Next Article in Journal
Improving User’s Experience in Exploring Knowledge Structures: A Gamifying Approach
Next Article in Special Issue
An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
Previous Article in Journal
Online Frequency Estimation on a Building-like Structure Using a Nonlinear Flexible Dynamic Vibration Absorber
Previous Article in Special Issue
Two-in-One Secret Image Sharing Scheme with Higher Visual Quality of the Previewed Image
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme

1
School of Cyber Science and Engineering, Xi’an Jiaotong University, Xi’an 710049, China
2
Shaanxi Key Laboratory of Network Computing and Security, Xi’an University of Technology, Xi’an 710048, China
3
Department of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
4
Department of Computer Science and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK
5
Department of Electrical, Computer, Software and Systems Engineering, Embry-Riddle Aeronautical University, Daytona Beach, FL 32114, USA
6
Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(5), 710; https://doi.org/10.3390/math10050710
Submission received: 14 January 2022 / Revised: 12 February 2022 / Accepted: 18 February 2022 / Published: 24 February 2022

Abstract

:
Secret image sharing (SIS) is an important application of the traditional secret sharing scheme, which has become popular in recent years. In an SIS scheme, a confidential image is encrypted into a group of shadows. Any set of shadows that reaches the threshold can reconstruct the image; otherwise, nothing can be recovered at all. In most existing SIS schemes, the threshold on shadows for image reconstruction is fixed. However, in this work, we consider more complicated cases of SIS, such that the threshold is changeable according to the security environment. In this paper, we construct a ( k h , n ) threshold-changeable SIS (TCSIS) scheme using a bivariate polynomial, which provides h k + 1 possible thresholds, k , k + 1 , , h . During image reconstruction, each participant can update their shadow according to the current threshold T based only on their initial shadow. Unlike previous TCSIS schemes, the proposed scheme achieves unconditional security and can overcome the information disclosure problem caused by homomorphism.

1. Introduction

The issue of image security has become important in recent years—for instance, in image steganography [1,2] and verification of visual consistency of images [3]. Secret image sharing (SIS) is also an important topic in image security, which is meant to protect confidential images among multiple participants. Most SIS schemes satisfy a ( k , n ) threshold, such that an image is encrypted into n shadows: k or more shadows can reconstruct the image, but less than k shadows can do nothing. There are two main approaches for SIS: visual cryptography-based SIS schemes [4,5,6] and polynomial-based SIS schemes [7,8,9]. Visual cryptography-based SIS uses the human visual system to recover an image, but the shadow size is greatly expanded from the original image, and the reconstructed image is of diminished quality; polynomial-based SIS is capable of recovering an image losslessly, and the shadow size is reduced from the original image, but the computation for image reconstruction is more complicated than in visual cryptography-based SIS. Many research topics concerning SIS exist, such as progressive SIS [10,11,12], SIS with essential shadows [13,14], and SIS with authentication [15]. When an image has a huge number of pixels, the computations in shadow generation or image reconstruction may cause high time complexity. One can use the method of compressive sensing [16,17] to reduce image size, so that the time complexity for an SIS scheme can be reduced.
Most existing SIS schemes consider a single security policy, and the threshold k for image reconstruction is fixed. However, the security environment for image reconstruction is probably changeable in real applications; therefore, it is more reasonable to design SIS schemes with the capability of threshold changeability. The considerations for threshold changeability include: (1) the security level of a secret image may change; (2) the number of total participants may vary; (3) the power of adversaries may increase; (4) information disclosure may be caused by some malicious participants. Discussion on changing thresholds in traditional secret sharing [18,19,20] has already been presented, which proves the necessity for threshold changeability in SIS. However, SIS and traditional secret sharing are different. The studies on threshold-changeable secret sharing could not be directly copied into TCSIS. In fact, the discussion on TCSIS is insufficient in the literature. Two TCSIS schemes [21,22] have been constructed. In the first TCSIS scheme [21], there are N possible thresholds T 1 , T 2 , , T N , but extra two-variable one-way functions are included for image reconstruction. The computational complexity is high, and the security is based on the assumption of one-way functions. It is unconditionally secure. The other TCSIS scheme [22] has reduced computational complexity, but it has only three possible thresholds ( k , k , k ) . In addition, it requires the dealer to be involved in shadow updating, and it suffers from the problem of information leakage.
In this paper, we construct a ( k h , n ) TCSIS scheme which provides h k + 1 possible thresholds, ( k , k + 1 , , h 1 , h ) . The shadows are encrypted using a bivariate polynomial, and the participant only keeps one initial shadow from the dealer. During image reconstruction, the dealer or another trusted party chooses a threshold T from { k , k + 1 , , h } according to the current security requirement; then, each participant can update their shadow according to threshold T. In addition, the process of shadow updating is only based on the initial shadow. The dealer does not need to participate in this process. All the computations in the proposed scheme are polynomial, making them highly efficient.
The rest of this paper is organized as follows. In next section, some preliminaries are prepared which include the Thien–Lin polynomial-based ( k , n ) SIS and some results of previous TCSIS. Our proposed scheme is described in Section 3 together with the corresponding theoretical proofs. Comparisons between the proposed scheme and previous TCSIS schemes and experimental results are shown in Section 4. The conclusions of our work are presented in Section 5.

2. Related Works

In this section, we briefly introduce some related studies about TCSIS, which relate to polynomial-based SIS, the model of TCSIS, and one previous TCSIS.

2.1. Polynomial Based SIS

The model of ( k , n ) SIS consists of two phases, which can be shown as follows.
Model of SIS
Shadow Encryption Phase
1
A dealer encrypts a confidential image O into shadows S 1 , S 2 , , S n .
2
Each shadow S i is sent to participant P i through a secure channel.
Image Reconstruction Phase
Any set of k or more participants can reconstruct the image O; less than k participants cannot get any information on the image at all.
In 2002, Thien and Lin proposed a polynomial based ( k , n ) threshold SIS scheme [7], which was the foundation for later polynomial based SIS schemes. All existing TCSIS schemes were based on the Thien–Lin polynomial-based SIS, and our work is also inspired by their work. Therefore, it is necessary to give a description of their work.
Scheme 1: Thien–Lin ( k , n ) SIS
Shadow Encryption Phase:
Input: image O, Output: n shadows S 1 , S 2 , , S n
1
The dealer divides O into l-non-overlapping k-pixel groups, G 1 , G 2 , , G l .
2
For k pixels p j , 0 , p j , 1 , , p j , k 1 in each group G j , j [ 1 , l ] , the dealer builds a k 1 degree polynomial f j ( x ) = p j , 0 + p j , 1 x + p j , 2 x 2 + , + p j , k 1 x k 1 .
3
The dealer computes n sub-shadows, s j , 1 = f j ( 1 ) , s j , 2 = f j ( 2 ) , , s j , n = f j ( n ) , j [ 1 , l ] .
4
The dealer outputs n shadows S i = s 1 , i s 2 , i , , s l , i , i = 1 , 2 , , n .
Image Reconstruction Phase:
Input: m shadows S 1 , S 2 , , S m . ( m k ) . Outputs: secret image O.
1
Reconstructing f j ( x ) from s 1 , j , s 2 , j , , s m , j , j [ 1 , l ] using Lagrange interpolation:
f j ( x ) = i = 1 m [ s i , j × w = 1 , w i m x w i w ] ;
then the block G j is recovered from all k coefficients in f j ( x ) .
2
Output: O = G 1 G 2 , , G l .

2.2. Results on TCSIS

In this section, we give a model of TCSIS, and then describe some results on previous TCSIS schemes.
The model TCSIS scheme consists of two phases: shadow encryption phase and image reconstruction phase, which have the following steps.
Model of TCSIS
Shadow Encryption Phase
1
A dealer encrypts a confidential image O into initial shadows S 1 , S 2 , , S n .
2
Each initial shadow S i is sent to participant P i through secure channel.
Image Reconstruction Phase
1
A threshold T is selected from the set of all possible thresholds T 1 , T 2 , , T d .
2
Each participant P i updates the shadow according to current threshold T.
3
Any group of participants that satisfy the access structure can reconstruct the image O using updated shadows.
The difference between the SIS model and the TCSIS model is that during the the image reconstruction phase, each participant needs to update the shadow according to the current threshold T.
The scheme in [21] is a polynomial scheme that satisfies the model of TCSIS; however, some one-way functions were adopted in [21] to change the threshold. Therefore, the security of [21] is based on the security assumptions of those one-way functions, and the computational complexity is much higher than the computations in polynomial interpolation. Recently, Liu et al. proposed a ( k , k , k ) TCSIS [22] that can reduce the computational complexity of [21]. However, there are only three available thresholds in [22], and the dealer has to involve one in shadow updating. In addition, information leakage can occur in [22] due to the property of homomorphism. Since the scheme in [22] is more representative than the scheme in [21], we give a description of the scheme in [22] in the following.
Scheme 2: Liu et al.’s ( k , k , k ) TCSIS [22]
Shadow Encryption Phase:
1
The dealer D divides an image O into l non-overlapping k pixel blocks, G 1 , G 2 , , G l .
2
For k pixels p j , 0 , p j , 1 , , p j , k 1 in each block G j , j [ 1 , l ] , D generates a k 1 degree polynomial f j ( x ) = p j , 0 + p j , 1 x + p j , 2 x 2 + , + p j , k 1 x k 1 .
3
D selects randomly k k integers w k , w k + 1 , , w k 1 , and generates a k 1 degree polynomials F ( x ) = w k x k + w k + 1 x k + 1 + + w k 1 x k 1 . In addition, D randomly selects k k integers r k , r k + 1 , , r k 1 and generates a polynomial: F ( x ) = r k x k + r k + 1 x k + 1 + + r k 1 x k 1 .
3
Let F j ( x ) = f j ( x ) + F ( x ) . D computes n sub-shadows s j , 1 = F j ( 1 ) , s j , 2 = F j ( 2 ) , , s j , n = F j ( n ) , j [ 1 , l ] , and the initial shadow S i of P i is S i = s 1 , i s 2 , i , , s l , i , i = 1 , 2 , , n .
Image Decryption Phase:
D chooses a threshold from { k , k , k } and publishes it to all participants.
1
If the threshold is k, k or more initial shadows can reconstruct l polynomials F j ( x ) , j = 1 , 2 , , l . k pixel block G j is made up of the first k coefficients in F j ( x ) , and thus the image O = G 1 | | G 2 | | | | G l can be recovered.
2
If the threshold is k , D publishes the information of e i = F ( i ) , i = 1 , 2 , , n to all participants. Each participant P i updates its shadow by: S i k = L i ( S i ) = S i e i . Here the operation of S i e i is defined as: S i e i = ( s 1 , i e i ) | | ( s 2 , i e i ) | | | | ( s l , i e i ) . Let P = { S i k | i = 1 , 2 , , n } . The threshold of all updated shadows in P is decreased to k from k.
3
If the threshold is k , D publishes the information of m i = F ( i ) , i = 1 , 2 , , n . Each participant P i updates their shadow by S i k = H i ( S i ) = S i + m i . Here the operation of S i + m i is defined as: S i + m i = ( s 1 , i + m i ) | | ( s 2 , i + m i ) | | | | ( s l , i + m i ) . Let P = { S i k | i = 1 , 2 , , n } . The threshold of all updated shadows in P is increased to k from k.
Here we omit the process of image reconstruction with the threshold k and k . The details can be found in reference [22].

3. Proposed Scheme

3.1. Design Motivation

In real applications, security conditions are probably changeable after the dealer sends shadows in an SIS scheme to all participants. For instance, (1) the security level of a secret image may change; (2) the number of total participants may vary; (3) the power of adversaries may increase; (4) information disclosure may be caused by some malicious participants. A wide variety of emergencies can affect security requirements. In this work, we assume there are multiple security levels for image reconstruction. For instance, a confidential image should be reconstructed immediately due to emergency cases, such as in medical or traffic settings. However, if the number of available participants did not satisfy the access structure for image reconstruction, it would cause losses, even loss of life. Therefore, an SIS scheme with the capability of changing its threshold is more reasonable, since it can reconstruct images under multiple security levels. The design concept of our work can be seen in Figure 1, and the flow chart of our scheme is shown in Figure 2.

3.2. TCSIS Using a Bivariate Polynomial

The previous TCSIS schemes [21,22] were based on univariate polynomials. Differently from their works, the proposed ( k h , n ) TCSIS is based on a bivariate polynomial, and it can provide h k + 1 available thresholds { k , k + 1 , , h } . The advantages of our scheme are that the dealer does not need to be involved in shadow updating, and that it is unconditionally secure. Similarly to the previous TCSIS schemes, the proposed scheme also divides an image into non-overlapping blocks, and each block includes k h pixels. During shadow encryption phase, each block is encrypted into shadows using the same algorithm. During the image reconstruction phase, all blocks are recovered from their shadows using same algorithm. When all blocks are recovered, the image is reconstructed accordingly. Therefore, for simplicity and readability, we use a k h -pixels block G instead of an image, as follows.
Scheme 3: ( k h , n ) TCSIS
Shadow Encryption Phase:
1
Suppose p i , j , i = 0 , 1 , , k 1 , j = 0 , 1 , , h 1 are k h pixels in G, D builds a bivariate polynomial:
F ( x , y ) = p 0 , 0 + p 0 , 1 y + , , + p 0 , h 1 y h 1 , p 1 , 0 x + p 1 , 1 x y + , , + p 1 , h 1 x y h 1 , p k 1 , 0 x k 1 + p k 1 , 1 x k 1 y + , , + p k 1 , h 1 x k 1 y h 1
2
D computes f i ( y ) = F ( i , y ) , g i ( x ) = F ( x , i ) . The initial shadow s i for P i is s i = ( f i ( y ) , g i ( x ) ) .
Image Reconstruction Phase:
1
Select a threshold T from the set { k , k + 1 , , h } .
(a)
If current threshold is T = k , each participant P i updates their shadow by s i k = f i ( y ) .
(b)
If the current threshold is T = h , each participant P i updates its shadow by s i h = g i ( x ) .
(c)
If the current threshold T satisfies k < T < h , the participants select h T integers e 1 , e 2 , , e h T other than 1 , 2 , , n . Each participant P i computes f i ( e 1 ) , f i ( e 2 ) , , f i ( e h T ) , and the updated shadow s i T is
s i T = ( s i h , ( f i ( e 1 ) , f i ( e 2 ) , , f i ( e h T ) ) .
2
Any group of T participants can reconstruct all k h pixels in G using Lagrange interpolation.
Scheme 3 describes the algorithms for updating shadows according to different thresholds, but the methods for image reconstruction using updated shadows are not given. In the following three theorems, we will prove that the updated shadows are consistent with the current threshold. This is also a proof of the security of our scheme. The methods of image reconstruction using these updated shadows are also described in these theorems.
Theorem 1.
The threshold T for updated shadows s 1 k , s 2 k , s n k on G is T = k .
Proof. 
According to Scheme 3, the updated shadow in s i k for G is s i k = f i ( y ) = F ( i , y ) . F ( x , y ) in Equation (2) can be rewritten as:
F ( x , y ) = u 0 ( x ) + u 1 ( x ) y + u 2 ( x ) y 2 + , , + u h 1 ( x ) y h 1
where u 0 ( x ) , u 1 ( x ) , , u h 1 ( x ) are all k 1 degree univariate polynomials. Suppose that
s i k = F ( i , y ) = b i , 0 + b i , 1 y + , , b i , h 1 y h 1 , i = 1 , 2 , , n
Comparing Equation (3) with Equation (4), we can observe that ( b 1 , 0 , b 2 , 0 , , b n , 0 ) are interpolations on u 0 ( x ) that b i , 0 = u 0 ( i ) , i = 1 , 2 , , n . Since u 0 ( x ) is k 1 degree polynomial, the threshold of ( b 1 , 0 , b 2 , 0 , , b n , 0 ) to reconstruct u 0 ( x ) is k, and the reconstruction can be executed using Lagrange interpolation, Equation (1). As each b i , 0 comes from sub-shadow s i k , the threshold on ( s 1 k , s 2 k , , s n k ) for u 0 ( x ) is k. By the same way, the threshold for the other polynomials u 1 ( x ) , u 2 ( x ) , , u h 1 ( x ) on ( s 1 k , s 2 k , , s n k ) is also k. In summary, the threshold for the k h pixel block G from ( s 1 k , s 2 k , , s n k ) is T = k . □
Theorem 2.
The threshold T for updated shadows s 1 h , s 2 h , , s n h is T = h .
Proof. 
The updated shadow s i h for G is s i h = g i ( x ) = F ( x , i ) . F ( x , y ) in Equation (2) can be rewritten as:
F ( x , y ) = v 0 ( y ) + v 1 ( y ) x + v 2 ( y ) x 2 + , , + v k 1 ( y ) x k 1
where v 0 ( y ) , v 1 ( y ) , , v k 1 ( y ) are all h 1 degree univariate polynomials. Suppose that
s i h = F ( x , i ) = c i , 0 + c i , 1 x + , , c i , k 1 x k 1 , i = 1 , 2 , , n
Comparing Equation (5) with Equation (6), we can observe that ( c 1 , 0 , c 2 , 0 , , c n , 0 ) are interpolations on v 0 ( y ) that c i , 0 = v 0 ( i ) , i = 1 , 2 , , n . Since v 0 ( y ) is h 1 degree polynomial, the threshold of ( c 1 , 0 , c 2 , 0 , , c n , 0 ) to reconstruct v 0 ( y ) is h, and the reconstruction can be executed using Lagrange interpolation, Equation (1). As each c i , 0 comes from sub-shadow s i , 1 h , the threshold on ( s 1 , 1 h , s 2 , 1 h , , s n , 1 h ) for v 0 ( y ) is h. By the same way, the threshold for the other polynomials v 1 ( y ) , v 2 ( y ) , , v k 1 ( y ) on ( s 1 h , s 2 h , , s n h ) is also h. In summary the threshold for the k h pixel block G from ( s 1 h , s 2 h , , s n h ) is T = h . □
Theorem 3.
The threshold on updated shadows ( s 1 T , s 2 T , , s n T ) when k < T < h is T.
Proof. 
The updated shadow s i T for G is s i T = ( s i h , f i ( e 1 ) , f i ( e 2 ) , , f i ( e h T ) ) . Without loss of generality, suppose s 1 T , s 2 T , , s T T are the T updated shadows on G. First we prove that G can be reconstructed by these T updated shadows. As f i ( e j ) = F ( i , e j ) = g e j ( i ) , f i ( e j ) can be seen seen as one interpolation on g e j ( x ) = F ( x , e j ) . On the other hand, T > k and g e j ( x ) is of degree k 1 ; thus, g e j ( x ) can be reconstructed from f i ( e j ) , i = 1 , 2 , , T , these T updated shadows. As a result, F ( x , e 1 ) , F ( x , e 2 ) , , F ( x , e h T ) can be reconstructed from T updated shadows s 1 T , s 2 T , , s T T . According to Equation (5), F ( x , e j ) , j = 1 , 2 , , h T can be presented as:
F ( x , e j ) = v 0 ( e j ) + v 1 ( e j ) x + v 2 ( e j ) x 2 + , , + v k 1 ( e j ) x k 1
Therefore, h T extra interpolations can be obtained on each polynomial in v 0 ( y ) , v 1 ( y ) , …, v k 1 ( y ) . On the other hand, other T interpolations can be obtained from s 1 h , s 2 h , , s T h . There are in total h T + T = h interpolations for each polynomial v 0 ( y ) , v 1 ( y ) , …, v k 1 ( y ) . Since these polynomials v 0 ( y ) , v 1 ( y ) , , v k 1 ( y ) are all of degree h 1 , they can be reconstructed. Thus, the bivariate polynomial F ( x , y ) can be reconstructed correspondingly. When there are T 1 or less updated shadows, at most T 1 + h T = h 1 interpolations can be gathered on v 0 ( y ) , v 1 ( y ) , , v k 1 ( y ) . F ( x , y ) cannot be reconstructed. In summary, the threshold for the k h pixel block G from ( s 1 T , s 2 T , , s n k ) when k < T < h is T. □

4. Results and Discussion

In this section, we use examples and experimental results to show the performance of the proposed scheme, and then compare the proposed scheme and previous TCSIS schemes.
Suppose the image is O = ( 97 , 46 , 253 , 12 , 165 , 19 , 247 , 251 , 214 , 142 , 191 , 180 , 210 , 172 , 152 ) . We construct a proposed ( 3 5 , 7 ) TCSIS scheme for this image. Our proposed scheme is based on the computation of a G F ( P ) : P = 251 and P = 2 8 are adopted in our examples. When using P = 251 , all pixels that larger than 250 are transformed to 250 instead, and the computation is over m o d ( 251 ) ; therefore, the reconstructed image is of lower quality than the original image. When using P = 2 8 , no distortion would be caused from reconstructed image, but each pixel would need to be transferred into a polynomial, and the computation would be over m o d ( x 8 + x 4 + x 3 + x + 1 ) , which is much more complicated than the computation in m o d ( 251 ) .
Example 1.
Proposed ( 3 5 , 7 ) TCSIS on O over G F ( 251 ) .
First the original image O is transformed into image O , where the pixels larger than 250 are transformed to 250. Then we get
O = ( 97 , 46 , 250 , 12 , 165 , 19 , 247 , 250 , 214 , 142 , 191 , 180 , 210 , 172 , 152 ) .
Next, a bivariate F ( x , y ) with degree 2 on x and degree 4 on y is constructed based on O .
F ( x , y ) = 97 + 46 y + 250 y 2 + 12 y 3 + 165 y 4 , 19 x + 247 x y + 250 x y 2 + 214 x y 3 + 142 x y 4 , 191 x 2 + 180 x 2 y + 210 x 2 y 2 + 172 x 2 y 3 + 152 x 2 y 4
Then the dealer computes f i ( y ) = F ( i , y ) , g i ( x ) = F ( x , i ) , i = 1 , 2 , , 7 over G F ( 251 ) . The initial shadow S i = ( f i ( y ) , g i ( x ) ) is sent to each participant P i , i = 1 , 2 , , 7 confidentially. The initial shadows S 1 , S 2 , , S 7 are listed in Equation (9).
S 1 : f 1 ( y ) = 56 + 222 y + 208 y 2 + 147 y 3 + 208 y 4 , g 1 ( x ) = 68 + 119 x + 152 x 2 S 2 : f 2 ( y ) = 146 + 5 y + 84 y 2 + 124 y 3 + 53 y 4 , g 2 ( x ) = 160 + 226 x + 179 x 2 S 3 : f 3 ( y ) = 116 + 148 y + 129 y 2 + 194 y 3 + 202 y 4 , g 3 ( x ) = 110 + 210 x + 250 x 2 S 4 : f 4 ( y ) = 217 + 149 y + 92 y 2 + 106 y 3 + 153 y 4 , g 4 ( x ) = 101 + 86 x + 226 x 2 S 5 : f 5 ( y ) = 198 + 8 y + 224 y 2 + 111 y 3 + 157 y 4 , g 5 ( x ) = 9 + 14 x + 102 x 2 S 6 : f 6 ( y ) = 59 + 227 y + 23 y 2 + 209 y 3 + 214 y 4 , g 6 ( x ) = 156 + 48 x + 7 x 2 S 7 : f 7 ( y ) = 51 + 53 y + 242 y 2 + 149 y 3 + 73 y 4 , g 7 ( x ) = 55 + 136 x + 204 x 2
During image reconstruction, suppose the threshold is T, and P 1 , P 2 , , P T are involved.
  • If T = 3 , P 1 , P 2 , P 3 publishes S i 3 = f i ( y ) , i = 1 , 2 , 3 , all coefficients in F ( x , y ) can be computed using Lagrange interpolation according to Theorem 1. Then the image O can be reconstructed.
  • If T = 4 , P 1 , P 2 , P 3 , P 4 publish S i 4 = g i ( x ) | | f i ( e 1 ) , i = 1 , 2 , 3 , 4 . Here e 1 = 8 . The interpolation polynomial on f i ( e 1 ) , i = 1 , 2 , 3 , 4 is g e 1 ( x ) = F ( x , e 1 ) = 167 + 120 x + 86 x 2 for Example 1. Then, all coefficients in F ( x , y ) can be computed using the Lagrange interpolation according to Theorem 3. Then the image O can be reconstructed.
  • If T = 5 , P 1 P 5 , publish S i 5 = g i ( x ) , i = 1 , 2 , , 5 . All coefficients in F ( x , y ) can be computed using Lagrange interpolation according to Theorem 1. Then the image O can be reconstructed.
Example 2.
Proposed ( 3 5 , 7 ) TCSIS on O over G F ( 2 8 ) .
A bivariate F ( x , y ) with degree 2 on x and degree 4 on y is constructed based on O as follows.
F ( x , y ) = 97 + 46 y + 253 y 2 + 12 y 3 + 165 y 4 , 19 x + 247 x y + 251 x y 2 + 214 x y 3 + 142 x y 4 , 191 x 2 + 180 x 2 y + 210 x 2 y 2 + 172 x 2 y 3 + 152 x 2 y 4
Then the dealer computes f i ( y ) = F ( i , y ) , g i ( x ) = F ( x , i ) , i = 1 , 2 , , 7 over G F ( 2 8 ) . The initial shadow S i = ( f i ( y ) , g i ( x ) ) is sent to each participant P i , i = 1 , 2 , , 7 confidentially. The initial shadows S 1 , S 2 , , S 7 are listed in Equation (11).
S 1 : f 1 ( y ) = 205 + 109 y + 212 y 2 + 118 y 3 + 179 y 4 , g 1 ( x ) = 27 + 71 x + 237 x 2 S 2 : f 2 ( y ) = 141 + 61 y + 117 y 2 + 61 y 3 + 244 y 4 , g 2 ( x ) = 58 + 245 x + 253 x 2 S 3 : f 3 ( y ) = 33 + 126 y + 92 y 2 + 71 y 3 + 226 y 4 , g 3 ( x ) = 104 + 99 x + 106 x 2 S 4 : f 4 ( y ) = 40 + 106 y + 179 y 2 + 87 y 3 + 232 y 4 , g 4 ( x ) = 168 + 119 x + 50 x 2 S 5 : f 5 ( y ) = 132 + 41 y + 154 y 2 + 45 y 3 + 254 y 4 , g 5 ( x ) = 34 + 153 x + 200 x 2 S 6 : f 6 ( y ) = 196 + 121 y + 59 y 2 + 102 y 3 + 185 y 4 , g 6 ( x ) = 168 + 219 x + 2 x 2 S 7 : f 7 ( y ) = 104 + 58 y + 18 y 2 + 28 y 3 + 175 y 4 , g 7 ( x ) = 10 + 247 x + 61 x 2
The reconstructions with different thresholds are similar to those in Example 1. Here we only emphasize that when the threshold is T = 4 , the participants can decide on e 1 = 8 , and compute g e 1 ( x ) = 13 + 248 x + 98 x 2 in G F ( 2 8 ) , which is different from the g e 1 ( x ) in Example 1.
The following Figure 3 shows the experimental results of the proposed ( 5 7 , 9 ) over G F ( 251 ) , where the original image and initial shadows are included.
Next we give comparisons between the proposed TCSIS and the previous two TCSIS schemes [21,22] in detail. First we illustrate the information disclosure problem of the scheme in [22]. The initial shadows S i for each participant P i in [22] are generated from a k 1 degree polynomial F i * ( x ) = F ( x ) + f i ( x ) , where F ( x ) is of degree k 1 , f i ( x ) is of degree k 1 , and f i ( x ) contains the pixels of secret image O. When the threshold is k , each participant P i modifies its initial shadow by S i = S i F ( i ) ; thus, the threshold of updated shadows is reduced to k from k. However, any k participants can recover a distortion image without updating their shadows, based on the homm. S i S j is generated from F i * ( x ) F j * ( x ) = f i ( x ) f j ( x ) . Since f i ( x ) f j ( x ) is of degree k 1 , any k participants can recover f i ( x ) f j ( x ) . As a result, a distortion image can be recovered from the pixel information in f i ( x ) f j ( x ) . The experimental results of information disclosure problem in [22] are shown in Figure 4.
The proposed TCSIS scheme generates initial shadows using bivariate polynomial F ( x , y ) , where image pixels are hidden in all coefficients in F ( x , y ) . Thus, the proposed scheme avoids the information disclosure problem in [22]. On the other hand, the the scheme in [22] only provides three potential thresholds k , k , k for low, medium, and high security levels, whereas our scheme can provide h k + 1 thresholds k , k + 1 , k + 2 , , h to satisfy more complicated security requirements. The scheme in [21] can also provide more thresholds than the scheme in [22], but there are two weaknesses of the scheme in [21]. The dealer needs to publish certain information when changing a threshold; therefore, the participation of dealer in this process would not only reduce the efficiency of image reconstruction, but also risks information leakage from the communication between dealer and participants. Such problems also exist for the scheme presented in [22]. The other problem of the scheme in [21] is that the security is based on the security assumption of two-variable one-way functions; it is not unconditionally secure. In addition, the computation of one-way functions is much more complicated than the computation of polynomial interpolation. A comparison between the proposed scheme and the previous TCSIS schemes [21,22] is shown in Table 1.

5. Conclusions

In this paper, we constructed a ( k h , n ) TCSIS scheme based on a bivariate polynomial that provides h k + 1 potential thresholds. During image reconstruction, participants can modify their initial shadows to adjust the threshold from { k , k + 1 , , h } . Compared with previous TCSIS schemes, our scheme has the following advantages:
  • Our scheme provides more thresholds than the scheme in [22].
  • Our scheme does not require the dealer’s involvement in changing the threshold, reducing its computational cost compared to the schemes in [21,22] and reducing the risk of information leakage.
  • Our scheme does not adopt one-way functions; it achieves unconditional security.
  • The computation is only based on polynomial interpolation, making it more efficient than the first scheme [21].

Author Contributions

Conceptualization, Q.S. and Y.L.; Formal analysis, H.C.; Methodology, S.L. and H.S.; Writing—original draft, H.C. and Q.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work is funded by the Youth Innovation Team of Shaanxi Universities (number 2019-38), the Guangxi Key Laboratory of Trusted Software (number KX202036), and the Shaanxi Provincial Natural Science Basic Project (number 2019JQ-736).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the editor and the anonymous reviewers for their valuable comment.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhou, Z.L.; Wu, Q.J.; Yang, Y.M.; Sun, X.M. Region-level visual consistency verification for large-scale partial-duplicate image search. ACM Trans. Multimed. Comput. Commun. Appl. 2020, 16, 1–25. [Google Scholar] [CrossRef]
  2. Wang, C.C.; Kuo, W.C.; Huang, Y.C.; Wuu, L.C. A high capacity data hiding scheme based on re-adjusted GEMD. Multimed. Tools Appl. 2018, 77, 6327–6341. [Google Scholar] [CrossRef]
  3. Zhou, Z.L.; Mu, Y.; Wu, Q.J. Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 2019, 23, 4927–4938. [Google Scholar] [CrossRef]
  4. Naor, M.; Shamir, A. Visual cryptography. Lect. Notes Comput. Sci. 1994, 950, 1–12. [Google Scholar]
  5. Wang, R.Z. Region incrementing visual cryptography. IEEE Signal Process. Lett. 2009, 16, 659–662. [Google Scholar] [CrossRef]
  6. Yang, C.N.; Shih, H.W.; Wu, C.C.; Harn, L. k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 2012, 22, 799–809. [Google Scholar] [CrossRef]
  7. Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
  8. Wang, R.Z.; Shyu, S.J. Scalable secret image sharing. Signal Process. Image Commun. 2007, 22, 363–373. [Google Scholar] [CrossRef]
  9. Liu, Y.X.; Yang, C.Y.; Yeh, P.H. Reducing shadow size in smooth scalable secret image sharing. Secur. Commun. Netw. 2014, 7, 2237–2244. [Google Scholar] [CrossRef]
  10. Wang, Z.H.; Di, Y.F.; Li, J.J.; Chang, C.C.; Liu, H. Progressive secret image sharing scheme using meaningful shadows. Secur. Commun. Netw. 2016, 9, 4075–4088. [Google Scholar] [CrossRef]
  11. Yan, X.H.; Wang, S.; Niu, X.M. Threshold progressive visual cryptography construction with unexpanded shares. Mutimedia Tools Appl. 2016, 75, 8657–8674. [Google Scholar] [CrossRef]
  12. Liu, Y.X.; Yang, C.N.; Wu, S.Y.; Chou, Y.S. Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process. Image Commun. 2018, 66, 77–86. [Google Scholar] [CrossRef]
  13. Liu, Y.X.; Yang, C.N. Scalable secret image sharing scheme with essential shadows. Signal Process. Image Commun. 2017, 58, 49–55. [Google Scholar] [CrossRef]
  14. Li, P.; Yang, C.N.; Wu, C.C.; Kong, Q.; Ma, Y. Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 2013, 24, 1106–1114. [Google Scholar] [CrossRef]
  15. Yang, C.N.; Ouyang, J.F.; Harn, L. Steganography and authentication in image sharing without parity bits. Opt. Commun. 2012, 285, 1725–1735. [Google Scholar] [CrossRef]
  16. Ye, G.D.; Liu, M.; Wu, M.F. Double image encryption algorithm based on compressive sensing and elliptic curve. Alex. Eng. J. 2022, 61, 6785–6795. [Google Scholar] [CrossRef]
  17. Gong, L.H.; Qiu, K.D.; Deng, C.Z.; Zhou, N.R. An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt. Lasers Eng. 2019, 121, 169–180. [Google Scholar] [CrossRef]
  18. Zhang, Z.; Chee, Y.M.; Ling, S.; Liu, M.; Wang, H. Threshold changeable secret sharing schemes revisited. Theor. Comput. Sci. 2012, 418, 106–115. [Google Scholar] [CrossRef] [Green Version]
  19. Steinfeld, R.; Pieprzyk, J.; Wang, H.X. Lattice-based threshold-changeability for standard crt secret-sharing schemes. Finite Fields Their Appl. 2006, 12, 653–680. [Google Scholar] [CrossRef]
  20. Harn, L.; Hsu, C.F. Dynamic threshold secret reconstruction and its application to the threshold cryptography. Inf. Process. Lett. 2015, 115, 851–857. [Google Scholar] [CrossRef]
  21. Yuan, L.F.; Li, M.C.; Guo, C.; Hu, W.T.; Luo, X.J. Secret image sharing scheme with threshold changeable capability. Math. Probl. Eng. 2016, 2016, 9576074. [Google Scholar] [CrossRef] [Green Version]
  22. Liu, Y.X.; Yang, C.N.; Wu, C.M.; Sun, Q.D.; Bi, W. Threshold changeable secret image sharing scheme based on interpolation polynomial. Multimed. Tools Appl. 2019, 78, 18653–18667. [Google Scholar] [CrossRef]
Figure 1. Thresholds for different schemes: (a) ( k , n ) SIS scheme; (b) ( k h , n ) TCSIS scheme.
Figure 1. Thresholds for different schemes: (a) ( k , n ) SIS scheme; (b) ( k h , n ) TCSIS scheme.
Mathematics 10 00710 g001
Figure 2. Flow chart of the proposed TCSIS.
Figure 2. Flow chart of the proposed TCSIS.
Mathematics 10 00710 g002
Figure 3. Original images and shadows using the proposed scheme.
Figure 3. Original images and shadows using the proposed scheme.
Mathematics 10 00710 g003
Figure 4. (a-1,b-1,c-1): original images, (a-2,b-2,c-2): quality lossy images with ( k = 2 , k = 3 ) , (a-3,b-3,c-3): quality lossy images with ( k = 3 , k = 4 ) , (a-4,b-4,c-4): quality lossy images with ( k = 4 , k = 5 ) .
Figure 4. (a-1,b-1,c-1): original images, (a-2,b-2,c-2): quality lossy images with ( k = 2 , k = 3 ) , (a-3,b-3,c-3): quality lossy images with ( k = 3 , k = 4 ) , (a-4,b-4,c-4): quality lossy images with ( k = 4 , k = 5 ) .
Mathematics 10 00710 g004
Table 1. A comparison of the three TCSIS schemes.
Table 1. A comparison of the three TCSIS schemes.
SchemesThresholdsChanging ThresholdSecurity LevelMain ComputationShadow Size
Scheme [22] k , k , k Dealer involvesUnconditionalPolynomial interpolation 1 k
Scheme [21] T 1 , T 2 , , T N Dealer involvesConditionalOne way function N T N
Proposed scheme k , k + 1 , , h Without dealerUnconditionalPolynomial interpolation k + h k h
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sun, Q.; Cao, H.; Li, S.; Song, H.; Liu, Y. Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme. Mathematics 2022, 10, 710. https://doi.org/10.3390/math10050710

AMA Style

Sun Q, Cao H, Li S, Song H, Liu Y. Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme. Mathematics. 2022; 10(5):710. https://doi.org/10.3390/math10050710

Chicago/Turabian Style

Sun, Qindong, Han Cao, Shancang Li, Houbing Song, and Yanxiao Liu. 2022. "Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme" Mathematics 10, no. 5: 710. https://doi.org/10.3390/math10050710

APA Style

Sun, Q., Cao, H., Li, S., Song, H., & Liu, Y. (2022). Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme. Mathematics, 10(5), 710. https://doi.org/10.3390/math10050710

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop