Abstract
In this paper, a secret image sharing scheme, by combining arithmetic compression coding and Chinese remainder theorem (CRT) is proposed. It is well known that arithmetic compression coding method for image has a good compressibility, and it can reduce the size of the shadow image, which consists of sharing values. Usually, a smaller shadow image is convenient to store and transmit. The piecewise linear map is applied to design compression coding scheme, which has the same properties as the conventional arithmetic compression coding. The CRT is used to construct the sharing scheme for compression codes. Meanwhile, it also has encryption effects in the process of sharing. Finally, the security and the effectiveness of the secret image sharing scheme are confirmed by some computer simulation results.
Similar content being viewed by others
References
Bao L, Zhou Y, Chen CLP (2014) A lossless (2,8)-chaos-based secret image sharing Scheme. IEEE International Conference on Systems, Man, and Cybernetics
Bose R, Pathak S (2006) A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circuits and Systems-I: Regular Papers 53(4):848–857
Chang CC, Lin CC, Lin CH, Chen YH (2008) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178(11):2433–2447
Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3):749–761
Chien MC, Ing j, Hwang G (2012) Secret image sharing using (t,n) threshold scheme with lossless recovery. IEEE International Congress on Image and Signal Processing
Devaki P, Rao GR (2012) Lossless reconstruction of secret image using threshold secret sharing and transformation. International Journal of Network Security and Its Applications 4(3):111–119
Duan LL, Liao XF, Xiang T (2011) A secure arithmetic coding based on Markov model. Commun Nonlinear Sci Numer Simul 16(6):2554–2562
Eslami Z, Ahmadabadi JZ (2010) A verifiable multi-secret sharing scheme based on cellular automata. Inf Sci 180(15):2889–2894
Harn L, Lin CL (2010) Strong (n,t,n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064
Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia tools and applications 72(1):57–70
Iftene S, Boureanu IC (2005) Weighted threshold secret sharing based on the Chinese remainder theorem. Scientific Annals of Cuza University 15:161–172
Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals 32(4):1518–1529
Li S, Zhao YH, Qu BY, Wang JA (2013) Image scrambling based on chaotic sequences and Veginre cipher. Multimedia tools and applications 66(3):573–588
Lin QZ, Wong KW, Chen JY (2013) An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. J Syst Softw 86(5):1384–1389
Luca MB, Serbanescu A, Azou S, Burel G (2004) A new compression method using a chaotic symbolic approach. In: Proceedings of IEEE Commun. Conf., Bucharest, Romania
Mi B, Liao XF, Chen Y (2008) A novel chaotic encryption scheme based on arithmetic coding. Chaos, Solitons and Fractals 38(5):1523–1531
Nagaraj N, Vaidya PG, Bhat KG (2009) Arithmetic coding as a non-linear dynamical system. Commun Nonlinear Sci Numer Simul 14(4):1013–1020
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools and Applications 71(3):1469–1497
Rehman AU, Liao XF, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimedia Tools and Applications 74(1):4655– 4677
Sharma S (2013) An implementation of a novel secret image sharing algorithm. International Journal of Computer Science and Mobile Computing 2(4):263–268
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shyu SJ, Chen YR (2008) Threshold secret image sharing by chinese remainder theorem. IEEE Asia-Pacific Services Computing Conference
Shyu SJ (2013) Visual cryptograms of random grids for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 23(3):414–424
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Transactions on Circuits and Systems for Video Technology 13 (12):1161–1169
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555
Wong KW, Lin QZ, Chen JY (2010) Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans Circults and Systems-II: Express Briefs 57 (2):146–150
Wu KS (2013) A secret image sharing scheme for light images. EURASIP Journal on Advances in Signal Processing 2013(1):1–5
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 61472331, in part by the Talents of Science and Technology Promote Plan, Chongqing Science & Technology Commission.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hua, W., Liao, X. A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem. Multimed Tools Appl 76, 7087–7103 (2017). https://doi.org/10.1007/s11042-016-3364-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3364-8