1 Introduction

Cryptographic algorithms encode sensitive information into ciphertext using random keys to safeguard it from unauthorized access (Menezes et al. 2021; Paar and Pelzl 2009). In some scenarios, relying on a single user to access this sensitive information can pose a potential security vulnerability (Yan et al. 2021; Liu et al. 2016; Deng et al. 2015). To address this issue, Blakley and Shamir independently introduced the concept of secret sharing (Blakley 1979; Shamir 1979). Desmedt and Frankel developed this concept further with their formal introduction of threshold cryptosystems (Desmedt and Frankel 1990). Secret sharing enables the splitting of a secret into multiple shares, which prevents monopolistic access by a single user to confidential information (Ben-Or et al. 2019; Garg et al. 2012). It ensures protection even when some shares are missing or damaged (Zhang et al. 2010; Asmuth and Bloom 1983; Stinson and Paterson 2018). Secret image sharing (SIS) has become an essential means for protecting access to confidential images during distribution and reconstruction stages. In SIS, the image is encoded into a number of shares (also called shadows), which are distributed on a group of users. Among this group, only a qualified subset can collectively retrieve the image using their shares (Georgi et al. 2021; Shankar et al. 2020; Yan et al. 2020). The SIS scheme is typically realized as a threshold (kn) system that decomposes a secret image into n shares (Thien and Lin 2002). To correctly retrieve the image, a minimum of k individual shares out of the n are required.

Most legacy schemes of threshold secret-sharing rely on complex mathematical operations running on computational systems (Shankar et al. 2020; Yang et al. 2023; Wu et al. 2020; Luo et al. 2023). However, in recent years, several optical techniques have been introduced to offer high-speed parallel processing in image encryption (Li et al. 2022; Abdelfattah et al. 2022; Su et al. 2021, 2020), and secret sharing (Deng et al. 2015, 2016; Li et al. 2018a; Lu et al. 2020). In 2015, an optical (2, n) threshold scheme based on interference was proposed, which could only be applied to binary secret images (Deng et al. 2015). Deng et al. (2016) then presented an optical (3, n) threshold technique using phased interferometry. Multilevel image authentication and Multiple-image encryption using ghost imaging and hyperplane threshold algorithm were also reported (Li et al. 2018a). Another optical (2, 3) threshold system was introduced by making use of the phase retrieval algorithm (Lu et al. 2020). Although that scheme was simple, a pre-verification process was necessary because the shares might be easily reproduced. All of the optical threshold schemes mentioned above assign the same authority level to participants. However, in many real-world applications, some participants have special privileges based on their status, role, or trust. In such cases, a multilevel or hierarchical structure becomes necessary. Li et al. presented in 2013 a (tskn) essential SIS (ESIS) algorithm, where n shares are categorized into two levels: s essential shares and \((n-s)\) nonessential ones. The qualified subset required to reconstruct the secret image should consist of a minimum of k shares, including at least t essential shares (Li et al. 2013). Subsequently, Yang et al. introduced an ESIS scheme that reduces the total size of shares using a conjunctive hierarchical approach (Yang et al. 2015). However, the schemes presented in Li et al. (2013); Yang et al. (2015) neglected two important issues: the generation of shares with unequal sizes and the concatenation of sub-shares.

Generating unequal-sized shadows may reveal sensitive information about the corresponding participant’s importance, while concatenating sub-shadows may complicate the reconstruction process in practice (Li et al. 2018b; Wu et al. 2019). Li et al. (2016) introduced an ESIS scheme that overcomes the problem of unequal-sized shadows. However, their scheme still has the issue of concatenating sub-shadows. Two schemes were then proposed over GF(\(2^8\)) that can solve both issues (Li et al. 2018b; Sardar and Adhikari 2020). However, these two schemes only work for grayscale images. More recently, Yadav and Singh (2022) introduced an ESIS scheme that can work with color images. However, this scheme suffers from interference if the threshold share number is an odd number and only operates well if it is an even number. All ESIS schemes, so far, have relied on complex mathematical operations performed on computational systems. This paper presents, to the best of our knowledge, the first optical ESIS system capable of sharing secret images among n participants, including one essential share. The novel (1, 2, n) ESIS system integrates both the unequal modulus decomposition (UMD) and the optical gyrator transform (GT). Its generated essential and nonessential shares are equal-sized, eliminating the need to concatenate sub-shares in the reconstruction process. While we demonstrate the key results of the presented system for color images, the scheme is entirely ready for binary and grayscale images. The presented system offers high-speed parallel processing and does not require separate pre-processing steps such as random permutations or a separate encryption stage, significantly reducing the system’s complexity.

