Skip to main content

Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12486))

Included in the following conference series:

  • 1245 Accesses

Abstract

Secret image sharing denotes a technique for apportioning secret images into \( n \) shadow images and preserving in \( n \) participants as the extension of secret sharing on images. Compared to Shamir’s scheme-based secret image sharing, Chinese remainder theorem-based secret imaging has the advantages as lossless recovery, no further encryption, and low recovery computation complexity. However, traditional secret sharing schemes based on the Chinese remainder theorem have shortcomings including no \( \left( {t, n} \right) \) threshold, lossy recovery, ignoring image features or further encryption. In this paper, a \( \left( {t, n} \right) \) secret image sharing scheme is suggested based on Chinese remainder theorem over a polynomial ring realizing no further encryption and lossless recovery and making the pixel values of shadow images randomly distribute \( \left[ {0, 255} \right] \). The effectiveness of the suggested scheme will be demonstrated by experiments and analyses later.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  2. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(1), 765–771 (2002)

    Article  Google Scholar 

  3. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)

    Article  MathSciNet  Google Scholar 

  4. Mignotte, M.: How to share a secret. In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371–375. Springer, Heidelberg (1983). https://doi.org/10.1007/3-540-39466-4_27

    Chapter  Google Scholar 

  5. Yan, W., Ding, W., Dongxu, Q.: Image sharing based on Chinese remainder theorem. J. North China Univ. Tech. 12(1), 6–9 (2000)

    Google Scholar 

  6. Shyu, S.J., Chen, Y.R.: Threshold secret image sharing by Chinese remainder theorem. In: IEEE Asia-Pacific Services Computing Conference, 9–12, pp. 1332–1337 (2008)

    Google Scholar 

  7. Stinson, D.: Cryptography: Theory and Practice. CRC Press, CRC Press LCC, Boca Raton (1995). ISBN 0849385210

    Google Scholar 

  8. Ulutas, M., Nabiyev, V.V., Ulutas, G.: A new secret sharing technique based on asmuth bloom’s scheme. In: IEEE International Conference on Application of Information and Communication Technologies, 1–5, pp. 14–16 (2009)

    Google Scholar 

  9. Lambert, M.S., Miriam, T.T., Susan, F.M.: Secret Sharing Using the Chinese Remainder Theorem. Betascript Publishing,(2010)

    Google Scholar 

  10. Blakley, G.R.: Safeguarding Cryptographic Keys. In: AFIPS Conference Proceedings, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  11. Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600–1610 (2010)

    Article  Google Scholar 

  12. Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3), 441–453 (2012)

    Article  Google Scholar 

  13. Hu, C., Liao, X., Xiao, D.: Secret image sharing based on chaotic map and chinese remainder theorem. Int. J. Wavelets Multiresolut. Inf. Process. 10(3), 1250023 (2012)

    Article  MathSciNet  Google Scholar 

  14. Chuang, T.W., Chen, C.C., Chien, B.: Image sharing and recovering based on chinese remainder theorem. In: International Symposium on Computer, Consumer and Control (IS3C), pp. 817–820 (2016)

    Google Scholar 

  15. Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H.: Chinese remainder theorem-based secret image sharing for (k, n) threshold. In: Sun, X., Chao, H.-C., You, X., Bertino, E. (eds.) ICCCS 2017. LNCS, vol. 10603, pp. 433–440. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-68542-7_36

    Chapter  Google Scholar 

  16. Ning, Y., Miao, F.Y., Huang, W.C., Meng, K.J., Xiong, Y., Wang, X.F.: Constructing ideal secret sharing schemes based on Chinese remainder theorem. In: Asiacrypt (2018)

    Google Scholar 

Download references

Acknowledgments

The work was supported by the National Natural Science Foundation of China (No. 61572454, 61520106007). We thank the editors and anonymous reviewers for giving us many constructive comments that significantly improved the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fuyou Miao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, S., Miao, F. (2020). Secret Image Sharing Based on Chinese Remainder Theorem over a Polynomial Ring. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62223-7_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62222-0

  • Online ISBN: 978-3-030-62223-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics