Next Article in Journal
Contact Metric Spaces and pseudo-Hermitian Symmetry
Next Article in Special Issue
A Robust and Reversible Watermarking Algorithm for a Relational Database Based on Continuous Columns in Histogram
Previous Article in Journal
Modeling Soil Water Redistribution under Gravity Irrigation with the Richards Equation
Previous Article in Special Issue
Novel Linguistic Steganography Based on Character-Level Text Generation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares

1
School of Software Engineering, Chengdu University of Information Technology, Chengdu 610225, China
2
The Software Engineering Technology Research Support Center of Informatization Application of Sichuan, Chengdu 610225, China
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(9), 1582; https://doi.org/10.3390/math8091582
Submission received: 23 July 2020 / Revised: 3 September 2020 / Accepted: 7 September 2020 / Published: 14 September 2020
(This article belongs to the Special Issue Computing Methods in Steganography and Multimedia Security)

Abstract

:
A Multi Secret Image sharing scheme can share several secret images among certain participators securely. Boolean-based secret sharing schemes are one kind of secret sharing method with light-weighted computation compared to the previous complex algebraic-based methods, which can realize the sharing of multi secret images. However, the existing Boolean-based multi secret sharing schemes are mostly restricted to the particular case of (2, n) and (n, n), only few Boolean-based multi secret sharing schemes study the general access structure, and the shares are mostly meaningless. In this paper, a new Boolean-based multi secret sharing scheme with the general access structure is proposed. All the shares are meaningful, which can avoid attracting the attention of adversaries, and the secret images can be recovered in a lossless manner. The feasibility of the scheme is proven, the performance is validated by the experiments on the gray images, and the analysis of the comparison with other methods is also given out.

1. Introduction

The secret sharing scheme was firstly proposed by Shamir [1] and Blakley [2] in 1979. Unlike the traditional encryption methods such as RSA which encrypt a piece of original plaintext into a piece of ciphertext, in the secret sharing scheme, the secret information is split into several pieces called shares using the secret sharing method and distributed between a group of participants, and only the participants in the qualified set can retrieve the secret information. Secret sharing can be used in many fields, such as the key management [3], access control [4], intelligent transportation [5], distributed computing in the cloud [6], and so forth. Recently, a new kind of secret division and sharing method called cognitive cryptography [7,8,9,10] was developed; it is a novel approach with the individual biometric features of each participator, which is an innovative solution in the sharing process allowing the owner of one share to be verified using the biometric feature, and can improve the security of the secret sharing.
In 1994, Shamir developed Visual Cryptography (VC) [11] which can encrypt binary images into several shares with random black and white pixels. The basic idea of VC is to use different binary matrices to represent the black and white pixel; the shares are generated based on the binary matrices by each pixel and printed on the transparencies, and the secret image can be recovered by simply overlapping the transparencies and can be recognized by the Human Vision System (HVS). The advantage of VC is that is can easily recover the secret image without any compute device, but it also has the disadvantage of pixel expansion which means the size of the shares is always much bigger than the original secret image, and another drawback is the low contrast, which means the recovered image is always has low recovery quality.
To deal with the problem of pixel expansion, probabilistic Visual Cryptography [12] was firstly proposed by Yang. With this method, the size of the share can be reduced to be the same as the secret image, but the quality of the recovered image is still low. Another secret sharing method which is based on the random grid [13] also can deal with the pixel expansion problem, but it is in fact equivalent to the probabilistic Visual Cryptography, so the quality of the recovered image is also poor.
Another way to overcome the problem of VC is polynomial-based Image Secret Sharing (ISS) [14], which introduced the Lagrange polynomial method into the image sharing. The pixel value of the shares is generated by the polynomial, and the secret is recovered by the polynomial interpolation. It overcomes the pixel expansion problem; the shares are even smaller than the secret image, and the recovered image is mostly the same as the secret image. However, the drawback is its highly complex computation due to the polynomial operation.
Boolean-based Image Secret sharing can achieve a better tradeoff between the pixel expansion, image quality, and the computation complex. In 2006, Wang et al. [15] proposed two XOR-based Image Secret Sharing Schemes for a single secret image; one is a probabilistic (2, n) threshold scheme for the binary image, and the other is a deterministic (n, n) threshold scheme for the gray-scale image. The size of the shares is the same as the secret image, and the recovered secret image is the same as the original secret image. Some other Boolean-based Image Secret sharing schemes are developed in [16,17,18,19,20], all these schemes have no or little pixel expansion, and the decryption is easy.
To realize sharing several secret images simultaneously, multi secret sharing schemes are developed. Some works focus on the particular (n, n) or the (k, n) threshold multi secret sharing scheme, only a few works focus on the multi secret sharing with the general access structure. The literature on the multi secret sharing schemes is covered in Section 2.

2. Related Work

Multi secret sharing schemes can share many secret images at one time. There are many kinds of the multi secret sharing scheme using different methods. In [21], the paradigm of the multi secret sharing was given out by Padiya et al. and the genetic method was developed as a kind of encryption. Weir et al. [22] proposed a scheme based on Visual Cryptography method, but the quality of the recovered secret images was very poor. Aarti et al. [23] used the extended Visual Cryptography method and mixing method to realize multi secret sharing.
Another way to construct the multi secret sharing is to use the matrix methods. Wang et al. [24] used the matrix projection methods to share multi secret images, and Fereshte et al. [25] used matrix multiplication method to realize the construction.
Some other research has been developed based on the polynomial methods or modulo method. Yang et al. [26] used the Lagrange interpolation polynomial method to share multi secret images, while Adachi et al. [27] constructed a (t, n) multi secret sharing scheme by Hermite interpolation, which can analyze the image more precisely than the Lagrange interpolation, but is more complex. Harn et al. [28] used another polynomial method which is the bivariate polynomial to share the multi secrets which can generate keys between the pair of the share owners. Chang et al. [29] applied the Chinese remainder method and the Lagrange Interpolation method in the sharing. Deshmukh et al. [30] realized the multi secret sharing combining with XOR operation. Mohit et al. [31] used the additive modulo method to realize the (n, n + 1) multi secret sharing scheme.
The researchers mentioned above constructed multi secret sharing schemes based on the different methods. Different kinds of schemes have their advantage, but they each also have some drawbacks. For example, the schemes based on the visual cryptography have the advantage of low computation complexity, but they always suffer from the problem of the poor recovery quality and the pixel expansion. The schemes based on the algebraic methods such as matrix methods, polynomial methods, and Chinese remainder method can get much better recovery quality, but they always have the disadvantage of the high computation complexity.
Boolean-based multi secret sharing schemes are the new method of multi secret sharing using simple Boolean operations with high recovered quality and no pixel expansion. Some research focused on the threshold scheme. Chen [32] gave out the first Boolean-based multi secret sharing scheme; all the shares are random, and it has (n + 1, n + 1) threshold which means all the n + 1 shares are necessary in the recovery of the n secret images. Later, Chen [33] proposed (n, n) multi secret sharing based on XOR operation and bit shift method. Yang et al. [34] constructed an n out of n multi secret sharing scheme, where no information can be recovered when there are less than n participants. Chen et al. [35] proposed a novel multi secret sharing scheme using Boolean operation and the hash method which can share different sizes of secret images. Deshmukh [36] proposed the (n, n) multi secret sharing scheme based on the XOR operation and modulo operation. Kabirirad et al. [37] developed a scheme with the random shares with low complexity based on Boolean operations. Prasetyo and Guo [38] proposed a multi secret sharing scheme based on the XOR and the Chinese remainder method which can share n secret images using n shares.
Some other research works focus on the secret sharing scheme with the general access structure. There are several works about sharing one secret with the general access structure [39,40]. Only a few works concern the multi secret sharing scheme with the general access structure. Das [41] proposed a multi secret sharing scheme with general access through the hash method. Yan [42] proposed the progressive sharing with general access structure using the Boolean operation. In 2019, Nag [43] proposed a multi secret sharing scheme with general access based on the Boolean operation; the shares are meaningless, and the concept of the public share is introduced, which come from the idea in [44]—the public share having high privilege participates in the recovery together with the owners’ meaningless shares, which does not violate the basic principle of secret sharing. Meghrajani et al. [45] shared multi secret sharing using Boolean operation using the public share. In 2020, Chen [46] proposed a multi secret sharing scheme with the general access structure, which does not need to collect all the shares, and where the defined qualified participators can recover the secret images, and the shares are meaningless.
From the literature survey, we notice that there are many multi secret sharing schemes with different characteristics, but there is no multi secret sharing scheme with the general access structure that can recover the secret exactly and at the same time the shares are all meaningful. As such, in this paper, we propose a multi secret image sharing scheme with general access structure and meaningful shares based on the Boolean operation.

3. Preliminary

3.1. General Access Structure

Suppose there are N participators, O = { 1 , 2 , 3 , , N } , which is the identity number of the participators, each participator will own one share, O W = { O W i } is the owners of the shares, i [ 1 , n ] .
Suppose the qualified part is P q u a l , P q u a l = { Q S 1 , Q S 2 , , Q S n } , where Q S i is the ith qualified subset i [ 1 , n ] , Q S i = { i 1 , i 2 , , i t } , which means the ith qualified subset Q S i consists of the t owners whose identity number is i 1 , i 2 , , i t , so the O W i 1 , O W i 2 ,…, O W i t can recover the ith secret. The forbidden part is P f o r b i d , P f o r b i d = { F S 1 , F S 2 , , F S m } , where F S i is the ith forbidden subset i [ 1 , m ] , F S j = { j 1 , j 2 , , j r } , which means the j 1 th, j 2 th, …, j r th owner are forbidden to recover the secret. P q u a l and P f o r b i d is not empty, P q u a l 2 O , P f o r b i d 2 O , and P q u a l P f o r b i d = .
Denote P 0 as the set of the minimum qualified set:
P 0 = { Q P q u a l : Q P q u a l , Q Q }
As such, each element of P q u a l is the minimum qualified subset.
The element C in O is called as the valid element, when there is at least one qualified subset concluding this element, i.e.,
{ D | D { C } P q u a l , D P q u a l }
In this paper, we suppose all the elements or owners are valid, there is no element not participating in the sharing.

3.2. Relationship between the Operation on GF(2m) and Bit-Wise XOR Operation

As we know, the pixels of the image can be expressed by m bits. For example, the pixels of the black-and-white image are expressed by 1 bit, and the pixels of the 256 gray level image are always expressed by 8 bits. For the 256 gray level image, the gray value is in fact isomorphic to the element over GF(28). Thus, the operations of the pixels of the images are executed on the GF(28). The operation on the Galois field can be found in [47].
In this paper, the additional operation on the GF(2m) is used in the secret sharing process and the recovery process, and the addition operation on the different elements is in fact the XOR operation of the coefficients of the polynomials for the different elements; so, for the pixel of m bits, the addition operation between the images is equivalent to the m bit-wise XOR operation.
Suppose there are two images X and Y which are m gray level and the size of each image A × B, the pixel value in the r o w th row and the c o l th column of OSi is p x ( r o w , c o l ) X , which is integer, p x ( r o w , c o l ) X [ 0 , 2 m 1 ] , r o w [ 1 , A ] , and c o l [ 1 , B ] . As each pixel of the image X can be turned into log 2 m bits, suppose p x ( r o w , c o l ) X = { b x 1 , b x 2 , , b x log 2 m } , similarly, each pixel of the image Y can be expressed by p x ( r o w , c o l ) Y = { b y 1 , b y 2 , , b y log 2 m } , so the addition operation between the pixel of the image X and Y in the same position is defined as below,
p x ( r o w , c o l ) X p x ( r o w , c o l ) Y = { b x 1 , b x 2 , , b x log 2 m } { b y 1 , b y 2 , , b y log 2 m } = { b x 1 b y 1 , b x 2 b y 2 , , b x log 2 m b y log 2 m }
And the image X can be expressed by the matrix M X A × B .
M X A × B = [ p x ( 1 , 1 ) X p x ( 1 , B ) X p x ( r o w , c o l ) X p x ( A , 1 ) X p x ( A , B ) X ]
The image Y can be expressed by the matrix M Y A × B .
M Y A × B = [ p x ( 1 , 1 ) Y p x ( 1 , B ) Y p x ( r o w , c o l ) Y p x ( A , 1 ) Y p x ( A , B ) Y ]
As such, the addition of the image X and Y can be expressed by the XOR between the matrix M X A × B and M Y A × B ,
M X A × B     M Y A × B = [ p x ( 1 , 1 ) X p x ( 1 , B ) X p x ( r o w , c o l ) X p x ( A , 1 ) X p x ( A , B ) X ]     [ p x ( 1 , 1 ) Y p x ( 1 , B ) Y p x ( r o w , c o l ) Y p x ( A , 1 ) Y p x ( A , B ) Y ] = [ p x ( 1 , 1 ) X p x ( 1 , 1 ) Y p x ( 1 , B ) X p x ( 1 , B ) Y p x ( r o w , c o l ) X p x ( r o w , c o l ) Y p x ( A , 1 ) X p x ( A , 1 ) Y p x ( A , B ) X p x ( A , B ) Y ]  
For each p x ( r o w , c o l ) X p x ( r o w , c o l ) Y , r o w [ 1 , A ] , and c o l [ 1 , B ] , the addition is executed as the definition above.