2 Preliminaries

The presented secret sharing system applies UMD to the secret image in the GT domain. Compared to other optical transforms, the GT rotation angle offers a highly sensitive key that can substantially augment the overall security of the system (Abuturab 2015). The integration of UMD and GT enhances the security of the scheme and eliminates the need for the pre-processing stage typically used in most secret sharing schemes. Here, we present a brief introduction to UMD and GT processes.

2.1 Gyrator transform

For a 2D image g(xy), the GT with a rotation angle \(\gamma\) can be defined by the linear transform: Rodrigo et al. (2007a)

$$\begin{aligned} G\left( u,v \right)&\equiv GT_{\gamma } \left\{ g \left( x,y \right) \right\} \nonumber \\&\quad \equiv \dfrac{1}{\left| \sin {\gamma } \right| } \iint g\left( x,y \right) \times K_{(\gamma )} ~ \textrm{d} x \textrm{d} y , \end{aligned}$$
(1)

where \(\left( x,y \right)\) / \(\left( u,v \right)\) are the coordinates at the input / output planes. The kernel \(K_{(\gamma )}\) is expressed as

$$\begin{aligned} K_{(\gamma )} =\exp {\left[ j2\pi \dfrac{\left( uv+xy \right) \cos {\gamma }-vx-uy}{\sin {\gamma }} \right] }. \end{aligned}$$
(2)

The rotation angle \(\gamma\) is the parameter that primarily controls the GT output. Compared to the Fourier transform, the rotation angle \(\gamma\) serves as a secondary key that enhances the security. This property renders GT widely used in optical image encryption (Singh and Sinha 2009; Rodrigo et al. 2007b). The GT is optically realized using three lenses inserted at certain distances (Rodrigo et al. 2007c). The inverse GT (GT\(_{-\gamma }\)) is equivalent to the GT with an angle of rotation \(-\gamma\).

2.2 Unequal modulus decomposition

UMD is a technique that decomposes a 2D image into two complex-valued masks, which are independent (with unequal amplitudes and phases) (Abdelfattah et al. 2020). This can be explained referring to the representation in the complex plane as in Fig. 1.

Consider a complex vector \(S \left( u,v \right)\) that represents a 2D image. We can express its amplitude and phase as \(A =\left| S \left( u,v \right) \right|\) and \(\phi = \arg \left\{ S \left( u,v \right) \right\}\), respectively. As illustrated in Fig. 1, we can decompose \(S \left( u,v \right)\) into two independent random vectors \(P_1\) and \(P_2\) with unequal amplitudes and phases. We can define these vectors using a simple geometrical deduction as follows

$$\begin{aligned} P_{1} = \frac{A e^{j\alpha } \sin (\beta - \phi )}{\sin (\beta - \alpha )},~~~ P_{2} = \frac{A e^{j\beta } \sin (\phi - \alpha )}{\sin (\beta - \alpha )}. \end{aligned}$$
(3)

where \(\alpha \left( u,v \right)\) and \(\beta \left( u,v \right)\) denote two independent random functions that are generated uniformly over the interval \(\left[ 0,2 \pi \right]\). The UMD process is represented by

$$\begin{aligned} \left[ P_{1} \left( u,v \right) ,P_{2} \left( u,v \right) \right] \equiv \mathcal {UMD}_{\alpha ,\beta } \left[ S \left( u,v \right) \right] , \end{aligned}$$
(4)

where denotes that the UMD process \(\mathcal {UMD}_{\alpha ,\beta }\) is performed on \(S \left( u,v \right)\) using two random functions \(\alpha \left( u,v \right)\) and \(\beta \left( u,v \right)\).

Fig. 1
figure 1

Unequal modulus decomposition process. The amplitude and phase of every pixel in the 2D image is represented by a vector S(uv). The UMD process decomposes the vector S(uv) in the complex plane into two independent random vectors \(P_1\) and \(P_2\) with unequal amplitudes and phases

3 ESIS scheme

The proposed ESIS scheme is designed to decompose an initial secret image into n shares with two levels of importance. The n generated shares include one essential share and \((n-1)\) nonessential shares. The scheme has numerous practical applications, such as maintaining the security of confidential images in financial institutions or the healthcare industry. For example, when a confidential image needs to be accessed by a department manager and one or more of his assistants, or when a medical image contains sensitive information about a patient that needs to be viewed by a doctor and at least one nurse, the proposed ESIS scheme can be employed to ensure that only authorized personnel can access the secret image.

Fig. 2
figure 2

Block diagram illustrating the essential secret image sharing (ESIS) scheme

In this section, we present the ESIS scheme, including the secret image sharing and reconstruction processes. The ESIS scheme is sketched in Fig. 2. The main objective of this process is to divide a secret image into a set of n shares, that are then distributed on a group of participants. In the (1, 2, n)-ESIS scheme, these n shares consist of one essential share and \((n-1)\) nonessential shares.

Fig. 3
figure 3

Optical layout of the secret image sharing process. \(GT_{\gamma }\): Gyrator transform of a rotation angle \(\gamma\); CCD: Charged coupled device; and SLM: Spatial light modulator

Let g(xy) be the secret color image which consists of RGB components (RGB denote red, green, and blue). The jth color component of this secret image \((j=\{R,G,B\})\) is multiplied by a random-phase mask (RPM) \(R_{i,j}(x,y)\), where \(i=1,2,3,\cdots , (n-1)\). The output is gyrator-transformed at a rotation angle \(\gamma\). The resulting function \(S_{i,j}\) can be expressed as

$$\begin{aligned} S_{i,j}\left( u,v \right) = {GT}_{\gamma } \left\{ \sqrt{g_j \left( x,y \right) } \cdot R_{i,j} \left( x,y \right) \right\} . \end{aligned}$$
(5)

Next, the first function \(S_{1,j} \left( u,v \right)\) is analyzed using UMD process into two functions \(P_{1,j} \left( u,v \right)\) and \(P_{e,j} \left( u,v \right)\)

$$\begin{aligned} \left[ P_{1,j} \left( u,v \right) , P_{e,j} \left( u,v \right) \right] \equiv \mathcal {UMD}_{\alpha , \beta } \left[ S_{1,j} \left( u,v \right) \right] . \end{aligned}$$
(6)

Here, \(P_{e,j} \left( u,v \right)\) is considered as the essential share and \(P_{1,j} \left( u,v \right)\) is regarded as one of the nonessential shares. The remaining nonessential shares \(P_{i,j} \left( u,v \right)\), \(i=2,3,...,(n-1)\) can be directly obtained using

$$\begin{aligned} P_{i,j} \left( u,v \right) = S_{i,j} \left( u,v \right) - P_{e,j} \left( u,v \right) . \end{aligned}$$
(7)

According to Eqs. (6)and (7), we generate n shares including an essential share \(P_{e,j} \left( u,v \right)\) and \((n-1)\) nonessential shares \(P_{i,j} \left( u,v \right)\); \(i=1,2,3,\) \(\cdots ,(n-1)\).

In the reconstruction process, a qualified subset of shares is required to recover the secret image correctly. A qualified subset consists of the essential share \(P_{e,j} \left( u,v \right)\) and any one of the nonessential shares \(P_{i,j} \left( u,v \right)\). Firstly, the function \(S_{i,j} \left( u,v \right)\) is obtained by the coherent superposition of an essential and a nonessential shares as

$$\begin{aligned} S_{i,j} \left( u,v \right) = P_{i,j} \left( u,v \right) + P_{e,j} \left( u,v \right) . \end{aligned}$$
(8)

Next, the jth color component of the image is obtained by applying the inverse gyrator transform with the same rotation angle \(\gamma\)

$$\begin{aligned} g_j \left( x,y \right) = \left| GT_{-\gamma } \left\{ S_{i,j}\left( u,v \right) \right\} \right| ^2. \end{aligned}$$
(9)

4 Proposed optical ESIS setups

Fig. 4
figure 4

Optical layout of the secret image reconstruction process. \(GT_{-\gamma }\): Inverse gyrator transform of a rotation angle \(\gamma\); BS: Beam splitter

The optical setups for the secret image sharing and reconstruction processes are sketched in Figs. 3 and 4, respectively. The RGB color components of the secret image are processed independently, one after the other. In Fig. 3, a laser beam illuminates two spatial light modulators (SLMs) which display the functions \(g_{j}\left( x,y\right)\) and \(R_{i,j}\left( x,y\right)\). This constructs a random-phase-masked version of the jth color component of this image. The output passes through a GT system configured with a rotation angle \(\gamma\). This produces the function \(S_{i,j} \left( u,v\right)\) which is registered by a Charged Coupled Device camera (CCD camera). UMD operation is then performed on a computing system to generate n shares. The in-line holography technique is run at the CCD-camera plane to register the phase information.

In Fig. 4, the magnitude and phase of the essential and nonessential shares are separately displayed on two SLM units placed in each of the two arms of a Mach-Zehnder interferometer. The coherent superposition of the two image shares takes place at a beam splitter BS2. The resulting spatially-modulated beam \(S_{i,j} \left( u,v\right)\) propagates through the GT system configured with a rotation angle \(-\gamma\), applying inverse GT. Next, the result is registered by a CCD camera for each color component.

In our scheme, the GT angle \(\gamma\) serves as a further key to improve the scheme security. Therefore, the GT rotation angle together with the essential share are distributed to the corresponding participant. To be able to recover the secret image, the essential share holder has to provide this key along with the essential share. This approach improves the security of the scheme in case hackers steal the essential share. This may be important in the scheme since it generates only one essential share. Through the analysis, the rotation angle \(\gamma\) is the same for all color components and shares. This speeds up the sequential secret sharing and reconstruction processes.

5 Numerical results

In this section, the feasibility and effectiveness of the presented (1, 2, n) ESIS scheme are demonstrated by numerical simulations. Without loss of generality, we have selected a (1, 2, 4) scheme as an example, in which the total number of shares is four (\(n=4\)), including one essential share and three nonessential shares. The \(256 \times 256\) color “Pepper” image (Fig. 5) is used as the input secret image. The random phase masks (RPMs) and UMD parameters (\(R_{i,j}\), \(\alpha _j\), and \(\beta _j\); where \(i=1,2,3\)) are generated via a random routine. Each of the RPMs and UMD parameters has the dimensions \(256\times 256\) and is fair distributed over the \(\left[ 0, 2 \pi \right]\) interval. In our simulations, the GT rotational angle is set to \(\gamma =1.5 \mathrm {~rad}\).

We have applied the (1, 2, 4) ESIS scheme to the secret “Pepper” image shown in Fig. 5. The secret sharing phase generates four shares, including the essential share \(P_e\) shown in Fig. 6a, along with three nonessential shares \(P_1\), \(P_2\), and \(P_3\) as depicted in Fig. 6b–d, respectively. It is evident that no useful information about the original secret image can be observed in the generated shares.

Fig. 5
figure 5

The secret color “Pepper” image with \(256 \times 256\) pixels

Fig. 6
figure 6

Results of the (1, 2, 4) ESIS scheme a An essential share, bd Three different nonessential shares

Fig. 7
figure 7

Recovered secret image using the essential share \(P_e\) with the nonessential shares a \(P_1\), b \(P_2\), c \(P_3\)

Fig. 8
figure 8

Recovered secret images using two of the nonessential shares a \(P_1\) and \(P_2\), b \(P_1\) and \(P_3\), c \(P_2\) and \(P_3\)

Fig. 9
figure 9

Recovered secret images using only a single share a \(P_e\), b \(P_1\), c \(P_2\), d \(P_3\)

Fig. 10
figure 10

CC curves of the recovered images versus the deviation in the GT rotation angle (\(\Delta R\)) for the qualified subsets a \(P_e\), \(P_1\) b \(P_e\), \(P_2\) c \(P_e\), \(P_3\)

In the reconstruction phase of the (1, 2, 4) scheme, there are three qualified subsets, namely (\(P_e\), \(P_1\)), (\(P_e\), \(P_2\)), and (\(P_e\), \(P_3\)). Each qualified subset consists of a pair of shares, including the essential one. The reconstructed images resulting from using the three subsets independently are shown in Fig. 7a–c, respectively. It is evident that the secret image is correctly reconstructed in all three cases.

To assess the degree of similarity between the secret image and the reconstructed one, we use the correlation coefficient (CC):

$$\begin{aligned} CC= \dfrac{E \left\{ \left[ g- E \left( g \right) \right] \cdot \left[ g_r-E \left( g_r \right) \right] \right\} }{\sqrt{E \left[ g-E \left( g \right) \right] ^{2} \cdot E \left[ g_r-E \left( g_r \right) \right] ^{2} }}, \end{aligned}$$
(10)

where g and \(g_r\) denote the original and retrieved image, respectively, and \(E \left( \cdot \right)\) is the expectation. The CCs of the three reconstructed images in Fig. 7a–c are all equal to one, indicating that any qualified subset can successfully recover the initial secret image without any loss of quality.

Table 1 Correlation coefficients of the recovered images using unqualified subsets of shares

For the ESIS scheme, it is essential that any unqualified subset of shares cannot reconstruct the secret image correctly. To further verify this, two numerical experiments have been conducted. Firstly, we have tested reconstructing the secret image using different pairs of nonessential shares. The recovered images obtained from employing the unqualified subsets (\(P_1\), \(P_2\)), (\(P_1\), \(P_3\)), and (\(P_2\), \(P_3\)) are displayed in Fig. 8a–c, respectively. It is evident that the recovered images reveal no information about the initial secret image. This implies that using any pair of nonessential shares cannot reconstruct the secret image correctly.

Next, we have evaluated the ability to recover the secret image using a single share, whether it is an essential or nonessential share. Since the reconstruction process requires a subset of two shares as input, we have replaced the missing share with zero matrices. We have examined reconstructing the secret image using the individual shares \(P_e\), \(P_1\), \(P_2\), and \(P_3\) independently. The corresponding recovered images are presented in Fig. 9a–d. It is evident that no important information about the initial secret image can be discerned in the recovered images. This verifies that the secret image cannot be recovered when one of the two shares that make up the qualified subset is missing. Moreover, these results further demonstrate that our optical scheme does not suffer from the silhouette problem, as observed in most interference-based optical cryptosystems (Chen and Chen 2013).

To numerically evaluate the unsuccessful recovery of the secret image using unqualified subsets of shares, CC values of the restored images in Figs. 8 and 9 for the R, G, and B components are computed. The CC values are listed in Table 1. all values are less than 0.004, signifying that the presented scheme is highly secure, and that only qualified subsets of shares can enable successful reconstruction of the secret image. These CC values provide a measure of the similarity between the original and recovered images and highlight the importance of using qualified shares for accurate and reliable recovery.

The proposed scheme utilizes the GT angle \(\gamma\) as an additional key to verify the essential share and improve the security. To measure the sensitivity of the image sharing system to tiny variations in the rotation angle, we have performed the following numerical experiment. The three qualified subsets associated with a deviated value of \(\gamma\) which is (\(\gamma + \Delta R\)) are used to restore the original secret image, where \(\Delta R\) represents the deviation from the correct value of \(\gamma\) (\(\gamma = 1.5 \mathrm {~rad}\)). For each of the three qualified subsets (\(P_e\), \(P_1\)), (\(P_e\), \(P_2\)), and (\(P_e\), \(P_3\)), the CC curves of the recovered images are plotted against \(\Delta R\) as shown in Fig. 10a–c, respectively. As observed, even a small deviation in the value of \(\gamma\) by \(\Delta R = \pm 0.001\) rad results in a decrease in the CC values for all color components to be less than 0.05. Additionally, Fig. 11 depicts the recovered images obtained by deviating the GT angle by only 0.001 rad. The resulting images exhibit significant blurring and lack discernible details. These results demonstrate that the scheme is highly sensitive to even minor changes in the GT rotation angle, which enhances the security of the scheme.

Fig. 11
figure 11

Recovered secret images after deviating the GT angle by only 0.001 rad using qualified subsets a \(P_1\) and \(P_2\), b \(P_1\) and \(P_3\), c \(P_2\) and \(P_3\)

To evaluate the robustness against noise attacks, we have contaminated the two shares of each qualified subset with zero-mean Gaussian noise using the following equation:

$$\begin{aligned} P' = P \left[ 1+ s \cdot G\right] , \end{aligned}$$
(11)

where P and \(P'\) represent the original share and the noise-affected share, respectively, G is a zero-mean Gaussian noise of a unity variance, and the parameter s is the strength factor representing the noise level. For the values: \(s=0.1\) and \(s=1\), the recovered secret images corresponding to using the noisy versions of the qualified subsets (\(P_e'\), \(P_1'\)), (\(P_e'\), \(P_2'\)), and (\(P_e'\), \(P_3'\)) in the reconstruction process are depicted in Fig. 12a–c and Fig. 12d-f, respectively. It is clear that the content of the secret color image can be still recognized in the reconstructed images. The corresponding average CC values of the restored images in Fig. 12a–c, are (0.9475, 0.9918, 0.9716), (0.9450, 0.9920, 0.9725), and (0.9451, 0.9913, 0.9710), respectively, and for the recovered images depicted in Fig. 12d–f, are (0.6027, 0.7046, 0.6463), (0.6094, 0.7101, 0.6513), and (0.6056, 0.7138, 0.6486), respectively. These results verify the high robustness of the proposed scheme against Gaussian noise.

Fig. 12
figure 12

Recovered secret images using the qualified subsets (\(P_e\), \(P_1\)), (\(P_e\), \(P_2\)), and (\(P_e\), \(P_3\)) after being contaminated by zero-mean Gaussian noise of unit variance and strength factors: a–c \(s= 0.1\) and d–f \(s = 1\)

We also investigate the robustness of the proposed scheme against speckle noise. Each share of the qualified subsets (\(P_e\), \(P_1\)), (\(P_e\), \(P_2\)), and (\(P_e\), \(P_3\)) is contaminated by speckle noise with zero mean and variances of \(v=0.05\) and \(v=0.5\). The corresponding reconstructed images are shown in Fig. 13a–f. The CC values of the recovered images in Fig. 13a–c are (0.8179, 0.9673, 0.8988), (0.8174, 0.9690, 0.8981), and (0.8146, 0.9740, 0.8992) respectively. However, for the recovered images in Fig. 13d–f the CC values are (0.6006, 0.7611, 0.6867), (0.6080, 0.7758, 0.6826), and (0.6061, 0.7607, 0.6824). Although increasing the noise variance degrades the quality of the recovered images, they can still be easily recognized. These results demonstrate the high level of robustness of the proposed scheme against speckle noise.

Fig. 13
figure 13

Recovered secret images using the qualified subsets (\(P_e\), \(P_1\)), (\(P_e\), \(P_2\)), and (\(P_e\), \(P_3\)) after being contaminated by zero-mean speckle noise of variances: ac \(v= 0.05\) and df \(v= 0.5\)

6 Discussion

UMD is an effective and promising tool that can be utilized in various security applications. To the best of our knowledge, this is the first time that UMD has been used in a SIS scheme. By designing the SIS scheme using UMD, equal-sized shares can be achieved. The potential for using UMD in SIS schemes is limitless, and many data-sharing configurations can be designed using this tool. For instance, in the proposed scheme, the essential share can be further divided into two other essential shares using UMD. This results in a (2,3,n) ESIS scheme in which three shares, including two essential ones, are required in the reconstruction process. Using multiple stages of UMD can enhance the scalability of the sharing scheme to accommodate various real-world scenarios. However, increasing the number of stages also increases the scheme’s complexity. Therefore, careful consideration should be given to the complexity of the sharing scheme. It is worth noting that designing the proposed ESIS scheme based on UMD yields equally-sized shares, eliminating the need to concatenate sub-shares during reconstruction. This improves the security and efficiency of the scheme (Li et al. 2018b, 2016). Nonetheless, one drawback of using UMD with SIS schemes is that the size of the generated shares may not be reduced compared to the original image.

While our proposed ESIS scheme offers several advantages compared to existing schemes, it is important to mention its main limitations. The proposed scheme requires an optical interferometric setup, which may pose challenges in practical scalability, and only works under coherent light illumination. While coherent light is indispensable in some known applications (e.g. phase-coded optical communications (El-Fiqi et al. 2016)), it is not an essential ingredient in the process of secret image sharing. This is compared to other approaches that are compatible with incoherent light sources. Exploring the use of incoherent light for SIS schemes, such as visual cryptography (Jiao et al. 2020; Yang et al. 2018), may offer more simple and scalable implementations.

7 Conclusion

In this paper, we have presented a novel approach to build optical ESIS that offers several advantages over existing ESIS schemes, including high-speed processing and simplified implementation. The scheme generates equal-sized essential and nonessential shares, eliminating the need to concatenate sub-shares in the reconstruction process. The numerical results confirm that only qualified subsets of shares can correctly reconstruct the secret image, while unqualified subsets result in noisy reconstructed images with a correlation coefficient not exceeding 0.003. Moreover, It is demonstrated that the scheme is highly robust against Gaussian noise and highly sensitive to minor changes in the GT angle, which serves as an additional key to verify the essential share. The scheme effectively avoids the well-known silhouette problem widely present in interference-based cryptosystems.