Next Article in Journal
Fractal Stochastic Processes on Thin Cantor-Like Sets
Next Article in Special Issue
A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks
Previous Article in Journal
Regression Models in Complex Survey Sampling for Sensitive Quantitative Variables
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

XOR-Based Progressively Secret Image Sharing

Department of Computer Science and Information Engineering, Tamkang University, New Taipei City 25137, Taiwan
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(6), 612; https://doi.org/10.3390/math9060612
Submission received: 30 January 2021 / Revised: 26 February 2021 / Accepted: 10 March 2021 / Published: 12 March 2021
(This article belongs to the Special Issue Recent Advances in Security, Privacy, and Applied Cryptography)

Abstract

:
Secret image sharing technology is a strategy for jointly protecting secret images. The (n, n) secret image sharing problem can be solved by conventional Boolean calculation easily. However, how to recover secret images with progressive steps is not addressed. In this study, we proposed an XOR-based (m, t, Ti) multi-secret image sharing scheme that shares m secret images among m participants and recovers m shared images progressively with t thresholds. The proposed secret images partition strategy (SIPS) partitions m secret images to generate intermediate images for different thresholds in the sharing procedure. Based on progressive recovery property, the proposed recovery method recovers parts of the secret images by gathering consecutive shared images. Moreover, gathering all shared images can perfectly recover all secret images. The experimental results show that the proposed XOR-based multi-secret image sharing method has high security and efficiency.

1. Introduction

With the development of digital multimedia and the Internet, the sharing of multimedia content through the Internet has become more popular, and intellectual property rights and personal privacy have also become increasingly important. The secret image sharing technique is one of the protection methods that aim to protect multimedia content and has become an important field of recent research [1].
Thien and Lin [2] first proposed a secret image sharing scheme based on the Shamir-Lagrange method [3,4], and then a number of functional secret image sharing schemes have been proposed, such as sharing a secret image among host images [5,6], sharing using Boolean operations [7,8], progressive sharing [9,10,11], visual cryptography with secret image sharing [12], and scalable sharing [13]. Since most of the approaches perform only for sharing one secret image, they cannot share multiple secret images simultaneously in real circumstances.
Over the past few years, a number of approaches for multi-secret image sharing have been proposed. Chen and Chien [14] proposed sharing numerous images secretly with the reduced possessing load. The concept of the method is to generate a random number image with the same size as the secret image, and the random number image and the secret image are processed separately, and then the calculation is made public. Then use secret image sharing technology to share images containing random noise with all participants. Chen and Wu [15] proposed an efficient multi-secret image sharing method that used n − 1 secret images to generate n shared images based on Boolean operations. However, it is necessary to collect all the shared images to recover the secret images. Chen and Wu [16] improved the multi-secret image sharing method proposed in Chen and Wu [15] and proposed a random number image generation function, which used secret images or shared images to perform XOR operations and bit-shifting operations to obtain the random image. Since the random image does not need to be shared as shared images, the sharing capacity is increased. Chen et al. [17] proposed a method that also used the random number image generation function to generate images containing random noise but will perform further bit shift processing on the generated random images. Kabirirad and Eslami [18] proposed a multi secret image sharing scheme based on Boolean operations. Although their approach is efficient, it requires that the size of the generated shared image must be the same as the secret image. Azza and Lian [19] present a cellular automaton-based multi-secret image sharing scheme with steganography. Chen and Wu [20] proposed a Boolean-based multi-secret sharing scheme with the general access structure. The proposed scheme does not necessarily collect all the shared images to recover the secret images by the predefined access structure. In addition, since image secret sharing schemes are widely used in watermarking, access control, identity authentication and so on, a number of image secret sharing schemes were proposed and applied in various practical applications, such as biometric privacy [21], share authentication [22,23], and e-voting [24]. Notice that most of the previous schemes are mainly for low computational complexity. How to process the secret images to achieve progressively secret image sharing and recovery is still not solved by them [25,26,27,28,29,30,31].
This paper proposed a secure XOR-based (m, t, Ti) multiple secret image sharing approach that shares m secret images among m participants and recovers m shared images progressively with t thresholds. The proposed method uses the random number image generation function to generate images containing random noise and further process the secret images to achieve progressively secret image sharing and recovery. The experimental results show the novel properties of our proposed approach.
The paper is organized into the following sections. Section 2 gives a brief review of related works [15,16,17]. Section 3 presents details of the proposed sharing and recovery approach. Section 4 presents the experimental results. Section 5 offers concluding remarks.

2. Review of Related Literature

This section briefly reviews the state-of-art in secret sharing of multiple images based on Boolean function. Section 2.1 introduces the secret sharing of multiple images based on the Boolean function proposed by Chen and Wu [15]. Section 2.2 introduces the method proposed by Chen and Wu [16]. Section 2.3 introduces the method proposed by Chen et al. [17].

2.1. Boolean Based Scheme of Chen and Wu

Chen and Wu [15] proposed a method of secretly sharing and restoring n − 1 secret images through n shared images. The sharing steps are as follows:
  • Select n − 1 secret images and a random number image R of the same size. The secret images are marked as Gi (i = 1, …, n − 1) in order;
  • Using Equation (1), perform an XOR operation on each of n − 1 secret images and R to obtain noise images of n−1 secret images, labeled Bi (i = 1, …, n − 1);
    B i = G i R
  • Use Equation (2) to generate shared images, labeled Si (i = 1, …, n);
    S 1 = B 1 S i = B i 1 B i ,   f o r   2 i n 1 S n = B n 1 G 1
The recovery steps are as follows:
  • Collect all n shared images, and perform XOR operation S1S2 ⊕ … ⊕ Sn on all shared images to restore G1. Moreover, restore the random number image R through S1G1;
  • Use Equation (3) to recover n − 1 noise images;
    B 1 = S 1 B k = S k B k 1 ,   f o r   2 k n 1
  • Using Equation (4), use n − 1 noise images and images containing random noise R to restore all secret images.
    G i = B i R
The above is the introduction of the Chen and Wu [15] method. If the number of shared secret images divided by the number of shared images is defined as the sharing rate, the sharing rate is n − 1/n. However, a shared image Si is calculated by Equation (5), and it is quite insufficient in security, as shown in Figure 1.
B i B i 1 = G i 1 R G i 1 R = G i G i 1

2.2. The Improved Scheme of Chen and Wu

Chen and Wu [16] improved their work [15] by using the proposed random number image generation function F to generate a random number image R. F contains two sub-functions F1 and F2. The function is defined as F(x)= F2 (F1(x)), where F1 is calculated by Equation (6), performs XOR operation on all images, F2 then marks the image after F1 operation as G ¯ . For each pixel value, it is converted into a binary bit, and the bit is transposed, and the processed result is marked as G ¯ and expressed by Equation (7).
G ¯ = F 1 G 1 , G 2 , , G k = G 1 G 2 G k
G ¯ = F 2 G ¯ x , y b = G ¯ x , y 7 b = G ¯ x , y b
where x, y represent the pixel position in the image, and b (0 ≤ b ≤ 7) represents the pixel bit converted to binary. The sharing steps are introduced as follows:
  • Select n secret images and mark them as G1, G2, …, Gn in sequence;
  • Using Equation (8), the random number image generation function obtains the random number image R;
    R = F G 1 , G 2 , , G k = F 2 F 1 G 1 , G 2 , , G k = F 2 G 1 G 2 G k , w h e r e   k = 2 · n 2
  • Using Equation (9), n secret images and images containing random noise R are used to generate n noise images, which are labeled Ni (i = 1, 2, …, n);
    N i = G i R
  • Using Equation (10), generate n shared images and share them with all participants, labeled Si (i = 1, …, n).
    S i = N 1 ,   i = 1 N 2 ,   i = 2 N i N i 1 N i 2 ,   f o r   3 i n
The recovery procedure is described as follows:
  • Using Equation (11), from the shared images S1, S2, S3, …, Sn, restore all the noise images N1, N2, …, Nn in sequence;
    N i = S 1 ,   i = 1 S 2 ,   i = 2 S i N i 1 N i 2 ,   f o r   3 i n
  • Using Equation (12), the G ¯ generated when sharing is obtained from the noise image. Then use Equation (7) to substitute G ¯ into the sub-function F2 of the random number, the image generating function, and the random number image R generated during sharing can be recovered;
    G ¯ = N 1 N 2 N k
  • According to Equation (13), the noise image and random number image R are recovered to the corresponding secret image.
    G i = N i R

2.3. Scheme of Chen et al.

The sharing steps of the secret image sharing scheme proposed by Chen et al. are introduced as follows:
  • Prepare n secret images and mark them as Ii (i = 0, , n − 1) in sequence;
  • After performing the XOR operation on all the secret images I, the Hash method is performed on the result to generate the matrix h;
    h = H I 0 I 1     I n 1
  • The matrix h is reorganized to generate the image SI;
    S I = i m a g e _ s y n t h e s i s h
  • Performing XOR operation on all secret images I0In−1 and then bit shifting to generate the image and then performing XOR operation with the SI to generate random image R;
    R = b i t _ r e v e r s e I 0 I 1     I n 1 S I
  • Using Equation (17), n random images R0Rn−1 are generated by n secret images performing bit shifting, where x, y represents the pixel positions in the image;
    R i x , y = R x i , y i
  • After all the secret images I0In−1 and images containing random noise R0Rn−1 are calculated according to Equation (18), n shared images Oi (i = 0,…, n − 1) can be obtained.
    O i = I i R i R i + 1 ,   i n 1 I i R i R 0 ,   o t h e r s
The recovery procedure is described as follows:
  • Collect all n shared images, and perform XOR operation on all shared images O 0 O 1 O n 1 . In this way, the result of I 0 I 1 I n 1 is obtained;
  • Obtain h by Equation (14), and then obtain SI by Equation (15);
  • After obtaining the noise image R by Equation (16), then obtain the noise image R 0 , , R n 1 by Equation (17);
  • Then, by Equation (19), n noise images R0, …, Rn1 are used to restore all the secret images.
    I i = O i R i R i + 1 ,   i n 1 O i R i R 0 , o t h e r s
Based on Chen et al.’s proposed algorithm [17], the sharing rate of this method is n/n.

3. The Proposed Approach

This section introduces our proposed XOR-based (m, t, Ti) multi-secret image sharing scheme, in which m secret images are shared among m participants with t different thresholds T0 to Tt−1 satisfying T0 < … < Tt−1. Moreover, the highest threshold Tt−1 should be equal to m.
Section 3.1 introduces the proposed secret image segmentation strategy (SIPS) method to partition m secret images into t groups of intermediate images for t thresholds. Section 3.2 introduces the proposed sharing algorithm, and Section 3.3 introduces the recovery algorithm. Examples of sharing and recovery with thresholds (4, 3, {2, 3, 4}) are demonstrated in Section 3.4.

3.1. Secret Images Partition Strategy (SIPS)

Since the proposed scheme obtains the progressive recovery property, the following partition method is, therefore, presented to generate intermediate images for different thresholds. For sharing m secret images with the property of t thresholds, the first step in SIPS partitions the lowest 4 bit-planes (LSB0–3) of m secret images, which denoted by PSt−1 as group partition and the remaining highest 4 bit-planes (LSB4–7) are partitioning to PS0PSt−2 by bit sequence. Since any modification under LSB2 is hard to be noticed by human eyes, therefore, lowest and highest 4 bit-planes are determined. Figure 2 shows two examples of sharing a 5 pixels block to PSi (0 ≤ it − 1) two different thresholds of (a) t = 3 and (b) t = 4 by the proposed SIPS.
Figure 3 shows the results of only part PSi being recovered by filling the un-recovered PSi by random or 0/1 bits under threshold t = 3. Figure 3a shows the original Barbara image, and Figure 3b–d shows the recovery by PS0 with compensating by 0/1 and random bit, respectively. Moreover, Figure 3e–g shows the recovery by {PS0, PS1} with compensating by 0/1 and random bit, respectively. Figure 3 shows that compensating by 0 leads to a darker recovery. On the contrary, compensating by 1 acquires a brighter recovery. However, since the compensation by 0/1 mainly changes the brightness of the recovery result, the proposed strategy adopting the compensation by random bits, as shown in Figure 3d,g.
Since each secret image has its group partitions PSi(0 ≤ it − 1), sharing m secret images acquires m multiples of their PSi. The second step in SPIS is to generate intermediate images from PSi. The lowest 4 bit-planes (LSB0–3) of PSt−1 construct the intermediate images Pt−1,j (0 ≤ jTt−1) for group t − 1. The 4 bits higher planes (LSB4–7) of PS0PSt−2 are shared to t − 1 groups, as shown in Figure 2, and the size of these intermediate images will reduce to 1 2 t 1 of the original image size. Each PSi(0 ≤ i < t − 1) is then reorganized to intermediate images Pi,k (0 ≤ kTi−1) for further sharing processing.
By applying the proposed SIPS and the predefined (m, t, Ti) thresholds, secret images with size M × N obtains the following intermediate images.
  • 4 lowest bit-planes (LSB0–3) of m secret images (4mMN bits) are reconstructed to m intermediate images with the size of M 2 × N pixels for threshold Tt−1 (=m);
  • Total 4 m M N / t 1 bits from m secret images in highest bit-planes (LSB4–7) are re-shaped to Ti (0 ≤ i < t − 1) intermediate images for different Ti thresholds, respectively. Therefore, sizes of intermediate images are m M 2 t 1 T i × N ;
  • Finally, the size of the shared image is i = 0 t 1 m 2 t 1 T i + 1 2 × M N
Table 1 shows the sizes of shared images in the proposed SIPS with different thresholds under the size of secret images being 300 × 300.

3.2. The Proposed Sharing Algorithm

The sharing algorithm of the proposed XOR-based (m, t, Ti) multiple secret image sharing scheme shares m secret images among m participants with the progressive property of t different thresholds Ti (0 ≤ it − 1) and m = Tt−1. These t thresholds must fit the requirement of T 0 < T 1 < < T t 1 . Figure 4 shows the proposed sharing structure. The intermediate images Pj,k (0 ≤ jt − 1, 0 ≤ k < Tj) are acquired from the proposed SIPS introduced in Section 3.1. The following steps adopt Chen et al.’s method [17] with consecutive modification on thresholds Ti, 0 ≤ i < t − 1. This modification also means that in the Pt−1,k intermediate images, the threshold is Tt−1, and Chen et al.’s method [17] is directly applied. However, other thresholds Ti (0 ≤ i < t − 1) should give some modification to Chen et al.’s method [17]. Our proposed structure obtains the property of consecutive recovery on threshold Ti (0 ≤ i < t − 1). For example, if Ti = 3 and m = 4, four shared images (denoted by S1, S2, S3, S4) are generated and collecting 3 consecutive shared images like S1, S2, S3 or S2, S3, S4 can perfectly recover secret images of the threshold Ti = 3.
The sharing algorithm is introduced as follows:
  • Using the proposed secret images partition strategy (SIPS) to generate intermediate images Pj,k (0 ≤ jt − 1, 0 ≤ k < Tj) from m secret images;
  • Apply the XOR function, the SHA-256 hash function H, the image_synthesis(h) function, and the bit_reverse(x) function on these intermediate images Pj,k by Equations (20) and (21) to generate random image Rj for each threshold;
    X j = P j , 0 P j , 1     P j , T i 1
    R j = i m a g e _ s y n t h e s i s H X j b i t _ r e v e r s e X j
    where the image_synthesis(h) function synthesizes the image from the seed h, and the bit_reverse(X) function reverses each bit of all pixels in an image X;
  • Generate a series of random images R j , k 0 k T i 1 from circular pixel shift processing on Rj as defined in Equation (22);
    R j , k x , y = R j x k , y k
  • Generate a series of intermediate shares Si,j by Equation (23);
    S i , j = P j , i %   T j R j , i %   T j R j , i + 1 %   T j
  • Concatenate all the intermediate shares Si,j to acquire shared image Si for participant i by Equation (24).
    S i = S i , 0 | | S i , 1 S i , t 1

3.3. The Proposed Recovery Algorithm

The recovery algorithm of the proposed XOR-based multiple secret image sharing scheme is introduced in this section. Enough shared images should be acquired for meeting the threshold criterium. In the proposed XOR-based (m, t, Ti) multiple secret image sharing scheme, the acquirement of consecutive k shared images recovers all thresholds Ti with Tik. The recovery algorithm is introduced as follows:
  • Acquire the consecutive k shared images. Without loss of generality, these shared images are denoted by S j 0 j k 1 ;
  • Split S j for obtaining intermediate shares S j , i 0 j k 1 ,   0 i t 1 ;
  • Assume the number of collected shared images k is equal to one threshold Tm m t 1 . For each threshold T i 0 i m , apply the following steps to recover the intermediate image P j , i ;
    3.1.
    Applying S j , i 0 j T i 1 to Equations (20) and (21) acquire X j and R j , respectively;
    3.2.
    Generate a series of random images R j , i 0 j T i 1 from R j ;
    3.3.
    Acquire intermediate images P j , i from Equation (25)
    P j , i %   T j = S i , j R j , i %   T j R j , i + 1 %   T j ;
  • Apply the reverse processing of the proposed SIPS from the intermediate images P j , i to recover the bit-plane shares PSi (0 ≤ it − 1);
  • Combine all the recovered bit-plane shares PSi (0 ≤ it − 1) and replace the un-recovered bits with random bits for recovering all secret images.

3.4. Discussion of a Sharing Example

This section shows an example of sharing four secret images I0I3 with size 300 × 300 by the proposed (4, 3, {2, 3, 4}) XOR-based multi-secret image sharing scheme. The detailed information for each step is introduced as follows:
  • Partition four secret images I0I3 to group partition;
    1.1.
    Four highest bit planes of size 150 × 300 are partitioned to group partitions PS0,i (0 ≤ i3) and PS1,i (0 ≤ i3) with size 75 × 300;
    1.2.
    Four lowest bit planes construct the PS2,i (0 ≤ i ≤ 3) with size 150 × 300;
  • Acquire the intermediate images Pi,j (0 ≤ i ≤ 3, 0 ≤ j ≤ 2) from PSi (0 ≤ i ≤ 2);
    2.1.
    Re-shape PS0,i (0 ≤ i ≤ 3) to acquire P0,0, P0,1 with size 150 × 300 for sharing with threshold 2;
    2.2.
    Re-shape PS1,i (0 ≤ i ≤ 3) to acquire P1,0, P1,1, P1,2 with size 100 × 300 for sharing with threshold 3;
    2.3.
    Re-shape 4 lower bit planes PS2,i (0 ≤ i ≤ 3) to acquire Pj,2 (0 ≤ j ≤ 3) with size 150 × 300 for sharing with threshold 4;
  • In first threshold 2, R0 is acquired by applying P0,0, P0,1 to Equation (20). Applying R0 and Equation (21) generates R0,0 and R0,1. Four intermediate shares with the size of 150 × 300 are acquired from the following:
    S 0 , 0 = P 0 , 0 R 0 , 0 R 0 , 1 S 1 , 0 = P 0 , 1 R 0 , 1 R 0 , 0 S 2 , 0 = P 0 , 0 R 0 , 0 R 0 , 1 S 3 , 0 = P 0 , 1 R 0 , 1 R 0 , 0
  • In second threshold 3, R1 is acquired by applying P1,0, P1,1, P1,2 to Equation (20). Applying R1 and Equation (21) generates R1,0, R1,1 and R1,2. Four intermediate shares with the size of 100 × 300 are acquired from the following:
    S 0 , 1 = P 1 , 0 R 1 , 0 R 1 , 1 S 1 , 1 = P 1 , 1 R 1 , 1 R 1 , 2 S 2 , 1 = P 1 , 2 R 1 , 2 R 1 , 0 S 3 , 1 = P 1 , 0 R 1 , 0 R 1 , 1
  • In the last threshold 4, R2 is acquired by applying P2,0, P2,1, P2,2, P2,3 to Equation (20). Applying R2 and Equation (21) generates R2,0, R2,1, R2,2 and R2,3. Four intermediate shares with the size of 150 × 300 are acquired from the following:
    S 0 , 2 = P 2 , 0 R 2 , 0 R 2 , 1 S 1 , 2 = P 2 , 1 R 2 , 1 R 2 , 2 S 2 , 2 = P 2 , 2 R 2 , 2 R 2 , 3 S 3 , 2 = P 2 , 3 R 2 , 3 R 2 , 0
  • All shared images S 0 , S 1 , S 2 , and S 3 with the size of 400 × 300 are obtained from the following concatenation processing:
    S 0 = S 0 , 0     S 0 , 1     S 0 , 2 S 1 = S 1 , 0     S 1 , 1     S 1 , 2 S 2 = S 2 , 0     S 2 , 1     S 2 , 2 S 3 = S 3 , 0     S 3 , 1     S 3 , 2
The recovery example is explained as follows: The proposed XOR-based multi-secret image sharing scheme should be recovered by collecting consecutive shared images. In the proposed (4, 3, {2, 3, 4}) XOR-based multi-secret image sharing scheme, the collections of { S 0 , S 1 } , { S 1 , S 2 } , or { S 2 , S 3 } meet the requirement of threshold 2 and the consecutive requirement. Moreover, the collections of { S 0 , S 1 , S 2 } or { S 1 , S 2 , S 3 } meet the requirement of threshold 3 and the consecutive requirement. The following introduces the recovery of three different collections of shared images.
  • The collection of { S 1 , S 2 } ;
    1.1.
    Splitting S 1 and S 2 acquire intermediate shares S 1 , 0 , S 1 , 1 , S 1 , 2 and S 2 , 0 , S 2 , 1 , S 2 , 2 , respectively;
    1.2.
    Since P 0 , 1 = S 1 , 0 R 0 , 1 R 0 , 0 and P 0 , 2 = S 0 , 0 R 0 , 0 R 0 , 1 , S 1 , 0 and S 0 , 0 can also be acquired by P 0 , 1 R 0 , 1 R 0 , 0 and P 0 , 2 R 0 , 0 R 0 , 1 , respectively;
    1.3.
    Directly applying S 1 , 0 S 0 , 0 acquires P 0 , 1 P 0 , 2 , and X 0 can be obtained by Equation (20);
    1.4.
    R 0 , 0 and R 0 , 1 are then acquired from Equations (21) and (22);
    1.5.
    By using S 1 , 0 , S 0 , 0 S 2 , 0 , R 0 , 0 , and R 0 , 1 , the intermediate images P 0 , 1 and P 0 , 2 can be then obtained;
    1.6.
    Finally, the reverse processing of the SIPS can obtain half bits of higher bit planes (LSB4–7) to have the rough image result;
  • The collection of { S 1 , S 2 , S 3 } ;
    2.1.
    Similar to the process in the previous collection, S 1 , S 2 , S 3 can also be split into intermediate shares S 1 , 0 S 1 , 1 S 1 , 2 , S 2 , 0 S 2 , 1 S 2 , 2 and S 3 , 0 S 3 , 1 S 3 , 2 , respectively;
    2.2.
    Directly applying S 1 , 1 S 2 , 1 S 3 , 1 S 0 , 1 acquires the same result of P 0 , 1 P 0 , 2 P 0 , 0 ;
    2.3.
    X 1 can be then obtained by Equation (20) so as to acquire R 1 , 0 , R 1 , 1 and R 1 , 2 ;
    2.4.
    From S 1 , 0 , S 2 , 0 , S 3 , 0 S 0 , 0 , R 1 , 0 , R 1 , 1 , R 1 , 2 , and reverse processing of the SIPS, another half bits of a higher bit planes (LSB4–7) are then acquired;
    2.5.
    Therefore, { S 1 , S 2 , S 3 } recovers all bits under higher bit planes (LSB4–7);
  • The collection of { S 0 , S 1 , S 2 , S 3 } ;
    3.1.
    Since { S 0 , S 1 , S 2 , S 3 } includes { S 1 , S 2 } and { S 1 , S 2 , S 3 } , all bits in a higher bit planes (LSB4–7) are perfectly recovered;
    3.2.
    Splitting { S 0 , S 1 , S 2 , S 3 } acquires { S 0 , 0 , S 0 , 1 , S 0 , 2 } , { S 1 , 0 , S 1 , 1 , S 1 , 2 } , { S 2 , 0 , S 2 , 1 , S 2 , 2 } , and { S 3 , 0 , S 3 , 1 , S 3 , 2 } , respectively;
    3.3.
    Using S 0 , 2 , S 1 , 2 , S 2 , 2 , S 3 , 2 , the X 2 , R 2 , 0 , R 2 , 1 , R 2 , 2 , and R 2 , 3 are orderly calculated for obtaining the lower bit planes (LSB0–3);
    3.4.
    The collection of { S 0 , S 1 , S 2 , S 3 } recovers the secret images information of two half bits of a higher bit planes (LSB4–7) from { S 1 , S 2 } and { S 1 , S 2 , S 3 } , and the lower bit planes (LSB0–3) from { S 0 , S 1 , S 2 , S 3 } . Therefore, all secret images can then be perfectly recovered.

4. Experimental Results and Discussions

This section demonstrates the experimental results of our proposed approach. Section 4.1 presents the experimental results of the proposed approach to share four and five secret images. All experiments are run on a PC with an Intel i5-4210 CPU and 12G RAM, using the MATLAB R2019b software. The size of all experimental secret images is 256 × 256. Section 4.2 presents the performance of the proposed approach by comparing other multiple secret image sharing methods.

4.1. Experimental Results

Figure 5 shows the experimental results of sharing by thresholds (4, 3, {2, 3, 4}) with sharing four secret images and 3 recovery thresholds by collecting 2, 3, or 4 consecutive shared images. Figure 5a–d shows the four secret images: Airplane, Baboon, Barbara, and Boat. Figure 5e shows the result of XOR of all pictures, and there are still afterimages of secret images. Figure 5f shows the generated random image R, which is obtained by hash and bit reverse calculation in Figure 5e. Figure 5g–j show four shared images with size 342 × 256, in which the size is acquired from the concatenation for three thresholds {2, 3, 4} by the equation m 2 t 1 T i × M N as 128 × 256, 86 × 256, 128 × 256, respectively. Figure 5k–n are the recovery results by gathering consecutive shared images in Figure 5g–h of satisfying the first threshold 2. Moreover, gathering three consecutive shared images in Figure 5g–i recover the results shown in Figure 5o–r, which are a little different comparing with the original secret images in Figure 5a–d. Gathering all four secret images recovers the secret images perfectly, as shown in Figure 5a–d.
Figure 6 shows another example of sharing five secret images by thresholds (5, 4, {2, 3, 4, 5}) consisting of 4 progressive recovery steps. Collecting 2, 3, 4, or 5 consecutive shared images recover high noise (Figure 6m–q), light noise (Figure 6r–v), clear (like Figure 5o–r), or perfect recovery (like Figure 6a–e), respectively. Figure 6h–l shows five shared images with size 361 × 256, in which the size is acquired from the concatenation for four thresholds {2, 3, 4, 5} by the equation m 2 t 1 T i × M N as 107 × 256, 72 × 256, 54 × 256, and 128 × 256, respectively. However, the size of shared images may not be a square integer due to the proposed SIPS method and compensation with bit 0 is needed. Moreover, the number of compensation bits is limited and will not have a visual effect. The progressive recovery property of the proposed XOR-based (m, t, Ti) multi-secret image sharing scheme is clearly demonstrated in Figure 5 and Figure 6.
Figure 7 shows an experiment of collecting all 5 shared images in a (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing, in which one shared image Figure 7a is under attacked. In our proposed scheme, collecting 5 shared images with no attacked shared image leads to perfect recovery. In Figure 7a, a region with black pixels is replaced at the center of the shared image, and the attacked region modifies the data required to recover in threshold 2. Therefore, the recovery of threshold 2 cannot be fulfilled. However, the data required to recover in threshold 3, 4, or 5 are still correct. Thus, the recovery results in Figure 7f–j exhibit the property of gathering satisfying the thresholds 3, 4 and 5.
Figure 8 shows another attack experiment. In Figure 8a, the attacked region covers the data required to satisfy thresholds 2, 3, 4, and 5. Therefore, no correct secret images can be recovered, and the recovered images shown in Figure 8f–j all look like noised images.
Table 2 shows the computation time of the proposed scheme in two thresholds. The proposed Boolean-based scheme requires limited CPU computation time, and the performance of the proposed scheme is, therefore, exhibited.

4.2. Comparison and Discussion

This section compares the proposed method with other multiple secret image sharing methods. The comparison metrics include recovery results, color levels, recovery methods, sharing types, sharing rates, and progressive or not. The recovery results are divided into recognizable recovery or lossless recovery. The color scales are divided into binary images and grayscale images by secret images. The recovery methods are to superimpose shared images or use a calculation to restore. The sharing rates are the value of the size of secret images divided by the size of shared images. Although the shared image size produced by the proposed method is not fixed, the total size of shared images is larger than the original image due to the presented consecutive recovery strategy. Table 3 shows that the proposed method is the only XOR-based method that can perform progressive sharing with no distortion reduction and grayscale.

5. Conclusions

This paper proposed a high security and efficiency XOR-based (m, t, Ti) multi-secret image sharing scheme. The proposed method only needs to perform XOR operations without recording random images. The proposed secret image partition strategy (SIPS) generates intermediate images for different thresholds in the sharing procedure. Based on the property of progressive recovery, the proposed scheme should be recovered by collecting consecutive shared images. The experimental results and analyses show that the proposed method outperforms previous schemes. In the future, we will study how to limit the sharing rate to further improve our approach.

Author Contributions

Conceptualization, C.-S.L., C.-C.C.; methodology, C.-C.C.; validation, C.-S.L., C.-C.C., Y.-C.C.; formal analysis, C.-S.L., C.-C.C.; investigation, Y.-C.C.; writing—original draft preparation, writing—review and editing, C.-S.L., C.-C.C., Y.-C.C.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chanu, O.B.; Neelima, A. A survey paper on secret image sharing schemes. Int. J. Multimed. Inf. Retr. 2019, 8, 195–215. [Google Scholar] [CrossRef]
  2. Thien, C.-C.; Lin, J.-C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
  3. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  4. Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA, 4–6 June 1979; Volume 48, pp. 313–317. [Google Scholar]
  5. Ulutas, M.; Ulutas, G.; Nabiyev, V.V. Invertible secret image sharing for gray level and dithered cover images. J. Syst. Softw. 2013, 86, 485–500. [Google Scholar] [CrossRef]
  6. Wu, X.; Ou, D.; Liang, Q.; Sun, W. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 2012, 85, 1852–1863. [Google Scholar] [CrossRef]
  7. Wang, D.; Zhang, L.; Ma, N.; Li, X. Two secret sharing schemes based on Boolean operations. Pattern Recognit. 2007, 40, 2776–2785. [Google Scholar] [CrossRef]
  8. Kabirirad, S.; Eslami, Z. Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. J. Inf. Secur. Appl. 2019, 47, 16–27. [Google Scholar] [CrossRef]
  9. Dhara, B.C.; Chanda, B. A fast progressive image transmission scheme using block truncation coding by pattern fitting. J. Vis. Commun. Image Represent. 2012, 23, 313–322. [Google Scholar] [CrossRef]
  10. Fang, W.-P. Friendly progressive visual secret sharing. Pattern Recognit. 2008, 41, 1410–1414. [Google Scholar] [CrossRef]
  11. Huang, C.-P.; Hsieh, C.-H.; Huang, P.S. Progressive sharing for a secret image. J. Syst. Softw. 2010, 83, 517–527. [Google Scholar] [CrossRef]
  12. Lin, S.-J.; Lin, J.-C. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit. 2007, 40, 3652–3666. [Google Scholar] [CrossRef]
  13. Wang, R.-Z.; Su, C.-H. Secret image sharing with smaller shadow images. Pattern Recognit. Lett. 2006, 27, 551–555. [Google Scholar] [CrossRef]
  14. Chen, C.C.; Chien, Y.W. Sharing numerous images secretly with reduced possessing load. Fundam. Inf. 2008, 86, 447–458. [Google Scholar]
  15. Chen, T.-H.; Wu, C.-S. Efficient multi-secret image sharing based on Boolean operations. Signal Process. 2011, 91, 90–97. [Google Scholar] [CrossRef]
  16. Chen, C.-C.; Wu, W.-J. A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 2014, 92, 107–114. [Google Scholar] [CrossRef]
  17. Chen, C.-C.; Wu, W.-J.; Chen, J.-L. Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools Appl. 2015, 75, 7113–7128. [Google Scholar] [CrossRef]
  18. Kabirirad, S.; Eslami, Z. A(t,n)-multi secret image sharing scheme based on Boolean operations. J. Vis. Commun. Image Represent. 2018, 57, 39–47. [Google Scholar] [CrossRef]
  19. Azza, A.A.; Lian, S. Multi-secret image sharing based on elementary cellular automata with steganography. Multimed. Tools Appl. 2020, 79, 21241–21264. [Google Scholar] [CrossRef]
  20. Chen, T.-H.; Wu, X.-W. Multiple secret image sharing with general access structure. Multimed. Tools Appl. 2020, 79, 13247–13265. [Google Scholar] [CrossRef]
  21. Ross, A.; Othman, A. Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 2011, 6, 70–81. [Google Scholar] [CrossRef] [Green Version]
  22. Yan, X.; Lu, Y.; Yang, C.-N.; Zhang, X.; Wang, S. A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 2020. [Google Scholar] [CrossRef]
  23. Yue, J.; Yan, X.; Qi, J.; Lu, Y.; Zhou, X. Secret image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics 2020, 8, 234. [Google Scholar]
  24. Li, J.; Wang, X.; Huang, Z.; Wang, L.; Xiang, Y. Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J. Parallel Distrib. Comput. 2019, 130, 91–97. [Google Scholar] [CrossRef]
  25. Chen, J.; Chen, Y.S.; Hsu, H.C.; Chen, H.W. New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electron. Imaging 2005, 14, 033018. [Google Scholar] [CrossRef]
  26. Shyu, S.J.; Huang, S.-Y.; Lee, Y.-K.; Wang, R.-Z.; Chen, K. Sharing multiple secrets in visual cryptography. Pattern Recognit. 2007, 40, 3633–3651. [Google Scholar] [CrossRef]
  27. Lin, S.-J.; Chen, S.-K.; Lin, J.-C. Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J. Vis. Commun. Image Represent. 2010, 21, 900–916. [Google Scholar] [CrossRef]
  28. Chen, C.C.; Fu, W.F. A geometry-based secret image sharing approach. J. Informat. Sci. Eng. 2008, 24, 1567–1577. [Google Scholar]
  29. Wu, H.C.; Chang, C.C. Sharing visual multi-secrets using circle shares. Comput. Stand. Interfaces 2005, 28, 123–135. [Google Scholar]
  30. Bhattacharjee, T.; Maity, S.P.; Islam, S.R. Hierarchical secret image sharing scheme in compressed sensing. Signal Process. Image Commun. 2018, 61, 21–32. [Google Scholar] [CrossRef]
  31. Chanu, O.B.; Neelima, A. A new multi-secret image sharing scheme based on DCT. Vis. Comput. 2019, 36, 939–950. [Google Scholar] [CrossRef]
Figure 1. The results of XOR operation: (a) Lena, (b) house, (c) XOR result of (a,b).
Figure 1. The results of XOR operation: (a) Lena, (b) house, (c) XOR result of (a,b).
Mathematics 09 00612 g001
Figure 2. Example of sharing 5 pixels by the proposed secret image partition strategy (SIPS), (a) shares to 3 groups of PS0, PS1, PS2, (b) shares to 4 groups of PS0, PS1, PS2, PS3.
Figure 2. Example of sharing 5 pixels by the proposed secret image partition strategy (SIPS), (a) shares to 3 groups of PS0, PS1, PS2, (b) shares to 4 groups of PS0, PS1, PS2, PS3.
Mathematics 09 00612 g002
Figure 3. Results of an image by part of group partitions under threshold t = 3, (a) the original image: Barbara, (bd) recovery by PS0 with compensating by 0/1 and random bit, respectively, (eg) recovery by {PS0, PS1} with compensating by 0/1 and random bit, respectively.
Figure 3. Results of an image by part of group partitions under threshold t = 3, (a) the original image: Barbara, (bd) recovery by PS0 with compensating by 0/1 and random bit, respectively, (eg) recovery by {PS0, PS1} with compensating by 0/1 and random bit, respectively.
Mathematics 09 00612 g003
Figure 4. The proposed sharing algorithm.
Figure 4. The proposed sharing algorithm.
Mathematics 09 00612 g004
Figure 5. A (4, 3, {2, 3, 4}) XOR-based progressively secret image sharing example, (ad) the secret images, (e) XOR result of (ad), (f) the generated random image, (gj) shared images, (kn) recovery results by using (gh), (or) recovery results by using (gi).
Figure 5. A (4, 3, {2, 3, 4}) XOR-based progressively secret image sharing example, (ad) the secret images, (e) XOR result of (ad), (f) the generated random image, (gj) shared images, (kn) recovery results by using (gh), (or) recovery results by using (gi).
Mathematics 09 00612 g005
Figure 6. A (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing example, (ae) the secret images, (f) XOR result of (ae), (g) the generated random image, (hl) shared images, (mq) recovery results by using (hi), (rv) recovery results by using (hj).
Figure 6. A (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing example, (ae) the secret images, (f) XOR result of (ae), (g) the generated random image, (hl) shared images, (mq) recovery results by using (hi), (rv) recovery results by using (hj).
Mathematics 09 00612 g006
Figure 7. An example of collecting 5 shared images with one attacked shared image in a (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing, (a) the attacked shared image, (be) the correct shared images, (fj) the recover results by using (ae).
Figure 7. An example of collecting 5 shared images with one attacked shared image in a (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing, (a) the attacked shared image, (be) the correct shared images, (fj) the recover results by using (ae).
Mathematics 09 00612 g007
Figure 8. Another example of collecting 5 shared images with one attacked shared image in a (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing, (a) the attacked shared image, (be) the correct shared images, (fj) the recover results by using (ae).
Figure 8. Another example of collecting 5 shared images with one attacked shared image in a (5, 4, {2, 3, 4, 5}) XOR-based progressively secret image sharing, (a) the attacked shared image, (be) the correct shared images, (fj) the recover results by using (ae).
Mathematics 09 00612 g008
Table 1. Sizes of shared images in the proposed secret image partition strategy (SIPS).
Table 1. Sizes of shared images in the proposed secret image partition strategy (SIPS).
Thresholds(3, 2, {2, 3})(4, 2, {2, 4})(4, 3, {2, 3, 4})
ThresholdIntermediate Image SizeThresholdIntermediate Image SizeThresholdIntermediate Image Size
Group 02225 × 3002300 × 3002150 × 300
Group 13150 × 3004150 × 3003100 × 300
Group 2 4150 × 300
Table 2. Performance of sharing and recovery procedures at different thresholds.
Table 2. Performance of sharing and recovery procedures at different thresholds.
ThresholdsSharing Computation Time (s)Recovery Computation Time (s)
(4, 3, {2, 3, 4})1.7341.422
(5, 4, {2, 3, 4, 5})2.3342.038
Table 3. Comparisons between the proposed approach and related multiple secret image sharing methods.
Table 3. Comparisons between the proposed approach and related multiple secret image sharing methods.
Recovery ResultsColor LevelsRecovery MethodsSharing TypesSharing RatesProgressive
Wu and Chang [29]RecognizableBinarySuperimposeCircle 2 2 × 4 No
Chen et al. [25]RecognizableBinarySuperimposeCircle n 2 × 4 No
Shyu et al. [26]RecognizableBinarySuperimposeCircle n 2 × 2 × n No
Lin et al. [27]RecognizableBinarySuperimposeRectangle 2 2 No
Wang et al. [7]LosslessGrayscaleXORRectangle 1 n No
Chen and Wu [15]LosslessGrayscaleXORRectangle n 1 n No
Chen and Wu [16]LosslessGrayscaleXORRectangle n n No
Chen et al. [17]LosslessGrayscaleXORRectangle n n No
The proposed approachLosslessGrayscaleXORrectangle i = 0 t 1 m 2 t 1 T i + 1 2 Yes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lin, C.-S.; Chen, C.-C.; Chen, Y.-C. XOR-Based Progressively Secret Image Sharing. Mathematics 2021, 9, 612. https://doi.org/10.3390/math9060612

AMA Style

Lin C-S, Chen C-C, Chen Y-C. XOR-Based Progressively Secret Image Sharing. Mathematics. 2021; 9(6):612. https://doi.org/10.3390/math9060612

Chicago/Turabian Style

Lin, Cheng-Shian, Chien-Chang Chen, and Yu-Cheng Chen. 2021. "XOR-Based Progressively Secret Image Sharing" Mathematics 9, no. 6: 612. https://doi.org/10.3390/math9060612

APA Style

Lin, C. -S., Chen, C. -C., & Chen, Y. -C. (2021). XOR-Based Progressively Secret Image Sharing. Mathematics, 9(6), 612. https://doi.org/10.3390/math9060612

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop