HOME JOURNALS CONTACT

Information Technology Journal

Year: 2010 | Volume: 9 | Issue: 2 | Page No.: 298-304
DOI: 10.3923/itj.2010.298.304
Shadow Size Reduction and Multiple Image Secret Sharing Based on Discrete Fractional Random Transform
Zhenfei Zhao, Hao Luo and Zhe-Ming Lu

Abstract: This study proposes an improved image secret sharing scheme based on the discrete fractional random transform. In this (r, n)-threshold prototype, the shadow size is reduced to 1/r of the secret image. In contrast, all shadows are of the same size as that of the secret image in the original scheme. Consequently, much storage space and transmission time is saved. Besides, our scheme can be naturally extended to multi-image secret sharing, i.e., r secret images can be encrypted in n shadows at a time. Meanwhile, the security is perfectly preserved due to the randomness of the discrete fractional random transform. Experimental results demonstrate the effectiveness of our scheme.

Fulltext PDF Fulltext HTML

How to cite this article
Zhenfei Zhao, Hao Luo and Zhe-Ming Lu, 2010. Shadow Size Reduction and Multiple Image Secret Sharing Based on Discrete Fractional Random Transform. Information Technology Journal, 9: 298-304.

Keywords: Image secret sharing, discrete fractional random transform and shadow size reduction

INTRODUCTION

Secret sharing plays an important role in image encryption. In the (r, n)-threshold model (Shamir, 1979), the secret image is encrypted and shared in n shadows. If any r or more than r shadows polled, the original secret can be decrypted, while r-1 or fewer shadows cannot recover any meaningful information. Thien and Lin (2002) first apply the Shamir’s paradigm for image secret sharing. After that, various image secret sharing schemes are reported in literatures. Most of these schemes made great efforts in two aspects. (1) Reducing the shadow size (Wu et al., 2004; Lin and Tsai, 2003; Yang and Chen, 2005, 2006; Wang and Su, 2006). In Shamir’s paradigm, each shadow is of the same size as the secret image. Thus a heavy burden is laid on network resources and transmission channels. Reducing the shadow size can alleviate this problem. (2) Encrypting multiple secret images. In recent years, multi-secret sharing is investigated in literatures (Yang et al., 2004; Feng et al., 2005; Tsai et al., 2002; Wu and Chang, 2005). Obviously, hiding multiple secrets instead of one enhances the sharing efficiency.

It is necessary to note that, most of the available image secret sharing schemes such as the above mentioned methods are based on spatial domain pixels operations. Recently, Liu et al. (2008) proposed an (r, n)-threshold scheme for image sharing from a new prospect, i.e., based on transform domain coefficients operations. In particular, the discrete fractional random transform (DFRNT) (Liu et al., 2005) is employed to achieve this. This scheme is effective and perfectly secure due to the DFRNT exploited. However, in this scheme all of the shadows are of the same size as that of the secret image and thus much storage space is required and more transmission time is spent. Another important property of Liu et al. (2008) scheme is that only one secret image can be encrypted at a time. Thus its encryption efficiency is not very high. In fact, a Largrange interpolation-based method for shadow size reduction has been proposed by Thien et al. (2002), with each shadow being 1/r size of the secret image. In this study, we improve Liu et al. (2008) scheme to achieve this goal. Moreover, our scheme still preserves high security due to the randomness of DFRNT. Our improvement can be naturally extended to multi-image secret sharing.

As both Liu et al.’s and our schemes are based on DFRNT, we briefly review the DFRNT (Liu et al., 2005) and Liu et al.’s image sharing scheme (Liu et al., 2005). DFRNT is a generalized transform for one or two-dimensional discrete signal analysis derived from the discrete fractional Fourier transform (DFrFT). Specifically, we focus on the DFRNT usage on two-dimensional data. The DFRNT of a two-dimensional image X can be represented as:

(1)

where, Rα and α denote the kernel matrix and the fractional order of DFRNT, respectively. The superscript T means matrix transposition. The output matrix Y is composed by the transform coefficients in the DFRNT domain.

To construct a transform matrix Rα, a random matrix P must be generated obtain in advance as:

(2)

where, Q is a real nonsingular matrix with elements randomly generated. Suppose V = (v1,v2,…vN) denotes the normalized eigenvector matrix of P. That is, the ith column of V, vq (1≤q≤N) corresponds to the qth eigenvector. Obviously, any two eigenvectors are orthonormal because P is a real symmetric matrix. Then we can obtain Rα as:

(3)

where, Dα is a diagonal matrix defined as:

(4)

where, t denotes the periodicity of DFRNT.

Obviously, DFRNT is a random transform due to the randomness of Rα. In other words, a different P (i.e., Q) corresponds to a different Rα and further different DFRNT. Specifically, when α = kt/2 (k is a constant integer), the output of DFRNT is also real for a real signal (Liu et al., 2005). For simplicity, we set t = 1, k = 1 and α = 0.5 in our context.

In Liu et al. (2008) scheme the original image X is encrypted via DFRNT first and then the DFRNT coefficient matrix Y can be obtained according to Eq. 1. Next, r-1 random nonsingular matrices K1, K2, …Kr-1 are generated. Finally, n shadows are produced as:

(5)

where, wi,j (1≤i≤n, 1≤j≤r) is the weighting factor chosen in advance. In decryption, assume r shadows are collected, a linear equation set can be constructed with r shadows and the associated weighting factors are known, while K1, K2, …, Kr-1 and Y are unknown. Thus the task of recovering the DFRNT coefficient matrix Y is reduced to solving this equation set. At last, the inverse DFRNT is performed on Y and thus the secret image X is reconstructed.

PROPOSED SCHEME

Motivation: In Liu et al.’s scheme, the random matrices K1, K2, …, Kr-1 produced in encryption are no longer required during decryption. This is one of the key advantages in their scheme. However, this principle leads to the each shadow Si (1≤i≤n) is equal sized as the input secret image Y, i.e., X. In addition, only one secret Y is encrypted in Eq. 5. After carefully examined the strategies of Liu et al.’s scheme, we find that besides Y, actually the other r-1 coefficients K1, K2, …, Kr-1 are also decrypted along with the secret image. Motivated by this, we can also exploit K1, K2, …, Kr-1 to carry some secret image information instead of meaningless random matrices. In this way, Liu et al.’s scheme can be improved in two cases. One is the shadow size can be reduced and the other is multiple secret images instead of one can be encrypted every time.

Reducing shadow size: In the shadow size reduction improvement, the input content is a single image. Suppose the input secret image I is a gray-level image with the size of WxH pixels, the encryption and decryption procedures are described below.

Encryption stage: The encryption stage is described as follows:

Step 1: Permute the secret image I into X with a pseudo-random sequence. This operation aims to decorrelate the secret image pixels in spatial domain. Although our method’s security is guaranteed by the randomness of DFRNT as explained in the later context, this step is still necessary to scramble the input image so that the finally shadows seem as random noise.

Step 2: Partition the permuted image X into r equal sized segments X1, X2, …, Xr, i.e., 1/r size of X. Suppose each of X1, X2, …, Xr is of the size WsxHs pixels.

Step 3: Generate a random matrix Q according to a secret key kQ and obtain Rsα as that in Liu et al.’s scheme. The difference between Liu et al.’s and our scheme lies in our transform matrix is prepared for the segments of input image, not for the input image in Liu et al.’s scheme. In particular, firstly generate a random real nonsingular matrix Q of the size WsxHs. Secondly, the matrix P is obtained according to Eq. 2. Obviously, P and Q are of the same size. Thirdly, a WsxHs transform matrix Rsα of DFRNT is produced according to Eq. 3 and 4.

Step 4: Perform the DFRNT transform on X1, X2, …, Xr respectively according to Eq. 6 and the corresponding Y1, Y2, …, Yr are obtained.

(6)

where, 1≤j≤r.

Step 5: Generate n shadows S1, S2, …, Sn as:

(7)

where, wi,j (1≤i≤n, 1≤j≤r) is the element of a constant weight matrix given in advance. Note this constant weight matrix must not be a singular matrix. In this way, n shadows are produced with each being WsxHs pixels, i.e., 1/r size of the input secret image.

Decryption stage: The decryption stage is described below:

Step 1: Suppose r different shadows S'1, S'2, …, S'r are collected for decryption. Construct a linear equation set as:

(8)

where, S'1, S'2, …, S'r are r different shadows collected from S1, S2, …, Sn and w'i,j are the associated weighting factors retrieved from the weight matrix. Thereby, Y1, Y2, …, Yr can be obtained by solving this linear equation set. If more than r shadows are collected, these coefficient matrices also can be decrypted similarly from any r shadows randomly selected among them.

Step 2: Generate a random matrix Q according to a same key kQ, further obtain the Rsα as Eq. 3 and 4.

Step 3: Perform the inverse DFRNT transform on Y1, Y2,…, Yr as Eq. 9 and thus the corresponding secret image segments X1, X2, …, Xr are recovered.

(9)

where, 1≤j≤r and the superscript -1 denotes the inverse matrix.

Step 4: Obtain the permuted secret image X by rearranging X1, X2, …, Xr.

Step 5: Perform the inverse permutation on X with the same pseudo-random sequence and thus the original secret image I is reconstructed.

Multiple secret images sharing: In the multiple secret images sharing improvement, the input content is composed by a set of equal sized secret images I1, I2, …, Ir. Each of the secret images can be any type of content. Suppose each of them is a gray-level image with the size of WxH pixels, the encryption and decryption procedures are described below.

Encryption stage: The encryption stage is described as follows:

Step 1: Permute the secret images I1, I2, …, Ir into X1, X2,…, Xr with a pseudo-random sequence. This operation is for neighboring pixels decorrelation.

Step 2: Generate a random matrix Q according to a secret key kQ and obtain Rmα. That is, firstly generate a random real nonsingular matrix Q of the size WxH. Secondly, the matrix P is obtained according to Eq. 2. Obviously, P and Q are of the same size. Thirdly, a WxH transform matrix Rmα of DFRNT is produced according to Eq. 3 and 4.

Step 3: Perform the DFRNT transform on X1, X2, …, Xr respectively according to Eq. 10 and the corresponding Y1, Y2, …, Yr are obtained.

(10)

where, 1≤j≤r.

Step 4: Generate n shadows S1, S2, …, Sn as Eq. 7. Hence, n shadows are produced with each being WxH pixels.

Decryption stage: The decryption stage is described below:

Step 1: Suppose r different shadows S'1, S'2, …, S'r are collected for decryption. Construct a linear equation set as Eq. 8. S'1, S'2, …, S'r are r different shadows collected from S1, S2, …, Sn. Thereby, Y1, Y2, …, Yr can be obtained by solving this linear equation set. If more than r shadows are collected, these coefficient matrices also can be decrypted similarly from any r shadows randomly selected among them.

Step 2: Generate a random matrix Q according to a same key kQ, further obtain the Rmα as Eq. 3 and 4.

Step 3: Perform the inverse DFRNT transform on Y1, Y2,…, Yr as Eq. 11 and thus the corresponding secret image segments X1, X2, …, Xr are recovered:

(11)

where, 1≤j≤r and the superscript -1 denotes the inverse matrix.

Step 4: Perform the inverse permutation on X1, X2, …, Xr with the same pseudo-random sequence and thus the original secret image I1, I2, …, Ir is reconstructed.

RESULTS

Four 512x512 gray-level images, Lena, Boat, Barbara and F16 as shown in Fig. 1 are selected as test images to evaluate the performance of our scheme. In our experiments, both Q and W are uniformly distributed random nonsingular matrices. First, the shadow size reduction performance of our scheme is validated. The Lena image is chosen as the secret image and shared with a (4, 6)-threshold model (Fig. 2a-m). It is permuted before encryption as shown in Fig. 2b and partitioned into four equal sized segments. Then each segment is encrypted with DFRNT and thus four corresponding encrypted segments are produced, as shown in Fig. 2d-g. Next, these encrypted segments are shared in 6 shadows as shown in Fig. 2h-m.

Fig. 1: 512x512 test secret images, Lena, Boat, Barbara and F16 (from left to right)

Fig. 2: Sharing Lena image with a (4, 6)-threshold model, (a) the original secret image, (b) the permuted secret image, (c) the reconstructed image, (d-g) the DFRNT coefficients of four segments and (h-m) six shadows S1-S6

In decryption, suppose four shadows S1, S3, S4, S6 shown in Fig. 2h, j, k, m are collected and then four DFRNT coefficient matrices are obtained by solving a simultaneous equation set constructed by these four shadows. Next, the inverse DFRNT transform is performed on these DFRNT coefficients matrices and thereby the corresponding X1, X2, X3 and X4 are recovered. Then X1, X2, X3 and X4 are rearranged into the permuted secret image X. At last, X is inversely permuted to the secret Lena image. If the shadows are accurately stored and transmitted, the reconstructed Lena as shown in Fig. 2c is exactly the same as the original one.

Fig. 3: The reconstructed secret image with a wrong Rα

To test the security of our scheme, we also apply another Rsα to decrypt the secret Lena. Actually, this Rsα is different from that used in Fig. 2 because it is generated by another random Q matrix. From the results shown in Fig. 3, there is no meaningful content revealed. This demonstrates that the security of our scheme is still guaranteed due to the DFRNT’s sensitivity of Rsα. In practice, the weight matrix also can be used as an extra key if necessary.

Second, the multi-image secret sharing ability of our scheme is tested. This is also achieved by employing the usage of random matrices produced in encryption. Suppose the Boat, Barbara and F16 images are shared together with a (3, 5)-threshold model. We only need to permute and encrypt them respectively. In this way, three corresponding DFRNT coefficient matrices are produced and further five 512x512 shadows are generated according to Eq. 7. The secret decryption is the inverse process of encryption and each original image is reconstructed individually. The encryption and decryption strategies are shown in Fig. 4 and 5, respectively.

It is necessary to note that, besides gray-level image, our scheme is also suitable for color image secret sharing. Given a color image, we only need to decompose it into red, green and blue channels and encrypt each channel as a gray-level image.

Fig. 4: Encryption strategy of multi-image secret sharing based on DFRNT

Fig. 5: Decryption strategy of multi-image secret sharing based on DFRNT

DISCUSSION

According to the experimental results, we can find that the difference between our scheme and the existing methods lies in the following two aspects. (1) The security of our scheme is guaranteed by several keys. One is the kernel transform of DFRNT, i.e., the matrix Q. The other is the permutation key used for scrambling the input images. This is different from the available image secret sharing schemes for usually only one key is preserved in decryption. In other words, our scheme can be maintain a higher security when both keys are required in decryption. (2) Our scheme maintains the two-layer abilities. One is for shadow size reduction to 1/r and the other is for multiple image secret sharing. Both of them are easily realized with DFRNT. In contrast, most image secret sharing schemes proposed in literatures are designed for only one purpose. That is, in one case, a single image is shared for small shadows; in the other case, multiple images are input for encryption at the same time. In a word, our scheme is a novel prototype for both application scenarios.

CONCLUSION

An improved (r, n)-threshold image secret sharing scheme based on DFRNT is proposed in this paper. To share one secret image, the size of each shadow is reduced to 1/r size of the original image and thus much storage space and transmission time is saved. In addition, our scheme can be naturally extended to a (r, n)-threshold multi-image secret sharing prototype. It allows parallel secret sharing and reconstruction. That is, r secret images can be shared in n shadows at a time and decrypted simultaneously. Perfect security is preserved in our scheme due to the randomness of DFRNT.

REFERENCES

  • Shamir, A., 1979. How to share a secret. Commun. ACM, 22: 612-613.
    CrossRef    Direct Link    


  • Thien, C.C. and J.C. Lin, 2002. Secret image sharing. Comput. Graph., 26: 765-770.
    CrossRef    Direct Link    


  • Wu, Y.S., C.C. Thien and J.C. Lin, 2004. Sharing and hiding secret images with size constraint. Pattern Recognition, 37: 1377-1385.
    CrossRef    Direct Link    


  • Lin, C.C. and W.H. Tsai, 2003. Secret image sharing with capability of share data reduction. Opt. Eng., 42: 2340-2345.
    CrossRef    Direct Link    


  • Yang, C.N. and T.S. Chen, 2006. Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recognition, 39: 1300-1314.
    CrossRef    Direct Link    


  • Wang, R.Z. and C.H. Su, 2006. Secret image sharing with smaller shadow images. Pattern Recogn. Lett., 27: 551-555.
    CrossRef    Direct Link    


  • Yang, C.N. and T.S. Chen, 2005. Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recognition Lett., 26: 193-206.
    CrossRef    Direct Link    


  • Yang, C.C., T.Y. Chang and M.S. Hwang, 2004. A (t, n) multi-secret sharing scheme. Applied Mathematics Comp., 151: 483-490.
    CrossRef    Direct Link    


  • Feng, J.B., H.C. Wu, C.S. Tsai and Y.P. Chu, 2005. A new multi-secret images sharing scheme using Largranges interpolation. J. Syst. Software, 76: 327-339.
    CrossRef    Direct Link    


  • Tsai, C.S., C.C. Chang and T.S. Chen, 2002. Sharing multiple secrets in digital images. J. Syst. Software, 64: 163-170.
    CrossRef    Direct Link    


  • Wu, H.C. and C.C. Chang, 2005. Sharing visual multi-secrets using circle shares, Comput. Standards Interf., 28: 123-135.
    CrossRef    Direct Link    


  • Liu, Z., S. Liu and M.A. Ahmad, 2008. Image sharing scheme based on discrete fractional random transform. Opt. Int. J. Light Electron. Opt.,
    CrossRef    


  • Liu, Z., H. Zhao and S. Liu, 2005. A discrete fractional random transform. Optics Commun., 255: 357-365.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved