1.
Introduction
With the rapid development of global network and communication technologies, we have entered the era of networking and informationization [1]. In this era, a vast number of images carrying personal information are rapidly spreading across the Internet. Even seemingly meaningless communication data can inadvertently leak important information. Therefore, protecting the confidentiality and integrity of image data has become an important research topics both domestically and internationally.
Currently, image security techniques mostly include image information hiding, image encryption and image secret sharing. Among them, image secret sharing (ISS) [2], as a specific application direction of secret sharing scheme [3] in image information security protection, provides a higher level of security and confidentiality for image security protection. It applies the concept of secret sharing to the storage and transmission of image information, effectively solving the problem of image secret information leakage and tampering.
ISS can be divided into two categories: Threshold secret sharing scheme (TSS) [4,5,6,7,8,9] and progressive image secret sharing scheme (PISS). However, some inherent defects have in existing TSS schemes. The size of the shares at least twice that of the secret image due to the high pixel expansion ratio. Also, the reconstructed image may exhibit low quality. To solve these problems, researchers have proposed many PISS schemes.
The fundamental concept of PISS is to accomplish secret sharing by progressively unveiling various layers of an image. Liu and Yang [10] proposed three sharing models to construct a scalable image secret sharing scheme. Yan et al. [11] constructed a generalized progressive image secret sharing scheme with pixel non-expansion. Guo et al. [12] proposed a progressive image secret sharing scheme that divides the generated shared copies into multiple tiers, and there is a risk of partial reconstruction due to the fact that an attacker can try to recover the overall secret image information by using part of the acquired image information. To overcome this drawback, Bhattacharjee et al. [13] introduced a progressive image secret sharing scheme utilizing compression-aware generation of fixable shares. Expanding upon this groundwork, references [14,15] have proposed a progressive image secret sharing scheme based on compressive sensing (CS) and multi-level access control, respectively. In [14], the encoding and measurement of the image were implemented, while in [15], the secret image was divided into multiple layers with varying access permissions. Moreover, both [14] and [15] present techniques for gradually recovering different levels of the secret image, which provides valuable references for achieving secure image secret sharing.
As the need for information sharing continues to grow, the traditional solution of sharing secret images by a single group does not meet the needs of multiple groups. In order to provide a more flexible sharing mechanism, group secret sharing schemes [16,17,18,19,20] have emerged. This type of scheme allows multiple groups to share secret images at the same time for broader information sharing. In [17], Lagrange interpolation and the Chinese Remainder Theorem were utilized to construct a secret sharing scheme, which is the first time that the concept of asymptotic secret sharing is extended to multi-group secret sharing schemes. Li et al. [18] employed the Chinese Remainder Theorem to construct a group secret sharing scheme, but it cannot share a large number of secrets efficiently. Yang et al. [19] constructed an image secret sharing scheme based on group cooperation using homomorphic Lagrangian interpolation, which realizes the sharing of secret images within and between groups, however, the number of secrets is limited to one. Wu et al. [20] proposed a group-based image secret sharing scheme that only allows for all-or-nothing recovery, and once a participant provides a dishonest share, the secret image will not be recovered.
Existing group secret sharing schemes usually adopt an all-or-nothing approach to image secret sharing, which does not take into account the differences in the level and importance of image information, leading to inefficiencies in some cases. Secret image sharing is often accompanied by complex contexts, and group-based scheme [20] for all-or-nothing image recovery are inflexible and not applicable to complex application scenarios. Therefore, the diverse demands of various application scenarios necessitate the development of more adaptable progressive secret image sharing schemes, tailored to accommodate these evolving requirements.
To ensure the security of different level information in the images, we propose a global progressive image secret sharing scheme based on multi-group joint management. Specifically, the present scheme utilizes bit-polar decomposition and priority assignment to give priority to groups, and the group with higher priority will receive a shared share of the image with higher pixel bits. Within each group, the Chinese Remainder Theorem is utilized to design an intra-group secret sharing scheme with participants having different weights. In the recovery phase, each group recovers the shared copies of the held images using Birkhoff interpolation and the Chinese Remainder Theorem, where Birkhoff interpolation can effectively fill in the missing image pixels. Intergroups utilize lightweight superposition operations for global progressive recovery of images. Even if a group is unable to fully recover an image, it is possible to recover the image gradually by cooperating with other groups, improving the efficiency of sharing.
The sections of this paper are organized as follows. The preparatory knowledge is presented in Section 2, the overall scheme design is presented in Section 3, the analysis and proof of the scheme is in Section 4 and the conclusion of the paper is given in Section 5.
2.
Preliminaries
2.1. Explanation of notations
The notations in Table 1 are used throughout this paper.
2.2. Bit-polar decomposition
Lakac et al. [10] originally proposed the concept of bit-level decomposition for image sharing. Let B(O)={bm−1,⋅⋅⋅,b2,b1,b0} be the set of bit-planes of a certain pixel in image O in Figure 1, where m is the depth of a pixel, and m belongs to {m|1⩽m⩽8,m∈Z+}. b0 is the least significant bit (LSB), and bm - 1 is the most significant bit (MSB). Based on the characteristics of a pixel value, the bits in B(O) follows a partial ordering bm−1>bm−2>...>b0, where bi>bj means that bi is more significant than bj, or simply i>j. In general, in a binary system, the changing of higher bits has a significant impact on the value, while the changing of lower bits has a smaller impact on the value. The partial ordering of the bits in B(O) by their significance implies the presence of priority among the bits. According to the desired group priority criteria, this solution assigns decomposed secret images at bit-level to each group and then shares image pixels with different bit depths.
The priority decomposition divides the image O into n partitions P1,P2,⋅⋅⋅,Pn satisfying Eq (1).
2.3. Birkhoff interpolation
The secret sharing scheme based on Birkhoff interpolation uses a different polynomial interpolation method compared to Shamir's secret sharing scheme, which supports a higher number of polynomials, thus supporting a larger number of participants with higher efficiency and stronger security. Therefore, this scheme applies Birkhoff interpolation to the secret recovery process, which makes the scheme have better protection performance.
Definition 1. Definition that X={x1,x2,...,xk}, where x1<x2<...<xk. E is a interpolation matrix with binary entries which is defined as E=(ei,j)1⩽i⩽k,0⩽j⩽l, where I(E)={(i,j):ei,j=1} and N=|I(E)|. C is a set of N real values which is defined as C={ci,j:(i,j)∈I(E)}.
The corresponding Birkhoff interpolation problem [21] is <X,E,C> a problem of finding a polynomial P(X)∈RN−1[x] satisfying N equations P(j)(xi)=ci,j(i,j)∈I(E). Where P(j)(xi) is the j−th derivative of P(x) and RN−1[x] is the set of all possible polynomials of order at most N−1.
Theorem 1. Let the Birkhoff interpolation problem corresponding to the triple <X,E,C> be will posed, where E satisfies Eq (2).
where l is the highest derivative order in the data and k is the number of interpolation points.
Theorem 2. This interpolation problem (Definition 1) has a unique solution if the interpolation matrix E satisfies Theorem 1 and does not contain supported l-odd length sequences.
Theorem 3. If the conditions in Theorem 2 and the following conditions co-exist, there exists a unique solution to the Birkhoff interpolation problem over the finite domain GF(q) as shown in Eq (3). where l is the highest order derivative in the data.
3.
The proposed scheme
In this paper, a global progressive image secret sharing scheme based on multi-group joint management is developed, as shown in Figure 2. The secret image S is classified into secret levels using the bit-polar decomposition technique, and then different groups G1, G2 andG3are assigned to the sub-images P1, P2 and P3 with different secret levels, respectively, such that each group is prioritized G1>G2>G3. As shown in Figure 2(a), G1 may utilize the group's sub-image P1 to generate an intra-group secret share s1,j to be assigned to each participant within G1. As shown in Figure 2(b), when the secret image is recovered, G1,j cooperate to fully recover P1, and participants within G2 and G3 can fully recover P2 and P3. As shown in Figure 2(c), when cooperating between groups, each Gi can make the clarity of the recovered image gradually increase by overlaying the sub-image Pi, which realizes the global progressive recovery effect.
