
Citation: Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xianhua Song. Ramp secret image sharing[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4433-4455. doi: 10.3934/mbe.2019221
[1] | Lina Zhang, Jing Zhang, Jiaqi Sun, Qingpeng Chen . A global progressive image secret sharing scheme under multi-group joint management. Mathematical Biosciences and Engineering, 2024, 21(1): 1286-1304. doi: 10.3934/mbe.2024055 |
[2] | Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang . A novel secret sharing scheme using multiple share images. Mathematical Biosciences and Engineering, 2019, 16(6): 6350-6366. doi: 10.3934/mbe.2019317 |
[3] | Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan . Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287 |
[4] | Guozheng Yang, Lintao Liu, Xuehu Yan . A compressed secret image sharing method with shadow image verification capability. Mathematical Biosciences and Engineering, 2020, 17(4): 4295-4316. doi: 10.3934/mbe.2020237 |
[5] | Li-na Zhang, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, Jing Zhang . Two-level QR code scheme based on region matrix image secret sharing algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16678-16704. doi: 10.3934/mbe.2023743 |
[6] | Jingju Liu, Lei Sun, Jinrui Liu, Xuehu Yan . Fake and dishonest participant location scheme in secret image sharing. Mathematical Biosciences and Engineering, 2021, 18(3): 2473-2495. doi: 10.3934/mbe.2021126 |
[7] | Li-na Zhang, Chen-yu Cui, Xiao-yu Zhang, Wei Wu . Adaptive visual cryptography scheme design based on QR codes. Mathematical Biosciences and Engineering, 2022, 19(12): 12160-12179. doi: 10.3934/mbe.2022566 |
[8] | Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang . Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093 |
[9] | Xingxing Jia, Yixuan Song, Daoshun Wang, Daxin Nie, Jinzhao Wu . A collaborative secret sharing scheme based on the Chinese Remainder Theorem. Mathematical Biosciences and Engineering, 2019, 16(3): 1280-1299. doi: 10.3934/mbe.2019062 |
[10] | Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu . Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318 |
Secret image sharing (SIS) belongs to but differs from secret sharing, and image is widely used and covers many privacies [2,1], thus, SIS should be specially studied and designed. In a (k,n) threshold SIS scheme, it aims at splitting a secret image into n shadows, i.e., shares or shadow images, which are then assigned to n participants. The secret can be disclosed by any k or more shadows while less than k shadows gain nothing of the secret. SIS can be applied to many scenarios, such as key management, access control, information hiding, authentication, watermarking, transmitting passwords, and distributed storage and computing in cloud computing [3,4,5,6,7,8]. In the field of SIS research, there are mainly Shamir's polynomial-based scheme [9] and visual secret sharing (VSS) [10] also called visual cryptography scheme (VCS) [11].
Shamir's original polynomial-based SIS [9,12] for (k,n) threshold splits a secret image into the constant coefficient of a random (k−1)-degree polynomial to generate n shadows, which are then assigned to n participants. The secret image can be disclosed with high-resolution by means of Lagrange interpolation with any k or more shadows. Inspired by Shamir's original scheme, some researchers [13,14,15,16,17,18] proposed more polynomial-based schemes to possess more features. Although polynomial-based SIS only needs k shadows for disclosing the distortion-less secret image, it has high computational complexity because of Lagrange interpolation and "all-or-nothing".
In (k,n) threshold VSS [19,20,21,22,23,24], the outputted n shadows are printed onto transparencies and then assigned to n participants. The beauty of VSS is that the secret image is disclosed by superposing any k or more shadows with human native eyes and no cryptographic computation. Collecting less than k shadows will in general give no clue about the secret image even a watchdog owns infinite computation power. Unfortunately, original VSS suffers from codebook design, pixel expansion problem, low contrast and "all-or-nothing", which are taken into account by the following works [23,25,26,27,28,29,30,31,32]. Furthermore, most of the existing VSS schemes have limitations of lossy recovery and "all-or-nothing" [29,33,34].
In contrast to "all-or-nothing", progressive secret image sharing (PSIS) [33,35,36,37,38] achieves the characteristic that the more shadows the better disclosed secret image quality. PSIS is useful in many multimedia applications, such as art work image vending, Pay-TV/Music, multi-level representation and degraded encryption, where we need to intentionally disclose the multimedia with a degraded but recognizable quality so as to protect the details in addition to multimedia content. Unfortunately, conventional PSIS may be lossy recovery. Progressiveness can be divided into global progressiveness and regional progressiveness. Global progressive PSIS mainly protects the detail of the secret image progressively, while regional progressive PSIS mainly protects the secret image region by region. Since the paper intends to protect the detail of the secret image, we focus on global progressiveness in this article. However, PSIS is mainly for (k,n) threshold, where lossless recovery is seldom achieved.
Based on above analyses, conventional SIS has the drawback of "all-or-nothing" and conventional PSIS has the limitation of lossy recovery. Thus, we intend to propose ramp SIS which achieves both progressive and lossless recovery by a unique disclosing method.
In this article, first we introduce ramp SIS definition according to image features and ramp secret sharing [39,40,41]. Then we propose (k1,k2,n) ramp SIS based on the Chinese remainder theorem (CRT) [42,43,44]. In the proposed ramp, i.e., (k1,k2,n) threshold, CRT-based SIS, when we collect any k1 or more and less than k2 shadows, the secret image will be disclosed in a progressive way [45]. On the other hand, when we collect any k2 or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic resulting in ability in real-time application. We give theoretical analyses and experiments to display the effectiveness of our method.
Our method allows the purchaser to review the secret with a degraded quality by collecting less shadows prior to buying them. Then the purchaser can obtain the lossless version by collecting more shadows after he decides to buy it. Image generally differs from data, thus the progressive feature with poor quality of image makes sense to some applicable scenarios. The progressive feature achieves that the quality of the image can be partially degraded. Such perceptibility makes it possible for the potential purchasers to view low-quality copies of the image prior to buying them.
A detailed scenario is given as follows. In the process of displaying and selling an art image, since the details are very important for the art image, details should be protected. After sharing the art image once, the owner can disclose and present different image qualities to different people on different occasions, instead of sharing again. For example, in an exhibition, first the owner can demonstrate a low quality of the art image with any k1 or more shadows to prove the copyright of the art, then after reaching a purchase agreement he shows the lossless quality with any k2 or more shadows.
The detailed advantages and contributions of the proposed approach are as follows.
1. A formal definition of ramp SIS is first introduced.
2. (k1,k2,n) ramp SIS based on CRT is proposed. We use CRT due to the following advantages comparing to polynomial-based SIS. On one hand, CRT-based SIS can achieve lossless recovery, while most of the polynomial-based SIS schemes are in general lossy. On the other hand, the disclosed operation of polynomial-based SIS is Lagrange's interpolation (O(klog2k)), while that of CRT-based SIS is only modular operation (O(k)) [44], therefore, CRT-based SIS has lower computational cost than polynomial-based SIS to disclose the secret image.
3. The secret image is decoded by only modular operation. When we collect any k2 or more shadows, the secret image will be disclosed losslessly, which outperforms polynomial-based SIS due to lossy recovery for secret pixel value larger than 250 if 251 is selected as the prime value in polynomial-based SIS.
The rest of the paper is organized as follows. Section 2 introduces ramp SIS definition and some basic requirements for the proposed method. In section 3, the proposed method and its analyses are presented in detail. Section 4 gives the security analyses of typical SIS schemes. Section 4 is devoted to experimental results. Finally, section 5 concludes this paper.
In this section, we will give some preliminaries. In conventional (k,n) threshold SIS, an original secret image S is encrypted into n shadows SC1,SC2,⋯SCn, and the decrypted secret image S′ is disclosed from any t (k≤t≤n,t∈Z+) shadows.
CRT was first exploited in the Western han dynasty of China as well as formally introduced in the southern and northern dynasties. It intends to solve a set of linear congruence equations.
When we choose a set of integers mi(i=1,2,⋯,k) satisfying gcd(mi,mj)=1,i≠j, then there is a unique solution y≡(a1M1M−11+a2M2M−12+⋯+akMkM−1k)(modM), y∈[0,M−1]) to Eq. (2.1).
y≡a1(modm1)y≡a2(modm2)⋯y≡ak−1(modmk−1)y≡ak(modmk) | (2.1) |
where M=∏ki=1mi, Mi=M/mi and MiM−1i≡1(modmi).
Proof. Since gcd(mi,mj)=1,i≠j, gcd(mi,Mi)=1 and we have M−1i subject to MiM−1i≡1(modmi).
For a1M1M−11, we have
aiMiM−1i≡ai(modmi),i≠j | (2.2) |
aiMiM−1i≡ai(modmj), | (2.3) |
According to Eqs. (2.2) and (2.3), y≡(a1M1M−11+a2M2M−12+⋯+akMkM−1k)(modM), y∈[0,M−1] subject to Eq. (2.1).
Thus, on one hand, y is one solution to Eq. (2.1).
On the other hand, if both y1 and y2 are solutions to Eq. (2.1), we have y1−y2≡0(modmi). Since gcd(mi,mj)=1,i≠j, M is exactly divided by y1−y2. In addition, y is one solution to Eq. (2.1), thus, the set of solutions to Eq. (2.1) is {zM+y|z∈Z}.
Therefore, there is a unique solution y≡(a1M1M−11+a2M2M−12+⋯+akMkM−1k)(modM), y∈[0,M−1]) to Eq. (2.1).
CRT will be utilized in the proposed scheme to possess (kx,n) threshold, where 2≤k1≤kx≤k2≤n. Both Polynomial-based SIS and CRT-based SIS are well studied. We use CRT in our scheme due to the following advantages and differences.
● The shadow size of polynomial-based SIS is easier to be reduced.
● CRT-based SIS easily achieves lossless reconstruction, while most polynomial-based SIS schemes are not lossless.
● The disclosing operation is Lagrange's interpolation (O(klog2k) in polynomial-based SIS, while that is modular operation (O(k) [46]) in CRT-based SIS, thus CRT-based SIS has lower computational complexity than polynomial-based SIS to disclose the secret image.
● The principle of CRT-based SIS is complex and hard to be understood.
● The number of owners is in general not limited in polynomial-based SIS, while that in CRT-based SIS is small like n ≤ 6, because as n increases the available value of mi decreases, which will affect the distribution of the values of the shadow pixels and therefore further may lead to secure issue.
Digital image differs from pure electronic data, where the differences mainly have:
● An image includes many pixels, which have correlations between adjacent ones, such as structure, texture, edge and other related information. The correlations are important to security and hence need to be considered in SIS algorithm design. Thus, SIS should encrypt not only the pixel values but also the correlations between adjacent pixels.
● There are lots of pixels in an image so that computational complexity of SIS should be considered.
● An image owns special file storage structure. Using grayscale image as an example, its pixel value is in the range of [0,255], which should be satisfied in SIS design, e.g., the output value, the input value, and other relative parameters, should lie in the range. For example, the secret pixel value range and the shadow pixel value range should not exceed the range. In addition, we have mi≤256 when applying to CRT.
● An image is a specific form of the data, where each grayscale (binary) pixel is represented as one byte (bit), so SIS is easily to be applied to secret sharing.
● In general, secret data is available only if it is losslessly recovered. Whereas, an image may be useful when recovered with some errors because of human eyes' low pass filter feature, thus, progressiveness makes sense to SIS.
The above differences lead to that in general traditional secret sharing cannot be directly applied to SIS. In particular, CRT-based ramp secret sharing cannot be directly applied to CRT-based ramp SIS.
Definition 1. A SIS splits a secret image, denoted as S, into n shadow images, denoted as SC1,SC2,⋯SCn. We say the SIS is a (k1,k2,n) ramp SIS subject to:
● security condition. The secret image cannot be reconstructed with any less than k1 shares.
● ramp recovery condition. The secret image will be reconstructed progressively with any k1 or more and less than k2 shares. The reconstructed image quality increases with the number of shares from k1 to k2.
● decodable condition. The secret image is decoded with any k2 or more shares.
If k1=k2=k, (k1,k2,n) ramp SIS will reduce to (k,n)-threshold SIS. The ramp SIS is called linear ramp SIS if the reconstructed image quality increases linearly with the number of shares from k1 to k2.
In VSS, contrast is generally used, which is also adopted in this paper to evaluate the quality in VSS. In polynomial-based SIS, in general due to lossless recovery the metrics are seldom considered. In the research field of image processing, there are many metrics to evaluate image quality, where some typical metrics will be directly adopted in this paper.
The visual quality in VSS, which can decide how well human eyes can recognize the disclosed image, of the disclosed secret image S′ corresponding to secret image S can be overall evaluated by contrast as follows [28].
Definition 2.
α=P0−P11+P1=P(S′[AS0]=0)−P(S′[AS1]=0)1+P(S′[AS1]=0) | (2.4) |
Where α is contrast, P0 (resp., P1) means the probability of white pixels in the disclosed image S′ for the corresponding white (resp., black) area in secret image S, that is, P0 denotes correctly decrypted probability corresponding to white area in secret image S, and P1 denotes wrongly decrypted probability corresponding to black area in secret image S.
Since lossless disclose or nothing, i.e., "all-or-nothing", conventional SIS for grayscale image omits to discuss quality evaluation of disclosed secret image. Progressiveness differs from "all-or-nothing", therefore, we should discuss the quality evaluation of the disclosed gray secret image. The following typical objective metrics will be adopted to evaluate the image quality between S′ and S.
1. Peak signal-to-noise-ratio (PSNR): PSNR, in Eq. (2.5), between the primary image I with size of M×N and modified image I′ is adopted to measure the image similarity, where MSE as Eq. (2.6) denotes the mean square error.
PSNR=10log10(2552MSE)dB | (2.5) |
MSE=1M×NM∑i=1N∑j=1[I′(i,j)−I(i,j)]2 | (2.6) |
2. Structural similarity index measure (SSIM) [47] is to assess the visual impact of three characteristics in an image, i.e., luminance, contrast and structure, which gains a multiplicative combination of the above three terms, as Eq. (2.7). The value of SSIM is in -1 and 1. The larger SSIM results in higher image similarity.
SSIM(x,y)=[l(x,y)]α⋅[c(x,y)]β⋅[s(x,y)]γ | (2.7) |
where
l(x,y)=2μxμy+C1μ2x+μ2y+C1c(x,y)=2σxσy+C2σ2x+σ2y+C2s(x,y)=2σxy+C3σxσy+C3
μx,μy,σx,σy,andσxy are the local means, standard deviations, and cross-covariance for images x,y. In this paper, we set C3=C22,α=β=γ=1.
3. NC is to evaluate the quality between the original secret image and the disclosed secret image, as Eq. (2.8).
NC(I,I′)=1M∑i=1N∑j=1I2(i,j)M∑i=1N∑j=1I(i,j)×I′(i,j) | (2.8) |
4. The universal quality index (UQI) [48] can reflect the distortion of the disclosed secret image with its original secret image, whose value is between -1 and 1. The larger UQI means better quality. The block size of UQI is 8 in this paper. For details please refer to [48].
In addition, contrast can decide how well human eyes recognize the disclosed binary secret, so that it is expected to be as great as possible to obtain better visual quality. About how the contrast values map to the quality of the disclosed image, please refer to [49]. Herein, in order to show some intuitions about the expected performance, we have the followings.
1. When α∈ [0, 0.03], one cannot recognize the secret image.
2. When α∈ (0.03, 0.14], one can see a little information of the secret image.
3. When α∈ (0.14, 0.21], the secret image is recognized with acceptable quality.
4. When α∈ (0.21, 1], the secret image is fast recognized with good quality.
About how the PSNR values map to the image quality [50], we may refer to the followings.
1. When PSNR ∈ [28.5, +∞], the image quality is very good.
2. When PSNR ∈ [23.0, 28.5), the image quality is good.
3. When PSNR ∈ [19.5, 23.0), the image quality is medium.
4. When PSNR ∈ [17.0, 19.5), the image quality is poor.
5. When PSNR ∈ [0, 17.0), the image quality is bad.
Algorithm 1. The proposed (k1,k2,n) ramp SIS |
Input: A secret image S with size of H×W and threshold parameters (k1,k2,n), where 2≤k1≤k2≤n. Output: n shadows SC1,SC2,⋯SCn and corresponding private integers m1,m2,⋯mn. |
Step 1: Choose a set of integers {128≤p<m1<m2⋯<mn≤256} to satisfy 1. gcd(mi,mj)=1,i≠j. 2. gcd(mi,p)=1 for i=1,2,⋯,n. 3. Mkx>pNkx for any 2≤k1≤kx≤k2. where Mkx=∏kxi=1mi, Nkx=∏kx−1i=1mn−i+1 and p is public. Step 2: Calculate Tkx=[⌊Mkxp−1⌋−⌈Nkxp⌉2+⌈Nkxp⌉] for kx=k1,k1+1,⋯k2 and Tkx is public as well among all the participants. For each coordinate (h,w)∈{(h,w)|1≤h≤H,1≤w≤W}, repeat Steps 3-5. Step 3:For now processing pixel value s=S(h,w), we select randomly a threshold kx∗ in [k1,k2]. Step 4:If 0≤x<p, randomly pick up an integer A in [Tkx∗+1,⌊Mkx∗p−1⌋] and compute y=s+Ap. Else randomly pick up an integer A in [⌈Nkx∗p⌉,Tkx∗) and y=s−p+Ap. Step 5:Calculate ai≡y(modmi) and compute SCi(h,w)=ai for i=1,2,⋯,n. Step 6: Output n shadows SC1,SC2,⋯SCn and their private corresponding integers m1,m2,⋯mn. |
We give the proposed (k1,k2,n) ramp SIS based on CRT in Algorithm 1 with an original secret image S leading to n output shadows SC1,SC2,⋯SCn and private corresponding integers m1,m2,⋯mn. The recovery Steps are described in Algorithm 2.
In Algorithm 1 and Algorithm 2, we find that.
1. In Step 1 of the proposed Algorithm 1, {128≤p<m1<m2⋯<mn≤256} is given due to image pixel value range and pNkx<Mkx. We suggest here that p is as small as possible for security and mi is as large as possible, thus, the pixel values of shadow will be randomly distributed in large range.
2. gcd(mi,mj)=1 and gcd(mi,p)=1 intend to satisfy CRT conditions, where mi may be preserved as the private key for participant i or may be public. gcd(mi,p)=1 is on account of not only applicable CRT but also containing all possible pixel values in range [0,mi) for shadow SCi. We note that, our method can accommodate only a constant number of participants because in Step 1 of Algorithm 1 one has to choose n+1 integers between 128 and 256, which must be pairwise relatively prime and whose available numbers are more than 23 but less than 128. However, these numbers can satisfy general applications.
Algorithm 2. Recovery for the proposed scheme. |
Input: t shadows SCi1,SCi2,⋯SCit, their corresponding private integers mi1,mi2,⋯mit, p and Tkx for kx=k1,k1+1,⋯k2, where k1≤t. Output: A H × W disclosed secret image S′. |
Step 1:For each coordinate (h,w)∈{(h,w)|1≤h≤H,1≤w≤W}, repeat Steps 2-5. Step 2:Calculate aij=SCij(h,w) for j=1,2,⋯,t. Let's solve the following linear equations according to CRT. y ≡ai1(modmi1)y ≡ai2(modmi2) ⋯y ≡ail−1(modmit−1)y ≡ait(modmit) (3.1) Step 3:Calculate T∗=⌊yp⌋. Step 4:For kx=k1,k1+1,⋯k2, if T∗≥Tkx, let skx≡y(modp); otherwise let skx=y(modp)+p. Step 5:kx∗=argminkx∈[k1,k2]{kx|skx=skx+1=⋯=smin(t,k2)}. Set S′(h,w)=skx∗. Step 6:Output the disclosed secret image S′. |
3. In Step 2 of Algorithm 1, Tkx divides interval [⌈Nkxp⌉,⌊Mkxp−1⌋] into two parts with a view to classify 0≤x<p or p≤x≤255 according to Step 4 of Algorithm 2. As a result, s can be losslessly disclosed for arbitrary x∈[0,255].
4. In Step 4 of our Algorithm 1, we know A is randomly picked up from [⌈Nkxp⌉,⌊Mkxp−1⌋], thus, Nkx≤y<Mkx in order to obtain (kx,n) threshold for y as explained in Section 2.1.
5. In Step 4 of Algorithm 1, A is randomly selected for every secret pixel s, hence y=s+Ap can enlarge s value in order to scramble both the correlations between adjacent pixels and the secret pixel value without auxiliary encryption.
6. In Step 4 of Algorithm 1, y=s+Ap and s<p will determine a unique s according to s≡y(modp).
7. In the recovery phase, for the current processing location (h,w), we do not know its threshold, thus, in Steps 4–5 of Algorithm 2 we search for the minimum threshold satisfying losslessly recovering the original secret pixel s, denoted as kx∗.
8. Our (k1,k2,n) threshold extension method may be also suitable for other SIS, such as polynomial-based SIS.
Moreover, we explain the differences between Algorithm 1 and the classical ones as follows.
1. Ramp SIS has not been formally introduced before our work.
2. CRT is first applied to Algorithm 1 to achieve ramp SIS.
3. Steps 1–4 of Algorithm 1 are different from the classical CRT-based SIS schemes since Steps 1–4 will achieve ramp SIS proved in Section 3.2.
We will show performances of the proposed method by theoretically analyzing the security, visual recognition and valid ramp threshold construction. In Theorem 1, we will prove that the proposed scheme is a valid (k1,k2,n) ramp SIS construction. Prior to the proof of Theorem 1, some Lemmas are given. Without loss of generality, in the following analyses, we assume that kx∗=k0 threshold is selected in Step 3 of Algorithm 1 for now processing pixel value s=S(h,w).
Lemma 1. Each shadow generated by our method gives no clue about the secret image.
Proof.
From y=s+Ap or y=s−p+Ap and ai≡y(modmi), we will prove SCi(h,w)=ai is random in range [0,mi).
If A is fixed, since s represents the pixel value of secret image, we assume s and s−p is random in range [0,255]. Due to ai≡(s+Ap)(modmi), we have ai is random in range [0,mi).
On the other hand, if s is fixed, gcd(mi,p)=1, thus, Ap(modmi) will cover all possible values in range [0,mi). We have s+Ap(modmi) will cover all possible values in range [0,mi) as well. As a result, we have ai is random in range [0,mi).
Thus, the Lemma is proved to be met.
Lemma 2. In the proposed scheme, any k0 or more shadow pixels can disclose the secret pixel losslessly.
Proof. Since s represents the pixel value of secret image, we will prove any k0 or more shadows can disclose s losslessly.
In order to disclose s, we only need to find y due to s≡y(modp) or s≡y(modp)+p.
When ai1,ai2,⋯aik0 are given, according to CRT, there exists only solution y modulo N1=∏k0j=1mij since N1≥Mk0. Finally we can uniquely determine y and thus, s based on Steps 4-5 of our Algorithm 2.
Lemma 3. In the proposed scheme, any k0−1 or less shadows give no clue about secret.
Proof. When k0−1 shadow pixels ai1,ai2,⋯aik0−1 are given, according to CRT then all we have is y0 modulo N2=∏k0−1j=1mij, where y0∈[0,N2−1]. On one hand, the true y∈[Nk0,Mk0−1], which is absolutely different from y0. On the other hand, since Nk0≥N2, Nk0≤y<Mk0 and gcd(N2,p)=1, in [N2,Mk0−1], y0+b∏k0−1j=1mij for b=1,2,⋯,mik0−1 are also the solutions for the collected k0−1 equations in Eq. (3.1). Thus, there are another mik0−1 solutions in [N2,Mk0−1], other than only one. Thus k0−1 or less shadows give no clue about secret.
Theorem 1. Our method is a valid (k1,k2,n) ramp SIS construction.
Proof. Based on the above Lemmas, we know for now processing pixel value s=S(h,w) (k0,n) threshold is achieved by our method.
Since sc1,sc2,⋯scn are generated according to the secret pixel s with (k0,n) threshold, we can disclose the secret s when we collect any k0 or more shadow pixels.
Since in Step 3 of Algorithm 1, for every processing pixel value s=S(h,w), a threshold kx in [k1,k2] is selected randomly, when we collect more than k1 shadows, more secret pixels will be disclosed losslessly so that the progressive quality of disclosed secret image will be gained. On the other hand, when we collect any k2 or more shadows, every pixel of the secret image is disclosed losslessly, thus, the secret image is disclosed losslessly. As a result, our method is a valid (k1,k2,n) ramp SIS construction.
In this section, experiments and analyses are taken into account to evaluate the effectiveness of the proposed scheme.
Figure 1 is one experimental result of our proposed (k1,k2,n) ramp CRT-based SIS, where p=128,m1=245,m2=247,m3=249,m4=251,m5=253, k1=2,k2=4,n=5 and its employed grayscale secret image is in Figure 1(a). Figures 1(b–f) are the generated 5 shadows, which are noise-like. Figures 1(g–j) display the disclosed grayscale secret image with any t(2≤t≤5) shadows by our recovery method, where S′1,2,⋯,t is the disclosed secret image S′ from SC1,SC2,⋯,SCt and for saving pages we only give the disclosed results with the first tth shadows. When more shadows are used, better disclosed secret image is obtained in [k1,k2], thus, the proposed (k1,k2,n) ramp SIS is progressive in [k1,k2]. The disclosed secret images with any k2 or more shadows, as Figures 1 (i)-(j), are the same as the original secret image in Figure 1 (a), since H∑h=1W∑w=1|S(h,w)−S′(h,w)|=0.
Furthermore, progressive rate can be adopted to evaluate the progressive effect of the disclosed secret image [51]. In Figure 1, taking PSNR as an example, the progressive rate at t=2 is 3.0746 and the progressive rate at t=3 is +∞.
In addition, Figure 2 shows shadows histogram analyses of proposed (k1,k2,n) ramp SIS corresponding to Figure 1. For each shadow, the pixel values are approximately uniformly distributed in range [0,mi−1], which tells that each shadow gives no clue about the secret image. In the following experiments, we will omit the shadows histogram analyses for saving pages.
Figure 3 is the further experimental result of our proposed (k1,k2,n) ramp CRT-based SIS, where p=128,m1=245,m2=247,m3=249,m4=251,m5=253, k1=3,k2=5,n=5 and its employed grayscale secret image is in Figure 3(a). Figures 3(b–f) are the generated 5 shadows, which are noise-like. Figures 3(g–j) display the disclosed grayscale secret image with any t(2≤t≤5) shadows by our recovery method. When less than k1 shadows are inspected, nothing of the secret image can be obtained. When k1 or more shadows are collected, the secret image can be disclosed in a degree. When more shadows are used, better disclosed secret image is obtained as well in [k1,k2], thus, the proposed (k1,k2,n) ramp SIS is progressive in [k1,k2] as well. The disclosed secret images with any k2 shadows as Figure 3(j) is the same as the original secret image Figure 3(a) as well.
Based on the above results we conclude that:
1. The shadows are noise-like, thus, every single shadow is secure.
2. When any t<k1 shadows are inspected, there is no information on the secret image is leaked except for image size, which shows security of our method.
3. When any t(k1≤t≤k2) shadows are collected, the secret image will be disclosed by our recovery method in a progressive way.
4. When we collect any k2 or more shadows, the secret image is disclosed losslessly by our recovery method.
5. (k1,k2,n) ramp SIS is achieved.
Some available parameters of p,m1,m2⋯,mn for different participant numbers are suggested in Table 1, some of which are applied to our experiments as well. The user can also search other parameters according to specific applications.
n | p | m1,m2⋯,mn |
2 | 128 | 253,255 |
2 | 131 | 253,254 |
3 | 128 | 251,253,255 |
3 | 131 | 253,254,255 |
4 | 128 | 247,251,253,255 |
4 | 131 | 251,253,254,255 |
5 | 128 | 245,247,249,251,253 |
5 | 131 | 247,251,253,254,255 |
Herein, we compare the proposed scheme with other related schemes especially VSS [28] and polynomial-based scheme [12], since they are typical SIS schemes. Furthermore, VSS in [28] is progressive without codebook design and pixel expansion based on stacking recovery. Polynomial-based scheme in [12] is fully lossless.
We note that, as stated in section 2.2, in general secret sharing is hard to be directly applied to SIS, thus, we omit the comparisons to ramp secret sharing.
Figure 4 is one experimental result of our proposed (k1,k2,n) ramp CRT-based SIS, where p=131,m1=251,m2=253,m3=254,m4=255, k1=2,k2=4,n=4 and its employed grayscale secret image is in Figure 4(a). Figures 4(b–e) are the generated 4 shadows, which are noise-like. Figures 4(f–h) display the disclosed grayscale secret image with any t(2≤t≤4) shadows by our recovery method. When more shadows are used, better disclosed secret image is obtained as well in [k1,k2], thus, the proposed (k1,k2,n) ramp SIS is progressive in [k1,k2]. The disclosed secret image with k2 shadows as Figure 4 (h) is the same as the original secret image Figure 4 (a), since H∑h=1W∑w=1|S(h,w)−S′(h,w)|=0 as well.
Figure 5 is further experimental result of our proposed (k1,k2,n) ramp CRT-based SIS, where p=131,m1=251,m2=253,m3=254,m4=255, k1=2,k2=2,n=4 and its employed grayscale secret image is in Figure 5(a). Figures 5(b–e) are the generated 4 shadows, which are noise-like. Figures 5(f–h) display the disclosed grayscale secret image with any t(2≤t≤4) shadows by our recovery method. When two or more shadows are used, the secret image is losslessly disclosed so that our proposed (k1,k2,n) ramp SIS reduces to (k,n) ramp SIS if k1=k2.
Then Figure 6 illustrates one experimental result of VSS for (k,n) threshold in [28], where k=2,n=4 and its employed binary secret image is in Figure 6(a). Figures 6(b–e) are the generated 4 shadows, which are noise-like as well. Figures 6(f–h) display the disclosed grayscale secret image with any t(2≤t≤4) shadows by stacking recovery. When 2 or more shadows are used, better disclosed secret image is obtained as well in [k,n], thus, VSS for (k,n) threshold in [28] is progressive in [k,n].
According to Figure 4, Figure 5 and Figure 6, comparisons between VSS and our method are given as follows.
1. Our method is for (k1,k2,n) ramp threshold due to random threshold selection in Step 3 of our method while VSS is only for (k,n) threshold, where (k,n) threshold is one special case of our method.
2. Our disclosing method is modular arithmetic since CRT while VSS is stacking, thus, our disclosing method needs more computation than VSS.
3. The secret image is disclosed in a progressive way by our method when t(k1≤t≤k2) shadows are collected due to random threshold selection in Step 3 of our method, while VSS is progressive in [k,n].
4. Our method discloses the secret image losslessly when we collect any k2 or more shadows since Steps 4–5 of our method, while VSS is lossy.
5. Our method is suitable for grayscale secret image as well as possible color secret image due to image characteristic analyses and CRT parameters design, while VSS is for binary secret image.
Figure 7 is one experimental result of (k,n) threshold polynomial-based SIS [12], where k=2,n=4 and its employed grayscale secret image is in Figure 7(a). Figures 7(b–e) are the generated 4 shadows, which are noise-like. Figures 7(f–h) display the same disclosed grayscale secret images with high-resolution with any k=2 or more shadows by Lagrange interpolation.
According to Figure 4, Figure 5 and Figure 7, comparisons between our method and polynomial-based SIS are given as follows.
1. Our method is for (k1,k2,n) ramp threshold due to random threshold selection in Step 3 of our method while polynomial-based SIS is only for (k,n) threshold, where (k,n) threshold is one special case of our method.
2. Our disclosing method is modular arithmetic (O(k) operations [44]) since CRT while polynomial-based SIS is Lagrange interpolation (O(klog2k) operations [44]), thus, our disclosing method needs less computation than polynomial-based SIS.
3. The secret image is disclosed in a progressive way by our method when any t(k1≤t≤k2) shadows are gained due to random threshold selection in Step 3 of our method, while polynomial-based SIS is "all-or-nothing".
4. In some polynomial-based SIS schemes, it is generally lossy recovery since secret image is decoded by modular 251 which is less than max grayscale value 255. The recovering image will be lossy if the pixel value of the secret image exceeds 251 and some polynomial-based SIS schemes have a little bit of loss. By contrast, our method is lossless because of CRT. We further analyze this issue as follows. In polynomial-based SIS, the primes near 255 are 257 and 251. In most polynomial-based SIS, 251 is used. If 257 is used, we cannot store the i-th shadow pixel for the value of 256; otherwise 251 is used, we cannot disclose the value of the secret pixel greater than 250. Although some methods are given to solve the 251 problem, such as selecting the prime 257 [52], primitive polynomial for GF(28), splitting the secret pixel greater than 250 into two pixels and so on, they are achieved at some other costs. Taking [53] as one example, Huffman coding and image differencing process are employed to reduce the size of each shadow and to avoid auxiliary encryption. Primitive polynomial for GF(28) is adopted to avoid quality degradation. However, primitive polynomial for GF(28) has larger computational complexity.
In addition, actually, when k1=k2=k, the (k1,k2,n) ramp SIS will be a (k,n)-SIS. Progressiveness is studied in some degree in VSS while that is seldom discussed in polynomial-based SIS. However, VSS is only suitable for binary image rather than grayscale image.
In a word, based on image characteristics and CRT, the proposed (k1,k2,n) ramp SIS has the features of (k1,k2,n) threshold with only modular arithmetic recovery method and no auxiliary encryption, which outperforms conventional (k,n) threshold SIS.
For the above experiments, the quality evaluation metrics of the disclosed secret image are given in Table 2. According to Table 2, the proposed method achieves progressive characteristic in general (k1,k2,n) threshold when more shadows are collected, which outperforms conventional SIS as well.
Schemes | Metrics | t=2 | t=3 | t=4 | t=5 |
Our (2,4,5) ramp SIS in Figure 1 | PSNR | 10.4435 | 13.5181 | +∞ | +∞ |
Our (2,4,5) ramp SIS in Figure 1 | SSIM | 0.0545 | 0.1500 | 1 | 1 |
Our (2,4,5) ramp SIS in Figure 1 | UQI | 0.0566 | 0.1609 | 1 | 1 |
Our (2,4,5) ramp SIS in Figure 1 | NC | 0.9351 | 0.9679 | 1 | 1 |
Our (3,5,5) ramp SIS in Figure 3 | PSNR | - | 10.2597 | 13.2965 | +∞ |
Our (3,5,5) ramp SIS in Figure 3 | SSIM | - | 0.1224 | 0.3198 | 1 |
Our (3,5,5) ramp SIS in Figure 1 | UQI | - | 0.1204 | 0.3234 | 1 |
Our (3,5,5) ramp SIS in Figure 1 | NC | - | 0.9133 | 0.9577 | 1 |
Our (2,4,4) ramp SIS in Figure 4 | PSNR | 10.2811 | 13.2348 | +∞ | - |
Our (2,4,4) ramp SIS in Figure 4 | SSIM | 0.0528 | 0.1403 | 1 | - |
Our (2,4,4) ramp SIS in Figure 1 | UQI | 0.0544 | 0.1511 | 1 | - |
Our (2,4,4) ramp SIS in Figure 1 | NC | 0.9482 | 0.9745 | 1 | - |
Our (2,2,4) ramp SIS in Figure 5 | PSNR | +∞ | +∞ | +∞ | |
Our (2,2,4) ramp SIS in Figure 5 | SSIM | 1 | 1 | 1 | - |
Our (2,2,4) ramp SIS in Figure 1 | UQI | 1 | 1 | 1 | - |
Our (2,2,4) ramp SIS in Figure 1 | NC | 1 | 1 | 1 | - |
(2,4) threshold RGVSS in Figure 6 | α | 0.2886 | 0.5018 | 0.5018 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | PSNR | +∞ | +∞ | +∞ | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | SSIM | 1 | 1 | 1 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | UQI | 1 | 1 | 1 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | NC | 1 | 1 | 1 | - |
In this paper, based on the study of image characteristics, the Chinese remainder theorem (CRT) and secret image sharing (SIS), we proposed (k1,k2,n) ramp SIS. Our method realizes (k1,k2,n) threshold and lossless recovery for grayscale image without auxiliary encryption. When we collect any k1 or more shadows, the secret image will be disclosed in a progressive way. On the other hand, when we collect any k2 or more shadows, the secret image will be disclosed losslessly. Furthermore, the disclosing method is only modular arithmetic resulting in ability in real-time application. Theoretical analyses and experiments are performed to display the effectiveness of our method. Applying our method to other SIS schemes like polynomial-based SIS and comparing to related ramp secret sharing will be our future work.
The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Numbers: 61602491, 61501148) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).
We have no conflicts of interest to declare.
[1] | Z. Qian, H. Xu, X. Luo, et al., New framework of reversible data hiding in encrypted jpeg bitstreams, IEEE Trans. Circuit Syst. Video Tech., 29 (2019), 351–362. |
[2] | Y. Zhang, C. Qin, W. Zhang, et al., On the fault-tolerant performance for a class of robust image steganography, Signal Process., 146 (2018), 99–111, |
[3] | A. Belazi and A. A. A. El-Latif, A simple yet efficient s-box method based on chaotic sine map, Optik-Int. J. Light Electron Opt., 130 (2017), 1438–1444. |
[4] | Y. Cheng, Z. Fu and B. Yu, Improved visual secret sharing scheme for qr code applications, IEEE Trans. Inf. Forensics Security., 13 (2018), 2393–2403. |
[5] | C. Kim, D. Shin, L. Leng, et al., Separable reversible data hiding in encrypted halftone image, Displays, 55 (2018), 71–79. |
[6] | Y. Ma, X. Luo, X. Li, et al., Selection of rich model steganalysis features based on decision rough set α -positive region reduction, IEEE Trans. Circuit Syst. Video Tech., 29 (2019), 336–350. |
[7] | G. Wang, F. Liu and W. Q. Yan, Basic visual cryptography using braille, Int. J. Digital Crime Forensics (IJDCF), 8 (2016), 85–93. |
[8] | X. Yan, S. Wang, X. Niu, et al., Generalized random grids-based threshold visual cryptography with meaningful shares, Signal Process., 109 (2015), 317–333. |
[9] | A. Shamir, How to share a secret, Commun. ACM, 22 (1979), 612–613. |
[10] | M. Naor and A. Shamir, Visual cryptography, in Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, (A DeSantis), Springer, 1995, 1–12. |
[11] | L. Liu, Y. Lu, X. Yan, et al., A progressive threshold secret image sharing with meaningful shares for gray-scale image, in Mobile Ad-Hoc and Sensor Networks (MSN), 2016 12th International Conference on, IEEE, 2016, 380–385. |
[12] | W. Ding, K. Liu, X. Yan, et al., Polynomial-based secret image sharing scheme with fully lossless recovery, Int. J. Digital Crime Forensics (IJDCF), 10 (2018), 120–136. |
[13] | L. Bao, S. Yi and Y. Zhou, Combination of sharing matrix and image encryption for lossless (k,n) -secret image sharing, IEEE Trans. Image Process., 26 (2017), 5618–5631. |
[14] | W. Ding, K. Liu, X. Yan, et al., A general (k,n) threshold secret image sharing construction based on matrix theory, Data Science: Third International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2017, Proceedings, Part I, (2017), 331–340. |
[15] | P. Li, Z. Liu and C. N. Yang, A construction method of (t,k,n)-essential secret image sharing scheme, Signal Process. Image Commun., 65 (2018), 210–220. |
[16] | Y. Liu and C. Yang, Scalable secret image sharing scheme with essential shadows, Signal Process. Image Commun., 58 (2017), 49–55. |
[17] | Y. Liu, C. Yang, Y. Wang, et al., Cheating identifiable secret sharing scheme using symmetric bivariate polynomial, Inf. Sci., 453 (2018), 21–29. |
[18] | X. Wu, C. N. Yang, Y. T. Zhuang, et al., Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Process. Image Commun., 66 (2018), 42–49. |
[19] | H. Chao and T. Fan, Generating random grid-based visual secret sharing with multi-level encoding, Signal Process. Image Commun., 57 (2017), 60–67. |
[20] | T. Guo and L. Zhou, Constructing visual cryptography scheme by hypergraph decomposition, Procedia Comput. Sci., 131 (2018), 336–343, |
[21] | Y. Ren, F. Liu, T. Guo, et al., Cheating prevention visual cryptography scheme using latin square, IET Inf. Secur., 11 (2017), 211–219. |
[22] | M. Sasaki and Y. Watanabe, Visual secret sharing schemes encrypting multiple images, IEEE Trans. Inf. Forensics Security, 13 (2018), 356–365. |
[23] | Z. Wang, G. R. Arce and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Security, 4 (2009), 383–396. |
[24] | J. Weir and W. Yan, A comprehensive study of visual cryptography, in Transactions on DHMS V, LNCS 6010, Springer-Verlag, Springer, Berlin, Heidelberg, 2010, 70–105. |
[25] | Z. X. Fu and B. Yu, Visual cryptography and random grids schemes, in Digital-Forensics and Watermarking, Springer, Auckland, New Zealand, 2014, 109–122. |
[26] | F. Liu and C. Wu, Embedded extended visual cryptography schemes, IEEE Trans. Inf. Forensics Security, 6 (2011), 307–322. |
[27] | X. Wu and W. Sun, Visual secret sharing for general access structures by random grids, IET Inf. Secur., 6 (2012), 299–309. |
[28] | X. Yan, X. Liu and C. N. Yang, An enhanced threshold visual secret sharing based on random grids, J. Real-Time Image Proc., 14 (2018), 61–73. |
[29] | X. Yan and Y. Lu, Progressive visual secret sharing for general access structure with multiple decryptions, Multimed. Tools Appl., 77 (2018), 2653–2672. |
[30] | X. Yan, Y. Lu and L. Liu, General meaningful shadow construction in secret image sharing, IEEE Access, 6 (2018), 45246–45255. |
[31] | X. Yan, S. Wang and X. Niu, Threshold construction from specific cases in visual cryptography without the pixel expansion, Signal Process., 105 (2014), 389–398. |
[32] | C. N. Yang, C. C. Wu, et al., A discussion on the relationship between probabilistic visual cryptography and random grid, Inf. Sci., 278 (2014), 141–173. |
[33] | Y. C. Hou, Z. Y. Quan, C. F. Tsai, et al., Block-based progressive visual secret sharing, Inf. Sci., 233 (2013), 290–304. |
[34] | X. Yan and Y. Lu, Generalized general access structure in secret image sharing, J. Vis. Commun. Image Represent., 58 (2019), 89–101, |
[35] | S. K. Chen, Friendly progressive visual secret sharing using generalized random grids, Optical Engineer., 48 (2009), 117001–117001–7. |
[36] | W. P. Fang, Friendly progressive visual secret sharing, Pattern Recognit., 41 (2008), 1410–1414. |
[37] | C. P. Huang, C. H. Hsieh and P. S. Huang, Progressive sharing for a secret image, J. Syst. Softw., 83 (2010), 517–527. |
[38] | C.H.Lin, Y.S.Leeand T.H.Chen, Friendly progressive random-grid-basedvisualsecretsharing with adaptive contrast, J. Vis. Commun. Image Represent., 33 (2015), 31–41, |
[39] | G. R. Blakley and C. Meadows, Security of ramp schemes, Proc. Crypto, 196 (1984), 242–268. |
[40] | Q. Chen, D. Pei, C. Tang, et al., A note on ramp secret sharing schemes from error-correcting codes, Math. Com. Model., 57 (2013), 2695–2702. |
[41] | X. Gong, P. Hu, K. W. Shum, et al., A zigzag-decodable ramp secret sharing scheme, IEEETrans. Inf. Forensics Security., 13 (2018), 1906–1916. |
[42] | X. Jia, D. Wang, D. Nie, et al., A new threshold changeable secret sharing scheme based on thechinese remainder theorem, Inf. Sci., 473 (2019), 13–30, |
[43] | X. Yan, Y. Lu, L. Liu, et al., Chinese remainder theorem-based secret image sharing for (k, n)threshold, Cloud Computing and Security: Third International Conference, ICCCS 2017,RevisedSelected Papers, Part II, (2017), 433–440, |
[44] | C. Asmuth and J. Bloom, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 29(1983), 208–210. |
[45] | X. Yan, Y. Lu and L. Liu, A general progressive secret image sharing construction method, SignalProcess., Image Commun., 71 (2019), 66–75, |
[46] | C. Asmuth and J. Bloom, A modular approach to key safeguarding, IEEE Trans. Inf. Theory, 30(1983), 208–210. |
[47] | Z. Wang, A. C. Bovik, H. R. Sheikh, et al., Image quality assessment: from error visibility tostructural similarity, IEEE Trans. Image Process., 13 (2004), 600–612. |
[48] | Z. Wang and A. C. Bovik, A universal image quality index, IEEE Signal Process. Lett., 9 (2002),81–84. |
[49] | X. Yan, Y. Lu, H. Huang, et al., Clarity corresponding to contrast in visual cryptography, Social Computing: Second International Conference of Young Computer Scientists, Engineersand Educators, ICYCSEE 2016, Proceedings, Part I, (2016), 249–257. |
[50] | J. Huang, C. Wang and Y. Wang, A snr method of evaluating image quality based on the hvsmodel, J. HEBEI Uni. Sci. Tech., 23 (2002), 80–85. |
[51] | X. Yan, Y. Lu, L. Liu, et al., Random grids-based threshold visual secret sharing with improved visual quality, Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Revised Selected Papers, (2016), 209–222. |
[52] | X. Zhou, Y. Lu, X. Yan, et al., Lossless and efficient polynomial-based secret image sharing with reduced shadow size, Symmetry, 10 (2018), 249. |
[53] | R. Z. Wang and C. H. Su, Secret image sharing with smaller shadow images, Pattern Recognit. Lett., 27 (2006), 551–555. |
1. | Atieh Mokhtari, Mohammad Taheri, 2024, Ramp Progressive Secret Image Sharing Using Ensemble of Simple Methods, 979-8-3315-1127-2, 417, 10.1109/ICCKE65377.2024.10874825 |
n | p | m1,m2⋯,mn |
2 | 128 | 253,255 |
2 | 131 | 253,254 |
3 | 128 | 251,253,255 |
3 | 131 | 253,254,255 |
4 | 128 | 247,251,253,255 |
4 | 131 | 251,253,254,255 |
5 | 128 | 245,247,249,251,253 |
5 | 131 | 247,251,253,254,255 |
Schemes | Metrics | t=2 | t=3 | t=4 | t=5 |
Our (2,4,5) ramp SIS in Figure 1 | PSNR | 10.4435 | 13.5181 | +∞ | +∞ |
Our (2,4,5) ramp SIS in Figure 1 | SSIM | 0.0545 | 0.1500 | 1 | 1 |
Our (2,4,5) ramp SIS in Figure 1 | UQI | 0.0566 | 0.1609 | 1 | 1 |
Our (2,4,5) ramp SIS in Figure 1 | NC | 0.9351 | 0.9679 | 1 | 1 |
Our (3,5,5) ramp SIS in Figure 3 | PSNR | - | 10.2597 | 13.2965 | +∞ |
Our (3,5,5) ramp SIS in Figure 3 | SSIM | - | 0.1224 | 0.3198 | 1 |
Our (3,5,5) ramp SIS in Figure 1 | UQI | - | 0.1204 | 0.3234 | 1 |
Our (3,5,5) ramp SIS in Figure 1 | NC | - | 0.9133 | 0.9577 | 1 |
Our (2,4,4) ramp SIS in Figure 4 | PSNR | 10.2811 | 13.2348 | +∞ | - |
Our (2,4,4) ramp SIS in Figure 4 | SSIM | 0.0528 | 0.1403 | 1 | - |
Our (2,4,4) ramp SIS in Figure 1 | UQI | 0.0544 | 0.1511 | 1 | - |
Our (2,4,4) ramp SIS in Figure 1 | NC | 0.9482 | 0.9745 | 1 | - |
Our (2,2,4) ramp SIS in Figure 5 | PSNR | +∞ | +∞ | +∞ | |
Our (2,2,4) ramp SIS in Figure 5 | SSIM | 1 | 1 | 1 | - |
Our (2,2,4) ramp SIS in Figure 1 | UQI | 1 | 1 | 1 | - |
Our (2,2,4) ramp SIS in Figure 1 | NC | 1 | 1 | 1 | - |
(2,4) threshold RGVSS in Figure 6 | α | 0.2886 | 0.5018 | 0.5018 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | PSNR | +∞ | +∞ | +∞ | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | SSIM | 1 | 1 | 1 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | UQI | 1 | 1 | 1 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | NC | 1 | 1 | 1 | - |
n | p | m1,m2⋯,mn |
2 | 128 | 253,255 |
2 | 131 | 253,254 |
3 | 128 | 251,253,255 |
3 | 131 | 253,254,255 |
4 | 128 | 247,251,253,255 |
4 | 131 | 251,253,254,255 |
5 | 128 | 245,247,249,251,253 |
5 | 131 | 247,251,253,254,255 |
Schemes | Metrics | t=2 | t=3 | t=4 | t=5 |
Our (2,4,5) ramp SIS in Figure 1 | PSNR | 10.4435 | 13.5181 | +∞ | +∞ |
Our (2,4,5) ramp SIS in Figure 1 | SSIM | 0.0545 | 0.1500 | 1 | 1 |
Our (2,4,5) ramp SIS in Figure 1 | UQI | 0.0566 | 0.1609 | 1 | 1 |
Our (2,4,5) ramp SIS in Figure 1 | NC | 0.9351 | 0.9679 | 1 | 1 |
Our (3,5,5) ramp SIS in Figure 3 | PSNR | - | 10.2597 | 13.2965 | +∞ |
Our (3,5,5) ramp SIS in Figure 3 | SSIM | - | 0.1224 | 0.3198 | 1 |
Our (3,5,5) ramp SIS in Figure 1 | UQI | - | 0.1204 | 0.3234 | 1 |
Our (3,5,5) ramp SIS in Figure 1 | NC | - | 0.9133 | 0.9577 | 1 |
Our (2,4,4) ramp SIS in Figure 4 | PSNR | 10.2811 | 13.2348 | +∞ | - |
Our (2,4,4) ramp SIS in Figure 4 | SSIM | 0.0528 | 0.1403 | 1 | - |
Our (2,4,4) ramp SIS in Figure 1 | UQI | 0.0544 | 0.1511 | 1 | - |
Our (2,4,4) ramp SIS in Figure 1 | NC | 0.9482 | 0.9745 | 1 | - |
Our (2,2,4) ramp SIS in Figure 5 | PSNR | +∞ | +∞ | +∞ | |
Our (2,2,4) ramp SIS in Figure 5 | SSIM | 1 | 1 | 1 | - |
Our (2,2,4) ramp SIS in Figure 1 | UQI | 1 | 1 | 1 | - |
Our (2,2,4) ramp SIS in Figure 1 | NC | 1 | 1 | 1 | - |
(2,4) threshold RGVSS in Figure 6 | α | 0.2886 | 0.5018 | 0.5018 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | PSNR | +∞ | +∞ | +∞ | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | SSIM | 1 | 1 | 1 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | UQI | 1 | 1 | 1 | - |
Polynomial-based (2,4) threshold SIS in Figure 7 | NC | 1 | 1 | 1 | - |