Abstract
The reversible extended secret image sharing (RESIS) scheme can safely segment the secret image into a shadow image and embed it into the cover image, while ensuring that both the secret image and the cover image are completely restored. The existing schemes do not consider the attack on the information transmission channel, and often cannot correctly recover the secret image when attacked. In view of this, this paper fully considers the active attack on the information channel, and then proposes a RESIS scheme with error correction capability. In this paper, the Reed-Solomon code is used to detect modification attacks and correct errors to a certain extent. Additionally, the lossless recovery effect of both the secret image and the cover image is accomplished in conjunction with secret sharing scheme based on the Chinese remainder theorem. According to experimental findings, this method can resist certain active attacks.
Keywords: Revertible extended secret image sharing scheme, Reed-Solomon Codes, Chinese remainder theorem
1. Introduction
Secret sharing is a technology of dividing secrets, whose aim is to prevent secrets from being too concentrated. This technology is important in information security and data confidentiality, which plays a key role in the safe preservation, transmission, and legal utilization of important information and secret data. It is also the theoretical basis of image secret sharing technology.
The concept of secret sharing (SS) scheme is proposed by Shamir [1] and Blakley [2] in 1979. In the threshold SS scheme, the secret distributor decomposes the secret into sub-secrets . The secret can be recovered only if the combination of any sub-secrets is satisfied. If there are fewer than sub-secrets, no information of secret can be obtained. Using the threshold SS scheme to keep secret has the following advantages. Firstly, the attacker cannot recover secret even if he can get up to secret shares. Secondly, even if up to shares are destroyed for some reason, the secret can be recovered. Thirdly, keeping secrets in a decentralized manner helps to avoid the abuse of rights caused by excessive concentration of rights. In 1983, Asmuth and Bloom [3] proposed a -threshold SS scheme based on Chinese remainder theorem (CRT) [4], which is a theorem giving a unique solution to simultaneous linear congruences with coprime moduli, and has applications in many fields, such as computing, cryptography, and coding theory. In the field of image security protection, CRT can be used for image encryption [5] and secret image sharing (SIS). Since it is difficult for Asmuth and Bloom's SS scheme to select a set of appropriate modulus, Ning [6] extended the CRT-based SS scheme on integer ring to polynomial ring. After that, Wu [7] presented a straightforward formulation of an ideal -threshold SS system based on CRT in 2022.
SIS scheme expands the secret scheme to the image, so as to ensure that the image will not be stolen or maliciously damaged in the transmission process. In 1994, Naor and Shamir [8] first proposed the idea of SIS, which is similar to the SS scheme, except that the secret value is replaced by a secret image. The secret image is divided into pieces, each of which is called a shadow image. Moreover, more than shadow images can be combined to recover , but less than cannot. Because this technology has the characteristics of concealment, security, and simplicity of secret recovery, the secret image sharing scheme has been widely used in many aspects. On the basis of Shamir's SS technique, Thien and Lin [9] designed a SIS in 2002. Since then, many works of literature [10,11] have constructed SIS schemes based on Shamir SS schemes. However, in the sharing scheme for 256 level gray images, these schemes have to select the number of modulo prime 251 (the maximum prime number less than 256). To realize the sharing of all pixels, the gray value of pixels greater than 250 must be converted to 250. Thus, they must change the original image, then the image quality is lost. To solve this problem, the CRT-based secret sharing scheme is used to construct a secret image sharing scheme [[12], [13], [14], [15], [16], [17]].
In the SIS scheme, the shadow image generated by dividing the secret image looks like a garbled image, not a normal image. And then these shadow images are easy to attract the attention of attackers when transmitted on the network. With the idea of information hiding, the extended secret image sharing (ESIS) [18,19] is proposed to add a cover image embedded by each shadow image, and finally form multiple stepo images, which are generated and distributed to shareholders. Because of the use of information hiding technology, the stego image looks no different from ordinary pictures visually, so it is easier to hide the transmitted information.
However, in some special situation, it is necessary to restore both the secret picture and the cover image. For illustration, the cover image is chosen to be a QR (Quick Response) Code. The carrier QR code contains the share created in accordance with the secret image, which may be retrieved and read normally to access the share's original public information. A reversible extended secret image sharing (RESIS) approach was put up by Lin [20] in 2009, where the secret image is embedded into the cover image through using modulus operator. A cheater in the partnership can be found using the Rabin's signature cryptosystem [21]. In this technique, in addition to shadow images, extra identification and authentication information is being conveyed from a sender to shareholders. In 2010, Lin [22] proposed another RESIS scheme based on Shamir -threshold sharing approach, but it has an overflow problem. In 2013, Ulutas [23] introduced a RESIS with a greater stego image quality, where images are hidden and recovered using the modification direction approach and modulus operator. To provide information hiding and authentication simultaneously, Wu [24] suggested a RESIS approach for compressed images in 2019, where parity bits are built and disguised inside stego images. Meng [25] suggested a RESIS in 2021 that is based on Ning's CRT-based SS scheme and employs an 8th-order polynomial to represent pixels and carry out CRT operations. Since there are only 30 coprime polynomials to the 8th power, the maximum of this scheme is 30.
The above schemes focus on secret sharing and recovery, and only consider participant deception detection in terms of security. Stego images transmitted in the open channel are facing various attacks, including not only passive attacks such as monitoring and interception, but also active attacks such as modification.
To solve the active attack problem in the transmission process, this paper proposes a RESIS scheme with error correction capability by combining Reed-Solomon Codes [26] and CRT based secret sharing scheme. Reed-Solomon is the most well-known class of correcting codes, which has been used to a variety of data transmission and storage applications.
The contribution of this paper is given as follows.
-
•
A RESIS scheme is provided that allows for the lossless recovery of both the secret image and the cover image.
-
•
Using Reed Solomon code [26], the scheme can not only detect modification attacks, but also correct errors to a certain extent.
-
•
Taking multiple pixels as a polynomial, the scheme breaks through the limit of the number of shareholders to share compared with Ref. [25]. Meanwhile, higher power polynomials will expand the plaintext space and enhance security.
The rest of this paper is organized as follows. The preliminaries are listed in Section II. In Section III, the proposed RESIS is presented in detail. In Section IV, results of the experiment and analysis are provided. Finally, Section V concludes the paper.
2. Preliminaries
2.1. A simple construction of CRT-based ideal SS scheme
The operation of the paper [6] is based on polynomial rings, which can improve efficiency. After that, Wu et al. [7] suggested a straightforward design of the CRT-based ideal SS scheme for the improvement of effectiveness. The scheme includes two phases.
2.1.1. Distribution phase
Step 1
With a secret , the dealer chooses polynomials with degree less than , and then produces a polynomial of degree . The is written as
(1) where is the element of the Finite Field . And is public information associated with shareholder for .
Step 2
The dealer computes the share , and then distributes shares to shareholder
2.1.2. Recovery phase
The combiner collects share , and gets a system of congruent equations:
| (2) |
In the case of , the solution of has an only one value, which can be determined:
| (3) |
where , and . The secret bit sequence is the first coefficients of polynomial .
2.2. Least significant bit substitution
Least significant bit (LSB) substitution is often used as an image steganography algorithm. It is a kind of spatial algorithm and embeds the information into the lowest bit of pixel bits in the image points to ensure that the embedded information is invisible.
With a secret bit sequence and an image , -LSB substitution means that: the low bits are substituted for each pixel binary of the image by a group of that has a length of , replacing each group in turn.
For example, , a pixel value is 180, the binary conversion of is '0b10110100'. If , the 2-LSB algorithm replaces the lowest bits of the binary conversion of with , forming the new binary sequence '0b10110110'. Then the new pixel value is 182.
Due to the small difference between 180 and 182, the human naked eye cannot accurately distinguish, so information hiding can be realized.