3.1. Parameter selection
Given a secret image S of size m×r. The scheme contains a trusted secret distributor D, a bulletin board and three participant groups G1, G2 and G3. D can post and update content on the bulletin board, and others can only read or download it. G1 consists of n1 participants, and so on. Gi consists of ni participants, n=n1+n2+n3. Gi,j denotes the j-th participant of the i-th group, and the weight of each participant is Wi,j. In addition, each group has a corresponding threshold requirement, such that the threshold for G1 is t1, and the threshold for Gi is ti. The corresponding sub-image can be reconstructed only if the sum of the weights of the participants in the group satisfies the threshold of the corresponding group. The sub-secrets of the participants in the group in this scheme are selected and saved by themselves and can be used multiple times.
D chooses two large prime numbers p and q at random and computes the product N=pq, satisfying the attacker that it is computationally infeasible to derive the sum p is q knowing N. D picks a random g in [√N,N] satisfying g(p−1)(q−1)2=1modN. Pick s0 at random in [2,N] such that s0 and (p−1)(q−1) are mutually prime, compute p0=gs0modN, and compute the smallest positive integer h such that s0h=1modφ(N), which will keep s0 secret and { g,N,p0,h} public.
3.2. Image preprocessing
For convenience, this section divides the secret image S into 3 different quality sub-images P1, P2 and P3, as shown in Eq (4). The higher the hierarchy of the sub-image, the more information it contains. Distribute sub-images Pi to Gi, where priority G1>G2>G3. In the image reconstruction pahse, the secret image can be reconstruction progressively by using sub-images from different groups.
3.3. Secret sharing
During the image preprocessing, the secret image generates authorized sub-images for different groups. During the pixel allocation process, D uses the pixel values of the sub-image as coefficients of a polynomial. Participants randomly select sub-secrets and perform computations using these sub-secrets to generate public identifiers. D verifies the participant identities to ensure that each participant's identity is unique. Once the uniqueness of the participant's identity is verified, D distributes to each participant a share of the computed secrets, which are generated based on a polynomial computation, to ensure the security of the secrets. The algorithm process is shown in Algorithm 1.
By collaborating between participating groups, the secret share generation process constructed using Algorithm 1 is shown in Figure 3.
3.4. Secret recovery
Secret recovery consists of two parts: Intra-group recovery and inter-group recovery. Gi,j hold their own secret shares si,j and restore the corresponding sub-image Pi by using the Chinese Remainder Theorem and Birkhoff interpolation, revealing partial information. During inter-group recovery, any group overlays their own sub-images Pi, and the image corresponding to pixel depth will be restored, while the remaining bit depths will remain in a noisy state. The algorithm process is shown in Algorithm 2.
Using Algorithm 2 for intra-group and inter-group image restoration, the restoration process is shown in Figure 4.
3.5. Correctness
3.5.1. Identity verification
The identity verification step described in Section 3.4 of this paper, constant Eq (5) holds.
Proof. During the secret recovery phase, it is not possible for Gi,j to provide fake shares Ai,j to D. Because D verifies whether the equation Ai,jh=yi,j holds after receiving the shares Ai,j provided by Gi,j, where Ai,jh=p0xi,jh=gs0xi,jh=(gs0h)xi,j=gxi,j=yi,j. Only proceeds to the next step if the verification passes.
3.5.2. Secret recovery
In this paper, in the secret recovery algorithm in Section 3.4, the secret share Si,j=Hi,j(x), the secret image can be recovered efficiently using the designed Algorithm 2.
Proof. The secret share Si,j=Hi,j(x) held by the authenticated Gi,j is derived from the coefficients of Hi,j(x) based on Birkhoff interpolation, which leads to Hi,j(x). Then applying the Chinese Remainder Theorem, calculate f(x) (The coefficients of f(x) are the pixel values of the corresponding region of the recovered image).
1) Find Hi,j(x) based on the secret share Si,j=Hi,j(x).
The basic idea of Birkhoff interpolation is to construct an interpolation polynomial based on known data points, which can approximate and interpolate between these points. The key of this method is to transform the known data points into a coefficient matrix and solve for the coefficients of the polynomial through matrix operations. As shown in Eq (6), this scheme constructs a vector S=[S(x0),S(x1),...,S(xr)] consisting of the secret shares Si,j of Gi,j. Construct a Vandermonde matrix V by arranging the pairs (xi,S(xi)) as rows or columns of the matrix. Where r is the number of pixel points, ni is the degree of the polynomial Hi,j(x) being solved, and Gi is the number of participants involved. Assuming that the coefficient matrix of the polynomial Hi,j(x) is C, solves for C in C=V−1⋅S, and then obtain Hi,j(x) by solving the equation.
2) After obtaining Hi,j(x), f(x) can be solved by the Chinese Remainder Theorem through H(x)=f(x)mod(x−yi,j)wi,j, where the coefficients of f(x) correspond to the pixel values of the image in the corresponding region.
The Chinese Remainder Theorem is a mathematical method used to solve a system of congruent equations. According to the congruent equation H(x)=f(x)mod(x−yi,j)wi,j, obtain f(x)=H(x)mod(x−yi,j)wi,j. Therefore, by solving Hi,j(x) modulo (x−yi,j)wi,j, determine the function f(x). First, calculate the modulus m. According to the given condition, m=(x−yi,j)wi,j. Then, calculate the value of the function Hi,j(x) and perform modulo m operation on it, which is H(x)modm.
According to the mathematical definition, H(x)modm=H(x)−m×floor(H(x)m), where floor(H(x)m) represents the floor of H(x)m. By substituting m=(x−yi,j)wi,j into the equation, get H(x)modm=H(x)−(x−yi,j)wi,j×floor(H(x)(x−yi,j)wi,j)=f(x), where the coefficient of f(x) represents the pixel value of the corresponding region in the restored image.
3.6. Security analysis
1) Protects against external attacks. It is infeasible for an attacker to try to derive a sub-secret xi,j of Gi,j through the open yi,j.
Proof. It is not possible for an attacker to download the information yi,j of Gi,j from the bulletin board and try to obtain the participant's sub-secret xi,j. Due to the difficulty of solving discrete logarithms, it is computationally infeasible to calculate xi,j given yi,j and g, as yi,j=gxi,jmodN.
2) Reusable sub-secrets. When it is necessary to reassign the secret image, D randomly selects s0 from [2,N] again and constructs a new polynomial f(x)=a0+a1x+a2x2+⋅⋅⋅+ar−1xr−1 with degree r-1. Meanwhile, D calculates H(x)=f(x)mod(x−yi,j)wi,j for each participant and updates their secret shares si,j without changing their sub-secrets xi,j, so each participant can use their sub-secret multiple times.
3) During the recovery process, when the number of participants in Gi does not satisfy the threshold condition ti, Gi may not recover the corresponding sub-image to ensure the security of the scheme.
Proof. In this scheme, to recover the shared sub-image Pi, it is necessary to reconstruct an r-1 degree polynomial f(x)=a0+a1x+a2x2+⋅⋅⋅+ar−1xr−1. During the secret recovery process, it is required that the sum of weights of participants in Gi,j reaches the threshold value ti, in order to guarantee accurate calculation of m=(x−yi,j)wi,j. Then, the r-1 degree polynomial f(x)=a0+a1x+a2x2+⋅⋅⋅+ar−1xr−1 can be further calculated using the pixel values of the sub-image Pi. For sub-images Pi with different priorities, if the sum of weights of the participants in Gi,j does not reach the threshold value ti, it will not be possible to calculate m=(x−yi,j)wi,j, and hence the correct r-1 degree polynomial f(x)=a0+a1x+a2x2+⋅⋅⋅+ar−1xr−1 cannot be obtained, resulting in unsuccessful image recovery in the group recovery process of the image Ii. In this case, the cooperation between this authorized group and other groups cannot successfully recover the image Ii+j, and hence it is not possible to perform inter-group recovery.
4.
Experiment and analysis
This chapter presents the experimental results of our proposed approach, and we evaluate the effectiveness of the scheme through experiments and analysis.
4.1. Experimental result
This section provides an example of this scheme to illustrate the generation of secret shares and the reconstruction of images. This section verifies the proposed scheme by taking, for example, three groups, and suppose there are three separate groups Gi(i=1,2,3), where the priority of G1>G2>G3. The secret message obtained from G1 is the clearest, while the secret message obtained from G3 is the closest to black, making the secret message almost unobservable through the visual system. Figure 5(a) serves as the secret image, and Figure 5(b)-(d) shows each group of sub-image. Figures 6-8 show the secret shares sent to participants within the G1,G2,G3.
The security of secret image in this scheme is demonstrated by experimental results. In Figure 9(a), when the secret shares of the 3 participants, denoted as G1,j, do not satisfy the threshold condition, the reconstructed image appears as a random pattern. However, in Figure 9(b), when the secret shares of the 4 participants, also denoted as G1,j, meet the threshold condition, the corresponding sub-images can be successfully reconstructed. In other words, only the participants who satisfy the threshold condition can participate in the effective image recovery process, while those who do not satisfy the threshold condition cannot be involved in image reconstruction.
After obtaining the corresponding sub-images Pi, cooperation between different groups was carried out to recover the secret image. Specifically, in Figure 10(a)-(c), the image restoration process was completed through cooperative efforts between the pairs G2+G3, G1+G3 and G1+G2, respectively. It is worth noting that these cooperative methods are determined based on the selection of participants. In addition, in Figure 10(d), three groups, G1+G2+G3, participated in the restoration process simultaneously, and the secret image was successfully reconstructed. This result indicates that cooperation among multiple groups can significantly improve the efficiency and robustness of image restoration.
The groups involved in the recovery are G1,G2 and G3, where the priority is G1>G2>G3. During the recovery process, the group with higher priority will restore a higher quality image. As shown in Figure 10(b), (c), the restored images I1+2 and I1+3, which were restored through the collaboration of G2 and G3, respectively with G1, demonstrate clear outlines but fail to fully recover and have lost some details. Additionally, G2 has higher priority over G3. Under the premise of G1 participation, the image I1+2, restored through the collaboration of G1 and G2, is clearer than the image I1+3, restored through the collaboration of G1 and G3. Due to the lower priority of G2 and G3, their collaborative restoration results in a less prominent feature in the restored image I2+3, as illustrated in Figure 10(a). When all three groups, G1, G2 and G3, participate in the restoration simultaneously, as shown in Figure 10(d), the restored image I1+2+3 exhibits the best image quality. At this point, the detailed information in the image has been nearly fully restored, resulting in a higher level of clarity and accuracy in the overall image.
During the secret restoration process, different collaborative groups have varying priorities and restoration effects. The quality of the restored image is influenced by the number of participating groups and their priorities. As the number of participating groups gradually increases, the clarity and accuracy of the secret image improves, gradually moving away from its initial blurry state. When the number of groups is the same, the degree of improvement in clarity depends on the priority assigned to each group, with higher-priority groups helping to obtain clearer image information. In particular, when collaborating groups have a higher collective priority, the clarity and accuracy of the restored secret image are enhanced. Optimizing collaborative restoration strategies can significantly improve the quality and accuracy of the restored image.
4.2. Noise attack
Image data is inevitably affected by various subjective and objective factors that cause pixel interference during transmission. To verify the impact of pixel interference on secret images before recovery, this section uses "Lena" and "Peppers" with a size of 264 × 173 as secret images, as shown in Figure 11. The results of the recovery process are shown in Figures 12 and 13. The recovered images were also tested after adding salt-and-pepper noise with a strength of 2% to the secret shares, as shown in Figures 14 and 15.
Since the naked eye system has limitations in determining the quality of image restoration, precise computational methods are needed to measure the quality of image restoration. This section uses the mean square error (MSE) and peak signal to noise ratio (PSNR) to analyze the image recovery performance under noise.
By analyzing experimental data, when the MSE value is smaller and the PSNR value is larger, the reconstructed image is more similar to the original image and the difference between the two is smaller. When the PSNR is higher than 40 dB, it indicates that the quality of the recovered image is extremely good and very close to the secret image. When the PSNR is between 30~40 dB, it indicates that the image quality is good. The MSE and PSNR between two given images P1 and S, with sizes of m×n, are defined as Eqs (7) and (8).
According to Tables 2 and 3, it can be observed that with inter-group collaboration, the PSNR of the recovered images is between 30 dB and 59 dB, while the MSE remains between 0.007 and 0.010. This indicates that the higher the priority of Gi involved in the recovery, the better the quality and PSNR of the corresponding recovered image. With the increase in noise attack intensity and cooperation group, it is inevitable that there will be some impact on the reconstruction of the secret, but it is within the visible range. Therefore, this scheme exhibits good robustness to noise attacks.
