Skip to main content
Log in

A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a secret image sharing scheme, by combining arithmetic compression coding and Chinese remainder theorem (CRT) is proposed. It is well known that arithmetic compression coding method for image has a good compressibility, and it can reduce the size of the shadow image, which consists of sharing values. Usually, a smaller shadow image is convenient to store and transmit. The piecewise linear map is applied to design compression coding scheme, which has the same properties as the conventional arithmetic compression coding. The CRT is used to construct the sharing scheme for compression codes. Meanwhile, it also has encryption effects in the process of sharing. Finally, the security and the effectiveness of the secret image sharing scheme are confirmed by some computer simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Bao L, Zhou Y, Chen CLP (2014) A lossless (2,8)-chaos-based secret image sharing Scheme. IEEE International Conference on Systems, Man, and Cybernetics

  2. Bose R, Pathak S (2006) A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circuits and Systems-I: Regular Papers 53(4):848–857

    Article  MathSciNet  Google Scholar 

  3. Chang CC, Lin CC, Lin CH, Chen YH (2008) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178(11):2433–2447

    Article  Google Scholar 

  4. Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  5. Chien MC, Ing j, Hwang G (2012) Secret image sharing using (t,n) threshold scheme with lossless recovery. IEEE International Congress on Image and Signal Processing

  6. Devaki P, Rao GR (2012) Lossless reconstruction of secret image using threshold secret sharing and transformation. International Journal of Network Security and Its Applications 4(3):111–119

    Article  Google Scholar 

  7. Duan LL, Liao XF, Xiang T (2011) A secure arithmetic coding based on Markov model. Commun Nonlinear Sci Numer Simul 16(6):2554–2562

    Article  MathSciNet  MATH  Google Scholar 

  8. Eslami Z, Ahmadabadi JZ (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci 180(15):2889–2894

    Article  MathSciNet  MATH  Google Scholar 

  9. Harn L, Lin CL (2010) Strong (n,t,n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064

    Article  MathSciNet  MATH  Google Scholar 

  10. Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia tools and applications 72(1):57–70

    Article  Google Scholar 

  11. Iftene S, Boureanu IC (2005) Weighted threshold secret sharing based on the Chinese remainder theorem. Scientific Annals of Cuza University 15:161–172

    MathSciNet  MATH  Google Scholar 

  12. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals 32(4):1518–1529

    Article  MathSciNet  MATH  Google Scholar 

  13. Li S, Zhao YH, Qu BY, Wang JA (2013) Image scrambling based on chaotic sequences and Veginre cipher. Multimedia tools and applications 66(3):573–588

    Article  Google Scholar 

  14. Lin QZ, Wong KW, Chen JY (2013) An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. J Syst Softw 86(5):1384–1389

    Article  Google Scholar 

  15. Luca MB, Serbanescu A, Azou S, Burel G (2004) A new compression method using a chaotic symbolic approach. In: Proceedings of IEEE Commun. Conf., Bucharest, Romania

  16. Mi B, Liao XF, Chen Y (2008) A novel chaotic encryption scheme based on arithmetic coding. Chaos, Solitons and Fractals 38(5):1523–1531

    Article  Google Scholar 

  17. Nagaraj N, Vaidya PG, Bhat KG (2009) Arithmetic coding as a non-linear dynamical system. Commun Nonlinear Sci Numer Simul 14(4):1013–1020

    Article  MathSciNet  MATH  Google Scholar 

  18. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools and Applications 71(3):1469–1497

    Article  Google Scholar 

  19. Rehman AU, Liao XF, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications 74(1):4655– 4677

    Article  Google Scholar 

  20. Sharma S (2013) An implementation of a novel secret image sharing algorithm. International Journal of Computer Science and Mobile Computing 2(4):263–268

    Google Scholar 

  21. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  22. Shyu SJ, Chen YR (2008) Threshold secret image sharing by chinese remainder theorem. IEEE Asia-Pacific Services Computing Conference

  23. Shyu SJ (2013) Visual cryptograms of random grids for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 23(3):414–424

    Article  Google Scholar 

  24. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  25. Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Transactions on Circuits and Systems for Video Technology 13 (12):1161–1169

    Article  Google Scholar 

  26. Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555

    Article  Google Scholar 

  27. Wong KW, Lin QZ, Chen JY (2010) Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans Circults and Systems-II: Express Briefs 57 (2):146–150

    Article  Google Scholar 

  28. Wu KS (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):1–5

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 61472331, in part by the Talents of Science and Technology Promote Plan, Chongqing Science & Technology Commission.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Liao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hua, W., Liao, X. A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem. Multimed Tools Appl 76, 7087–7103 (2017). https://doi.org/10.1007/s11042-016-3364-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3364-8

Keywords

Navigation