)i,j+k−1).
3.4.1. Encryption and Embedding Steps
The set of pixel values of the original image are P(i,j) = 2 (10) = 10 (2), P(i,j+k) = 4 (10) = 100 (2), and P(i,j+2) = 8 (10) = 1000 (2), respectively. Using the pixel values P(i,j), P(i,j+k), and P(i,j+2) to construct the polynomial , we obtain . Then, we start the encryption, at this time we assume the encryption keys Xt are X1 = 10, X2 = 20, X3 = 30, substitute them into and get 3 encrypted shared pixels by GF(256), respectively, y(1) = 60 (10) = 001 111 00 (2), y(2) = 10 (10) = 000 010 10 (2), y(3) = 52 (10) = 001 101 00 (2). Finally, the encrypted pixel values are divided into 8 bits and stored in the pixel group (C(t)i,j, …,C(t)i,j+k−1),, called the P part. We can get
C(1)i,j = 010 00000 (2), C(1)i,j+1 = 010 00000 (2), C(1)i,j+2 =11 000000 (2).
C(2)i,j = 001 00000 (2), C(2)i,j+1 = 010 00000 (2), C(2)i,j+2 =00 000000 (2).
C(3)i,j = 010 00000 (2), C(3)i,j+1 = 000 00000 (2), C(3)i,j+2 =11 000000 (2).
Assuming S(1)= 10000 10000 010000 (2), S(2) = 01000 01000 001000 (2), S(3)= 00100 00100 000100 (2), the data-hider targets the pixels of the three shared images C(1), C(2), and C(3), respectively, the secret information S(1), S(2), and S(3) embedded in part B to obtain the images , , :
i,j = 01010000 (2), C′(1)i,j+1 = 01010000 (2), C′(1)i,j+2 =11010000 (2).
i,j = 00101000 (2), C′(2)i,j+1 = 01001000 (2), C′(2)i,j+2 =00001000 (2).
i,j = 01000100 (2), C′(3)i,j+1 = 00000100 (2), C′(3)i,j+2 =11000100 (2).
3.4.2. Decryption and Extracting Steps
We use 3 shared images to illustrate the steps of decryption and extracting. Take out the pixel sets of 3 shared image images (
i,j, …,
i,j+k−1), (
i,j, …,
i,j+k−1), (
i,j, …,
i,j+k−1) and the decryption keys
X1,
X2,
X3 and take out each pixel set of B to obtain the secret information
S. The
P parts of each pixel group are merged individually to obtain the shared image pixels
y(1),
y(2), and
y(3). Substitute
X1,
X2,
X3, and
y(1),
y(2),
y(3) into Equation (4) to obtain the original polynomial, where
y(1) = 60,
y(2) = 10,
y(3) = 52,
X1 = 10,
X2 = 20,
X3 = 30,
The polynomial = 8x2 + 4x + 2 is obtained to obtain the pixel group of the original image (Pi,j, …, Pi,j+k−1) = (2, 4, 8).
4. Experimental Results
In this section, we perform experiments and analysis. All the tested images are gray 425 level sized by 512 × 512.
Figure 9 shows the experimental results of Image Boat. We use the three-out-of-four threshold secret sharing method to group every three original images and encrypt them into four shared images.
Figure 9a is the original image,
Figure 9b–e are different shared images, and
Figure 9f is the image after decryption and information retrieval. From the image we can see that our method can fully recover. Similarly, we did the same for image Couple1 and the result is shown in
Figure 10.
Figure 11 shows the maximum embedding rate comparison among the proposed method and state-of-the-art methods. We use three-out-of-three, three-out-of-four, and three-out-of-five threshold secret sharing to make the comparison. Here is a three-out-of-four to illustrate that, in our way, a shared image pixel can be embedded with 5 or 6 bits of secret information at an embedding rate of 5.3 bpp (Bit Per Pixel). In Chen et al.’s method, their embedding rate is
bpp, which is about 1.75 bpp since
n = 4 and
l = 7. From
Figure 11, we can see that the embedding rate of my method is larger than other methods, and it will be more obvious as the number of shared images increases.
Table 1 shows the feature comparison among the proposed scheme and state-of-the-art schemes, which shows the comparison of the features of our approach with other approaches.
Table 2 shows the comparisons of embedding capacity (bits) and embedding rate (bpp), here the experimental data is used in a three-out-of-four threshold secret sharing approach, in our method, a pixel of a shared image can embed 5 or 6 bits of secret information, so a shared image can embed 1,398,096 bits. The bpp (bit per pixel) for embedding rate is
5.3. We share the image as four shared images, so you can embed
bits.
Figure 12 shows the images used in
Table 2.
Table 3 shows the comparison of embedding rata (bpp) with different
k based on Shamir (
k,
n). In our approach, each original pixel
Pi,j could be reconstructed by collecting
k sharing pixels. It means that the
k sharing pixels holds only
Pi,j with 8 bits, so
k sharing pixels has a space of
bits, thus the embedding ratio is estimated by
. Assume that
indicates that a pixel
Pi,j can be split into 8 pixels to produce shared pixels
C(1)i,j, …,
C(8)i,j by Shamir’s confidential sharing. Therefore, the embedding ratio is
= 7. In the same cases, assume that
and the embedding ratio is
6.6. From
Table 3, we can see that our method increases the embedding rate (bpp) as k increases for each k binning of the original images.
If two-out-of-two threshold secret sharing is used for the experiment, the maximum number of entries in the multiplex is only one, which may make the sharing images appear contoured and therefore the encryption effect is not satisfactory. In this case, you just need to add a procedure to encrypt the shared image once more, and then the encrypted image will have the encryption effect. Of course, the decryption process should also add one additional step to the image decryption. We experiment with image Boat.
Figure 13a is the original image,
Figure 13b,c are the two-out-of-two threshold secret sharing different sharing images, and we can find some contours appear in
Figure 13b,c.
Figure 13d,e are the results of re-encryption of
Figure 13b,c, respectively, which already have the effect of image encryption, while
Figure 13d,e are the results of the re-encryption of
Figure 13b,c.
Figure 13f is the image after decryption and information retrieval.