4.3. Performance analysis
The comparison between some related progressive image secret sharing schemes and the proposed scheme is shown in Table 4.
First, there is a comparison of the level of security, as shown in the first column of Table 4. This scheme is superior to the scheme of Guo et al. [12] in terms of safety. It embeds secret pixel values into all coefficients of a polynomial, which may lead to unauthorized participants recovering the secret image, thus resulting in lower security. In the proposed scheme in this article, the secret image is divided into sub-images with different priorities, and secret sharing operations are performed on these sub-images, thus enhancing the security level of the secret image.
Second, there is a comparison of the features used to verify the identity information of participants, as shown in the second column of Table 4. References [9,12,13,14,15,20] does not verify the identity of participants, which cannot prevent internal fraud, allowing adversaries to infiltrate and obtain information about the secret image using incorrect information. In this scheme, D verifies the identity information of participants by using the publicly available yi,j to calculate Ai,jh=yi,j.
Third, as shown in the third column of Table 4, in this scheme, the secret share of each participant can be utilized for multiple secret sharing processes without necessitating any updates. References [9,12,13,14,15,20] has no reusable sub-secrets, and the secret shares need to be redistributed during each secret sharing process.
Fourth, there is a comparison of the characteristics of participants, as shown in the fourth column of Table 4. The participants in references [9,12,13,14,15] belong to a group, so the secret image is managed by a single group. In real life, secret images need to be managed by multiple groups. Therefore, the scheme in this paper is more suitable for visual passwords.
Fifth, only in this scheme there is prioritization among groups. In fact, it is unlikely that multiple groups co-managing mutual trade-offs can achieve complete equality in the true sense, and the priority assignment in this paper plays a decisive role in achieving global progressive recovery.
Sixth, the shares generated by [13,20] have equal importance. Typically, individuals within a group are further classified into management members and regular members. Different access levels to classified information are assigned to members based on their importance levels. As a result, the proposed scheme in this paper is more versatile. In this scheme, each group has a specific threshold. When the sum of participant weights reaches the threshold, the corresponding sub-image can be restored. Compared to traditional (k,n) threshold schemes, this solution offers enhanced security.
Finally, as shown in Table 4, Xie et al. [9] proposed a low-cost CS based multi-party secret image sharing scheme that enhances security through permutation and blurring, but it is not progressively recoverable. Guo et al. [12] resolved the issue of achieving only fully recovered or unrecovered images, and proposed non-expandable hierarchical shadowing for reconstructed images. Both [14] and [15] implemented a hierarchical structure, but without scalability. Wu et al. [20] is a joint multi-group image secret sharing scheme, but the reconstructed images are either fully recovered or not recovered at all. This scheme combines their strengths to achieve both hierarchy and progression, and secret images can be divided into arbitrary levels according to actual needs.
5.
Conclusions
In this paper, we introduce a novel global progressive image secret sharing scheme that combines group secret sharing with a progressive secret sharing system. The proposed scheme utilizes multi-group joint management to allow for global progressive recovery with varying priorities. Throughout the sharing process, the scheme employs bit-polar decomposition to divide the depth of the secret image's pixels, enabling groups to establish diverse priorities. During the recovery process, Birkhoff interpolation ensures the recovery of secret images within groups. Using lightweight superposition operations, distinct layers of secret images can be recovered with global progressivity among groups. In addition, the reuse of participant secret shares can effectively prevent external attacks. The scheme, as presented in this paper, finds potential application in transmitting product design diagrams. Future research will focus on detecting potential spoofing on the distributor's end and exploring methods for decentralizing the distributor's rights based on the current scheme.
Use of AI tools declaration
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Acknowledgments
The authors thank the anonymous reviewers for their valuable comments. This work was supported by Xi'an Science and Technology Plan Project (No. 22GXFW0063); Shaanxi Provincial Department of Science and Technology Youth Project (Nos. 2021JQ-575 and 2021JQ-576); Shaanxi Provincial Department of Education Project (No. 19JK0526).
Conflict of interest
The authors declare there is no conflict of interest.