Secret Image Sharing for (kk) Threshold Based on Chinese Remainder Theorem and Image Characteristics

  • Xuehu Yan
  • Yuliang Lu
  • Lintao Liu
  • Song Wan
  • Wanmeng Ding
  • Hanlin Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10749)

Abstract

Secret image sharing (SIS) based on Chinese remainder theorem (CRTSIS) has lower recovery computation complexity than Shamir’s polynomial-based SIS. Most of existing CRTSIS schemes generally have the limitations of auxiliary encryption and lossy recovery, which are caused by that their ideas are borrowed from secret data sharing. According to image characteristics and CRT, in this paper we propose a CRTSIS method for (kk) threshold, based on enlarging the grayscale image pixel values. Our method owns the advantages of no auxiliary encryption and lossless recovery for grayscale image. We perform experiments and analysis to illustrate our effectiveness.

Keywords

Secret image sharing Chinese remainder theorem Image characteristics Lossless recovery 

Notes

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).

References

  1. 1.
    Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Chuang, T.W., Chen, C.C., Chien, B.: Image sharing and recovering based on Chinese remainder theorem. In: International Symposium on Computer, Consumer and Control, pp. 817–820 (2016)Google Scholar
  3. 3.
    Chunqiang, H., Xiaofeng, L., Di, X.: Secret image sharing based on chaotic map and Chinese remainder theorem. Int. J. Wavelets Multiresolut. Inf. Process. 10(3), 1250023 (2012). 18 pGoogle Scholar
  4. 4.
    Li, P., Yang, C.N., Kong, Q.: A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J. Real-Time Image Process. 1–10 (2016)Google Scholar
  5. 5.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Shyu, S.J., Chen, Y.R.: Threshold secret image sharing by Chinese remainder theorem. In: IEEE Asia-Pacific Services Computing Conference, pp. 1332–1337 (2008)Google Scholar
  7. 7.
    Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)CrossRefGoogle Scholar
  8. 8.
    Ulutas, M., Nabiyev, V.V., Ulutas, G.: A new secret image sharing technique based on Asmuth Bloom’s scheme. In: International Conference on Application of Information and Communication Technologies, AICT 2009, pp. 1–5 (2009)Google Scholar
  9. 9.
    Wang, G., Liu, F., Yan, W.Q.: Basic visual cryptography using braille. Int. J. Digit. Crime Forensics 8(3), 85–93 (2016)CrossRefGoogle Scholar
  10. 10.
    Yan, W., Ding, W., Dongxu, Q.: Image sharing based on chinese remainder theorem. J. North China Univ. Tech 12(1), 6–9 (2000)Google Scholar
  11. 11.
    Yan, X., Lu, Y.: Progressive visual secret sharing for general access structure with multiple decryptions. Multimedia Tools Appl. 77(2), 2653–2672 (2018)CrossRefGoogle Scholar
  12. 12.
    Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600–1610 (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.National University of Defense TechnologyHefeiChina

Personalised recommendations