4. Proposed Scheme

4.1. Multi Secret Sharing Process

Suppose there are m secret gray images to be shared, the secret images are OS1, OS2, … OSn. All the secret images are 256 gray level and share the same size. There are n participators and n qualified subsets, The qualified part is P q u a l , P q u a l = { Q S 1 , Q S 2 , , Q S n } , where Q S i is the ith qualified subset i [ 1 , n ] , and the ith qualified subset Q S i have access to recover the ith secret image OSi. Q S i = { i 1 , i 2 , , i t } means that the i 1 th, i 2 th,…, i t th participators can be recover the secret image OSi. Moreover, the forbidden part is P f o r b i d , P f o r b i d = { F S 1 , F S 2 , , F S m } .
In the multi secret sharing process the universal shares and the personal shares of the same size as the secret images will be generated. The personal shares are owned by the individual owners and the universal shares are kept by the committee members with high privilege. In the recovery process, the personal owners and the committee members with universal shares will participate in the recovery. The process about the secret sharing process is described as Algorithm 1.
Algorithm 1: The secret sharing process of the proposed scheme.
Input: The secret images OS1, OS2, …, OSn; for the general access structure, the qualified part is P q u a l , P q u a l = { Q S 1 , Q S 2 , , Q S n } , and the forbidden part is P f o r b i d , P f o r b i d = { F S 1 , F S 2 , , F S m }
Output: The personal shares PS1, PS2, …, PSn; the universal shares US1, US2, …, USn.
Step 1: Suppose the size of each secret image OSi is A × B, the pixel value in the r o w th row and the c o l th column of OSi is p x O ( r o w , c o l ) i , and p x O ( r o w , c o l ) i is integer, p x O ( r o w , c o l ) i [ 0 , 255 ] , r o w [ 1 , A ] , and c o l [ 1 , B ] . As each pixel can be expressed into an element with 8 bits in GF(28), suppose p x O ( r o w , c o l ) i = { b o 1 , b o 2 , b o 3 , b o 4 , b o 5 , b o 6 , b o 7 , b o 8 } , split the bits of each pixel into the 4 MSB bits and the 4 LSB bits, p x O M ( r o w , c o l ) i = { b o 1 , b o 2 , b o 3 , b o 4 } , and p x O L ( r o w , c o l ) i = { b o 5 , b o 6 , b o 7 , b o 8 } . Thus, the MSB part of the secret image OSi can be regarded as the matrix S M A × B i .
S M A × B i = [ p x O M ( 1 , 1 ) i p x O M ( 1 , B ) i p x O M ( r o w , c o l ) i p x O M ( A , 1 ) i p x O M ( A , B ) i ]
And the LSB part of the secret image OSi can be regarded as the matrix S L A × B i .
S L A × B i = [ p x O L ( 1 , 1 ) i p x O L ( 1 , B ) i p x O L ( r o w , c o l ) i p x O L ( A , 1 ) i p x O L ( A , B ) i ]
Step 2: Select n gray images {PO1, PO2, …, POn} from a mass of images randomly which are the same size and the same gray level with the secret images, and select another n gray images {UO1, UO2, …, UOn} from a mass of images randomly which are the same size and the same gray level with the secret images, {UO1, UO2, …, UOn} need to be different with {PO1, PO2, …, POn}.
Step 3: Find out the essential id for each qualified subset Q S i in P q u a l by Algorithm 2, i [ 1 , n ] , Q S i = { i 1 , i 2 , , i t } , the essential id is specific element of the set Q S i , denote it as i d i .
Step 4: For the images {PO1, PO2, …, POn}, for each image POi with the size A × B, suppose the pixel value in the r o w th row and the c o l th column of POi is p x P ( r o w , c o l ) i , and p x P ( r o w , c o l ) i is the integer, p x P ( r o w , c o l ) i [ 0 , 255 ] , r o w [ 1 , A ] , and c o l [ 1 , B ] . Each pixel can be expressed as p x P ( r o w , c o l ) i = { b p 1 , b p 2 , b p 3 , b p 4 , b p 5 , b p 6 , b p 7 , b p 8 } , separate 4 MSB bits and the 4 LSB bits of each pixel, p x P M ( r o w , c o l ) i = { b p 1 , b p 2 , b p 3 , b p 4 } , and p x P L ( r o w , c o l ) i = { b p 5 , b p 6 , b p 7 , b p 8 } . Thus, the matrix of the MSB is denoted as P M A × B i .
P M A × B i = [ p x P M ( 1 , 1 ) i p x P M ( 1 , B ) i p x P M ( r o w , c o l ) i p x P M ( A , 1 ) i p x P M ( A , B ) i ]
And the matrix about LSB is denoted as S L A × B i .
P L A × B i = [ p x P L ( 1 , 1 ) i p x P L ( 1 , B ) i p x P L ( r o w , c o l ) i p x P L ( A , 1 ) i p x P L ( A , B ) i ]
Step 5: For the images {UO1, UO2, …, UOn}, suppose the pixel value in the r o w th row and the c o l th column of POi is p x U ( r o w , c o l ) i , and p x U ( r o w , c o l ) i is integer, p x U ( r o w , c o l ) i [ 0 , 255 ] , r o w [ 1 , A ] , and c o l [ 1 , B ] . Each pixel can be expressed as p x U ( r o w , c o l ) i = { b u 1 , b u 2 , b u 3 , b u 4 , b u 5 , b u 6 , b u 7 , b u 8 } , separate 4 MSB bits and the 4 LSB bits of each pixel, p x U M ( r o w , c o l ) i = { b u 1 , b u 2 , b u 3 , b u 4 } , and p x U L ( r o w , c o l ) i = { b u 5 , b u 6 , b u 7 , b u 8 } . The matrices are denoted as the U M A × B i for the MSB part and U L A × B i for the LSB part.
U M A × B i = [ p x U M ( 1 , 1 ) i p x U M ( 1 , B ) i p x U M ( r o w , c o l ) i p x U M ( A , 1 ) i p x U M ( A , B ) i ]
And the matrix of LSB S L A × B i is as below.
U L A × B i = [ p x U L ( 1 , 1 ) i p x U L ( 1 , B ) i p x U L ( r o w , c o l ) i p x U L ( A , 1 ) i p x U L ( A , B ) i ]
Step 6: For the secret image OSi and the qualified subset is Q S i = { i 1 , i 2 , , i t } , perform the following operation about the MSB part of the secret image OSi:
T U A × B i = S M A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i
The addition operation is defined as in Section 3.2. Suppose T U A × B i is shown as below,
T U A × B i = [ p x T U ( 1 , 1 ) i p x T U ( 1 , B ) i p x T U ( r o w , c o l ) i p x T U ( A , 1 ) i p x T U ( A , B ) i ]
Apply the Arnold transform [48] method to each matrix T U A × B i to realize the element scrambling, and the scrambled matrix is denoted as E T U A × B i ,
E T U A × B i = [ p x E T U ( 1 , 1 ) i p x E T U ( 1 , B ) i p x E T U ( r o w , c o l ) i p x E T U ( A , 1 ) i p x E T U ( A , B ) i ]
Perform another operation for the LSB part of the secret image OSi:
T P A × B i d i = S L A × B i + P M A × B i g 1 + + P M A × B i g t 1 + U M A × B i
where { i g 1 , , i g t 1 } = G P i , G P i = { G P i | G P i i d i = Q S i , i d i G P i } , Q S i = { i 1 , i t } .
Suppose T P A × B i d i is shown as below,
T P A × B i d i = [ p x T P ( 1 , 1 ) i p x T P ( 1 , B ) i p x T P ( r o w , c o l ) i p x T P ( A , 1 ) i p x T P ( A , B ) i ]
Apply the Arnold transform method to each matrix T P A × B i d i to realize the element scrambling, and the scrambled matrix is denoted as E T P A × B i d i ,
E T P A × B i d i = [ p x E T P ( 1 , 1 ) i p x E T P ( 1 , B ) i p x E T P ( r o w , c o l ) i p x E T P ( A , 1 ) i p x E T P ( A , B ) i ]
Step 7: For the images {UO1, UO2, …, UOn}, replace the 4 LSBs of each pixel of UOi with the element of E T U A × B i in the same position, which means join each element p x U M ( r o w , c o l ) i of U M A × B i and p x E T U ( r o w , c o l ) i of T U A × B i together, and get the pixel matrix expression U S A × B i of USi,
U S A × B i = [ p x U M ( 1 , 1 ) i p x E T U ( 1 , 1 ) i p x U M ( 1 , B ) i p x E T U ( 1 , B ) i p x U M ( r o w , c o l ) i p x E T U ( r o w , c o l ) i p x U M ( A , 1 ) i p x E T U ( A , 1 ) i p x U M ( A , B ) i p x E T U ( A , B ) i ]
Suppose p x U M ( r o w , c o l ) i = { b u 1 , b u 2 , b u 3 , b u 4 } , and p x T U ( r o w , c o l ) i = { b t u 1 , b t u 2 , b t u 3 , b t u 4 } , so
p x U M ( r o w , c o l ) i p x T U ( r o w , c o l ) i = { b u 1 , b u 2 , b u 3 , b u 4 } { b t u 1 , b t u 2 , b t u 3 , b t u 4 } = { b u 1 , b u 2 , b u 3 , b u 4 , b t u 1 , b t u 2 , b t u 3 , b t u 4 }
The renewed images are the universal shares {US1, US2, …, USn}.
Step 8: For the images {PO1, PO2, …, POn}, replace the 4 LSBs of each pixel of POi with the element of E T P A × B i in the same position, which means join each element p x P M ( r o w , c o l ) i of P M A × B i and p x E T P ( r o w , c o l ) i of E T P A × B i together, and get the pixel matrix expression P S A × B i of PSi,
P S A × B i = [ p x P M ( 1 , 1 ) i p x E T P ( 1 , 1 ) i p x P M ( 1 , B ) i p x E T P ( 1 , B ) i p x P M ( r o w , c o l ) i p x E T P ( r o w , c o l ) i p x P M ( A , 1 ) i p x E T P ( A , 1 ) i p x P M ( A , B ) i p x E T P ( A , B ) i ]
The element joint operation is the similar as the last step, and the renewed images are the personal shares {PS1, PS2, …, PSn}.
Algorithm 2: The essential id selection process for the qualified subset of the general access.
Input: The general access structure, the qualified part is P q u a l , P q u a l = { Q S 1 , Q S 2 , , Q S n } , where Q S i is the ith qualified subset i [ 1 , n ] , Q S i = { i 1 , i 2 , , i t } , { i 1 , i 2 , , i t } { 1 , 2 , , n } .
Output: The essential id E I D = { i d 1 , i d 2 , , i d n }
Step 1: For each qualified subset Q S i , i [ 1 , n ] , Q S i = { i 1 , i 2 , , i t } , denote the essential id of the set Q S i as i d i . Construct the vector of length n where all the elements are 0, set the i 1 th, i 2 th, …, i t th elements according to { i 1 , i 2 , , i t } to be 1, the vector is denoted as V i . As such, the vector V i is the logical presentation of the qualified subset Q S i .
Step 2: Regard the vector V i as the ith row of the matrix Q M , so the matrix Q M is the presentation of the qualified access subsets.
Step 3: Q M 1 is the start point of the searching, and Q M 1 = Q M .
For k = 1: n, calculate the hamming weights of each column and row of the matrix Q M k , the hamming wights of the columns are denoted as { h m c 1 , h m c 2 , , h m c n }, and the hamming weights of the rows are denoted as { h m r 1 , h m r 2 , , h m r n }, search for the smallest hamming weight of the column vector. There are different cases.
Case 1: If the smallest hamming weight of the column is 1 and unique, the non-zero element is the ( s r , s c ) element in the matrix Q M , it shows that the essential id for the srth qualified subset Q S s r is s c .
Case 2: If the smallest hamming weight is not 1 and unique, compare the rows’ hamming weights of the non-zero elements, select the element ( s r , s c ) which has the smallest hamming weight; if the rows’ hamming weights are the same, select the element in which the row number is smaller, so the essential id for the srth qualified subset Q S s r is s c .
Case 3: If the smallest hamming weight is not 1 and not unique, compare all the rows’ hamming weights of the non-zero elements in the different columns, select the element ( s r , s c ) which has the smallest hamming weight; if the rows’ hamming weights are the same, select the element in which the row number is smallest, so the essential id for the srth qualified subset Q S s r is s c .
Step 4: Set all the elements of the srth row and the scth column to be zero, Q M k is renewed as Q M k + 1 .
Step 5: For the renewed matrix Q M k + 1 , execute the same operations as in Step 3 to fix the essential id for the other row, it is stopped when all the essential id for all the rows are fixed.
Step 6: The final essential id is denoted as E I D = { i d 1 , i d 2 , , i d n } , which means the idith element is the essential element for the ith qualified subset Q S i .
Some observations and details for the steps are given below:
In step 1, as each pixel of the 256 gray secret image O S i is expressed by 8 bits in the computer science, so the secret image O S i can be regarded as the matrix M A × B i from the point of the mathematics, where the element is the bit expression of pixel value in GF(28). If we divide the pixel into 4 MSBs and 4 LSBs part, the secret image O S i can be regarded as the combination of matrix S M A × B i about the MSB part and S L A × B i about the LSB part, and all the elements of S M A × B i and S L A × B i is in GF(24).
In step 2, the n gray images {PO1, PO2, …, POn} are the prepared images for the personal shares, and the n gray images {UO1, UO2, …, UOn} are the prepared images for the universal shares; they are all selected randomly from a mass of images, so it is hard to predict which one is selected.
In step 3, the essential id is determined by Algorithm 2, the essential id i d i = i c for Q S i = { i 1 , i 2 , , i t } must be the id of the essential participator for the qualified subset Q S i , and the essential id for the different qualified subset is different. For the essential id i d i for Q S i and i d j for Q S j , i d i i d j , if j i .
In steps 4 and 5, the images {PO1, PO2, …, POn} and the images {UO1, UO2, …, UOn} are divided into MSB and LSB part. P M A × B i for the MSB part and P L A × B i for the LSB part of POi, U M A × B i for the MSB part and U L A × B i for the LSB part of UOi are generated from the point of matrix.
In step 6, in Equation (12), there are three parts taking part in the addition computation to generate T U A × B i , the first part is the MSB part of the secret image S M A × B i , the second part is P M A × B i j ( j { 1 , , t } ) which are the MSB part of the images {POi1, POi2, …, POit} according to the qualified subset Q S j , the third part is U M A × B i which is the MSB part of UOi. A similar operation is executed as shown in Equation (15) to get T P A × B i d i ,where the set G P i is in fact the subset of Q S i removing the element idi. The Arnold transform method is applied to T U A × B i and T P A × B i d i to scramble the pixels, which is important for enhancing the security. If A = B , the image is square, we can use the transform in [48] directly, if A B , the image is not square, it needs to be extended to be square by supplying some zero pixel. Then, the Arnold transform method is carried out.
In step 7, the 4 LSBs of the each pixel of UOi are replaced by the elements of E T U A × B i , and the renewed image is the final universal share USi. The idith personal share PSidi can be obtained as shown in Equation (15) by replacing the LSBs of PSidi bythe elements of E T P A × B i d i .
Then the generated personal share PSi is distributed to the owner OWi, and the universal shares USi are kept by the committee members having high privilege.
The example 1 is an example of the secret sharing process and the size of the image is small for the convenience to show the sharing process using the matrices.
Example 1.
Suppose there are 4 participants, the qualified part P q u a l = { Q S 1 , Q S 2 , Q S 3 , Q S 4 } , and Q S 1 = { 1 , 2 , 3 } , Q S 2 = { 1 , 4 } , Q S 3 = { 2 , 4 } , Q S 4 = { 3 , 4 } . The secret images with 256 gray level are OS1, OS2, OS3, OS4, and the size of the secret image is 2 × 2. As such, the participants in Q S i have access to recover the secret image OSi.
The secret sharing process is described below:
  • For the secret images, suppose the matrices of the pixel value is shown as below:
    ( 154 35 69 247 ) ( 227 141 165 46 ) ( 142 64 237 37 ) ( 118 148 49 97 )
  • For each Q S i , there is one corresponding essential id idi and universal share, so we take the generation of the personal share P S i d 1 and the universal U S 1 for example. First, turn the pixel value of the first secret image OS1 into 8 bits, to get:
    O M 2 × 2 1 = ( 10011010 00100011 01000101 11110111 )
  • Divide the MSB part and the LSB part of O M 2 × 2 1 , So S M A × B i about the MSB parts and S L A × B i about LSB is shown below:
    S M 2 × 2 1 = ( 1001 0010 0100 1111 )
    S L 2 × 2 1 = ( 1010 0011 0101 0111 )
  • Select 4 gray images randomly {PO1, PO2, PO3, PO4} with the same size as the secret image from a set of thousands of images, and select another 4 gray images randomly {UO1, UO2, UO3, UO4} with the same size as the secret image.
  • Find out the essential id for the qualified subset based on Algorithm 2, the essential id for the qualified subsets is { i d 1 , i d 2 , i d 3 , i d 4 } = {2, 1, 4, 3}.
  • For the image {PO1, PO2, PO3, PO4}, suppose P M 2 × 2 i is the matrix for the MSB part of POi. As such, the matrices of the MSB parts of the images are as below:
    P M 2 × 2 1 = ( 0101 1100 0110 1001 )
    P M 2 × 2 2 = ( 1110 1000 1010 0010 )
    P M 2 × 2 3 = ( 0100 0110 0111 1100 )
    P M 2 × 2 4 = ( 1100 0110 0101 0111 )
  • For the image UO1, the matrix U M 2 × 2 1 of the MSB parts is as below:
    U M 2 × 2 1 = ( 0111 1000 1001 0101 )
  • Thus, according to Equation (15) we can get T U 2 × 2 1 :
    T U 2 × 2 1 = S M 2 × 2 1 + P M 2 × 2 1 + P M 2 × 2 2 + P M 2 × 2 3 + U M 2 × 2 1 = ( 1001 0010 0100 1111 ) + ( 0101 1100 0110 1001 ) + ( 1110 1000 1010 0010 ) + ( 0100 0110 0111 1100 ) + ( 0111 1000 1001 0101 ) = ( 0001 1000 0110 1101 )
  • Apply the Arnold transform method to each matrix T U 2 × 2 1 to realize the element scrambling, and the scrambled matrix is denoted as E T U 2 × 2 1 ,
    E T U 2 × 2 1 = ( 1101 0001 1000 0110 )
  • Similarly, we can get:
    T P 2 × 2 i d 1 = T P 2 × 2 2 = S L 2 × 2 1 + P M 2 × 2 1 + P M 2 × 2 3 + U M 2 × 2 1 = ( 0101 1110 1100 0110 )
  • Apply the Arnold transform method to each matrix T P 2 × 2 2 to realize the element scrambling, and the scrambled matrix is denoted as E T P 2 × 2 2 ,
    E T P 2 × 2 2 = ( 0110 0101 1110 1100 )
  • So, for the image UO1, replace the 4 LSBs of each pixel with the element in E T U 2 × 2 1 to obtain the matrix of the universal share US1 as below:
    U g 2 × 2 1 = ( 01111101 10000001 10011000 01010110 )
  • The pixel presentation matrix is:
    U G 2 × 2 1 = ( 125 129 152 86 )
  • For the images {PO1, PO2, PO3, PO4}, select the essential id id1 for the qualified subset Q S 1 (the algorithm about the essential id for the qualified subset is shown in Algorithm 2), as id1 = 2, so for the image PO2, replace the 4 LSBs with E T P 2 × 2 i d 1 , i d 1 = 2 to get one personal share PS2.
    P S 2 × 2 2 = ( 11100110 10000101 10101110 00101100 )
    P G 2 × 2 2 = ( 230 133 174 44 )
  • The other universal shares UO2, UO3, UO4 and the personal shares PO1, PO3, PO4 can be obtained in the same way.
In the following, the definition of the essential id for the qualified subset and the algorithm for the determination of the essential id is given out.
As described in the beginning of Section 4.1, the number of the minimal qualified subset is the same as the number of the participants, so each participant is in one minimal qualified subset. The essential id i d i for the subset Q S i is defined as the representative element id in Q S i , for each qualified subset, there is one essential id and it is different from the essential id of other subsets; that is, the i d i for the subset Q S i is not equal to the i d j for the subset Q S j , i d i i d j if i j . Thus, the id of each participator can be assigned as the essential id for one minimal qualified subset, and each essential id can be assigned to one secret image according to one qualified subset. The algorithm about the selection of the essential id is described below.
In step 1, the qualified subset Q S i = { i 1 , i 2 , , i t } means that the i 1 th, i 2 th, …, i t th participators have the ability to recovery the ith secret image, so the vector V i is in fact the logical express of the qualified subset.
In step 2, the matrix Q M is the binary matrix presentation of the general access structure, and the ith row is according to the ith qualified subset Q S i , and the jth column is corresponding to the jth participator, so the ( i , j ) element of Q M is not zero shows that the jth participator takes part in the recovery the ith secret image.
In step 3, the essential id for each qualified subset is determined according to the comparison of the column hamming weights and the row hamming weights, and the matrix is renewed continuously in the iteration. After step 5, we can get the final essential id for all the qualified subsets.
The following is the example of the determination process of the essential id.
Example 2.
Suppose there are 4 participants, the qualified part P q u a l = { Q S 1 , Q S 2 , Q S 3 , Q S 4 } , and Q S 1 = { 1 , 2 , 3 } , Q S 2 = { 1 , 4 } , Q S 3 = { 2 , 4 } , Q S 4 = { 3 , 4 } .
  • The vectors of the Q S i are shown as below:
    V 1 = [ 1 , 1 , 1 , 0 ] V 2 = [ 1 , 0 , 0 , 1 ] V 3 = [ 0 , 1 , 0 , 1 ] V 4 = [ 0 , 0 , 1 , 1 ]
  • As such, the matrix Q M of the qualified access is shown as below:
    Q M = ( 1 1 1 0 1 0 0 1 0 1 0 1 0 0 1 1 )
  • Let Q M 1 = Q M as the start point, calculate the hamming weight of each column, { h m c 1 , h m c 2 , h m c 3 , h m c 4 } = {2, 2, 2, 3}, and the hamming weight of each row is { h m r 1 , h m r 2 , h m r 3 , h m r 4 } = {3, 2, 2, 2}. As 2 is the smallest column hamming weight and not unique, compare all the {1, 2, 3} rows’ hamming weights, { h m r 1 , h m r 2 , h m r 3 , h m r 4 } = {3, 2, 2, 2}, since the element (2, 1) element has the row number that is smallest in the rows with a smaller row hamming weight of 2, the essential id for the qualified subset Q S 2 is 1;
  • Then all the elements in the 2th row and the 1th column are set to be zero, the renewed matrix Q M 2 is as below:
    Q M 2 = ( 0 1 1 0 0 0 0 0 0 1 0 1 0 0 1 1 )
  • Compare the hamming weight of the non-zero columns in Q M 2 , { h m c 2 , h m c 3 , h m c 4 } = {2, 2, 2}, as all the columns hamming weight is the same, so compare the row hamming weight, { h m r 1 , h m r 3 , h m r 4 } = {2, 2, 2}, so select the (1, 2) element whose row number is smallest in the rows with hamming weight 2, which means the essential id for the qualified subset Q S 1 is 2;
  • Then, the 1th row and the 2rd column is set to be zero, the renewed matrix Q M 3 is as blow:
    Q M 3 = ( 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 1 )
  • The hamming weight of the non-zero columns { h m c 3 , h m c 4 } = {1, 2}, the smallest rows’ hamming weight is 1 and unique, so select the element (4, 3), the essential id for the qualified subset Q S 4 is 3;
  • Then the 4th row and the 3th column is set to be zero, the renewed matrix Q M 4 is as blow:
    Q M 4 = ( 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 )
  • Thus, it is easy to confirm the essential id for the qualified subset Q S 3 is 4;
  • At last, we can obtain the essential id E I D = { i d 1 , i d 2 , , i d n } = { 2 , 1 , 4 , 3 } .

4.2. Secret Recovery Process

In the secret sharing process, the personal shares {PS1, PS2, …, PSn} are distributed to the personal owners and the universal shares {US1, US2, …, USn} are kept by the privileged committee members. As per the definition of the general access structure, the qualified owners can recover the ith secret image use the personal shares {PSi1, PSi2, …, PSit} according to the qualified subset Q S i , i [ 1 , n ] , Q S i = { i 1 , i 2 , , i t } . The recovery process is shown in Algorithm 3.
Algorithm 3: The secret recovery process of the proposed scheme.
Input: The personal shares PS1, PS2, …, PSn; the universal shares US1, US2, …, USn.; the general access structure, the qualified part is P q u a l , and the forbidden part is P f o r b i d .
Output: The secret images RS1, RS2, …, RSn
Step 1: Take the recovery of the ith secret image as the example. Retrieve the universal image UOi from the committee after verification, or else the committee members can participate in the recovery taking the universal share UOi. Extract the 4 LSBs of the each pixel to get the matrix E T U A × B i over GF(24), and 4 MSBs of the pixels of UOi form the matrix U M A × B i ;
Step 2: Collect the qualified personal shares {PSi1, PSi2, …, PSit} based on the qualified subset Q S i , i [ 1 , n ] , Q S i = { i 1 , i 2 , , i t } . For each qualified personal share, extract the 4 MSBs of each pixel of the share, as in Algorithm 1. Obtain the matrix P M A × B i j over GF(24), j [ 1 , t ] , as Q S i = { i 1 , i 2 , , i t } , so we can get the matrices { P M A × B i 1 , P M A × B i 2 , , P M A × B i t } ;
Step 3: Apply the Arnold inverse transform on E T U A × B i to get T U A × B i , and perform the following operation:
S M A × B i = T U A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i
S M A × B i is shown as below:
S M A × B i = [ p x S M ( 1 , 1 ) i p x S M ( 1 , B ) i p x S M ( r o w , c o l ) i p x S M ( A , 1 ) i p x S M ( A , B ) i ]
where p x S M ( r o w , c o l ) i = { b m 1 , b m 2 , b m 3 , b m 4 } .
Step 4: Calculate the essential id i d i for the qualified set Q S i using Algorithm 2, and extract the 4 LSBs of each pixel in the i d i th personal share to get the matrix E T P A × B i d i , and apply the Arnold inverse transform on E T P A × B i d i to get T P A × B i d i ;
Step 5: From the construction of T P A × B i d i , perform the following operation to get S L A × B i :
S L A × B i = T P A × B i d i + P M A × B i g 1 + + P M A × B i g t 1 + U M A × B i
where { i g 1 , , i g t 1 } = G P , G P = { G P | G P i d i = Q S i , i d i G P } , Q S i = { i 1 , i t } and S L A × B i is shown as below:
S L A × B i = [ p x S L ( 1 , 1 ) i p x S L ( 1 , B ) i p x S L ( r o w , c o l ) i p x S L ( A , 1 ) i p x S L ( A , B ) i ]
where p x S L ( r o w , c o l ) i = { b l 1 , b l 2 , b l 3 , b l 4 } .
Step 6: For each element in matrix S M A × B i and S L A × B i , join the element of the matrix S M A × B i and the element of the matrix S L A × B i in the same position to form a new matrix R M A × B i :
R M A × B i = [ p x S M ( 1 , 1 ) i p x S L ( 1 , 1 ) i p x S M ( 1 , B ) i p x S L ( 1 , B ) i p x S M ( r o w , c o l ) i p x S L ( r o w , c o l ) i p x S M ( A , 1 ) i p x S L ( A , 1 ) i p x S M ( A , B ) i p x S L ( A , B ) i ]
where p x S M ( r o w , c o l ) i p x S L ( r o w , c o l ) i = { b m 1 , b m 2 , b m 3 , b m 4 , b l 1 , b l 2 , b l 3 , b l 4 } .
Step 7: Transform each element of the matrix R M A × B i into the decimal number, which is the pixel value of the ith recovered secret image RSi which is 256 gray level. For example, if the element of R M A × B i is { b m 1 , b m 2 , b m 3 , b m 4 , b l 1 , b l 2 , b l 3 , b l 4 } , the pixel value is in fact { 2 7 b m 1 + 2 6 b m 2 + 2 5 b m 3 + 2 4 b m 4 + 2 3 b l 1 + 2 2 b l 2 + 2 1 b l 3 + 2 0 b l 4 } . Finally, we can get the recovered ith secret image, and the recovery of other secret images can be realized in the same manner.
In step 1 and 2, we collect the qualified personal shares responding to Q S i , and the universal share is also collected. The matrices of the shares are divided into the MSB part and the LSB part, and the recovery can be realized by Equations (42) and (44). The example is shown as below.
Example 3.
As shown in example 1, in the secret sharing process, the personal shares {PS1, PS2, PS3, PS4} are distributed to the personal owners and the universal shares {US1, US2,US3, US4} are kept by the committee members with high privilege. The qualified access is P q u a l = { Q S 1 , Q S 2 , Q S 3 , Q S 4 } , and Q S 1 = { 1 , 2 , 3 } , Q S 2 = { 1 , 4 } , Q S 3 = { 2 , 4 } , Q S 4 = { 3 , 4 } , which is the same as the sharing process. The secret image recovery process is shown as below, take the recovery of the first secret image for example.
Get the according universal share UO1, change the pixel expression value into the bits expression.
U G 2 × 2 1 = ( 125 129 152 86 )
U g 2 × 2 1 = ( 01111101 10000001 10011000 01010110 )
Split each pixel into 2 parts, so the matrix about MSB and LSB is as shown below:
U M 2 × 2 1 = ( 0111 1000 1001 0101 )
E T U 2 × 2 1 = ( 1101 0001 1000 0110 )
Apply the Arnold inverse transform on E T U A × B i to get T U A × B i , and T U A × B 1 = ( 0001 1000 0110 1101 ) .
As the qualified subset Q S 1 = { 1 , 2 , 3 } , collect the 1st, 2nd, and 3rd personal shares, and obtain the matrices of MSBs:
P M 2 × 2 1 = ( 0101 1100 0110 1001 )
P M 2 × 2 2 = ( 1110 1000 1010 0010 )
P M 2 × 2 3 = ( 0100 0110 0111 1100 )
Thus, we can get S M 2 × 2 1 based on the Equation (42).
S M 2 × 2 1 = T U 2 × 2 1 + P M 2 × 2 1 + P M 2 × 2 2 + P M 2 × 2 3 + U M 2 × 2 1 = ( 0001 1000 0110 1101 ) + ( 0101 1100 0110 1001 ) + ( 1110 1000 1010 0010 ) + ( 0100 0110 0111 1100 ) + ( 0111 1000 1001 0101 ) = ( 1001 0010 0100 1111 )
Additionally, as the essential id i d 1 = 2 , extract the 4 LSBs of the 2nd personal share to get E T P 2 × 2 2 = ( 0110 0101 1110 1100 ) . Apply the Arnold inverse transform on E T P 2 × 2 2 to get T P 2 × 2 2 , and T P 2 × 2 2 = ( 0101 1110 1100 0110 ) , and we can get S L 2 × 2 1 based on Equation (44).
S L 2 × 2 1 = T P 2 × 2 2 + P M 2 × 2 1 + P M 2 × 2 3 + U M 2 × 2 1 = ( 1010 0011 0101 0111 )
Then, join the element of the matrix S M 2 × 2 1 and the element of the matrix S L 2 × 2 1 in the same position to get the bits expression of the first secret RS1,
O M 2 × 2 1 = ( 10011010 00100011 01000101 11110111 )
Finally, transform the element of O M 2 × 2 1 into a decimal number to obtain the pixel value matrix of the first secret image:
R S 1 = ( 154 35 69 247 )
The other secret images can be recovered in the same way according to their qualified subsets.

5. Proof and Analysis

5.1. Correctness Proof

Theorem 1.
The secret images can be successfully recovered by the personal shares in the qualified subset in P q u a l and the universal shares.
In other words, we need to prove that each secret image OSi can be recovered by the personal shares according to the qualified subset Q S i , Q S i = { i 1 , i 2 , , i t } and the universal share USi, i [ 1 , n ] .
As shown in the secret sharing process, all the images are turned into the matrix form after transforming the pixel between 0 to 255 into the element with 8 bits in GF(28) from the point of mathematics. The matrix O M A × B i about the secret image OSi is divided into two matrix S M A × B i about the MSB part and S L A × B i about the LSB part. Thus, in the recovery process we need to recover the two matrices.
Each of the prepared random selected images POi corresponding to Q S i = { i 1 , i 2 , , i t } are also divided into two parts in the same way as the secret image. The MSB matrices are denoted as the P M A × B i j , and the LSB matrices are P L A × B i j , j [ 1 , n ] . The matrix P M A × B i j of the MSB part will participate in the sharing, and the LSB space is reserved.
Another prepared image for the universal share UOi is also divided into U M A × B i and U L A × B i respectively.
The matrices’ computation for the secret image and the prepared images for the personal shares and the universal share are shown as below in Equation (12),
T U A × B i = S M A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i
Then the Arnold transform is applied on T U A × B i and the scrambling matrix E T U A × B i is generated. Based on the basic idea that the LSBs have the little effect on the image quality, the LSBs of the UOi can be replaced by E T U A × B i and will not effect on the meaning of the image, so we can get the universal share USi.
Another operation for the LSB part of the secret image is executed as below in Equation (15):
T P A × B i d i = S L A × B i + P M A × B i g 1 + + P M A × B i g t 1 + U M A × B i
where { i g 1 , , i g t 1 } = G P , G P = { G P | G P i d i = Q S i , i d i G P } , Q S i = { i 1 , i t } .
And the matrix T P A × B i d i is scrambled into E T P A × B i d i by the Arnold transform.
From the definition of the essential id, each Q S i has an only essential id, and the i d i for the Q S i is different from the others; if i j , i d i i d j , then each Q S i has a different essential i d i , so for each qualified subset, the 4-bits elements of T P A × B i d i can be used to replace the LSBs of the i d i th image in {PO1, PO2, …, POn}, so we can get the final i d i th personal share P S i d i .
In the recovery process, the owners of personal shares of Q S i = { i 1 , i 2 , , i t } participate in the recovery, they offer the personal shares PSi1, PSi2, …, PSit, and the corresponding universal share USi is obtained from the universal panel, so we can get the matrices P M A × B i 1 , P M A × B i 2 , , P M A × B i t from PSi1, PSi2, , PSit, and T U A × B i , U M A × B i can be obtained from the USi.
As shown in Equation (12), the share generation can be expressed as follows:
0 = T U A × B i + S M A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i
Move S M A × B i to another side of the equation to get the expression of S M A × B i as shown below:
S M A × B i = T U A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i
In fact, Equation (59) used in the recovery, by which we can retrieve the MSB part of the secret image of OSi.
As in Equation (15), the share generation can be expressed as below:
0 = T P A × B i d i + S L A × B i + P M A × B i g 1 + + P M A × B i g t 1 + U M A × B i
Move S L A × B i to another side of the equation to get the expression of S L A × B i as shown below:
S L A × B i = T P A × B i d i + P M A × B i g 1 + + P M A × B i g t 1 + U M A × B i
where { i g 1 , , i g t 1 } = G P , G P = { G P | G P i d i = Q S i , i d i G P } , Q S i = { i 1 , i t } .
In fact, Equation (44) is used in the recovery, by which we can retrieve the LSB part of the secret image of OSi.
Combining the S M A × B i and S L A × B i together, we can get the exact pixel value of the secret image, and the secret image RSi is recovered, which is the same as the original secret image OSi.

5.2. Security Analysis

In this section, we will discuss the security of the proposed multi secret sharing scheme through theoretical analyses.
Theorem 2.
The personal are meaningful and the security of the share are reasonably good.
Regarding the personal shares, they are generated by the prepared meaningful images {PO1, PO2, …, POn} which are selected randomly from lots of images. Although all the shares are not meaningless shares in which the pixels values are random, they still have strong randomness, so it is hard to know which images will be selected from a set of images.
From the point of the visual assessment, the replacement of LSBs has little influence on the visual quality of the image; the change is so minuscule it can barely be detected by the human visual system. An example of the original image and the modified image of 4 LSBs is shown in Figure 1.
From the comparison in Figure 1, we can see that the modified image is still a meaningful image that looks like a nature image and it is almost the same as the original image.
The high security of the personal shares can be ensured by two aspects.
Firstly, the personal shares with 4 LSBs replaced by the elements in the matrix E T P A × B i are meaningful as the nature images, so they can avoid attracting any adversary’s attention more so than the random meaningless shares.
Secondly, from the point of the computation analysis, the MSBs of the personal share are the original bits of the original image, and the LSBs are E T P A × B i which is the random permutation result of T P A × B i , T P A × B i d i = S L A × B i + P M A × B i g 1 + + P M A × B i g t 1 + U M A × B i ; if one participant intends to analyze the single personal share to get some information about S L A × B i , from the generation of T P A × B i , he needs to get the MSB information { P M A × B i 2 , , P M A × B i t } about the other qualified personal shares and the MSB information { U M A × B i } about the according universal share. Without the help of this information, only use { T P A × B i d i , P M A × B i d i }, the single personal share cannot retrieve the secret information, so it is not possible to analyze the content or the bits of the single personal share to get any information about the secret image. Furthermore, the result of Equation (15) is permuted and embedded; the embedded bits are scrambled, and it is hard to get the original bits because it is not known which transform is used.
Theorem 3.
The universal shares are meaningful, and the security of the shares are reasonably good.
For the universal shares, they still have strong randomness because the prepared images {UO1, UO2, …, UOn} are selected randomly from lots of images. Also, the universal share UOi is still meaningful image as a nature image and is almost the same as the original image USi, i [ 1 , n ] .
The high security of the universal shares can be ensured by three point.
First, the universal shares are kept by the committee members with high privilege, who are trusted. The universal share for each qualified subset only can be used after the authentication, or in the recovery where the committee members take the universal share and participate in the recovery.
Secondly, the universal share looks like the nature image, which can avoid attracting the adversary’s attention more so than the random meaningless shares.
Thirdly, from the point of the computation analysis, the LSBs of the pixels are E T U A × B i which is the random permutation result of T U A × B i . They are scrambled and it is hard to get the original bits because the transform is unknown. From the generation of T U A × B i , T U A × B i = S M A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i , the MSB part S M A × B i the MSB information { P M A × B i 1 , P M A × B i 2 , , P M A × B i t } about the other qualified personal shares and the MSB information { U M A × B i } about the according universal share take part in the generation. If one committee member intends to analyze the single universal share to get some information about S M A × B i , from the generation of T U A × B i , he can get the MSB information { U M A × B i } about the universal share, he still needs to get the MSB information { P M A × B i 1 , P M A × B i 2 , , P M A × B i t } about the qualified personal shares. Without the information of personal share, he can only use { T U A × B i , U M A × B i } about the single universal share and cannot retrieve the secret information. It is established that even the qualified subset is very simple. Since there must be an essential id idi for the qualified subset Q S i , there is at least one matrix P M A × B i d i and the U M A × B i participating in the generation of T U A × B i , so T U A × B i S M A × B i . After applying the Arnold transform to T U A × B i , the embedded bits are the scrambling bits, so the MSB bits of the secret images will not be revealed directly and are hard to be calculated.
It is also not possible to use different universal shares to reveal some information about the secret images, because each T U A × B i is scrambling by the Arnold transform and XOR. Two or more universal shares only can get some useless random permutation result on E T U A × B i .
Theorem 4.
The shares of the part of each subset Q S i cannot reveal the information about the secret image.
Suppose the qualified subset is Q S i = { i 1 , i 2 , , i t } , and the subset of Q S i is { i 1 , i 2 , , i w } , where w < t , { i 1 , i 2 , , i w } { i 1 , i 2 , , i t } . From the definition of the minimum qualified subset, Q Q , and Q P q u a l , Q P q u a l . As the P q u a l is the minimum qualified subset, for any part of the subset of the qualified subset Q S i , it is not possible to be a qualified access.
From the generation equation of the personal shares for the subset Q S i = { i 1 , i 2 , , i t } , T U A × B i = S M A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i t + U M A × B i , we can derive that, for the { i 1 , i 2 , , i w } , where w < t , S M A × B i T U A × B i + P M A × B i 1 + P M A × B i 2 + + P M A × B i w ; thus, it cannot recover the secret image OSi for { i 1 , i 2 , , i w } , where w < t for the secret image.
Theorem 5.
The shares according to the forbidden subset F S i cannot reveal any information about the secret image.
From the definition of the forbidden subset, P f o r b i d = { F S 1 , F S 2 , , F S m } , where F S i is the ith forbidden subset i [ 1 , m ] , F S j = { j 1 , j 2 , , j r } , which means the j 1 th, j 2 th, …, j r th owner is forbidden from recovering the secret, so we can know that the shares in the forbidden subset obviously cannot retrieve any information about the secret images.

6. Experiments

In this part, some experiments about the performance of the sharing and the recovery are given to evaluate the proposed multi secret sharing scheme with general access structure.

6.1. Secret Sharing and Recovery

Suppose there are 4 secret images with 256 gray level {OS1, OS2, OS3, OS4} to be shared, there are 4 participators O W = { O W 1 , O W 2 , O W 3 , O W 4 } , the qualified part P q u a l = { Q S 1 , Q S 2 , Q S 3 , Q S 4 } , and Q S 1 = { 1 , 2 , 3 } , Q S 2 = { 1 , 4 } , Q S 3 = { 2 , 4 } , Q S 4 = { 3 , 4 } as shown in Example 2.
The secret images are shown in Figure 2.
Randomly select 4 gray images {PO1, PO2, PO3, PO4} with the same size as the secret image. The images are shown in Figure 3.
Select another 4 gray images randomly {UO1, UO2, UO3, UO4} with the same size. The images are shown in Figure 4.
Select the essential id of the qualified subsets, { i d 1 , i d 2 , i d 3 , i d 4 } = {2, 1, 4, 3}.
Transform the secret images {OS1, OS2, OS3, OS4} and the randomly selected images {PO1, PO2, PO3, PO4} and {UO1, UO2, UO3, UO4} into the matrix format over GF(28), get the matrix S M A × B i about the MSB part of the secret image OSi, the matrix S L A × B i about the LSB part of the secret image OSi, the matrix P M A × B i about the MSB part of the image POi, the matrix U M A × B i about the MSB part of the secret image USi, i [ 1 , 4 ] , and execute the additional operation as per Equations (12) and (15) to get T U A × B i and T P A × B i d i . After the Arnold transform and the bits replacement in Algorithm 1, we can get the final personal shares {PS1, PS2, PS3, PS4} and the universal shares{US1, US2, US3, US4}, which are shown in Figure 5 and Figure 6.
The universal shares are shown in Figure 6.
The personal shares are distributed to the owners; each owner OWi owns a personal share PSi, and the universal shares USi are kept by the committee members with high privilege.
In the recovery process, each secret image can be recovered based on the qualified subset. To recover the ith secret image, the owners according to the qualified subset Q S i offer their share images {PSi1, PSi2, …, PSit}, and retrieve the universal share UOi after the verification, or the committee members participate in the recovery by taking the universal share UOi and execute the matrix operation as shown in Algorithm 3. The retrieved secret images are shown in Figure 7a–d. Figure 7a is the recovered 1th secret image QS1 used the personal shares{PS1, PS2, PS3} and the universal share US1, Figure 7b is the recovered 2th secret image QS2 used the personal shares{PS1, PS4} and the universal share US2, Figure 7c is the recovered 3th secret image QS3 used the personal shares{PS2, PS4} and the universal share US3, Figure 7d is the recovered 4th secret image QS4 used the personal shares{PS3, PS4} and the universal share US4.
From the experiments results, we can see that all the personal share images and the universal share images are meaningful and look like the nature image, and the recovered secret image is exactly the same as the original secret image.

6.2. Analysis about the Experiments

Although all the shares and the recovered secret image can be recognized easily by the human visual system, we still evaluate the performance of the quality of the shares and the recovered secret images by quantitative analysis. To measure the quality of the share images and the recovered images, the peak signal-to-noise rate (PSNR) is used. The PSNR can evaluate the quality of the modified image compared to the original image, and in general the quality of the image is better if the PSNR is higher.
P S N R = 10 log 10 ( 255 2 M S E ) d B
where MSE is the mean-square error of the image with the size of r o w × c o l . Suppose the pixel value of the modified image and the original image are p ( i , j ) and P ( i , j ) respectively, MSE can be expressed as:
M S E = 1 r o w × c o l i = 1 r o w j = 1 c o l ( P ( i , j ) p ( i , j ) ) 2
The PSNR of the personal share images in the experiments are shown in Table 1.
Moreover, the PSNR of the universal share images in the experiment are shown in Table 2.
From the result we can see that the PSNR value of the shares which the 4 LSBs are replaced is about 32 dB. From the point of image process, if PSNR is bigger than 30 dB, we generally consider the quality is good enough to be recognized, and there is tiny difference between the original prepared images and the generated personal share images as shown in Figure 3 and Figure 5, and the original images and the universal shares is also almost looks like the same as shown in Figure 4 and Figure 6.
The quality of the recovered secret images are shown as the Table 3.
From Table 3, we can see that all the PSNR of the recovered secret images result is ; this is because that the recovered secret images can be exactly the same as the original secret images from the theoretical analysis and the experiment results, which means there is no lossless in the recovery as shown in Figure 7.
In the secret sharing scheme, to measure the correlation between the secret image and the share image, we use the SSIM (structural similarity index measure) [49] to evaluate the similarity between the different images. SSIM uses the structure combined with the luminance and the contrast to measure the similarity. The value of SSIM is between 0 to 1, and the lower SSIM means that there is less similarity. In this part, we evaluate the similarity between the secret images and all the personal and universal shares. The result is shown in Table 4.
From the table, we can observe that the similarity between the secret images and the share images are very low and close to 0, so the shares have nearly no similarity with the secret images.

7. Discussion

There are different methods to construct the different kinds of multi secret sharing schemes with different properties; as such, in this part we will compare our proposed scheme with the typical multi secret sharing schemes from the secret image type, the pixel expansion, access type, the operation type, meaningful share, and lossless recovery.
The secret image type means that the secret images can be binary or gray or color image; the pixel expansion means if the size of the share is bigger than the size of the secret image; access type means that the access is the threshold access or the general access; the operation means that the mathematics computation methods are used in the schemes; meaningful share determines if the shares are meaningful or not; and the lossless recovery determines if the quality of the recovered secret images is lossless or not. The comparison is shown in Table 5.
From the comparison of the schemes we can see that, compared with the multi secret sharing schemes based on the visual cryptography, our proposed multi image secret sharing scheme has better performance in terms of the pixel expansion, recovery quality, secret image type, meaningful share, and more general access. It is not like visual cryptography, which does not need any external device and the secret is obtained by overlapping the printed transparent shares. The proposed scheme need to execute the Boolean operations for the pixels of the images with the help of the computers, so it is more complex than the visual cryptography method. Compared with the multi secret sharing schemes based on the polynomial or other algebraic method, it also has the advantages of more simple computation, meaningful share, and more general access. Compared with other Boolean based multi secret sharing schemes, our method can realize more flexible general access not restricted on the fixed (n, n) or other threshold, and all the shares are meaningful which is not achieved in other methods. Moreover, the quality of the share images is higher than 30 dB which is good enough, the recovery is lossless and is exactly the same as the original secret images. In this paper, we focus on describing the construction of the sharing and recovery process from the point of mathematics operation. However, there are still some point in the proposed scheme that can be improved for example, the 4 LSBs of the original prepared images are replaced in the generation of personal shares and the universal share. In the future we can use some method to reduce the embedded data and obtain a better steganography method to make the embedding more unnoticeable.

8. Conclusions

In this paper, we proposed a multi secret sharing scheme with the general access structure based on the Boolean operation. There is no pixel expansion as in visual cryptography, and the recovery is lossless. Also, there is no distortion in the recovered secret images, and one secret image can be recovered by the owners in the qualified subset, or all the secret images can be recovered by all the owners. All the shares including the personal shares and the universal shares are meaningful and the quality is good enough which will not attract the attention of any adversaries. Furthermore, our scheme can be easily extended to the color images, which will be the focus of our future work.

Author Contributions

Conceptualization, H.C.; Methodology, H.C.; Supervision, D.T.; Validation, D.T.; Writing of original draft, H.C. The authors contributed equally to the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Sichuan Province Science and Technology Support Program (China), grant number 2020YFG0150 and 2019YFG0103.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  2. Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA, 4–7 June 1979; IEEE Computer Society: Washington, DC, USA, 1979. [Google Scholar]
  3. Harn, L.; Lin, C. Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Comput. 2010, 59, 842–846. [Google Scholar] [CrossRef]
  4. Naor, M.; Wool, A. Access control and signatures via quorum secret sharing. IEEE Trans. Parallel Distrib. Syst. 1998, 9, 909–922. [Google Scholar] [CrossRef] [Green Version]
  5. Liu, Y.; Yang, C.; Sun, Q. Thresholds based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management. IEEE Trans. Intell. Transp. Syst. 2020. [Google Scholar] [CrossRef]
  6. Ermakova, T.; Fabian, B. Secret Sharing for Health Data in Multi-provider Clouds. IEEE Conf. Bus. Inform. 2013, 93–100. [Google Scholar] [CrossRef]
  7. Ogiela, M.R.; Ogiela, L. Cognitive Keys in Personalized Cryptography. IEEE Int. Conf. Adv. Inf. Netw. Appl. 2017, 1050–1054. [Google Scholar] [CrossRef]
  8. Ogiela, M.R.; Ogiela, L. Cognitive cryptography techniques for intelligent information management. Int. J. Inf. Manag. 2018, 40, 21–27. [Google Scholar] [CrossRef]
  9. Ogiela, L.; Ogiela, M.R. Bio-Inspired Cryptographic Techniques in Information Management Applications. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 1059–1063. [Google Scholar] [CrossRef]
  10. Ogiela, M.R.; Ogiela, L. On using cognitive models in cryptography. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, 23–25 March 2016. [Google Scholar]
  11. Naor, M.; Shamir, A. Visual Cryptography. Lect. Notes Comput. ENCE 1994, 950, 1–12. [Google Scholar] [CrossRef] [Green Version]
  12. Yang, C.N. New visual secret sharing schemes using pro babilistic method. Pattern Recognit. Lett. 2004, 25, 481–494. [Google Scholar] [CrossRef]
  13. Shyu, S.J. Image encryption by random grids. Pattern Recognit. 2007, 40, 1014–1031. [Google Scholar] [CrossRef]
  14. Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
  15. Wang, D.; Zhang, L.; Ma, N. Two secret sharing schemes based on Boolean operations. Pattern Recognit. 2007, 40, 2776–2785. [Google Scholar] [CrossRef]
  16. Liu, Y.; Yang, C.; Wu, S.; Chou, Y. Progressive (k,n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process. Image Commun. 2018, 77–86. [Google Scholar] [CrossRef]
  17. Yan, X.; Wang, S.; Abd El-Latif, A.A.; Niu, X. Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimed. Tools Appl. 2015, 74, 3231–3252. [Google Scholar] [CrossRef]
  18. Han, Y.; He, W.; Dong, H. A verifiable visual cryptography scheme based on XOR algorithm. In Proceedings of the 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China, 9–11 November 2012. [Google Scholar]
  19. Verma, M.; Rani, R. Strong threshold secret image sharing based on Boolean operation. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, 29–30 April 2016. [Google Scholar]
  20. Wang, Z.; Jin, H.; Wang, X. An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation. Int. J. Netw. Secur. 2014, 16, 487–493. [Google Scholar]
  21. Isha, M.P.; Dadvi, G.D. Encrypting multiple images using visual secret sharing scheme. Int. J. Sci. Res. (IJSR) 2014, 3, 107–111. [Google Scholar]
  22. Weir, J.; Yan, W. Sharing multiple secrets using visual cryptography. IEEE Int. Symp. Circuits Syst. IEEE 2009. [Google Scholar] [CrossRef]
  23. Aarti, A. Multiple Secret Sharing Scheme with Gray-Level Mixing using EVCS. In Proceedings of the International Conference on Issues and Challenges in Networking, Intelligence and Computing Technologies (ICNICT-2012), Ghaziabad, India, 7–8 September 2012. [Google Scholar]
  24. Wang, K.; Zou, X.; Sui, Y. A Multiple Secret Sharing Scheme based on Matrix Projection. IEEE Int. Comput. Softw. Appl. Conf. IEEE Comput. Soc. 2009, 400–405. [Google Scholar] [CrossRef]
  25. Fereshte, S. Reviewing multiple secret image sharing scheme based on matrix multiplication. Int. J. Comput. Technol. Appl. 2013, 4, 494–501. [Google Scholar]
  26. Yang, C.-C.; Chang, T.-Y.; Hwang, M.-S. A (t,n) multi-secret sharing scheme. Appl. Math. Comput. 2004, 151, 483–490. [Google Scholar] [CrossRef]
  27. Adachi, T.; Okazaki, C. A Multi-Secret Sharing Scheme with Many Keys Based on Hermite Interpolation. J. Appl. Math. Phys. 2014, 2, 1196–1201. [Google Scholar] [CrossRef] [Green Version]
  28. Harn, L.; Hsu, C.-F. (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial. Wirel. Pers. Commun. 2017. [Google Scholar] [CrossRef]
  29. Chang, C.C.; Huynh, N.T.; Le, H.D. Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation. Signal Process. 2014, 99, 159–170. [Google Scholar] [CrossRef]
  30. Deshmukh, M.; Nain, N.; Ahmed, M. A Novel Approach for Sharing Multiple Color Images by Employing Chinese Remainder Theorem. J. Vis. Commun. Image Represent. 2017, 49, 291–302. [Google Scholar] [CrossRef]
  31. Rajput, M.; Deshmukh, M. Secure (n, n + 1)-Multi Secret Image Sharing Scheme Using Additive Modulo. Procedia Comput. ENCE 2016, 89, 677–683. [Google Scholar] [CrossRef] [Green Version]
  32. Chen, T.H.; Wu, C.S. Efficient multi-secret image sharing based on Boolean operations. Signal Process. 2011, 91, 90–97. [Google Scholar] [CrossRef]
  33. Chen, C.C.; Wu, W.J. A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 2014, 92, 107–114. [Google Scholar] [CrossRef]
  34. Yang, C.-N.; Hua, C. Enhanced Boolean-based multi secret image sharing scheme. J. Syst. Softw. 2016. [Google Scholar] [CrossRef]
  35. Chen, C.C.; Chen, J.L. A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J. Inf. Secur. Appl. 2017, 33, 45–54. [Google Scholar] [CrossRef]
  36. Deshmukh, M.; Nain, N.; Ahmed, M. Efficient and secure multi secret sharing schemes based on Boolean XOR and arithmetic modulo. Multimed. Tools Appl. 2016. [Google Scholar] [CrossRef]
  37. Kabirirad, S.; Eslami, Z. Improvement of (n,n)-Multi-Secret Image Sharing Schemes Based on Boolean Operations. J. Inf. Secur. Appl. 2019, 47, 16–27. [Google Scholar] [CrossRef]
  38. Prasetyo, H.; Guo, J.M. A Note on Multiple Secret Sharing Using Chinese Remainder Theorem and Exclusive-OR. IEEE Access 2019, 7, 37473–37497. [Google Scholar] [CrossRef]
  39. Wu, X.; Lai, Z.R. Random grid based color visual cryptography scheme for black and white secret images with general access structures. Signal Process. Image Commun. 2019, 75, 100–110. [Google Scholar] [CrossRef]
  40. Lian, C.; Pang, L.; Liang, J. Generalized Random Grid-Based Visual Secret Sharing for General Access Structures. Comput. J. 2015, 58, 2426. [Google Scholar] [CrossRef]
  41. Das, A.; Adhikari, A. An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 2010, 23, 993–996. [Google Scholar] [CrossRef] [Green Version]
  42. Yan, X.; Lu, Y. Progressive visual secret sharing for general access structure with multiple decryptions. Multimed. Tools Appl. 2017, 77, 1–20. [Google Scholar] [CrossRef]
  43. Nag, A.; Singh, J.P.; Singh, A.K. An efficient Boolean based multi-secret image sharing scheme. Multimed. Tools Appl. 2019, 1–25. [Google Scholar] [CrossRef]
  44. Fang, W.; Lin, J. Universal share for the sharing of multiple images. J. Chin. Inst. Eng. 2007, 30, 753–757. [Google Scholar] [CrossRef]
  45. Meghrajani, Y.K.; Mazumdar, H.S. Universal Share for Multisecret Image Sharing Scheme Based on Boolean Operation. IEEE Signal Process. Lett. 2016, 23, 1429–1433. [Google Scholar] [CrossRef]
  46. Chen, T.; Wu, X. Multiple secret image sharing with general access structure. Multimed. Tools Appl. 2020, 1–19. [Google Scholar] [CrossRef]
  47. Rudolf, L.; Harald, N. Finite Fields, 2nd ed.; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
  48. Arnol’d, V.I. Ergodic Problems of Classical Mechanics; Benjamin: New York, NY, USA, 1968. [Google Scholar]
  49. Wang, Z.; Bovik, A.C.; Sheikh, H.R.; Simoncelli, E.P. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. The figures of the original image and the modified image: (a) the original gray image with 256 gray level; (b) the modified image with the replacement of the 4 LSBs.
Figure 1. The figures of the original image and the modified image: (a) the original gray image with 256 gray level; (b) the modified image with the replacement of the 4 LSBs.
Mathematics 08 01582 g001
Figure 2. The figures of the secret images: (a) the secret image OS1; (b) the secret image OS2; (c) the secret image OS3; (d) the secret image OS4.
Figure 2. The figures of the secret images: (a) the secret image OS1; (b) the secret image OS2; (c) the secret image OS3; (d) the secret image OS4.
Mathematics 08 01582 g002
Figure 3. The random selected gray images: (a) the gray image PO1; (b) the gray image PO2; (c) the gray image PO3; (d) the gray image PO4.
Figure 3. The random selected gray images: (a) the gray image PO1; (b) the gray image PO2; (c) the gray image PO3; (d) the gray image PO4.
Mathematics 08 01582 g003
Figure 4. The random selected gray images: (a) the gray image UO1; (b) the gray image UO2; (c) the gray image UO3; (d) the gray image UO4.
Figure 4. The random selected gray images: (a) the gray image UO1; (b) the gray image UO2; (c) the gray image UO3; (d) the gray image UO4.
Mathematics 08 01582 g004aMathematics 08 01582 g004b
Figure 5. The personal share images: (a) the personal share PS1; (b) the personal share PS2; (c) the personal share PS3; (d) the personal share PS4.
Figure 5. The personal share images: (a) the personal share PS1; (b) the personal share PS2; (c) the personal share PS3; (d) the personal share PS4.
Mathematics 08 01582 g005aMathematics 08 01582 g005b
Figure 6. The universal share images: (a) the universal share US1; (b) the universal share US2; (c) the universal share US3; (d) the universal share US4.
Figure 6. The universal share images: (a) the universal share US1; (b) the universal share US2; (c) the universal share US3; (d) the universal share US4.
Mathematics 08 01582 g006
Figure 7. The recovered secret images: (a) the recovered secret image RS1 by the qualified subset QS1; (b) the recovered secret image RS2 by the qualified subset QS2; (c) the recovered secret image RS3 by the qualified subset QS3; (d) the recovered secret image RS4 by the qualified subset QS4.
Figure 7. The recovered secret images: (a) the recovered secret image RS1 by the qualified subset QS1; (b) the recovered secret image RS2 by the qualified subset QS2; (c) the recovered secret image RS3 by the qualified subset QS3; (d) the recovered secret image RS4 by the qualified subset QS4.
Mathematics 08 01582 g007
Table 1. The quality evaluation of the personal shares by peak signal-to-noise rate (PSNR).
Table 1. The quality evaluation of the personal shares by peak signal-to-noise rate (PSNR).
The Personal Share PSNR
PS131.62 dB
PS232.02 dB
PS331.84 dB
PS430.58 dB
Table 2. The quality evaluation of the universal shares by PSNR.
Table 2. The quality evaluation of the universal shares by PSNR.
The Universal Share PSNR
US131.83 dB
US231.84 dB
US331.75 dB
US431.63 dB
Table 3. The quality evaluation of the recovered secret images by PSNR.
Table 3. The quality evaluation of the recovered secret images by PSNR.
The Recovered Secret Images PSNR
RS1
RS2
RS3
RS4
Table 4. The structural similarity index measure (SSIM) between the secret images and the shares.
Table 4. The structural similarity index measure (SSIM) between the secret images and the shares.
PS1PS2PS3PS4US1US2US3US4
OS10.04210.05910.05280.02310.05600.06200.05430.0602
OS20.01630.02500.03420.01960.02800.07760.03220.0261
OS30.0678 0.07820.08740.04060.09920.07150.08820.0842
OS40.08160.06790.08110.04450.07580.06930.08410.0883
Table 5. The comparison about the different multi secret sharing schemes.
Table 5. The comparison about the different multi secret sharing schemes.
The SchemesSecret ImagePixel ExpansionAccess typeOperationMeaningful ShareLossless Recovery
Weir, J [22]Binaryyes(n, n)OR nono (low quality)
Chang C C [29]Gray or colorno(k, n)Chinese remainder mathod and Lagrange interpolationnoyes
Rajput M [31]Gray or colorno(n, n+1)Additive Modulo(256)nono
Chen [32]Binary or grayno(n+1, n+1)XORnoyes
Chen [33]Grayno(n, n)XORno yes
Yang C N [34]Grayno(n, n)XOR and bit shiftnoyes
Chen C C [35]Gray (different size)no(n, n)XOR and hashnoyes
Deshmukh M [36]Grayno(n, n)XOR and arithmetic modulonoyes
Kabirirad S [37]Grayno(n, n)XORnoyes
Nag A [43]GraynoGeneral accessXORnoyes
Chen T [46]Gray noGeneral accessXORnoyes
Proposed schemeGray or colornoGeneral accessXORyes (good enough)yes

Share and Cite

MDPI and ACS Style

Cai, H.; Tang, D. Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares. Mathematics 2020, 8, 1582. https://doi.org/10.3390/math8091582

AMA Style

Cai H, Tang D. Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares. Mathematics. 2020; 8(9):1582. https://doi.org/10.3390/math8091582

Chicago/Turabian Style

Cai, Hongliang, and Dan Tang. 2020. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares" Mathematics 8, no. 9: 1582. https://doi.org/10.3390/math8091582

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop