Abstract
Traditional (k, n) secret image sharing provides all-or-nothing decoding model and (k, n) scalable secret image sharing provides progress decoding model during image reconstruction. Both these two decoding models are significance in various applications. However, the security level for real applications would change due to the dynamical environment, only one single decoding model cannot satisfy the changeable security requirement. In this work, we construct scalable secret image sharing schemes that provides both all-or-nothing and progress decoding models to satisfy the dynamical secure requirement. Each participant in our schemes only needs to keep one initial-shadow. During image reconstruction, the dealer selects the decoding model according to current security requirement, if progress model is chosen, initial shadows can achieve image reconstruction in progress model without any modification; else if all-or-nothing model is chosen, the dealer does not need to resent new shadows to participants, the initial-shadows can be updated to satisfy all-or-nothing model efficiently.
Introduction
(k, n) secret image sharing (SIS) [1, 2] consists of encoding phase and decoding phase. During encoding phase, a secret image O is divided into n shadows S1, S2, …, Sn; During decoding phase, a group of any k or more shadows is capable to reconstruct the entire image O, less than k shadows get nothing on the image. Such reconstruction model is called all-or-nothing decoding model. There are mainly two approaches in (k, n) SIS that achieving all-or-nothing decoding model, polynomial based SIS [3–5] and visual cryptography based SIS [6–9]. Polynomial based SIS can reduce shadow size from secret image and recover lossless image, the image reconstruction is based on interpolation operation. Visual cryptography based SIS can reconstruct image by human visual system without any cryptographic computation, but the shadow size is expanded and the recovered image is distort comparing to original image.
Recently, a new category of SIS: (k, n) Scalable SIS scheme was proposed which provides a different decoding model other than all-or-nothing model. In (k, n) scalable SIS scheme, k to n shadows can progressively reconstruct the secret image and less than k shadows still get nothing on the image, and such model is called progress decoding model. There were many works on (k, n) scalable SIS that achieve progress decoding model. In 2007, Wang and Shyu [10] first constructed a (2, n) scalable SIS based on interpolation polynomial. Later, Yang and Huang [11] proposed a general (k, n) scalable SIS to enhance Wang-Shyu’s work [10]. However, those two schemes [10, 11] did not satisfy the property of smooth reconstruction. The schemes [12, 13] not only satisfy progress decoding model but also the property of smooth reconstruction. In [14], Liu et.al published a general approach to reduce shadow size in scalable secret sharing schemes. The works [15–17] constructed SIS schemes with essential shadows. In those schemes, all the shadows can be categorized into essential shadows and non-essential shadows, and essential shadows have more contributions in image reconstruction than non-essential shadows. Later, Liu and Yang [18] proposed a (k, n) scalable SIS with essential shadows which provides progress decoding model. All above (k, n) scalable SIS were based on interpolation polynomial. There were also scalable SIS schemes that were based on other approaches, for instance, [19, 20] were based on visual cryptography, [21] was based on Boolean operation, [22] was based on linear congruence equation. Comparing to those schemes, polynomial based scalable SIS schemes have advantaged in shadow size and quality of recovered image.
All previous (k, n) SIS or (k, n) scalable SIS provide single decoding model during image reconstruction (all-or-nothing model or progress model). However the secure environment in current applications is much more complicated than ever before, many factors may have influence on the security level in SIS schemes. For example, (1) an increase or decrease in the importance level of the secret image; (2) a change in participants number (i.e., one or more participants joining or leaving the group); (3) a change in the level of mutual trust between participants; and (4) the leakage of some participants’ shadow. A new category of threshold changeable secret sharing scheme [23–25] have been introduced to solve the problem of dynamical security level, where the threshold k for secret reconstruction can be increased or decreased. However the problem of dynamical secure environment in SIS has not been considered yet. Any single decoding model (all-or-nothing or progress) has secure problem with changeable security environment. For instance, in all-or-nothing model, k or more shadows can recover the same secret image, this model causes shadow redundance when more than k shadows participant in reconstruction, and the redundance shadows would cause additional secure problems. Progress model needs all n shadows to recover entire image, it has low efficiency to recover entire image in a emergency situation. In this paper, we aim to address the problem of dynamical security environment in the filed of SIS, and construct (k, n) scalable SIS schemes that provide both two decoding models. The similar approach of providing multiple decoding options have been used in Chinese reminder based SIS [26–29]. During image reconstruction, the dealer can decide the decoding model according to current security level. If progress model is selected, k to n initial-shadows can progressively recover the image; else if all-or-nothing model is selected, each participant update his shadow correspondingly to satisfy all-or-nothing decoding model.
The rest of this paper is organized as follows. In Section 2, we introduce Thien-Lin’s polynomial-based (k, n) SIS and Yang-Chu’s (k, n) scalable SIS. Section 3 describes the motivation of our work and constructs two (k, n) scalable SIS schemes that provide both two decoding models. Examples and experimental results are shown in Section 4, then conclusion is summarized in Section 5.
Preliminaries
In this part, we introduce some preliminaries to our work. Our proposed schemes are based on interpolation polynomial and extended from Yang-Chu’s (k, n) scalable SIS [12], therefore the original polynomial based (k, n) SIS [1] and Yang-Chu’s scheme [12] are described in this section.
Polynomial based (k, n) SIS
Thien and Lin introduced a remarkable (k, n) SIS scheme [1] which consists of two phases: Encoding phase and Decoding phase. In first phase, a dealer takes a secret image O as input and invoke an algorithm
Encoding phase:
On input secret image O, invoke The dealer divide O into l-non-overlapping k pixel blocks, B1, B2, …, B
l
. For k pixel values aj,0, aj,1, …, aj,k-1 in each block B
j
, j ∈ [1, l], the dealer generates a k - 1 degree polynomial: f
j
(x) = aj,0 + aj,1x + aj,2x2 + … , aj,k-1xk-1. Using f
j
(x) to compute n shares: vj,1 = f
j
(1) , vj,2 = f
j
(2) , …, vj,n = f
j
(n) , j ∈ [1, l]. Outputs n shadows: S
i
= v1,i||v2,i||, …, ||vl,i, i = 1, 2, …, n.
Decoding phase:
On input m shadows S1, S2, …, S
m
. (m ≥ k), invoke Compute all k coefficients in f
j
(x) from v1,j, v2,j, …, vm,j, j ∈ [1, l] using lagrange formula to recover the block B
j
. Outputs O = B1||B2||, …, ||B
l
It is obvious that Thien-Lin’s scheme satisfies all-or-nothing reconstruction model on threshold k that: k or more shadows can reconstruct entire image; less than k shadows get noting on secret image. The size of each shadow S
i
in is
Yang-Chu’s (k, n) scalable SIS
In [12], Yang and Chu introduced a (k, n) scalable SIS which is based on Thien-Lin’ work. In this scheme [12], a secret image O is also encoded into n shadows S1, S2, …, S
n
, and these n shadows achieve progress decoding model other than all-or-nothing decoding model. We use following
Encoding phase:
On input secret image O. output n. shadows S1, S2, …, S
n
The secret image O is segmented into n - k + 1 disjoint sub-images O1, O2, …, On-k+1, where O1 has the size For each sub-image O
j
, j ∈ [1, n - k + 1], generate n sub-shadows sj,1, sj,2, …, sj,n using The shadow S
i
for participant P
i
is S
i
= s1,i||s2,i|| … ||sn-k+1,i. Output n shadows S1, S2, …, S
n
.
Decoding phase:
On input m shadows S1, S2, …, S
m
. n ≥ m ≥ k, The sub-images Oj, j ∈ [1, m - k + 1] can be recov ered by Outputs the reconstructed partial image
We can observe that any groups of m shadows k ≤ m ≤ n in
Proposed scheme
Motivation
Previous SIS schemes provided single decoding model of all-or-nothing model or progress model. However, in real applications, security scenarios are possibly changeable after that the dealer publicly distributes n shadows of (k, n) SIS scheme to all participants, respectively. In this case, single decoding model of all-or-nothing model or progress model is unable to satisfy the requirement of changeable security scenarios. For instance, in all-or-nothing model, k or more shadows can recover the same secret image, when more than k shadows participant in reconstruction, and the redundance shadows have no contribution in image reconstruction and would leak confidential information to attackers. On the other hand, all-or-nothing model is not fit for a secret image where it includes information with different secure levels in different areas. Since the area with higher importance level would requires higher threshold to reconstruction. Progress decoding model provides a more flexible way in image reconstruction than all-or-nothing model. In this model, the secret image can be segmented into sub-images with different secure levels, the sub-image with higher secure level requires more shadows in reconstruction. However, it needs all n shadows to recover entire secret image, when there is an emergence situation that requires recovering entire image immediately, it has low efficiency to gathering all participants. We use Fig. 1 to show all-or-nothing model and progress model respectively.
Our motivation is to addressing the problem of changeable security environment in the filed of SIS, and the solution is to design SIS schemes that achieve both all-or-nothing model (Fig. 1a) and progress model (Fig. 1b) in image reconstruction. When the security level is high, the dealer chooses progress decoding model in image reconstruction, each participated shadows has contribution in reconstruction, the sub-image with higher secure level requires more shadows in reconstruction; when security level is decreased or the reconstruction situation is emergency, all-or-nothing model is selected, where the entire image can be recovered more efficiently. The proposed schemes satisfy following conditions:

(a) All-or-nothing model (b) progress model.
During
In
If progress model is selected, k to n partici pants can recover image progressively using their initial-shadows.
Otherwise if all-or-nothing model is selected, participants update their shadows correspondingly, then any group of k or more updated shadows are able to recover entire image.
In this part, we propose two (k, n). scalable SIS schemes that provide both two decoding models. Our proposed schemes are based on Yang-Chu’s (k, n) scalable SIS scheme, which are described in following
Encoding phase:
On input secret image O. output n shadows S1, S2, …, S
n
The secret image O is segmented in to n - k + 1. isjoint sub-images O1, O2, …, On-k+1, where O1 has the size For sub-image O1, generate n. ub-shadows s1,1, s1,2, …, s1,n using For each sub-images O
j
, j ∈ [2, n - k + 1], Segment O
j
into l disjoint k-pixels blocks, such that: Each k-pixels block For each The shadow S
i
for participant P
i
is:
S i = s1,i||s2,i|| … ||sn-k+1,i. Output n shadows S1, S2, …, S n .
Decoding phase:
The dealer chooses all-or-nothing model or progress model according to current security requirement. If progress model is chosen. Any group of m shadows (k ≤ m ≤ n) can recover using The sub-shadows O2 - Om-k+1 can be extracted from expanded sub-images, then the partial image O
Par
= O1||O2|| … ||Om-k+1 is recovered. If all-or-nothing model is chosen. The dealer generates and publishes n - k Polynomials: g
j
(x) = p1x
k
+ p2xk+1 + … + p
j
xk+j-1, j = 1, 2, …, n - k. Without loss of generality, suppose P1 - P
k
participate in image reconstruction. The original shadow of P
i
is S
i
= s1,i||s2,i|| … ||sn-k+1,i, P
i
computes Using these k updated shadows:
The following theorem proves that
In
In
Encoding phase:
The secret image O is segmented into n - k + 1 disjoint sub-images O1, O2, …, On-k+1, where O1 has the size The dealer generates n shadows S1, S2, …, S
n
using Yang-Chu’s approach, and sends each shadow S
i
to P
i
. For each sub-image O
j
, j ∈ [2, n - k + 1] The dealer selects j - 1 IDs d(j,1), d(j,2), …, d(j,j-1) other than 1, 2, …, n, and computes j - 1 sub-shadows sj,d(j,1), sj,d(j,2), …, sj,d(j,j-1) on IDs d(j,1), d(j,2), …, d(j,j-1) respectively. The dealer randomly selects a group of n - k + 1 participants in {P1, P2, …, P
n
} and then sends j - 1 subhadows sj,d(j,1), sj,d(j,2), …, sj,d(j,j-1) to each of these n - k + 1 participants, but keeps the IDs d(j,1), d(j,2), …, d(j,j-1) secretly.
Decoding phase:
The dealer chooses all-or-nothing model or progress model according to current security level. If progress model is chosen. Any group of m initial-shadows (k ≤ m ≤ n) in {S1, S2, …, S
n
} can recover sub-images O1, O2, …, Om-k+1 using Yang-Chu’s approach. If all-or-nothing model is chosen. The dealer publishes the j - 1 IDs d(j,1), d(j,2), …, d(j,j-1) for the each sub-image O
j
, j ∈ [2, n - k + 1]. For any group of k participants, they can gather k + j - 1 sub-shadows on each sub-image O
j
, j = 1, 2, …, n - k + 1 using their initial-shadows S
i
and the public information. Since the sub-image O
j
is encrypted into sub-shadows using (k + j - 1, n) SIS, then O
j
can be reconstructed from these k + j–1 sub-shadows. As a result, the entire image O = O1||O2|| … ||On-k+1 can be recovered.
We use
The initial-shadow S
i
in
It is easy to prove that
As a trade off for the shadow size expansion, the published information for all-or-nothing model in
Examples and experiments
In this section, we use examples to illustrate the process of shadow generation and image reconstruction in proposed schemes. Thus three examples are listed respectively, Example 1 shows the process in Yang-Chu’s scheme which provides only progress model during image reconstruction; Examples 2 and 3 describe the processes of proposed
In all examples, we use scalable (k = 3, n = 5) threshold to encode secret image O into n = 5 shadows. According to Yang-Chu’s approach and proposed schemes, the secret image O is first segmented into n - k + 1 =3 sub-images O1, O2, O3, where the sizes of each sub-image are
Assume that O1 consists of three 3 pixels blocks B1,1 = (67, 98, 157), B1,2 = (51, 215, 175), B1,3 = (243, 41, 91), O2 consists of one 4-pixels block B2,1 = (77, 23, 103, 213) and O3 consists of one 5-pixels block B3,1 = (89, 151, 123, 65, 180).
•
For sub-image O1, generate three k - 1 degree polynomials:
For sub-images O2, O3, generate f2 (x) =77 + 23x + 103x2 + 213x3 and f3 (x) =89 + 151x + 123x2 + 65x3 + 180x4 respectively. The sub-shadow s2,j, s3,j, j ∈ [1, 5] for each participant P j is s2,j = f2 (j) , s3,j = f3 (j).
The 5 shadows S
j
, j ∈ [1, 5] are:
•
The image O can be reconstructed from 3 to 5 shadows under progress model. Any 3 shadows can reconstruct sub-image O1, any 4 shadows can reconstruct O1 and O2, all 5 shadows can reconstruct the entire image O = O1||O2||O3.
Assume that O1 consists of three 3 pixels blocks B1,1 = (67, 98, 157), B1,2 = (51, 215, 175), B1,3 = (243, 41, 91), O2 consists of one 3-pixels block B2,1 = (77, 23, 103) and O3 consists of one 3-pixels block B3,1 = (89, 151, 123).
•
For sub-image O1, generate three k - 1 degree polynomials: f1,1 (x) =67 + 98x + 157x2, f1,2 (x) =51 + 215x + 175x2, f1,3 (x) =243 + 41x + 91x2
For each block B1,1, B1,2, B1,3 respectively, and then compute the values f1,i (j), i = 1, 2, 3, j = 1, 2, 3, 4, 5. Thus the sub-shadow s1,j, j ∈ [1, 5] for each participant P j is s1,j = {f1,1 (j) , f1,2 (j) , f1,3 (j)}.
For sub-image O2, the 3-pixels block B2,1 is first expanded to a 4-pixels block
For sub-image O3, the 3-pixels block B3,1 is first expanded to a 5-pixels block
The 5 shadows S
j
, j ∈ [1, 5] are:
•
– If progress model is selected:
The image O can be reconstructed from 3 to 5 shadows under progress model. Any 3 shadows can reconstruct sub-image O1, any 4 shadows can reconstruct the 4-pixels block
– If all-or-nothing model is selected.
The dealer publishes p1 = 40, p2 = 78, p3 = 39, then any k = 3 participants can generate g1 (x) = p1x3 and g2 (x) = p2x3 + p3x4. The participants update their sub-shadows by:
Assume that O1 consists of three 3 pixels blocks B1,1 = (67, 98, 157), B1,2 = (51, 215, 175), B1,3 = (243, 41, 91), O2 consists of one 4-pixels block B2,1 = (77, 23, 103, 213) and O3 consists of one 5-pixels block B3,1 = (89, 151, 123, 65, 180).
•
The shadows in
The dealer selects one additional ID 6 for O2 and two additional IDs 7,8 for O3, and computes one sub-shadow s2,6 = 233 on O2, two sub-shadows s3,7 = 59, s3,8 = 123 on O3 using the approach in Yang-Chu’s approach.
Afterwards the sub-shadows s2,6 is sent to randomly n - k + 1 =3 participants, and the sub-shadows s3,7, s3,8 are sent to randomly n - k + 1 =3 participants. The IDs {6,7,8} are kept secretly.
•
– If progress model is selected:
The image O can be reconstructed from 3 to 5 original shadows under progress model as in
– If all-or-nothing model is selected.
The dealer publishes the IDs 6,7,8. Any k = 3 participants can gather enough sub-shadows on each O1, O2, O3. Then the entire image O can be recovered by interpolation.
Next we use an experiment to show the results of proposed

Secret image and sub-images.

(a) Shadows using Scheme 3 (b) shadows using Scheme 4.
Single all-or-nothing model or progress model cannot satisfy the changeable security requirement in threshold secret image sharing scheme for real applications.
In this paper, we first consider the problem of dynamical security environment in the field of image secret sharing, and propose two (k, n) scalable secret image sharing schemes that provide both progress model and all-or-nothing model in image reconstruction. Our schemes are based on interpolation polynomial and extended from Yang-Chu’s (k, n) scalable SIS scheme. Each participant only keeps one initial-shadow for progress model. When all-or-nothing model is selected, initial-shadows can be updated efficiently to satisfy all-or-nothing model.
Footnotes
Acknowledgments
This work was supported by National Natural Science Foundation of China under Grant No. 61502384, 61571360; and the Shaanxi Provincial Natural Science Basic Research Program (No.2019JQ-736). This research was supported in part by Ministry of Science and Technology (MOST), under Grant 105-2221-E-259-007-MY2.
