Abstract
Secret image sharing denotes a technique for apportioning secret images into \( n \) shadow images and preserving in \( n \) participants as the extension of secret sharing on images. Compared to Shamir’s scheme-based secret image sharing, Chinese remainder theorem-based secret imaging has the advantages as lossless recovery, no further encryption, and low recovery computation complexity. However, traditional secret sharing schemes based on the Chinese remainder theorem have shortcomings including no \( \left( {t, n} \right) \) threshold, lossy recovery, ignoring image features or further encryption. In this paper, a \( \left( {t, n} \right) \) secret image sharing scheme is suggested based on Chinese remainder theorem over a polynomial ring realizing no further encryption and lossless recovery and making the pixel values of shadow images randomly distribute \( \left[ {0, 255} \right] \). The effectiveness of the suggested scheme will be demonstrated by experiments and analyses later.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(1), 765–771 (2002)
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371–375. Springer, Heidelberg (1983). https://doi.org/10.1007/3-540-39466-4_27
Yan, W., Ding, W., Dongxu, Q.: Image sharing based on Chinese remainder theorem. J. North China Univ. Tech. 12(1), 6–9 (2000)
Shyu, S.J., Chen, Y.R.: Threshold secret image sharing by Chinese remainder theorem. In: IEEE Asia-Pacific Services Computing Conference, 9–12, pp. 1332–1337 (2008)
Stinson, D.: Cryptography: Theory and Practice. CRC Press, CRC Press LCC, Boca Raton (1995). ISBN 0849385210
Ulutas, M., Nabiyev, V.V., Ulutas, G.: A new secret sharing technique based on asmuth bloom’s scheme. In: IEEE International Conference on Application of Information and Communication Technologies, 1–5, pp. 14–16 (2009)
Lambert, M.S., Miriam, T.T., Susan, F.M.: Secret Sharing Using the Chinese Remainder Theorem. Betascript Publishing,(2010)
Blakley, G.R.: Safeguarding Cryptographic Keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313–317 (1979)
Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600–1610 (2010)
Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3), 441–453 (2012)
Hu, C., Liao, X., Xiao, D.: Secret image sharing based on chaotic map and chinese remainder theorem. Int. J. Wavelets Multiresolut. Inf. Process. 10(3), 1250023 (2012)
Chuang, T.W., Chen, C.C., Chien, B.: Image sharing and recovering based on chinese remainder theorem. In: International Symposium on Computer, Consumer and Control (IS3C), pp. 817–820 (2016)
Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H.: Chinese remainder theorem-based secret image sharing for (k, n) threshold. In: Sun, X., Chao, H.-C., You, X., Bertino, E. (eds.) ICCCS 2017. LNCS, vol. 10603, pp. 433–440. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68542-7_36
Ning, Y., Miao, F.Y., Huang, W.C., Meng, K.J., Xiong, Y., Wang, X.F.: Constructing ideal secret sharing schemes based on Chinese remainder theorem. In: Asiacrypt (2018)
Acknowledgments
The work was supported by the National Natural Science Foundation of China (No. 61572454, 61520106007). We thank the editors and anonymous reviewers for giving us many constructive comments that significantly improved the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, S., Miao, F. (2020). Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-62223-7_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62222-0
Online ISBN: 978-3-030-62223-7
eBook Packages: Computer ScienceComputer Science (R0)