2.3. Reed-Solomon Codes
Due to some reasons (such as noise or interference etc.), errors will occur during data transmission or storage. To overcome this problem, the Reed Solomon codes were proposed [26].
Reed Solomon codes include two parts: encoder and decoder. One block of digital data is processed at a time in the encoder, and after that, extra "redundant" bits are added. Each block is handled in the decoder so that mistakes may be fixed and the original data can be retrieved. The Reed Solomon code's nature will determine how many mistakes may be fixed.
Reed-Solomon codes are described as with -bit symbols, as is shown in Fig. 1. The block length of the original data is , and then the data is processed by the encoder. The encoder adds extra bits to the data forming codewords. The decoder can correct -bit errors, which contains .
Fig. 1.
Reed-Solomon code RS (s, p).
A typical Reed-Solomon code is with 8-bit symbols, where , , and . It means that each block contains 255 bytes; every time the encoder adds 32 bytes extra data. The decoder has the ability to correct up to 16-byte errors.
3. The proposed scheme
Combining the error correction algorithm of Reed-Solomon Codes and CRT over polynomial ring, we will give a minute description of our new RESIS scheme in this section.
3.1. The model
The model structure of the proposed scheme is shown in Fig. 2. The scheme has two phases: secret image sharing procedure and image retrieving procedure. The secret image sharing procedure includes sharing, encoding, and hiding stages. First, the dealer shares the secret image into share pieces with Wu et al. SS scheme. Then, uses Reed-Solomon code to encode share pieces into shadow images. Finally, 2-LSB is utilized to hide share pieces into the cover image, forming stego images. The image retrieving procedure includes extracting, decoding and recovery. Every shareholder uses 2-LSB to extract the shadow image from the stego image. And then Reed-Solomon code is used to decode shadow images to the share pieces. At last, the combiner represents of shareholders recovery the secret image and cover image.
Fig. 2.
The model of our proposed scheme.
3.2. Setting parameters
We first set the parameters for the scheme, including the degree of polynomials, selecting some coprime polynomials and Reed Solomon code parameters.
In scheme [25], all pixels are represented by an 8th power polynomial, which is of course simple and natural. But there are only 30 coprime 8th power polynomials in . In the secret sharing of the Chinese remainder theorem, each user corresponds to a polynomial, then there are only 30 users at most. Our scheme taking multiple pixels as a polynomial will break through the limit of the number of shareholders to share.
Step 1
Define polynomial , where represents the length of secret share in the CRT-based secret sharing scheme.
Step 2
Choose co-prime polynomials , which satisfy: and are co-prime, where ; deg() = deg() = = deg() = deg() = .
Step 3
A Reed-Solomon code is specified as RS() with -bit symbols. Here, . Depending on conditions such as communication and security requirements, we select appropriate correction parameters.
3.3. Detailed procedures
We describe the implementation details of the scheme, mainly including two parts: secret image sharing procedure and image retrieving procedure.
3.3.1. Secret image sharing procedure
-
a)
Sharing stage
The secret image is divided into owed by user . And the dealer D is in charge of sending every share to the corresponding user.
Step 1
Two images are picked by : secret image and cover image, whose size are and .
Step 2
Divide the cover image into blocks, which contains pixels. After that, a polynomial of degree is defined as , where and are last bit and the penultimate bit of the binary pixel value .
Step 3
Pick pixels , where . Then a polynomial of degree is defined as , where is the -th binary value of the -th pixel .
Step 4
Defines a new joint function:
(4) where .
Step 5
Generate a polynomial for shareholder , and the polynomial .
Step 6
Get the coefficients of polynomial to form a bit sequence with length . The degree of is less than or equal to .
Step 7
Repeat step 2–6 to generating bit sequence until the secret image is converted into shares for all users. The dealer aggregates all to form the secret share owed by user .
- b)
Encoding stage
To obtain the error correction ability, the dealer does not directly embed the secret share in the cover image to obtain the shadow image. In this paper, these secret shares are encoded by Reed-Solomon code to form error correction codes to resist tampering attacks or transmission errors. Then the encoded image is embedded in the cover image.
The dealer uses Reed-Solomon code to convert the secret share into code words.
Step 1
The dealer divides the secret share into blocks with a length of bytes. The unit of block here is byte, because Reed-Solomon code is usually in bytes.
Step 2
Utilize Reed-Solomon code to convert the block with length into a codeword block with length .
Step 3
Continue to perform Step 2 till all blocks are encoded completely.
- c)
Hiding stage
The stego image is created through embedding code words into the cover image with 2-LSB. The hiding stage has 5 steps:
Step 1
Select a byte from , and chooses four pixels values from cover image respectively.
Step 2
is converted into binary values {} and divided into four groups, each containing two binary bits {}.
Step 3
Convert {} into binary values and replace the last two bits with {b1b2}, {b3b4} {b5b6} {b7b8}. And then the replaced 4 binary sequences are converted to decimal {}.
Step 4
Repeat steps 1–3 until the share is totally embedded into the cover image . Then the stego image is formed for user .
Step 5
Repeat step 1–4 for other users until stego images are computed. The dealer sends all to the corresponding user .
3.3.2. Image retrieving procedure
This section gives a description of the proposed secret image retrieval procedure. Assuming there are shareholders , it is possible for of them to cooperate in order to get these two lossless images.
-
a)
Extracting stage
With a stego image as input, the corresponding shareholders exact the hidden information using the 2-LSB algorithm.
Step 1
Divide the stego image into blocks including 4 pixels, such as .
Step 2
Convert the 4 pixels into binary sequence with length 8 bits. We mark the converted value bits as .
Step 3
Take out the last two bits of 4 pixels , and combine them to form an 8-bit binary sequence, and convert the value into decimal.
Step 4
Repeat the above Step 1–3 until all the hidden information is extracted.
After the above steps are completed, a shareholder extracts its hidden information . Other shareholders perform the same operations and gets all the secret share.
- b)
Decoding stage
The shareholder utilizes Reed-Solomon code to decode the code words and obtains the secret share .
Step 1
The shareholder divides the code words into blocks with a length of bytes.
Step 2
With the Reed-Solomon code, shareholder extracts valid information while correcting errors, and then obtains the blocks with length .
Step 3
Repeat step 2 until the decoding is finished, and then the shareholder finally aggregates the decoded parts to obtain the secret share .
- c)
Recovery stage
Step 1
The shareholder convert to a binary sequence.
Step 2
Divide the binary sequence into blocks with length , and then recovers the polynomial .
Step 3
Other shareholders repeat Step 1–2, and obtains their own polynomial .
Step 4
After collecting polynomials, the combiner reconstructs the secret polynomial by computing
(5) where , and .
Step 5
With the polynomial , is the first 4 terms, and is the residual terms module .
Step 6
Continue to perform steps 2–5, and then aggregate the obtained A (x) and B (x) to get the secret image and cover image.
4. Experiment and analysis
We demonstrate the effectiveness of the proposed RESIS scheme in this section. Then, a comparison to different related RESIS scheme is provided. Finally, we demonstrate the examination of security and accuracy.
4.1. Experiment
We select Lenna(128 128) as the secret image and Peppers (512 512) as the cover image, and they are shown in Fig. 3. Set to 4 and to 3, which means that there are 4 shareholders and the threshold value is 3. Four co-prime polynomials with degree 223 for shareholders are chosen randomly. The Reed-Solomon code is set to be RS().
Fig. 3.
Secret image and Cover image.
With the proposed scheme, the secret image Lenna is shared and hidden in the cover image Peppers, and then forming 4 stego images, which are depicted in Fig. 4. Naturally, we cannot visually discriminate between these stego images and the cove image.
Fig. 4.
Stego images and Recovered images.
The peak signal-to-noise ratio (PSNR), mean square error (MSE), and structure similarity index method (SSIM) of stego images and recovered images are displayed in Table 1.
Table 1.
PSNR, MSE and SSIM of stego images and recovered images.
| Images | PSNR | MSE | SSIM |
|---|---|---|---|
| Stego image 1, cover image | 50.2138 | 0.6190 | 0.9956 |
| Stego image 2, cover image | 50.1702 | 0.6253 | 0.9955 |
| Stego image 3, cover image | 50.1893 | 0.6225 | 0.9955 |
| Stego image 4, cover image | 50.1803 | 0.6238 | 0.9956 |
| Recovered cover image, cover image | 0 | 1 | |
| Recovered secret image, secret image | 0 | 1 |
The PSNR is defined as:
| (6) |
where .
The MSE is defined by:
| (7) |
where and represent the pixel value of two images and with pixels.
Loss of correlation, luminance distortion, and contrast distortion are the three elements that make up the design of the SSIM. The formula for calculating the SSIM is:
| (8) |
where . Here, and are the mean values of image and image respectively; is the covariance of and ; , and are positive constants used to prevent a null denominator.
The PSNR value and MSE between the stego image and the cover image are around 50.18 and 0.62, respectively, indicating that the stego image has been altered and exhibits some distortion when compared to the cover image. While the SSIM between the stego image and the cover image is around 0.995, this clearly shows that the brightness, contrast, and structure of the stego image and the cover image are highly comparable. Between the recovered image and the original image, there is a PSNR, MSE, and SSIM of , 0 and 1. This indicates that the secret image and the recovered image are identical and that there was no loss during the recovery.
4.2. Least significant bit flipping attack
Flipping the least significant bit (LSB) of a pixel value in an image is referred to as an LSB flipping attack. The restoration of the secret image may be impacted by the modification, even how little it is.
In the experiment in subsection A, we target the stego pictures and change the LSB of a specific subset of pixels in each stego image. The range of the number is 0–4000. Fig. 5 shows that if the secret picture is changed within 1500 pixels, it may be fully recovered. There will be more changed pixels, which means some pixels won't be recovered. For the purpose of evaluating the quality of the recovered pictures using the SSIM metric, various numbers of LSB flipping attacks are applied to the shadow images in Fig. 6.
Fig. 5.
Recovered images with different number of pixels modifiability in every stego image.
Fig. 6.
SSIM values with different numbers of pixels attacked by LSB flipping.
According to the above experiment results, our proposed RESIS offers certain error correcting capabilities in resisting LSB flipping attack.
4.3. Comparing with other works
We evaluate the performance of our RESIS scheme in comparison to other related schemes proposed by Lin [16], Lin [18], Ulutas [19], and Meng [21] in seven different categories: error correction, meaningful stego image, lossless secret image, lossless cover image, most-capable pixels, sharing procedure cost, and recovery procedure cost.
Table 2 contains findings of comparation analysis. Only our proposed could correct errors. Schemes of Lin [16] and Lin [18] are constructed based on Shamir SS, and select 251 as the number of modulo prime. Unless additional processing is required, all pixels larger than 251 will not be effectively restored. Both Meng [21] scheme and our scheme are based on CRT polynomial ring, and thus it can recover all pixels naturally without other operations. Compared with Meng [21] scheme, out scheme uses Reed-Solomon Codes to get the ability to defend against modification attacks, thus its maximum capacity pixels is lower.
Table 2.
Comparing with other related schemes.
4.4. Analysis
We shall assess the proposed scheme's accuracy and security. That is or more shareholders can reconstruct the secret image and cover image while or fewer cannot.
-
1)
Theorem of correctness. Any t or more stego images can be employed to retrieve the secret image and cover image.
Proof. Suppose that shareholders have their shares . With the 2-LSB algorithm, the shareholder exacts the hidden information. Then the Reed-Solomon code is used to decode the hidden information and obtains the secret share . The shareholder convert to a binary sequence and divide it into blocks with length , so that the polynomial is obtained.
After shareholders have gotten their polynomials, the combiner has a system of congruent equations, which is shown as follow:
| (9) |
According to CRT, can be computed. Beside , we can obtain and . Repeat this process continuously, and the combiner gets all .With all and a stego image, the combiner can recover the cover image using the 2-LSB algorithm. With all the polynomials , the secret image can be recovered.
-
2)
Theorem of security. No more than stego images can be used to retrieve either the secret image or the cover image.
Proof. Suppose that shareholders have their shares . Perform steps similar to Theorem 1, the combiner can also obtain a system of congruent equation as follow:
| (10) |
Because , the combiner cannot recovery only one polynomial based CRT. Thus, it is impossible to perform the recovery of the cover image and secret image.
5. Conclusions
In this study, an error-correcting RESIS system is put forward. To build the RESIS, we used the Reed-Solomon Code and SS scheme based on CRT. The Reed-Solomon Code is used to correct errors. Moreover, taking multiple pixels as a polynomial, our scheme can break through the number limit of shareholders. The security of information transmission is improved by these processes.
The previous RESIS schemes tend to attach more attention to secret image sharing. Some of them consider the authentication ability of SIS, trying to find out whether the stego image has been modified, but lack the consideration of error correction. Our proposed scheme has the capacity to repair errors, which will increase its resistance to active attacks. In other words, the technique can automatically retrieve some of the material that has been modified in addition to determining if the stego image has been altered.
However, some problems need to be solved in the practical application of this paper. The error correction capability needs to be further improved. At the same time, a high polynomial degree used in the proposed RESIS scheme also brings high computation, which needs to be balanced with security requirements.
Author contribution statement
Chaoying Wang; Zhibiao Liang: Conceived and designed the experiments; Performed the experiments; Analyzed and interpreted the data; Contributed reagents, materials, analysis tools or data; Wrote the paper.
Yong Peng: Performed the experiments; Analyzed and interpreted the data.
Yu Wang: Contributed reagents, materials, analysis tools or data.
Gang Ke: Conceived and designed the experiments.
Zhiping Jin: Analyzed and interpreted the data; Contributed reagents, materials, analysis tools or data.
Funding statement
Chaoying Wang was supported by the Key Special Projects of Guangdong Education Department [ZDZX1119], the special project of intelligent terminal and intelligent manufacturing of Dongguan vocational and technical college in 2021 [ZXF014].
Gang Ke was supported by Dongguan Science and Technology of Social Development Program [20211800904512], Dongguan Sci-tech Commissoner Program [20231800500352], Characteristic Innovation Projects for Ordinary Universities in Guangdong Province [2021KTSCX301].
Zhiping Jin was supported by Zhongshan Public Welfare Science and Technology Research Project [2021B2064, 2021B2068].
Zhibiao Liang was supported by General scientific research projects of Zhongshan Polytechnic [KYB2110].
Data availability statement
The data that has been used is from a publicly available repository.
Declaration of interest’s statement
The authors declare no competing interests.
Contributor Information
Chaoying Wang, Email: wangcy@dgpt.edu.cn.
Yong Peng, Email: pengy@dgpt.edu.cn.
Zhibiao Liang, Email: liangzhibiao@zspt.edu.cn.
Yu Wang, Email: yuwang@gzhu.edu.cn.
Gang Ke, Email: keg@dgpt.edu.cn.
Zhiping Jin, Email: jinzp@zspt.edu.cn.
References
- 1.Shamir A. How to share a secret. Commun. ACM. 1979;22(11):612–613. [Google Scholar]
- 2.Blakley G.R. Proceedings of the National Computer Conference. 1979. Safeguarding cryptographic keys; pp. 313–317. [Google Scholar]
- 3.Asmuth C., Bloom J. A modular approach to key safeguarding. IEEE Trans. Inf. Theor. 1983;29(2):208–210. [Google Scholar]
- 4.Ding C., Pei D., Salomaa A. World Scientific; 1996. Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography. [Google Scholar]
- 5.Li C., Liu Y., Zhang L.Y., et al. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 2014;29(8):914–920. [Google Scholar]
- 6.Ning Y., Miao F., Huang W., et al. International Conference on the Theory and Application of Cryptology and Information Security. Springer; Cham: 2018. Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder theorem; pp. 310–331. [Google Scholar]
- 7.Wu L., Miao F., Meng K., et al. A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor. Front. Comput. Sci. 2022;16(1):1–9. [Google Scholar]
- 8.Naor M., Shamir A. Springer; Berlin, Heidelberg: 1994. Visual Cryptography. Workshop on the Theory and Application of Cryptographic Techniques; pp. 1–12. [Google Scholar]
- 9.Thien C.C., Lin J.C. Secret image sharing. Comput. Graph. 2002;26(5):765–770. [Google Scholar]
- 10.Chen C.C., Chen C.C., Lin Y.C. Weighted modulated secret image sharing method. J. Electron. Imag. 2009;18(4) [Google Scholar]
- 11.Alharthi S., Atrey P.K. 2010 IEEE International Conference on Multimedia and Expo. IEEE; 2010. An improved scheme for secret image sharing; pp. 1661–1666. [Google Scholar]
- 12.Hu C., Liao X., Xiao D. Secret image sharing based on chaotic map and Chinese remainder theorem. Int. J. Wavelets, Multiresolut. Inf. Process. 2012;10(3) doi: 10.1142/S0219691312500403. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Shyu S.J., Chen Y.R. 2008 IEEE Asia-Pacific Services Computing Conference. IEEE; 2008. Threshold secret image sharing by chinese remainder theorem; pp. 1332–1337. [Google Scholar]
- 14.Yan X., Lu Y., Liu L., et al. Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digit. Signal Process. 2018;82:80–90. [Google Scholar]
- 15.Yan X., Lu Y., Liu L., et al. International Conference on Cloud Computing and Security. Springer; Cham: 2017. Chinese remainder theorem-based secret image sharing for (K,n) threshold; pp. 433–440. [Google Scholar]
- 16.Yan X., Liu L., Li L., et al. Robust secret image sharing resistant to noise in shares. ACM Trans. Multimed Comput. Commun. Appl. 2021;17(1):1–22. [Google Scholar]
- 17.Sun Y., Yang C.N., Yan X., et al. Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization. Gene Expr. Patterns. 2022;45 doi: 10.1016/j.gep.2022.119267. [DOI] [PubMed] [Google Scholar]
- 18.Lin C.C., Tsai W.H. Secret image sharing with steganography and authentication. J. Syst. Software. 2004;73(3):405–414. [Google Scholar]
- 19.Wu Y.S., Thien C.C., Lin J.C. Sharing and hiding secret images with size constraint. Pattern Recogn. 2004;37(7):1377–1385. [Google Scholar]
- 20.Lin P.Y., Lee J.S., Chang C.C. Distortion-free secret image sharing mechanism using modulus operator. Pattern recognition. 2009;42(5):886–895. [Google Scholar]
- 21.Stinson D.R. second ed. CRC Press; New York, USA: 2002. Cryptography: Theory and practice. [Google Scholar]
- 22.Lin P.Y., Chan C.S. Invertible secret image sharing with steganography. Pattern Recogn. Lett. 2010;31(13):1887–1893. [Google Scholar]
- 23.Ulutas M., Ulutas G., Nabiyev V.V. Invertible secret image sharing for gray level and dithered cover images. J. Syst. Software. 2013;86(2):485–500. [Google Scholar]
- 24.Wu X., Yang C.N. Invertible secret image sharing with steganography and authentication for ambtc compressed images. Signal Process. Image Commun. 2019;78:437–447. [Google Scholar]
- 25.Meng K., Miao F., Xiong Y., et al. A reversible extended secret image sharing scheme based on Chinese remainder theorem. Signal Process. Image Commun. 2021;95 [Google Scholar]
- 26.Reed-Solomon Codes and Their applications. John Wiley & Sons; 1999. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
The data that has been used is from a publicly available repository.






