Skip to main content
Heliyon logoLink to Heliyon
. 2023 Mar 25;9(4):e14918. doi: 10.1016/j.heliyon.2023.e14918

Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem

Chaoying Wang a, Yong Peng a, Zhibiao Liang b,, Yu Wang c, Gang Ke a, Zhiping Jin b
PMCID: PMC10121609  PMID: 37095991

Abstract

The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored. The existing schemes do not consider the attack on the information transmission channel, and often cannot correctly recover the secret image when attacked. In view of this, this paper fully considers the active attack on the information channel, and then proposes a RESIS scheme with error correction capability. In this paper, the Reed-Solomon code is used to detect modification attacks and correct errors to a certain extent. Additionally, the lossless recovery effect of both the secret image and the cover image is accomplished in conjunction with secret sharing scheme based on the Chinese remainder theorem. According to experimental findings, this method can resist certain active attacks.

Keywords: Revertible extended secret image sharing scheme, Reed-Solomon Codes, Chinese remainder theorem

1. Introduction

Secret sharing is a technology of dividing secrets, whose aim is to prevent secrets from being too concentrated. This technology is important in information security and data confidentiality, which plays a key role in the safe preservation, transmission, and legal utilization of important information and secret data. It is also the theoretical basis of image secret sharing technology.

The concept of secret sharing (SS) scheme is proposed by Shamir [1] and Blakley [2] in 1979. In the (t,n) threshold SS scheme, the secret distributor decomposes the secret s into n sub-secrets si(1<in). The secret s can be recovered only if the combination of any t(1<tn) sub-secrets is satisfied. If there are fewer than t sub-secrets, no information of secret s can be obtained. Using the threshold SS scheme to keep secret s has the following advantages. Firstly, the attacker cannot recover secret s even if he can get up to t1 secret shares. Secondly, even if up to nt shares are destroyed for some reason, the secret s can be recovered. Thirdly, keeping secrets s in a decentralized manner helps to avoid the abuse of rights caused by excessive concentration of rights. In 1983, Asmuth and Bloom [3] proposed a (t,n)-threshold SS scheme based on Chinese remainder theorem (CRT) [4], which is a theorem giving a unique solution to simultaneous linear congruences with coprime moduli, and has applications in many fields, such as computing, cryptography, and coding theory. In the field of image security protection, CRT can be used for image encryption [5] and secret image sharing (SIS). Since it is difficult for Asmuth and Bloom's SS scheme to select a set of appropriate modulus, Ning [6] extended the CRT-based SS scheme on integer ring to polynomial ring. After that, Wu [7] presented a straightforward formulation of an ideal (t,n)-threshold SS system based on CRT in 2022.

SIS scheme expands the secret scheme to the image, so as to ensure that the image will not be stolen or maliciously damaged in the transmission process. In 1994, Naor and Shamir [8] first proposed the idea of SIS, which is similar to the SS scheme, except that the secret value is replaced by a secret image. The secret image is divided into n pieces, each of which is called a shadow image. Moreover, more than t(t<n) shadow images can be combined to recover s, but less than t cannot. Because this technology has the characteristics of concealment, security, and simplicity of secret recovery, the secret image sharing scheme has been widely used in many aspects. On the basis of Shamir's SS technique, Thien and Lin [9] designed a SIS in 2002. Since then, many works of literature [10,11] have constructed SIS schemes based on Shamir SS schemes. However, in the sharing scheme for 256 level gray images, these schemes have to select the number of modulo prime 251 (the maximum prime number less than 256). To realize the sharing of all pixels, the gray value of pixels greater than 250 must be converted to 250. Thus, they must change the original image, then the image quality is lost. To solve this problem, the CRT-based secret sharing scheme is used to construct a secret image sharing scheme [[12], [13], [14], [15], [16], [17]].

In the SIS scheme, the shadow image generated by dividing the secret image looks like a garbled image, not a normal image. And then these shadow images are easy to attract the attention of attackers when transmitted on the network. With the idea of information hiding, the extended secret image sharing (ESIS) [18,19] is proposed to add a cover image embedded by each shadow image, and finally form multiple stepo images, which are generated and distributed to shareholders. Because of the use of information hiding technology, the stego image looks no different from ordinary pictures visually, so it is easier to hide the transmitted information.

However, in some special situation, it is necessary to restore both the secret picture and the cover image. For illustration, the cover image is chosen to be a QR (Quick Response) Code. The carrier QR code contains the share created in accordance with the secret image, which may be retrieved and read normally to access the share's original public information. A reversible extended secret image sharing (RESIS) approach was put up by Lin [20] in 2009, where the secret image is embedded into the cover image through using modulus operator. A cheater in the partnership can be found using the Rabin's signature cryptosystem [21]. In this technique, in addition to shadow images, extra identification and authentication information is being conveyed from a sender to shareholders. In 2010, Lin [22] proposed another RESIS scheme based on Shamir (t,n)-threshold sharing approach, but it has an overflow problem. In 2013, Ulutas [23] introduced a RESIS with a greater stego image quality, where images are hidden and recovered using the modification direction approach and modulus operator. To provide information hiding and authentication simultaneously, Wu [24] suggested a RESIS approach for compressed images in 2019, where parity bits are built and disguised inside stego images. Meng [25] suggested a RESIS in 2021 that is based on Ning's CRT-based SS scheme and employs an 8th-order polynomial to represent pixels and carry out CRT operations. Since there are only 30 coprime polynomials to the 8th power, the maximum n of this scheme is 30.

The above schemes focus on secret sharing and recovery, and only consider participant deception detection in terms of security. Stego images transmitted in the open channel are facing various attacks, including not only passive attacks such as monitoring and interception, but also active attacks such as modification.

To solve the active attack problem in the transmission process, this paper proposes a RESIS scheme with error correction capability by combining Reed-Solomon Codes [26] and CRT based secret sharing scheme. Reed-Solomon is the most well-known class of correcting codes, which has been used to a variety of data transmission and storage applications.

The contribution of this paper is given as follows.

  • A RESIS scheme is provided that allows for the lossless recovery of both the secret image and the cover image.

  • Using Reed Solomon code [26], the scheme can not only detect modification attacks, but also correct errors to a certain extent.

  • Taking multiple pixels as a polynomial, the scheme breaks through the limit of the number of shareholders to share compared with Ref. [25]. Meanwhile, higher power polynomials will expand the plaintext space and enhance security.

The rest of this paper is organized as follows. The preliminaries are listed in Section II. In Section III, the proposed RESIS is presented in detail. In Section IV, results of the experiment and analysis are provided. Finally, Section V concludes the paper.

2. Preliminaries

2.1. A simple construction of CRT-based ideal SS scheme

The operation of the paper [6] is based on polynomial rings, which can improve efficiency. After that, Wu et al. [7] suggested a straightforward design of the CRT-based ideal SS scheme for the improvement of effectiveness. The scheme includes two phases.

2.1.1. Distribution phase

Step 1

With a secret s(x)=a0+a1x+a2x2+adr1xdr1, the dealer chooses n polynomials ri(x)(i=1,2,,n) with degree less than dr, and then produces a polynomial f(x) of degree df(dftdr1). The f(x) is written as

f(x)=a0+a1x++adr1xdr1++adfxdf (1)

where ai is the element of the Finite Field Fq . And ri(x) is public information associated with shareholder Pi for i=1,2,,n.

Step 2

The dealer computes the share si(x)=f(x)modri(x), and then distributes shares to shareholder Pi.

2.1.2. Recovery phase

The combiner collects k share si(x), and gets a system of congruent equations:

{f(x)s1(x)modr1(x)f(x)s2(x)modr2(x)f(x)sk(x)modrk(x) (2)

In the case of dftdr1, the solution of f(x) has an only one value, which can be determined:

f(x)=i=1ksi(x)Mi(x)Mi(x)modM(x) (3)

where M(x)=i=1kri(x), Mi(x)=M(x)ri(x) and Mi(x)Mi(x)1modri(x). The secret bit sequence is the first dr coefficients of polynomial f(x).

2.2. Least significant bit substitution

Least significant bit (LSB) substitution is often used as an image steganography algorithm. It is a kind of spatial algorithm and embeds the information into the lowest bit of pixel bits in the image points to ensure that the embedded information is invisible.

With a secret bit sequence b and an image I, k-LSB substitution means that: the low k bits are substituted for each pixel binary of the image I by a group of b that has a length of k, replacing each group in turn.

For example, b=0b10, a pixel value Ii is 180, the binary conversion of Ii is '0b10110100'. If k=2, the 2-LSB algorithm replaces the lowest 2 bits of the binary conversion of Ii with b, forming the new binary sequence '0b10110110'. Then the new pixel value is 182.

Due to the small difference between 180 and 182, the human naked eye cannot accurately distinguish, so information hiding can be realized.

2.3. Reed-Solomon Codes

Due to some reasons (such as noise or interference etc.), errors will occur during data transmission or storage. To overcome this problem, the Reed Solomon codes were proposed [26].

Reed Solomon codes include two parts: encoder and decoder. One block of digital data is processed at a time in the encoder, and after that, extra "redundant" bits are added. Each block is handled in the decoder so that mistakes may be fixed and the original data can be retrieved. The Reed Solomon code's nature will determine how many mistakes may be fixed.

Reed-Solomon codes are described as RS(s,p) with l-bit symbols, as is shown in Fig. 1. The block length of the original data is p, and then the data is processed by the encoder. The encoder adds sp extra bits to the data forming s codewords. The decoder can correct t-bit errors, which contains 2t=sp.

Fig. 1.

Fig. 1

Reed-Solomon code RS (s, p).

A typical Reed-Solomon code is RS(255,223) with 8-bit symbols, where p=223, s=255, l=8 and t=16. It means that each block contains 255 bytes; every time the encoder adds 32 bytes extra data. The decoder has the ability to correct up to 16-byte errors.

3. The proposed scheme

Combining the error correction algorithm of Reed-Solomon Codes and CRT over polynomial ring, we will give a minute description of our new RESIS scheme in this section.

3.1. The model

The model structure of the proposed scheme is shown in Fig. 2. The scheme has two phases: secret image sharing procedure and image retrieving procedure. The secret image sharing procedure includes sharing, encoding, and hiding stages. First, the dealer D shares the secret image into n share pieces with Wu et al. SS scheme. Then, D uses Reed-Solomon code to encode n share pieces into shadow images. Finally, 2-LSB is utilized to hide n share pieces into the cover image, forming n stego images. The image retrieving procedure includes extracting, decoding and recovery. Every shareholder uses 2-LSB to extract the shadow image from the stego image. And then Reed-Solomon code is used to decode shadow images to the share pieces. At last, the combiner represents k(tkn) of shareholders recovery the secret image and cover image.

Fig. 2.

Fig. 2

The model of our proposed scheme.

3.2. Setting parameters

We first set the parameters for the scheme, including the degree of polynomials, selecting some coprime polynomials and Reed Solomon code parameters.

In scheme [25], all pixels are represented by an 8th power polynomial, which is of course simple and natural. But there are only 30 coprime 8th power polynomials in F2(x). In the secret sharing of the Chinese remainder theorem, each user corresponds to a polynomial, then there are only 30 users at most. Our scheme taking multiple pixels as a polynomial will break through the limit of the number of shareholders to share.

Step 1

Define drdegree polynomial r(x)=xdr, where dr represents the length of secret share in the CRT-based secret sharing scheme.

Step 2

Choose n co-prime polynomials ri(x)F2[x](i=1,2,,n), which satisfy: ri(x) and r(x) are co-prime, where i=1,2,,n; deg(r1(x)) = deg(r2(x)) =  = deg(rn(x)) = deg(r(x)) = dr.

Step 3

A Reed-Solomon code is specified as RS(s,p) with l-bit symbols. Here, p=dr. Depending on conditions such as communication and security requirements, we select appropriate correction parameters.

3.3. Detailed procedures

We describe the implementation details of the scheme, mainly including two parts: secret image sharing procedure and image retrieving procedure.

3.3.1. Secret image sharing procedure

  • a)

    Sharing stage

The secret image is divided into n sharei owed by user Pi. And the dealer D is in charge of sending every share to the corresponding user.

Step 1

Two images are picked by D: secret image and cover image, whose size are Ws×Hs and WC×HC.

Step 2

Divide the cover image C into blocks, which contains 2s pixels. After that, a polynomial of degree s1 is defined as A(x)=i=12s(ai,1x2i2+ai,2x2i1), where ai,1 and ai,2 are last bit and the penultimate bit of the binary pixel value pc,j.

Step 3

Pick m1 pixels ps,1,ps,2,,ps,m1, where 8mtdrs. Then a polynomial of degree 8m1 is defined as B(x)=i=1m1j=18bi,jx8(i1)+(j1), where bi,j is the j-th binary value of the i-th pixel ps,i.

Step 4

Defines a new joint function:

f(x)=A(x)+B(x)r(x)=a0++adr1xdr1++asxs++adfxdf (4)

where aiF2.

Step 5

Generate a polynomial si(x) for shareholder {Pi|i=1,2,n}, and the polynomial ssh,i(x)=f(x)modri(x).

Step 6

Get the coefficients of polynomial ssh,i(x) to form a bit sequence ssh,i with length dr. The degree of ssh,i is less than or equal to dr.

Step 7

Repeat step 2–6 to generating bit sequence until the secret image is converted into shares for all users. The dealer D aggregates all ssh,i to form the secret share sharei owed by user Pi.

  • b)

    Encoding stage

To obtain the error correction ability, the dealer D does not directly embed the secret share in the cover image to obtain the shadow image. In this paper, these secret shares are encoded by Reed-Solomon code to form error correction codes to resist tampering attacks or transmission errors. Then the encoded image is embedded in the cover image.

The dealer D uses Reed-Solomon code to convert the secret share sharei into code words.

Step 1

The dealer D divides the secret share sharei into blocks with a length of p bytes. The unit of block here is byte, because Reed-Solomon code is usually in bytes.

Step 2

Utilize Reed-Solomon code to convert the block with length p into a codeword block with length s.

Step 3

Continue to perform Step 2 till all blocks are encoded completely.

  • c)

    Hiding stage

The stego image STi is created through embedding code words into the cover image C with 2-LSB. The hiding stage has 5 steps:

Step 1

Select a byte pi,j from sharei, and chooses four pixels values pc,1, pc,2,pc,3,pc,4 from cover image C respectively.

Step 2

pi,j is converted into binary values bin(pi,j)= {b1b2b3b4b5b6b7b8} and divided into four groups, each containing two binary bits {b1b2,b3b4,b5b6,b7b8}.

Step 3

Convert {pc,1,pc,2,pc,3,pc,4} into binary values and replace the last two bits with {b1b2}, {b3b4} {b5b6} {b7b8}. And then the replaced 4 binary sequences are converted to decimal {pst,1,pst,2,pst,3,pst,4}.

Step 4

Repeat steps 1–3 until the share sharei is totally embedded into the cover image C. Then the stego image STi is formed for user Pi.

Step 5

Repeat step 1–4 for other users until n stego images STi(i=1,2,3,,n) are computed. The dealer D sends all STi to the corresponding user Pi.

3.3.2. Image retrieving procedure

This section gives a description of the proposed secret image retrieval procedure. Assuming there are n shareholders P1,P2,,Pn, it is possible for k(tkn) of them to cooperate in order to get these two lossless images.

  • a)

    Extracting stage

With a stego image STi(i=1,2,,k) as input, the corresponding shareholders Pi exact the hidden information using the 2-LSB algorithm.

Step 1

Divide the stego image STi into blocks including 4 pixels, such as Pst,1,Pst,2,Pst,3,Pst,4.

Step 2

Convert the 4 pixels into binary sequence with length 8 bits. We mark the converted value bits as bin(Pst,1),bin(Pst,2),bin(Pst,3),bin(Pst,4).

Step 3

Take out the last two bits of 4 pixels bin(Pst,1),bin(Pst,2),bin(Pst,3),bin(Pst,4), and combine them to form an 8-bit binary sequence, and convert the value into decimal.

Step 4

Repeat the above Step 1–3 until all the hidden information is extracted.

After the above steps are completed, a shareholder Pi extracts its hidden information sharei. Other k1 shareholders perform the same operations and gets all the secret share.

  • b)

    Decoding stage

The shareholder Pi utilizes Reed-Solomon code to decode the code words and obtains the secret share sharei.

Step 1

The shareholder Pi divides the code words into blocks with a length of s bytes.

Step 2

With the Reed-Solomon code, shareholder Pi extracts valid information while correcting errors, and then obtains the blocks with length p.

Step 3

Repeat step 2 until the decoding is finished, and then the shareholder finally aggregates the decoded parts to obtain the secret share sharei.

  • c)

    Recovery stage

Step 1

The shareholder Pi convert sharei to a binary sequence.

Step 2

Divide the binary sequence into blocks with length dr, and then recovers the polynomial ssh,i(x).

Step 3

Other shareholders repeat Step 1–2, and obtains their own polynomial ssh,j(x)(j!=i).

Step 4

After collecting k polynomials, the combiner reconstructs the secret polynomial by computing

f(x)=i=1kssh,i(x)Mi(x)Mi(x)modM(x) (5)

where M(x)=i=1kri(x), Mi(x)=M(x)ri(x) and Mi(x)Mi(x)1modri(x).

Step 5

With the polynomial f(x), A(x) is the first 4 s terms, and B(x) is the residual terms module r(x).

Step 6

Continue to perform steps 2–5, and then aggregate the obtained A (x) and B (x) to get the secret image and cover image.

4. Experiment and analysis

We demonstrate the effectiveness of the proposed RESIS scheme in this section. Then, a comparison to different related RESIS scheme is provided. Finally, we demonstrate the examination of security and accuracy.

4.1. Experiment

We select Lenna(128 × 128) as the secret image and Peppers (512× 512) as the cover image, and they are shown in Fig. 3. Set n to 4 and t to 3, which means that there are 4 shareholders and the threshold value is 3. Four co-prime polynomials with degree 223 for shareholders are chosen randomly. The Reed-Solomon code is set to be RS(255,223).

Fig. 3.

Fig. 3

Secret image and Cover image.

With the proposed scheme, the secret image Lenna is shared and hidden in the cover image Peppers, and then forming 4 stego images, which are depicted in Fig. 4. Naturally, we cannot visually discriminate between these stego images and the cove image.

Fig. 4.

Fig. 4

Stego images and Recovered images.

The peak signal-to-noise ratio (PSNR), mean square error (MSE), and structure similarity index method (SSIM) of stego images and recovered images are displayed in Table 1.

Table 1.

PSNR, MSE and SSIM of stego images and recovered images.

Images PSNR MSE SSIM
Stego image 1, cover image 50.2138 0.6190 0.9956
Stego image 2, cover image 50.1702 0.6253 0.9955
Stego image 3, cover image 50.1893 0.6225 0.9955
Stego image 4, cover image 50.1803 0.6238 0.9956
Recovered cover image, cover image 0 1
Recovered secret image, secret image 0 1

The PSNR is defined as:

PSNR=10×log10((2k1)2/MSE) (6)

where k=8.

The MSE is defined by:

MSE=1mi=1m(piqi)2 (7)

where pi and qi represent the pixel value of two images p and q with m pixels.

Loss of correlation, luminance distortion, and contrast distortion are the three elements that make up the design of the SSIM. The formula for calculating the SSIM is:

SSIM(p,q)=l(p,q)c(p,q)s(p,q) (8)

where (p,q)=2μpμq+C1μp2+μq2+C1,c(p,q)=2σpσq+C2σp2+σq2+C2,s(p,q)= σpq+C3σpq+C3. Here, μp and μq are the mean values of image p and image q respectively; σpq is the covariance of p and q; C1, C2 and C3 are positive constants used to prevent a null denominator.

The PSNR value and MSE between the stego image and the cover image are around 50.18 and 0.62, respectively, indicating that the stego image has been altered and exhibits some distortion when compared to the cover image. While the SSIM between the stego image and the cover image is around 0.995, this clearly shows that the brightness, contrast, and structure of the stego image and the cover image are highly comparable. Between the recovered image and the original image, there is a PSNR, MSE, and SSIM of , 0 and 1. This indicates that the secret image and the recovered image are identical and that there was no loss during the recovery.

4.2. Least significant bit flipping attack

Flipping the least significant bit (LSB) of a pixel value in an image is referred to as an LSB flipping attack. The restoration of the secret image may be impacted by the modification, even how little it is.

In the experiment in subsection A, we target the stego pictures and change the LSB of a specific subset of pixels in each stego image. The range of the number is 0–4000. Fig. 5 shows that if the secret picture is changed within 1500 pixels, it may be fully recovered. There will be more changed pixels, which means some pixels won't be recovered. For the purpose of evaluating the quality of the recovered pictures using the SSIM metric, various numbers of LSB flipping attacks are applied to the shadow images in Fig. 6.

Fig. 5.

Fig. 5

Recovered images with different number of pixels modifiability in every stego image.

Fig. 6.

Fig. 6

SSIM values with different numbers of pixels attacked by LSB flipping.

According to the above experiment results, our proposed RESIS offers certain error correcting capabilities in resisting LSB flipping attack.

4.3. Comparing with other works

We evaluate the performance of our RESIS scheme in comparison to other related schemes proposed by Lin [16], Lin [18], Ulutas [19], and Meng [21] in seven different categories: error correction, meaningful stego image, lossless secret image, lossless cover image, most-capable pixels, sharing procedure cost, and recovery procedure cost.

Table 2 contains findings of comparation analysis. Only our proposed could correct errors. Schemes of Lin [16] and Lin [18] are constructed based on Shamir SS, and select 251 as the number of modulo prime. Unless additional processing is required, all pixels larger than 251 will not be effectively restored. Both Meng [21] scheme and our scheme are based on CRT polynomial ring, and thus it can recover all pixels naturally without other operations. Compared with Meng [21] scheme, out scheme uses Reed-Solomon Codes to get the ability to defend against modification attacks, thus its maximum capacity pixels (t1)×WC×WH×p4×s is lower.

Table 2.

Comparing with other related schemes.

Functionality Lin [16] Lin [18] Ulutas [19] Meng [21] Our Scheme
Error correction N N N N Y
Meaningful stego image Y Y Y Y Y
Lossless secret image Y N Y Y Y
Lossless cover image Y Y Y Y Y
Most-capable pixels (t3)×WC×WH3 (t1)×WC×WHlogm255 (t2)×WC×WH4 (t1)×WC×WH4 (t1)×WC×WH×p4×s
Sharing procedure cost Ο(t) Ο(t) Ο(t) Ο(1) Ο(1)
Recovery procedure cost Ο(tlg2t) Ο(tlg2t) Ο(tlg2t) Ο(t) Ο(t)

4.4. Analysis

We shall assess the proposed scheme's accuracy and security. That is t or more shareholders can reconstruct the secret image and cover image while t1 or fewer cannot.

  • 1)

    Theorem of correctness. Any t or more stego images can be employed to retrieve the secret image and cover image.

Proof. Suppose that k(kt) shareholders have their shares STi(i=1,2,,k). With the 2-LSB algorithm, the shareholder exacts the hidden information. Then the Reed-Solomon code is used to decode the hidden information and obtains the secret share sharei. The shareholder Pi convert sharei to a binary sequence and divide it into blocks with length dr, so that the polynomial ssh,i(x) is obtained.

After k shareholders have gotten their polynomials, the combiner has a system of congruent equations, which is shown as follow:

{f(x)=ssh,1(x)modr1(x)f(x)=ssh,2(x)modr2(x)f(x)=ssh,k(x)modrk(x) (9)

According to CRT, f(x) can be computed. Beside f(x)=A(x)+B(x)r(x), we can obtain A(x) and B(x). Repeat this process continuously, and the combiner gets all A(x).With all A(x) and a stego image, the combiner can recover the cover image using the 2-LSB algorithm. With all the polynomials B(x), the secret image can be recovered.

  • 2)

    Theorem of security. No more than t stego images can be used to retrieve either the secret image or the cover image.

Proof. Suppose that k(k<t) shareholders have their shares STi(i=1,2,,k). Perform steps similar to Theorem 1, the combiner can also obtain a system of congruent equation as follow:

{f(x)=ssh,1(x)modr1(x)f(x)=ssh,2(x)modr2(x)f(x)=ssh,k(x)modrk(x) (10)

Because i=1kdeg(ri(x))=8dr<8t, the combiner cannot recovery only one polynomial based CRT. Thus, it is impossible to perform the recovery of the cover image and secret image.

5. Conclusions

In this study, an error-correcting RESIS system is put forward. To build the RESIS, we used the Reed-Solomon Code and SS scheme based on CRT. The Reed-Solomon Code is used to correct errors. Moreover, taking multiple pixels as a polynomial, our scheme can break through the number limit of shareholders. The security of information transmission is improved by these processes.

The previous RESIS schemes tend to attach more attention to secret image sharing. Some of them consider the authentication ability of SIS, trying to find out whether the stego image has been modified, but lack the consideration of error correction. Our proposed scheme has the capacity to repair errors, which will increase its resistance to active attacks. In other words, the technique can automatically retrieve some of the material that has been modified in addition to determining if the stego image has been altered.

However, some problems need to be solved in the practical application of this paper. The error correction capability needs to be further improved. At the same time, a high polynomial degree used in the proposed RESIS scheme also brings high computation, which needs to be balanced with security requirements.

Author contribution statement

Chaoying Wang; Zhibiao Liang: Conceived and designed the experiments; Performed the experiments; Analyzed and interpreted the data; Contributed reagents, materials, analysis tools or data; Wrote the paper.

Yong Peng: Performed the experiments; Analyzed and interpreted the data.

Yu Wang: Contributed reagents, materials, analysis tools or data.

Gang Ke: Conceived and designed the experiments.

Zhiping Jin: Analyzed and interpreted the data; Contributed reagents, materials, analysis tools or data.

Funding statement

Chaoying Wang was supported by the Key Special Projects of Guangdong Education Department [ZDZX1119], the special project of intelligent terminal and intelligent manufacturing of Dongguan vocational and technical college in 2021 [ZXF014].

Gang Ke was supported by Dongguan Science and Technology of Social Development Program [20211800904512], Dongguan Sci-tech Commissoner Program [20231800500352], Characteristic Innovation Projects for Ordinary Universities in Guangdong Province [2021KTSCX301].

Zhiping Jin was supported by Zhongshan Public Welfare Science and Technology Research Project [2021B2064, 2021B2068].

Zhibiao Liang was supported by General scientific research projects of Zhongshan Polytechnic [KYB2110].

Data availability statement

The data that has been used is from a publicly available repository.

Declaration of interest’s statement

The authors declare no competing interests.

Contributor Information

Chaoying Wang, Email: wangcy@dgpt.edu.cn.

Yong Peng, Email: pengy@dgpt.edu.cn.

Zhibiao Liang, Email: liangzhibiao@zspt.edu.cn.

Yu Wang, Email: yuwang@gzhu.edu.cn.

Gang Ke, Email: keg@dgpt.edu.cn.

Zhiping Jin, Email: jinzp@zspt.edu.cn.

References

  • 1.Shamir A. How to share a secret. Commun. ACM. 1979;22(11):612–613. [Google Scholar]
  • 2.Blakley G.R. Proceedings of the National Computer Conference. 1979. Safeguarding cryptographic keys; pp. 313–317. [Google Scholar]
  • 3.Asmuth C., Bloom J. A modular approach to key safeguarding. IEEE Trans. Inf. Theor. 1983;29(2):208–210. [Google Scholar]
  • 4.Ding C., Pei D., Salomaa A. World Scientific; 1996. Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography. [Google Scholar]
  • 5.Li C., Liu Y., Zhang L.Y., et al. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 2014;29(8):914–920. [Google Scholar]
  • 6.Ning Y., Miao F., Huang W., et al. International Conference on the Theory and Application of Cryptology and Information Security. Springer; Cham: 2018. Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder theorem; pp. 310–331. [Google Scholar]
  • 7.Wu L., Miao F., Meng K., et al. A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor. Front. Comput. Sci. 2022;16(1):1–9. [Google Scholar]
  • 8.Naor M., Shamir A. Springer; Berlin, Heidelberg: 1994. Visual Cryptography. Workshop on the Theory and Application of Cryptographic Techniques; pp. 1–12. [Google Scholar]
  • 9.Thien C.C., Lin J.C. Secret image sharing. Comput. Graph. 2002;26(5):765–770. [Google Scholar]
  • 10.Chen C.C., Chen C.C., Lin Y.C. Weighted modulated secret image sharing method. J. Electron. Imag. 2009;18(4) [Google Scholar]
  • 11.Alharthi S., Atrey P.K. 2010 IEEE International Conference on Multimedia and Expo. IEEE; 2010. An improved scheme for secret image sharing; pp. 1661–1666. [Google Scholar]
  • 12.Hu C., Liao X., Xiao D. Secret image sharing based on chaotic map and Chinese remainder theorem. Int. J. Wavelets, Multiresolut. Inf. Process. 2012;10(3) doi: 10.1142/S0219691312500403. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 13.Shyu S.J., Chen Y.R. 2008 IEEE Asia-Pacific Services Computing Conference. IEEE; 2008. Threshold secret image sharing by chinese remainder theorem; pp. 1332–1337. [Google Scholar]
  • 14.Yan X., Lu Y., Liu L., et al. Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digit. Signal Process. 2018;82:80–90. [Google Scholar]
  • 15.Yan X., Lu Y., Liu L., et al. International Conference on Cloud Computing and Security. Springer; Cham: 2017. Chinese remainder theorem-based secret image sharing for (K,n) threshold; pp. 433–440. [Google Scholar]
  • 16.Yan X., Liu L., Li L., et al. Robust secret image sharing resistant to noise in shares. ACM Trans. Multimed Comput. Commun. Appl. 2021;17(1):1–22. [Google Scholar]
  • 17.Sun Y., Yang C.N., Yan X., et al. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization. Gene Expr. Patterns. 2022;45 doi: 10.1016/j.gep.2022.119267. [DOI] [PubMed] [Google Scholar]
  • 18.Lin C.C., Tsai W.H. Secret image sharing with steganography and authentication. J. Syst. Software. 2004;73(3):405–414. [Google Scholar]
  • 19.Wu Y.S., Thien C.C., Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recogn. 2004;37(7):1377–1385. [Google Scholar]
  • 20.Lin P.Y., Lee J.S., Chang C.C. Distortion-free secret image sharing mechanism using modulus operator. Pattern recognition. 2009;42(5):886–895. [Google Scholar]
  • 21.Stinson D.R. second ed. CRC Press; New York, USA: 2002. Cryptography: Theory and practice. [Google Scholar]
  • 22.Lin P.Y., Chan C.S. Invertible secret image sharing with steganography. Pattern Recogn. Lett. 2010;31(13):1887–1893. [Google Scholar]
  • 23.Ulutas M., Ulutas G., Nabiyev V.V. Invertible secret image sharing for gray level and dithered cover images. J. Syst. Software. 2013;86(2):485–500. [Google Scholar]
  • 24.Wu X., Yang C.N. Invertible secret image sharing with steganography and authentication for ambtc compressed images. Signal Process. Image Commun. 2019;78:437–447. [Google Scholar]
  • 25.Meng K., Miao F., Xiong Y., et al. A reversible extended secret image sharing scheme based on Chinese remainder theorem. Signal Process. Image Commun. 2021;95 [Google Scholar]
  • 26.Reed-Solomon Codes and Their applications. John Wiley & Sons; 1999. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The data that has been used is from a publicly available repository.


Articles from Heliyon are provided here courtesy of Elsevier

RESOURCES