XOR-Based Progressively Secret Image Sharing
Abstract
:1. Introduction
2. Review of Related Literature
2.1. Boolean Based Scheme of Chen and Wu
- Select n − 1 secret images and a random number image R of the same size. The secret images are marked as Gi (i = 1, …, n − 1) in order;
- Using Equation (1), perform an XOR operation on each of n − 1 secret images and R to obtain noise images of n−1 secret images, labeled Bi (i = 1, …, n − 1);
- Use Equation (2) to generate shared images, labeled Si (i = 1, …, n);
- Collect all n shared images, and perform XOR operation S1 ⊕ S2 ⊕ … ⊕ Sn on all shared images to restore G1. Moreover, restore the random number image R through S1 ⊕ G1;
- Use Equation (3) to recover n − 1 noise images;
- Using Equation (4), use n − 1 noise images and images containing random noise R to restore all secret images.
2.2. The Improved Scheme of Chen and Wu
- Select n secret images and mark them as G1, G2, …, Gn in sequence;
- Using Equation (8), the random number image generation function obtains the random number image R;
- Using Equation (9), n secret images and images containing random noise R are used to generate n noise images, which are labeled Ni (i = 1, 2, …, n);
- Using Equation (10), generate n shared images and share them with all participants, labeled Si (i = 1, …, n).
- Using Equation (11), from the shared images S1, S2, S3, …, Sn, restore all the noise images N1, N2, …, Nn in sequence;
- Using Equation (12), the generated when sharing is obtained from the noise image. Then use Equation (7) to substitute into the sub-function F2 of the random number, the image generating function, and the random number image R generated during sharing can be recovered;
- According to Equation (13), the noise image and random number image R are recovered to the corresponding secret image.
2.3. Scheme of Chen et al.
- Prepare n secret images and mark them as Ii (i = 0, …, n − 1) in sequence;
- After performing the XOR operation on all the secret images I, the Hash method is performed on the result to generate the matrix h;
- The matrix h is reorganized to generate the image SI;
- Performing XOR operation on all secret images I0–In−1 and then bit shifting to generate the image and then performing XOR operation with the SI to generate random image R;
- Using Equation (17), n random images R0–Rn−1 are generated by n secret images performing bit shifting, where x, y represents the pixel positions in the image;
- After all the secret images I0–In−1 and images containing random noise R0–Rn−1 are calculated according to Equation (18), n shared images Oi (i = 0,…, n − 1) can be obtained.
- Collect all n shared images, and perform XOR operation on all shared images . In this way, the result of is obtained;
- Obtain h by Equation (14), and then obtain SI by Equation (15);
- After obtaining the noise image R by Equation (16), then obtain the noise image by Equation (17);
- Then, by Equation (19), n noise images R0, …, Rn−1 are used to restore all the secret images.
3. The Proposed Approach
3.1. Secret Images Partition Strategy (SIPS)
- 4 lowest bit-planes (LSB0–3) of m secret images (4mMN bits) are reconstructed to m intermediate images with the size of pixels for threshold Tt−1 (=m);
- Total bits from m secret images in highest bit-planes (LSB4–7) are re-shaped to Ti (0 ≤ i < t − 1) intermediate images for different Ti thresholds, respectively. Therefore, sizes of intermediate images are ;
- Finally, the size of the shared image is
3.2. The Proposed Sharing Algorithm
- Using the proposed secret images partition strategy (SIPS) to generate intermediate images Pj,k (0 ≤ j ≤ t − 1, 0 ≤ k < Tj) from m secret images;
- Apply the XOR function, the SHA-256 hash function H, the image_synthesis(h) function, and the bit_reverse(x) function on these intermediate images Pj,k by Equations (20) and (21) to generate random image Rj for each threshold;
- Generate a series of random images from circular pixel shift processing on Rj as defined in Equation (22);
- Generate a series of intermediate shares Si,j by Equation (23);
- Concatenate all the intermediate shares Si,j to acquire shared image Si for participant i by Equation (24).
3.3. The Proposed Recovery Algorithm
- Acquire the consecutive k shared images. Without loss of generality, these shared images are denoted by ;
- Split for obtaining intermediate shares ;
- Assume the number of collected shared images k is equal to one threshold Tm . For each threshold , apply the following steps to recover the intermediate image ;
- 3.1.
- Applying to Equations (20) and (21) acquire and , respectively;
- 3.2.
- Generate a series of random images from ;
- 3.3.
- Acquire intermediate images from Equation (25)
- Apply the reverse processing of the proposed SIPS from the intermediate images to recover the bit-plane shares PSi (0 ≤ i ≤ t − 1);
- Combine all the recovered bit-plane shares PSi (0 ≤ i ≤ t − 1) and replace the un-recovered bits with random bits for recovering all secret images.
3.4. Discussion of a Sharing Example
- Partition four secret images I0–I3 to group partition;
- 1.1.
- Four highest bit planes of size 150 × 300 are partitioned to group partitions PS0,i (0 ≤ i ≤ 3) and PS1,i (0 ≤ i ≤ 3) with size 75 × 300;
- 1.2.
- Four lowest bit planes construct the PS2,i (0 ≤ i ≤ 3) with size 150 × 300;
- Acquire the intermediate images Pi,j (0 ≤ i ≤ 3, 0 ≤ j ≤ 2) from PSi (0 ≤ i ≤ 2);
- 2.1.
- Re-shape PS0,i (0 ≤ i ≤ 3) to acquire P0,0, P0,1 with size 150 × 300 for sharing with threshold 2;
- 2.2.
- Re-shape PS1,i (0 ≤ i ≤ 3) to acquire P1,0, P1,1, P1,2 with size 100 × 300 for sharing with threshold 3;
- 2.3.
- Re-shape 4 lower bit planes PS2,i (0 ≤ i ≤ 3) to acquire Pj,2 (0 ≤ j ≤ 3) with size 150 × 300 for sharing with threshold 4;
- In first threshold 2, R0 is acquired by applying P0,0, P0,1 to Equation (20). Applying R0 and Equation (21) generates R0,0 and R0,1. Four intermediate shares with the size of 150 × 300 are acquired from the following:
- In second threshold 3, R1 is acquired by applying P1,0, P1,1, P1,2 to Equation (20). Applying R1 and Equation (21) generates R1,0, R1,1 and R1,2. Four intermediate shares with the size of 100 × 300 are acquired from the following:
- In the last threshold 4, R2 is acquired by applying P2,0, P2,1, P2,2, P2,3 to Equation (20). Applying R2 and Equation (21) generates R2,0, R2,1, R2,2 and R2,3. Four intermediate shares with the size of 150 × 300 are acquired from the following:
- All shared images , , , and with the size of 400 × 300 are obtained from the following concatenation processing:
- The collection of ;
- 1.1.
- Splitting and acquire intermediate shares , , and , , , respectively;
- 1.2.
- Since and , and can also be acquired by and , respectively;
- 1.3.
- Directly applying acquires , and can be obtained by Equation (20);
- 1.4.
- and are then acquired from Equations (21) and (22);
- 1.5.
- By using , , , and , the intermediate images and can be then obtained;
- 1.6.
- Finally, the reverse processing of the SIPS can obtain half bits of higher bit planes (LSB4–7) to have the rough image result;
- The collection of ;
- 2.1.
- Similar to the process in the previous collection, can also be split into intermediate shares , and , respectively;
- 2.2.
- Directly applying acquires the same result of ;
- 2.3.
- can be then obtained by Equation (20) so as to acquire , and
- 2.4.
- From , , , , , and reverse processing of the SIPS, another half bits of a higher bit planes (LSB4–7) are then acquired;
- 2.5.
- Therefore, recovers all bits under higher bit planes (LSB4–7);
- The collection of ;
- 3.1.
- Since includes and , all bits in a higher bit planes (LSB4–7) are perfectly recovered;
- 3.2.
- Splitting acquires , , , and , respectively;
- 3.3.
- Using , , the , , , , and are orderly calculated for obtaining the lower bit planes (LSB0–3);
- 3.4.
- The collection of recovers the secret images information of two half bits of a higher bit planes (LSB4–7) from and , and the lower bit planes (LSB0–3) from . Therefore, all secret images can then be perfectly recovered.
4. Experimental Results and Discussions
4.1. Experimental Results
4.2. Comparison and Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chanu, O.B.; Neelima, A. A survey paper on secret image sharing schemes. Int. J. Multimed. Inf. Retr. 2019, 8, 195–215. [Google Scholar] [CrossRef]
- Thien, C.-C.; Lin, J.-C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA, 4–6 June 1979; Volume 48, pp. 313–317. [Google Scholar]
- Ulutas, M.; Ulutas, G.; Nabiyev, V.V. Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 2013, 86, 485–500. [Google Scholar] [CrossRef]
- Wu, X.; Ou, D.; Liang, Q.; Sun, W. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 2012, 85, 1852–1863. [Google Scholar] [CrossRef]
- Wang, D.; Zhang, L.; Ma, N.; Li, X. Two secret sharing schemes based on Boolean operations. Pattern Recognit. 2007, 40, 2776–2785. [Google Scholar] [CrossRef]
- Kabirirad, S.; Eslami, Z. Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. J. Inf. Secur. Appl. 2019, 47, 16–27. [Google Scholar] [CrossRef]
- Dhara, B.C.; Chanda, B. A fast progressive image transmission scheme using block truncation coding by pattern fitting. J. Vis. Commun. Image Represent. 2012, 23, 313–322. [Google Scholar] [CrossRef]
- Fang, W.-P. Friendly progressive visual secret sharing. Pattern Recognit. 2008, 41, 1410–1414. [Google Scholar] [CrossRef]
- Huang, C.-P.; Hsieh, C.-H.; Huang, P.S. Progressive sharing for a secret image. J. Syst. Softw. 2010, 83, 517–527. [Google Scholar] [CrossRef]
- Lin, S.-J.; Lin, J.-C. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit. 2007, 40, 3652–3666. [Google Scholar] [CrossRef]
- Wang, R.-Z.; Su, C.-H. Secret image sharing with smaller shadow images. Pattern Recognit. Lett. 2006, 27, 551–555. [Google Scholar] [CrossRef]
- Chen, C.C.; Chien, Y.W. Sharing numerous images secretly with reduced possessing load. Fundam. Inf. 2008, 86, 447–458. [Google Scholar]
- Chen, T.-H.; Wu, C.-S. Efficient multi-secret image sharing based on Boolean operations. Signal Process. 2011, 91, 90–97. [Google Scholar] [CrossRef]
- Chen, C.-C.; Wu, W.-J. A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 2014, 92, 107–114. [Google Scholar] [CrossRef]
- Chen, C.-C.; Wu, W.-J.; Chen, J.-L. Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools Appl. 2015, 75, 7113–7128. [Google Scholar] [CrossRef]
- Kabirirad, S.; Eslami, Z. A(t,n)-multi secret image sharing scheme based on Boolean operations. J. Vis. Commun. Image Represent. 2018, 57, 39–47. [Google Scholar] [CrossRef]
- Azza, A.A.; Lian, S. Multi-secret image sharing based on elementary cellular automata with steganography. Multimed. Tools Appl. 2020, 79, 21241–21264. [Google Scholar] [CrossRef]
- Chen, T.-H.; Wu, X.-W. Multiple secret image sharing with general access structure. Multimed. Tools Appl. 2020, 79, 13247–13265. [Google Scholar] [CrossRef]
- Ross, A.; Othman, A. Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 2011, 6, 70–81. [Google Scholar] [CrossRef] [Green Version]
- Yan, X.; Lu, Y.; Yang, C.-N.; Zhang, X.; Wang, S. A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 2020. [Google Scholar] [CrossRef]
- Yue, J.; Yan, X.; Qi, J.; Lu, Y.; Zhou, X. Secret image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics 2020, 8, 234. [Google Scholar]
- Li, J.; Wang, X.; Huang, Z.; Wang, L.; Xiang, Y. Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J. Parallel Distrib. Comput. 2019, 130, 91–97. [Google Scholar] [CrossRef]
- Chen, J.; Chen, Y.S.; Hsu, H.C.; Chen, H.W. New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electron. Imaging 2005, 14, 033018. [Google Scholar] [CrossRef]
- Shyu, S.J.; Huang, S.-Y.; Lee, Y.-K.; Wang, R.-Z.; Chen, K. Sharing multiple secrets in visual cryptography. Pattern Recognit. 2007, 40, 3633–3651. [Google Scholar] [CrossRef]
- Lin, S.-J.; Chen, S.-K.; Lin, J.-C. Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Represent. 2010, 21, 900–916. [Google Scholar] [CrossRef]
- Chen, C.C.; Fu, W.F. A geometry-based secret image sharing approach. J. Informat. Sci. Eng. 2008, 24, 1567–1577. [Google Scholar]
- Wu, H.C.; Chang, C.C. Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 2005, 28, 123–135. [Google Scholar]
- Bhattacharjee, T.; Maity, S.P.; Islam, S.R. Hierarchical secret image sharing scheme in compressed sensing. Signal Process. Image Commun. 2018, 61, 21–32. [Google Scholar] [CrossRef]
- Chanu, O.B.; Neelima, A. A new multi-secret image sharing scheme based on DCT. Vis. Comput. 2019, 36, 939–950. [Google Scholar] [CrossRef]
Thresholds | (3, 2, {2, 3}) | (4, 2, {2, 4}) | (4, 3, {2, 3, 4}) | |||
---|---|---|---|---|---|---|
Threshold | Intermediate Image Size | Threshold | Intermediate Image Size | Threshold | Intermediate Image Size | |
Group 0 | 2 | 225 × 300 | 2 | 300 × 300 | 2 | 150 × 300 |
Group 1 | 3 | 150 × 300 | 4 | 150 × 300 | 3 | 100 × 300 |
Group 2 | 4 | 150 × 300 |
Thresholds | Sharing Computation Time (s) | Recovery Computation Time (s) |
---|---|---|
(4, 3, {2, 3, 4}) | 1.734 | 1.422 |
(5, 4, {2, 3, 4, 5}) | 2.334 | 2.038 |
Recovery Results | Color Levels | Recovery Methods | Sharing Types | Sharing Rates | Progressive | ||
---|---|---|---|---|---|---|---|
Wu and Chang [29] | Recognizable | Binary | Superimpose | Circle | No | ||
Chen et al. [25] | Recognizable | Binary | Superimpose | Circle | No | ||
Shyu et al. [26] | Recognizable | Binary | Superimpose | Circle | No | ||
Lin et al. [27] | Recognizable | Binary | Superimpose | Rectangle | No | ||
Wang et al. [7] | Lossless | Grayscale | XOR | Rectangle | No | ||
Chen and Wu [15] | Lossless | Grayscale | XOR | Rectangle | No | ||
Chen and Wu [16] | Lossless | Grayscale | XOR | Rectangle | No | ||
Chen et al. [17] | Lossless | Grayscale | XOR | Rectangle | No | ||
The proposed approach | Lossless | Grayscale | XOR | rectangle | Yes |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lin, C.-S.; Chen, C.-C.; Chen, Y.-C. XOR-Based Progressively Secret Image Sharing. Mathematics 2021, 9, 612. https://doi.org/10.3390/math9060612
Lin C-S, Chen C-C, Chen Y-C. XOR-Based Progressively Secret Image Sharing. Mathematics. 2021; 9(6):612. https://doi.org/10.3390/math9060612
Chicago/Turabian StyleLin, Cheng-Shian, Chien-Chang Chen, and Yu-Cheng Chen. 2021. "XOR-Based Progressively Secret Image Sharing" Mathematics 9, no. 6: 612. https://doi.org/10.3390/math9060612
APA StyleLin, C. -S., Chen, C. -C., & Chen, Y. -C. (2021). XOR-Based Progressively Secret Image Sharing. Mathematics, 9(6), 612. https://doi.org/10.3390/math9060612