Robust Secret Image Sharing Resistant to Noise in Shares
Robust Secret Image Sharing Resistant to Noise in Shares
XUEHU YAN, LINTAO LIU, LONGLONG LI, and YULIANG LU, National University of Defense
Technology, China
A secret image is split into n shares in the generation phase of secret image sharing (SIS) for a (k, n) thresh-
old. In the recovery phase, the secret image is recovered when any k or more shares are collected, and each
collected share is generally assumed to be lossless in conventional SIS during storage and transmission. How-
ever, noise will arise during real-world storage and transmission; thus, shares will experience data loss, which
will also lead to data loss in the secret image being recovered. Secret image recovery in the case of lossy shares
is an important issue that must be addressed in practice, which is the overall subject of this article. An SIS
scheme that can recover the secret image from lossy shares is proposed in this article. First, robust SIS and
its definition are introduced. Next, a robust SIS scheme for a (k, n) threshold without pixel expansion is pro-
posed based on the Chinese remainder theorem (CRT) and error-correcting codes (ECC). By screening the
random numbers, the share generation phase of the proposed robust SIS is designed to implement the error
correction capability without increasing the share size. Particularly in the case of collecting noisy shares,
our recovery method is to some degree robust to some noise types, such as least significant bit (LSB) noise,
JPEG compression, and salt-and-pepper noise. A theoretical proof is presented, and experimental results are
examined to evaluate the effectiveness of our proposed method.
CCS Concepts: • Security and privacy → Graphical/visual passwords; Access control; Key management;
24
Digital rights management;
Additional Key Words and Phrases: Secret image sharing, robust secret image sharing, Chinese remainder
theorem, error-correcting codes, JPEG compression
ACM Reference format:
Xuehu Yan, Lintao Liu, Longlong Li, and Yuliang Lu. 2021. Robust Secret Image Sharing Resistant to Noise in
Shares. ACM Trans. Multimedia Comput. Commun. Appl. 17, 1, Article 24 (April 2021), 22 pages.
https://doi.org/10.1145/3419750
1 INTRODUCTION
With the widespread development and application of the Internet and multimedia technology,
digital multimedia data are easily obtained, transmitted, and manipulated. Therefore, security
of digital multimedia is very important for protecting sensitive multimedia data from malicious
interference during transmission over public channels. Traditional ways of ensuring a high
level of security for multimedia include cryptography and information hiding. Cryptographic
techniques transform the multimedia data between incomprehensible and comprehensible forms
This work was supported by the National Natural Science Foundation of China under Grant No. 61602491.
Authors’ addresses: X. Yan, L. Liu, L. Li, and Y. Lu, National University of Defense Technology, No.460 HUANGSHAN Road,
Hefei, Anhui, 230037, China; emails: [email protected], {liuta1989, lilongs8636}@163.com, [email protected].
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be
honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee. Request permissions from [email protected].
© 2021 Copyright held by the owner/author(s). Publication rights licensed to ACM.
1551-6857/2021/04-ART24 $15.00
https://doi.org/10.1145/3419750
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:2 X. Yan et al.
by encryption and decryption operations using secret keys. Information hiding [18] embeds
multimedia data into digital cover media. However, when the cover media’s data are destroyed or
lost due to typical causes, the embedded multimedia data will be unavailable. Thus, secret sharing
has been proposed to overcome this limitation.
In the generation phase, secret sharing for a (k, n) threshold splits the multimedia data
into n shares, called shadow images or shadows, which are subsequently distributed to the
corresponding n participants; in the recovery phase, the multimedia data are recovered when
any k or more shares are collected. An attacker cannot recover the multimedia data even by using
a very computationally powerful device when fewer than k shares are collected. Hence, secret
sharing is applicable in many scenarios, such as digital watermarking, key management, identity
authentication, access control, password transmission, blockchains, and distributed storage in a
cloud [3, 5, 25, 39].
Because digital images are one of the most important media types, secret image sharing (SIS)
has been extensively researched. Digital images have a special feature that distinguishes them
from general digital data (even though they are a specific form of such data), whereby each bi-
nary (grayscale) pixel is represented by 1 bit (8 bits, i.e., 1 Byte); thus, SIS can be easily applied to
data sharing. The basic principles of widely studied high-quality SIS techniques include polyno-
mials [26, 40], the Chinese remainder theorem (CRT) [1, 32], and so on [14]. We note that visual
cryptography (VC), a.k.a. visual secret sharing (VSS) [10, 17, 29, 34] is also widely studied. (k, n)
threshold VC belongs to (k, n) threshold SIS, i.e., VC is one branch of SIS. VC is generally for bi-
nary secret images and is lossy by nature, thus, we mainly focus on a secret sharing method with
high-quality recovery of the secret image.
For high-quality recovery of the secret image, the first polynomial-based secret sharing method
for a (k, n) threshold introduced by Shamir [20] entailed constructing a random (k − 1)-degree
polynomial to generate n shares. When any k or more shares are collected, the secret is recovered
with high quality according to Lagrange interpolation. Inspired by Shamir’s work, several en-
hanced polynomial-based SIS schemes [2, 16, 23, 35] with more properties have been put forward.
The significance of polynomial-based SIS is that the recovered secret image is of high quality and
there is no pixel expansion. However, it has the shortcomings that the recovered secret image is
either slightly distorted or difficult to obtain, with a high computational complexity of O (k log2 k )
when obtaining a nondistorted image [1]).
Because the modular approach needs only O (k ) operations [1] to recover every secret pixel,
Chinese remainder theorem-based SIS (CRTSIS) allows recovery of the nondistorted secret image
with fewer calculations and has thus been explored in several other studies. Yan et al. [30]
introduced CRT to SIS and achieved small information leakage and loss. Shyu et al. [22] extended
Mignotte’s scheme using a pseudorandom number generator in an approach that needed auxiliary
encryption. Ulutas et al. [24] modified Asmuth Bloom’s secret sharing scheme by dividing each
grayscale image pixel’s value. In their scheme, the random number range may be unsuitable,
and thus, the (k, n) threshold may not be achieved. Moreover, image pixel values of double or
more the scheme’s parameter were not considered. Utilizing a chaotic map, Hu et al. [7] put
forward another CRTSIS method with auxiliary encryption. A simple CRTSIS method satisfying
the (3, 5) threshold was presented by Chuang et al. [6] for RGB color images. The method either
is lossy or requires prestoring the least significant bit (LSB). A CRTSIS method with lossless
recovery for a (k, n) threshold has recently been designed by Yan et al. [33], and the explicit
parameters have also been illustrated based on image features. Furthermore, Yan et al. [31]
and Li et al. [12] developed CRTSIS methods with multiple decryptions and lossless recovery,
respectively.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:3
In the recovery phase of the above-mentioned SIS for a (k, n) threshold, the secret image can be
recovered when any k or more shares are collected, and each collected share is in general assumed
to be lossless during storage and transmission.
However, there will be noise [13, 36], such as LSB noise, JPEG compression, and salt-and-pepper
noise [4] during real-world storage and transmission. Thus, the shares will be lossy, which will lead
to the secret image also being recovered with data loss.
Secret image recovery in the case of lossy shares is important in practice; it is unfortunately
seldom considered in the above-mentioned SIS schemes, including CRTSIS schemes, and is the
motivation of this article.
SIS for a (k, n) threshold naturally has a loss-tolerance property, i.e., the creator of shares can
recover the secret image with at least n − k shares lost. Although several studies [8, 11, 19] have
discussed a coalition of participants corrupted by means of the loss-tolerant property, secret re-
covery in the case of lossy shares has rarely been considered.
Figure 1 illustrates the motivation of robust SIS.
VC [17, 21, 27, 37] is naturally robust, because VC is implemented based on probability theory.
A secret image with contrast loss can be recovered by stacking to some degree in the case of
lossy shares. The value of the contrast loss is dependent on the noise density added to the shares.
However, due to the stacking needed for recovery, the recovered secret image is naturally of low
quality, i.e., a significant contrast loss occurs.
An alternative simple idea used to achieve robustness is to embed the shares into n cover im-
ages using steganography to output robust steganographic images. A typical approach has been
presented by Mohammad and Ali [9]. The researchers proposed polynomial-based SIS to achieve
robustness with the help of steganography [38]. In their scheme, a polynomial is first used to
generate shares. Afterward, the shares are embedded into the cover images using an existing ro-
bust steganography technique to output steganographic images. Thus, the researchers’ scheme
is robust and produces steganographic images of high visual quality. However, a method of this
kind has a high computational complexity and entails pixel expansion. In addition, robustness is
achieved based on steganography rather than SIS.
Secret image recovery in the case of lossy shares without pixel expansion is an important issue
and poses difficulty that must be dealt with in practice, which is the overall focus of this article.
The recovery method generally entails using mathematical functions, such as interpolation and
modulo, which are sensitive to low-level noise; thus, based on SIS itself and under the condition
of no pixel expansion, achieving robust SIS for a (k, n) threshold is a key challenge. The research
objective investigated in this article is to propose an SIS scheme without pixel expansion that can
recover the secret image despite lossy shares.
In this article, robust SIS and its definition are first introduced. Next, a robust SIS scheme for
a (k, n) threshold without pixel expansion is proposed based on CRT and error-correcting codes
(ECC). By screening the random numbers, the share generation phase of the proposed robust SIS
is designed to attain an error-correcting capability without increasing the share size; in this way,
in the case of collecting a noisy share, our recovery method is to some degree robust to some noise
types, such as LSB noise, JPEG compression, and salt-and-pepper noise. The characteristics of the
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:4 X. Yan et al.
Notation Description
(k, n) Threshold parameters
S The original secret image
W ×H The size of the original secret image
S The recovered secret image
SCi The ith share
SCi The ith noisy share
t The number of shares collected in the recovery phase
Si1,i 2, ...i t The secret image recovered from shares SCi 1 , SCi 2 , . . . , SCi t
k 0 , n 0 , and t 0 The length of each message, codeword length, and error-correcting capability
in ECC
(HL,W L) Block size parameters in ECC
NA The number of available values of A satisfying the equations in Step 8 of our
method
D and R The bits of a message and the corresponding check bits
proposed scheme are its robustness, lack of pixel expansion, lossless recovery, and use of the SIS
principle. A theoretical proof is provided, and experimental results are examined to demonstrate
the effectiveness of our proposed method.
The remaining sections are organized as follows: Section 2 introduces CRT. In Section 3, we dis-
cuss the introduced robust SIS definition and our proposed robust SIS algorithm in detail. Section 4
presents the proof of the security and performance analysis of the algorithm. Section 5 discusses
the experimental results and comparisons. Section 6 presents the conclusions.
2 PRELIMINARIES
In this section, we introduce some preliminaries for our study. In (k, n) threshold SIS, n shares,
denoted by SC 1 , SC 2 , . . . , SCn , are generated for an original secret image S, and the secret image
S can be recovered from any t (k ≤ t ≤ n, t ∈ Z+ ) shares.
The key notations used in this article are shown in Table 1.
y ≡ a 1 (mod m 1 )
··· (1)
y ≡ ak (mod mk ),
k
where M = i=1 m i , Mi = M mi and Mi Mi−1 ≡ 1 (mod mi ).
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:5
Both polynomial-based SIS and CRTSIS [1] have been widely researched. The reasons for using
CRT in our scheme are stated as follows:
(1) CRTSIS can achieve lossless recovery, while most polynomial-based SIS schemes are lossy.
(2) The recovery method of polynomial-based SIS is Lagrange interpolation with a compu-
tational complexity of O (k log2 k ), while that in CRTSIS entails only modular operations
with a complexity of O (k ); hence, CRTSIS needs fewer computations than polynomial-
based SIS to recover the secret image.
where
(1) IQR(SCi1 , SCi2 , . . . , SCit ) denotes the image quality of the secret image denoted by
S SC ,SC , ...,SC recovered from SC i , SC i , . . . , SC i by the robust recovery method, and
i1 i2 it 1 2 t
IQT (SCi1 , SCi2 , . . . , SCit ) denotes the image quality of the secret image recovered from
SCi1 , SCi2 , . . . , SCit by the traditional recovery method;
(2) the image quality means the similarity between S and S, which can be evaluated by con-
ventional metrics, such as the signal-to-noise-ratio (PSNR), the structural similarity index
measure (SSIM) [28], and the contrast in VC; and
(3) the greater the improvement in the image quality is, the stronger the robustness achieved.
If IQR(SCi1 , SCi2 , . . . , SCit ) = IQT (SCi 1 , SCi 2 , . . . , SCi t ), then we say that the robust SIS is fully
robust to the noise; otherwise, we say that the robust SIS is partially robust to the noise.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:7
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:8 X. Yan et al.
Fig. 2. Design idea of the proposed robust secret image sharing algorithm.
(6) The first block with W L secret pixels is processed separately without screening in
Steps 3–4 to output R i to screen A, thus obtaining satisfactory share pixel values in the
next block.
(7) Because A is randomly selected in Step 7.2, when N A ≥ 8, we can search for a value
of A that satisfies the equations in Step 8, where N A denotes the number of available values
n 8− H L
of A satisfying the equations in Step 8, and N A = T × 2 2
mi , which will be analyzed
i=1
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:9
in Section 4. As a result, the mathematical relation in ECC between bits of the message
D i and check bits R i , a.k.a. the share bits’ relation between adjacent blocks, will be con-
structed for the ith share for i = 1, 2, . . . , n; thus, robustness will be achieved. Robustness
in the case of no pixel expansion based on SIS is the significant advantage between the
proposed method and other related methods.
(8) We may apply other SIS principles, such as polynomial, in our scheme, as follows: In
Steps 1–2 of Algorithm 1, we can construct a polynomial instead of CRT. The random
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:10 X. Yan et al.
coefficients of the constructed polynomial will be screened to satisfy the necessary con-
ditions in Algorithm 1. This will be tested in future work.
(9) VC is implemented based on probability theory, and generally for a binary secret image,
the recovered secret image is naturally lossy with low quality. As a result, our method is
not suitable for VC.
Regarding Algorithm 2, we further note the following:
(1) Algorithm 2 actually contains the steps of Algorithm 1 in the reverse order.
(2) The secret image is recovered when any k or more shares are provided as input.
(3) To correct errors in each share block, Steps 3–5 are performed, where Step 4 aims to deter-
mine if the bits of the message are properly decoded by examining the number of corrected
errors. After error correction, the secret pixel’s value is recovered directly in Steps 6–9.
(4) Steps 7–9 can recover
S (w, h) = x with any k or more shared pixels, since T divides
the interval 0, M p − 1 into two parts corresponding to 0 ≤ x < p and p ≤ x ≤ 255 in
Step 7 of Algorithm 1. As a result, x can be recovered for arbitrary x ∈ [0, 255].
(5) The last block with W L secret pixels is processed separately without error correction in
Steps 10–13.
ALGORITHM 2: Recovery of the proposed robust secret image sharing for a (k, n) threshold.
Input: Any t grayscale shares SCi1 , SCi2 , . . . , SCit (t = k ), their private integers mi 1 , mi 2 , . . . , mi t , p, T,
ECC (k 0 , n 0 , t 0 ) and block size parameters (HL,W L).
Step 1: Repeat Steps 2–9 until all the secret pixels except for the last W L pixels are processed.
Step 2: Follow the order similar to that shown in Figure 3 to select the uncorrected share pixels to construct
the current block. Repeat Steps 3–5 to process the W L uncorrected share pixels in the current block.
Step 3: Set D i = (B i H L , B i H L , . . . , B i1,1 , B i H L , B i H L , . . . , B i2,1 , . . . , B i HL , B
i ,...,
1, 2 1, 2 −1 2, 2 2, 2 −1 HL
W L, 2 W L, 2 −1
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:12 X. Yan et al.
Finally, IQR(SCi1 , SCi2 , . . . , SCit ) > IQT (SCi1 , SCi2 , . . . , SCit ) when t ≥ k.
Theorem 4.4. Our scheme is a robust SIS scheme.
Proof. According to Definition 3.1, the mentioned conditions are satisfied based on the above
Lemmas 4.1–4.3.
n 8− H L
Proposition 1: In our Algorithm 1, N A = T × 2
mi
2
.
i=1
Proof. Generally, A has T possible values in Step 7.2 of Algorithm 1. To satisfy the equations
n 8− H L
in Step 8, HL/2 bit planes are fixed, and thus, N A will decrease to N A = T × 2 2
mi .
i=1
Using a larger N A will result in stronger security, since the number of brute force attacks is T NA .
N A ≥ 2 is required for the lowest security, because if N A = 1, then we have only one integer A that
is being repeatedly applied in Step 7.2 of Algorithm 1, which will be insecure.
In addition, we suggest N A ≥ 8 to achieve an acceptable time for searching the available values
of A in the generation phase of our SIS, which is obtained from experiments.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:13
Fig. 4. Experiments with the proposed robust SIS scheme for a (k, n) threshold, where k = 2, n = 2, m 1 =
253, m 2 = 254, HL = 2,W L = 4, BCH(8,4,1) is adopted and LSB-changing (bit-flipping) noise with density
r = 0.0083 is added to SC 1 and SC 2 .
Fig. 5. Experiments with the proposed robust SIS scheme for a (k, n) threshold, where k = 4, n = 4, m 1 =
251, m 2 = 253, m 3 = 254, m 4 = 255, HL = 8,W L = 4, BCH(32,16,3) is adopted and salt-and-pepper noise with
a density of r = 0.002 is added to SCi , for i = 1, 2, 3, 4.
original share SC 1 generated by our method; this share has the same size as the original secret
grayscale image. Figure 5(c) demonstrates the noisy share SC 1 that results from adding salt-and-
pepper noise with a density of r = 0.002 to SC 1 . Figure 5(d) shows the difference map between the
original share and the noisy share. Figures 5(e)–(g) show the secret images recovered from any
two or more noisy shares based on CRT by the traditional recovery method and their PSNR and
SSIM. Figures 5(h)–(j) present the secret images recovered from any two or more noisy shares by
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:14 X. Yan et al.
our recovery method and their PSNR and SSIM. According to Figures 5(e)–(j), the secret image
recovered by our method is better than that recovered by the traditional method from the same
noisy shares, which indicates that our method is partially robust to salt-and-pepper noise. Accord-
ing to Figures 5(h)–(j), the secret image recovered from all four shares is recognizable, while no
clue about the secret image can be obtained when three or fewer shares are leaked, which indicates
that our scheme is a valid SIS design for a (k, n) threshold.
The above examples show the following:
(1) The shares exhibit neither pixel expansion nor cross-interference for a natural secret
image.
(2) When fewer than k shares have been collected, no secret information is leaked, which
indicates the security of our robust SIS scheme.
(3) When any k or more shares have been collected, the secret image can be recovered to
some extent.
(4) The secret image recovered by our method is better than that recovered by the traditional
method from the same noisy shares; hence, our method is partially robust to LSB noise,
JPEG compression, and salt-and-pepper noise.
(5) A robust SIS algorithm without pixel expansion for a (k, n) threshold has finally been
implemented, where n ≥ k ≥ 2.
The proper reason for the observed robust behavior of the proposed scheme is analyzed as fol-
lows: In Algorithm 1, the share generation phase of the proposed robust SIS is specially designed
to attain an error-correcting capability without increasing the share size. In such a way, in the case
of collecting noisy shares, our recovery method is robust to the noise to some degree.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:15
Fig. 6. Experiments with the proposed robust SIS scheme for a (k, n) threshold performed to show the effects
of various values of W L, where k = 3, n = 3, m 1 = 253, m 2 = 254, m 3 = 255, HL = 8, and LSB-changing (bit-
flipping) noise with density r = 0.208 is added to SCi for i = 1, 2, 3.
Fig. 7. Experiments with the proposed robust SIS scheme for a (k, n) threshold performed to show the effects
of various values of W L, where k = 3, n = 3, m 1 = 253, m 2 = 254, m 3 = 255, HL = 8, and JPEG compression
with the same quality of 100 is performed on SCi for i = 1, 2, 3.
Finally, when ECC is available, a small W L is more suitable than a large W L under the condition
of random noise with a high density being experienced by the low bit planes of shares.
In the next example, to compare the effects of W L = 1 and W L = 4, we perform JPEG compres-
sion on SCi for i = 1, 2, 3, with the same quality of the JPEG-compressed file of 100. Figures 7(a)–
(e) illustrate the experimental results obtained when W L = 1 and BCH(8,4,1) is adopted.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:16 X. Yan et al.
Figures 7(f)–(j) illustrate the experimental results obtained when W L = 4 and BCH(32,16,3) is
adopted. According to Figures 7(e) and (j), the image quality of the secret image recovered when
W L = 4 is better than that obtained when W L = 1, since t 0 = 1, one bit-flipping error can be
corrected for every one-pixel position when W L = 1, and JPEG compression may lead to more
than one bit-flipping error in each block. Finally, when ECC is available, a large W L is more
suitable than a small W L under the condition of burst noise with a low density being experienced
by more bit planes of shares.
In addition to parameters HL and W L, in step 1 of the proposed Algorithm 1, we select a set of
integers 128 ≤ p < m 1 < m 2 · · · < mn ≤ 256 that satisfy three equations, aiming to achieve CRT-
based SIS for a (k, n) threshold. The condition 128 ≤ p < m 1 < m 2 · · · < mn ≤ 256 is required
because of the image pixel value range and pN < M. In our Algorithm 1, to achieve a random
distribution of the share pixel values over a large range to improve security, mi should be as large
as possible, and p should be as small as possible for security of the secret image recovery while
ensuring that the secret pixel values can be divided into two intervals. Due to image pixel values
being in the range of [0, 255], we can choose p = 128; moreover, in cryptography, a prime number
in general has significance; thus, we can also select p = 131, which is the smallest prime number
greater than 128.
Considering the above analysis, we list several available parameters p, m 1 , m 2 , . . . , mn , HL, and
W L for a (k, n) threshold in Table 2. The user can further select other suitable parameters in addi-
tion to the available parameters in Table 2 according to the specific applications.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:17
Fig. 8. PSNR and SSIM curves of secret images recovered by the traditional method and our method when
LSB-flipping noise is added to all three shares.
Fig. 9. PSNR and SSIM curves of secret images recovered by the traditional method and our method when
compression noise is added to all three shares.
(1) When 0 ≤ density ≤ 0.07, the PSNR of our method is close to 100, and the SSIM is close
to 1, i.e., the secret image is recovered losslessly, and our robust SIS scheme is fully robust
to LSB-flipping noise; deviations from perfect results are caused by noise randomness.
(2) When density > 0.07, both the PSNR and SSIM of our method are nearly monotonically
decreasing functions of density, and our robust SIS scheme is partially robust to LSB-
flipping noise.
(3) Both the PSNR and SSIM of the traditional method are monotonically decreasing functions
of density.
(4) Highest robustness is analyzed from two perspectives: (1) the highest quality of the re-
covered secret image in the case of lossy shares; and (2) the highest improved rate of the
quality compared with the traditional method. The highest quality of the recovered secret
image in the case of lossy shares is lossless, i.e., PSNR=100, SSIM=1 when density = 0.05.
Compared with the traditional method, our highest improved rate of the quality is 624.39%
for PSNR when density = 0.083 or 946.74% for SSIM when density = 0.208.
(5) The quality of the secret image recovered by our method exceeds that by the traditional
method in the case of collecting shares affected by LSB-flipping noise.
Figure 9 shows the curves of the quality evaluation metrics versus the quality of JPEG com-
pression used in the creation of shares from which the secret image was recovered. The figure
demonstrates the following:
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:18 X. Yan et al.
Fig. 10. PSNR and SSIM curves of secret images recovered by the traditional method and our method when
salt-and-pepper noise is added to all three shares.
(1) When the quality of JPEG compression is less than 97, both the PSNR and SSIM of our
method and the traditional method are very low, because neither our method nor the
traditional method are robust to JPEG compression noise of high density.
(2) When the quality of JPEG compression is equal to or greater than 97, both the PSNR and
SSIM of our method and the traditional method are monotonically increasing functions
of JPEG compression quality. The quality of the secret image recovered by our method is
higher than that of the traditional method; thus, our robust SIS scheme is partially robust
to JPEG compression noise.
(3) The highest quality of the recovered secret image in the case of lossy shares is PSNR=19.45,
SSIM=0.5767 when the quality of JPEG compression is 100. Compared with the traditional
method, our highest improved rate of the quality is 43.02% for PSNR when the quality of
JPEG compression is 100 or 178.39% for SSIM when the quality of JPEG compression is 99.
(4) The quality of the secret image recovered by our method surpasses that of the traditional
method in the case of collecting shares affected by JPEG compression noise when high-
quality JPEG compression is used.
Figure 10 shows the curves of the quality evaluation metrics versus noise density for the recov-
ered secret image when salt-and-pepper noise is added to all three shares. The figure shows the
following:
(1) Both the PSNR and SSIM of our method and the traditional method are monotonically
decreasing functions of density. The quality of secret images recovered by our method is
higher than that of the traditional method; thus, our robust SIS scheme is partially robust
to salt-and-pepper noise.
(2) The highest quality of the recovered secret image in the case of lossy shares is lossless, i.e.,
PSNR=100, SSIM=1 when density = 0.0001. Compared with the traditional method, our
highest improved rate of the quality is 90.05% for PSNR when density = 0.0001 or 6.82%
for SSIM when density = 0.0017.
(3) The quality of secret images recovered by our method surpasses that of the traditional
method in the case of collecting shares affected by salt-and-pepper noise.
The proper reason for the observed above robust behavior of the proposed scheme is analyzed
as follows: When a small amount of noise less than the error-correcting capability is added, our
scheme can fully correct it. When a large amount of noise is added, our scheme can partially correct
it. Some unusual points are caused by randomness.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:19
Fig. 11. Experimental comparisons of the scheme of Yan et al. and the proposed robust SIS method for
a (k, n) threshold, where k = 2, n = 2, m 1 = 253, m 2 = 255, HL = 2,W L = 4, and LSB-changing (bit-flipping)
noise with density r = 0.042 is added to SCi for i = 1, 2.
In summary, our algorithm is to some degree robust to some noise types, including at least
LSB-flipping noise, JPEG compression, and salt-and-pepper noise of a certain density.
Fig. 12. Experimental comparisons of the scheme of Li et al. and the proposed robust SIS method for
a (k, n) threshold, where k = 3, n = 3, m 1 = 253, m 2 = 254, m 2 = 255, HL = 8,W L = 4, and salt-and-pepper
noise with a density of r = 0.001 is added to SCi for i = 1, 2, 3.
illustrate the experimental results of the scheme of Li et al. Figures 12(f)–(j) illustrate the exper-
imental results of our method when HL = 8,W L = 4, and BCH(32,16,3) is adopted. According to
Figure 12(e), the secret image is not recovered losslessly in the case of collecting both noisy shares
in the scheme of Li et al., since the researchers’ method is not robust. According to Figures 12(e)
and (j), the image quality of the secret image recovered by our scheme is better than that of the
scheme of Li et al., which shows that our scheme is robust to salt-and-pepper noise. Finally, our
scheme is more robust than the scheme of Li et al. as well as the traditional SIS methods, including
polynomial-based SIS and CRT-based SIS.
6 CONCLUSIONS
In this article, we have introduced a formal definition of robust SIS and subsequently proposed
a robust SIS algorithm for a (k, n) threshold that utilizes the principle of CRTSIS to achieve the
features of no pixel expansion, low complexity of recovery, and robustness to some types of noise,
such as least significant bit noise, JPEG compression, and salt-and-pepper noise, to some degree.
Our SIS method is even fully robust to some noise of a certain density. The experimental results
have proven the effectiveness of the proposed algorithm. Analyses of the available parameters
and quality have been presented as well. We have performed experimental comparisons with re-
lated schemes to demonstrate the advantages of our algorithm. In our future research, we will
study the following topics: First, we will theoretically analyze and test the optical image qual-
ity factors HL, W L, and N A to balance security and image quality. Second, we will improve our
method’s robustness against more types of noises. Third, we will apply polynomial-based SIS in our
scheme.
ACKNOWLEDGMENTS
The authors would like to thank the anonymous reviewers for their valuable comments.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
Robust Secret Image Sharing Resistant to Noise in Shares 24:21
REFERENCES
[1] C. Asmuth and J. Bloom. 1983. A modular approach to key safeguarding. IEEE Trans. Inf. Theor. 29, 2 (1983), 208–210.
[2] L. Bao, S. Yi, and Y. Zhou. 2017. Combination of sharing matrix and image encryption for lossless (k, n)—Secret image
sharing. IEEE Trans. Image Proc. 26, 12 (Dec. 2017), 5618–5631. DOI:https://doi.org/10.1109/TIP.2017.2738561
[3] Akram Belazi and Ahmed A. Abd El-Latif. 2017. A simple yet efficient S-box method based on chaotic sine map. Optik
- Int. J. Light Electron Optics 130 (2017), 1438–1444.
[4] Z. Chen, X. Hou, X. Qian, and C. Gong. 2018. Efficient and robust image coding and transmission based on scrambled
block compressive sensing. IEEE Trans. Multimedia 20, 7 (July 2018), 1610–1621. DOI:https://doi.org/10.1109/TMM.
2017.2774004
[5] Yuqiao Cheng, Zhengxin Fu, and Bin Yu. 2018. Improved visual secret sharing scheme for QR code applications. IEEE
Trans. Inf. Forens. Secur. 13, 9 (2018), 2393–2403.
[6] Ting Wei Chuang, Chaur Chin Chen, and Betty Chien. 2016. Image sharing and recovering based on Chinese remain-
der theorem. In International Symposium on Computer, Consumer and Control. 817–820.
[7] Hu Chunqiang, Liao Xiaofeng, and Xiao Di. 2012. Secret image sharing based on chaotic map and Chinese remainder
theorem. Int. J. Wavel. Multires. Inf. Proc. 10, 3 (2012), 1250023 (2012).
[8] Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, and Gabriele Spini. 2015. Linear secret sharing
schemes from error correcting codes and universal hash functions. In Advances in Cryptology - EUROCRYPT 2015,
Elisabeth Oswald and Marc Fischlin (Eds.). Springer Berlin, 313–336.
[9] Mohammad Ghebleh and Ali Kanso. 2018. A novel secret image sharing scheme using large primes. Multimedia Tools
Applic. 77, 10 (01 May 2018), 11903–11923. DOI:https://doi.org/10.1007/s11042-017-4841-4
[10] Xingxing Jia, Daoshun Wang, Qimeng Chu, and Zhenhua Chen. 2019. An efficient XOR-based verifiable visual cryp-
tographic scheme. Multimedia Tools Applic. 78, 7 (01 Apr. 2019), 8207–8223. DOI:https://doi.org/10.1007/s11042-018-
6779-6
[11] Ilan Komargodski and Anat Paskin-Cherniavsky. 2017. Evolving secret sharing: Dynamic thresholds and robustness.
In Theory of Cryptography, Yael Kalai and Leonid Reyzin (Eds.). Springer International Publishing, Cham, 379–393.
[12] L. Li, Y. Lu, X. Yan, L. Liu, and L. Tan. 2019. Lossless (k, n)—Threshold image secret sharing based on the Chinese
remainder theorem without auxiliary encryption. IEEE Access 7 (2019), 75113–75121. DOI:https://doi.org/10.1109/
ACCESS.2019.2921612
[13] Y. Li, Z. Lu, C. Zhu, and X. Niu. 2012. Robust image hashing based on random Gabor filtering and dithered lattice vector
quantization. IEEE Trans. Image Proc. 21, 4 (Apr. 2012), 1963–1980. DOI:https://doi.org/10.1109/TIP.2011.2171698
[14] Feng Liu and Chuankun Wu. 2011. Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forens. Secur.
6, 2 (2011), 307–322.
[15] Xiaobei Liu, Soo Ngee Koh, Xin Wen Wu, and Chee Cheon Chui. 2012. Reconstructing a linear scrambler with im-
proved detection capability and in the presence of noise. IEEE Trans. Inf. Forens. Secur. 7, 1 (2012), 208–218.
[16] Yanxiao Liu, Chingnung Yang, Yichuan Wang, Lei Zhu, and Wenjiang Ji. 2018. Cheating identifiable secret sharing
scheme using symmetric bivariate polynomial. Inf. Sci. 453 (2018), 21–29.
[17] Moni Naor and Adi Shamir. 1995. Visual cryptography. In Advances in Cryptology-EUROCRYPT’94 Lecture Notes in
Computer Science, Workshop on the Theory and Application of Cryptographic Techniques. Springer, 1–12.
[18] Z. Qian, X. Zhang, and S. Wang. 2014. Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia
16, 5 (Aug. 2014), 1486–1491. DOI:https://doi.org/10.1109/TMM.2014.2316154
[19] V. Rishiwal, M. Yadav, and K. V. Arya. 2008. A robust secret image sharing scheme. In 1st International Conference on
Emerging Trends in Engineering and Technology. 11–14. DOI:https://doi.org/10.1109/ICETET.2008.109
[20] Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.
[21] K. Shankar and P. Eswaran. 2016. A new k out of n secret image sharing scheme in visual cryptography. In 10th Inter-
national Conference on Intelligent Systems and Control (ISCO’16). 1–6. DOI:https://doi.org/10.1109/ISCO.2016.7726969
[22] Shyong Jian Shyu and Ying Ru Chen. 2008. Threshold secret image sharing by Chinese remainder theorem. In IEEE
Asia-Pacific Services Computing Conference. 1332–1337.
[23] Chih-Ching Thien and Ja-Chen Lin. 2002. Secret image sharing. Comput. Graph. 26, 5 (2002), 765–770.
[24] M. Ulutas, V. V. Nabiyev, and G. Ulutas. 2009. A new secret image sharing technique based on Asmuth Bloom’s
scheme. In International Conference on Application of Information and Communication Technologies (AICT’09). 1–5.
[25] Guangyu Wang, Feng Liu, and Wei Qi Yan. 2016. Basic visual cryptography using braille. Int. J. Digit. Crime Forens.
8, 3 (2016), 85–93.
[26] Ping Wang, Xing He, Yushu Zhang, Wenying Wen, and Ming Li. 2019. A robust and secure image sharing scheme
with personal identity information embedded. Comput. Secur. 85 (2019), 107–121. DOI:https://doi.org/10.1016/j.cose.
2019.04.010
[27] Zhongmin Wang, Gonzalo R. Arce, and Giovanni Di Crescenzo. 2009. Halftone visual cryptography via error diffusion.
IEEE Trans. Inf. Forens. Secur. 4, 3 (2009), 383–396.
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.
24:22 X. Yan et al.
[28] Zhou Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli. 2004. Image quality assessment: From error visibility to
structural similarity. IEEE Trans. Image Proc. 13, 4 (Apr. 2004), 600–612. DOI:https://doi.org/10.1109/TIP.2003.819861
[29] Jonathan Weir, Weiqi Yan, and Mohan S. Kankanhalli. 2012. Image hatching for visual cryptography. ACM Trans.
Multimedia Comput. Commun. Appl. 8, 2S (Sept. 2012). DOI:https://doi.org/10.1145/2344436.2344438
[30] Weiqi Yan, Wei Ding, and Qi Dongxu. 2000. Image sharing based on Chinese remainder theorem. J. North China Univ.
of Tech 12, 1 (2000), 6–9.
[31] Xuehu Yan, Yuliang Lu, Lintao Liu, Jingju Liu, and Guozheng Yang. 2018. Chinese remainder theorem-based two-in-
one image secret sharing with three decoding options. Digit. Sig. Proc. 82 (2018), 80–90. DOI:https://doi.org/10.1016/
j.dsp.2018.07.015
[32] Xuehu Yan, Yuliang Lu, Lintao Liu, and Xianhua Song. 2020. Reversible image secret sharing. IEEE Trans. Inf. Forens.
Secur. 15 (2020), 3848–3858. DOI:https://doi.org/doi: 10.1109/TIFS.2020.3001735
[33] Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, and Hanlin Liu. 2017. Chinese remainder theorem-
based secret image sharing for (k, n) threshold. Third International Conference of Cloud Computing and Security
(ICCCS’17)433–440. DOI:https://doi.org/10.1007/978-3-319-68542-7_36
[34] C. Yang, C. Wu, and Y. Lin. 2019. k out of n region-based progressive visual cryptography. IEEE Trans. Circ. Syst. Vid.
Technol. 29, 1 (Jan. 2019), 252–262. DOI:https://doi.org/10.1109/TCSVT.2017.2771255
[35] Ching-Nung Yang and Chuei-Bang Ciou. 2010. Image secret sharing method with two-decoding-options: Lossless
recovery and previewing capability. Image Vis. Comput. 28, 12 (2010), 1600–1610.
[36] X. Zhang, F. Peng, and M. Long. 2018. Robust coverless image steganography based on DCT and LDA topic classifi-
cation. IEEE Trans. Multimedia 20, 12 (Dec. 2018), 3223–3238. DOI:https://doi.org/10.1109/TMM.2018.2838334
[37] Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo. 2006. Halftone visual cryptography. IEEE Trans. Image Proc.
15, 8 (2006), 2441–2453.
[38] Zhili Zhou, Yan Mu, and Q. M. Jonathan Wu. 2019. Coverless image steganography using partial-duplicate image
retrieval. Soft Comput. 23 (2019), 4927–4938.
[39] Zhili Zhou, Q. M. Jonathan Wu, Yimin Yang, and Xingming Sun. 2020. Region-level visual consistency verification
for large-scale partial-duplicate image search. ACM Trans. Multimedia Comput., Commun., Applic. 16, 2 (2020).
[40] Z. Zhou, C. Yang, Y. Cao, and X. Sun. 2018. Secret image sharing based on encrypted pixels. IEEE Access 6 (2018),
15021–15025. DOI:https://doi.org/10.1109/ACCESS.2018.2811722
ACM Trans. Multimedia Comput. Commun. Appl., Vol. 17, No. 1, Article 24. Publication date: April 2021.