<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn>
<issn pub-type="ppub">0868-4952</issn>
<issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFOR420</article-id>
<article-id pub-id-type="doi">10.15388/20-INFOR420</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>A Lossless Linear Algebraic Secret Image Sharing Scheme</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Kanso</surname><given-names>Ali</given-names></name><email xlink:href="ali.kanso@ku.edu.kw">ali.kanso@ku.edu.kw</email><xref ref-type="aff" rid="j_infor420_aff_001"/><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>A. Kanso</bold> is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc degree in mathematics from Queen Mary and Westfield College (University of London), in 1994. He earned his MSc degree in applied computing technology at the Electronic Engineering department of Middlesex University, in 1996. In 1999 he obtained a PhD in mathematics from Royal Holloway and Bedford New College (University of London). His research interests include chaos-based encryption systems, information hiding, hash functions, secret sharing, and graph theory.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Ghebleh</surname><given-names>Mohammad</given-names></name><email xlink:href="mohammad.ghebleh@ku.edu.kw">mohammad.ghebleh@ku.edu.kw</email><xref ref-type="aff" rid="j_infor420_aff_001"/><bio>
<p><bold>M. Ghebleh</bold> is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc and MSc in mathematics from Sharif University of Technology, Tehran, Iran (1997 and 1999), and his PhD in mathematics from Simon Fraser University, Burnaby, British Columbia, Canada (2007). His research interests include graph theory, combinatorics, and digital security topics such as encryption, data hiding, hash functions, and secret sharing.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Alazemi</surname><given-names>Abdullah</given-names></name><email xlink:href="abdullah.alazemi@ku.edu.kw">abdullah.alazemi@ku.edu.kw</email><xref ref-type="aff" rid="j_infor420_aff_001"/><bio>
<p><bold>A. Alazemi</bold> is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc in mathematics from Kuwait University, Kuwait. He earned his MSc and PhD in mathematics from Colorado State University, Colorado, the United States (2004 and 2007). His research interests include incidence structures, classification problems, spectral graph theory, graph theory, combinatorics and algebra.</p></bio>
</contrib>
<aff id="j_infor420_aff_001">Department of Mathematics, <institution>Kuwait University</institution>, P.O. Box 5969, Safat 13060, <country>Kuwait</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2020</year></pub-date>
<pub-date pub-type="epub"><day>17</day><month>6</month><year>2020</year></pub-date><volume>31</volume><issue>3</issue><fpage>499</fpage><lpage>522</lpage>
<history>
<date date-type="received"><month>9</month><year>2019</year></date>
<date date-type="accepted"><month>5</month><year>2020</year></date>
</history>
<permissions><copyright-statement>© 2020 Vilnius University</copyright-statement><copyright-year>2020</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>A <inline-formula id="j_infor420_ineq_001"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-threshold secret image sharing scheme is any method of distributing a secret image amongst <italic>n</italic> participants in such a way that any <italic>k</italic> participants are able to use their shares collectively to reconstruct the secret image, while fewer than <italic>k</italic> shares do not reveal any information about the secret image. In this work, we propose a lossless linear algebraic <inline-formula id="j_infor420_ineq_002"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-threshold secret image sharing scheme. The scheme associates a vector <inline-formula id="j_infor420_ineq_003"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> to the <italic>i</italic>th participant in the vector space <inline-formula id="j_infor420_ineq_004"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">α</mml:mi></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{{2^{\alpha }}}^{k}}$]]></tex-math></alternatives></inline-formula>, where the vectors <inline-formula id="j_infor420_ineq_005"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> satisfy some admissibility conditions. The <italic>i</italic>th share is simply a linear combination of the vectors <inline-formula id="j_infor420_ineq_006"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> with coefficients from the secret image. Simulation results demonstrate the effectiveness and robustness of the proposed scheme compared to standard statistical attacks on secret image sharing schemes. Furthermore, the proposed scheme has a high level of security, error-resilient capability, and the size of each share is <inline-formula id="j_infor420_ineq_007"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$1/k$]]></tex-math></alternatives></inline-formula> the size of the secret image. In comparison with existing work, the scheme is shown to be very competitive.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>secret sharing</kwd>
<kwd>secret image sharing</kwd>
<kwd>(<italic>k, n</italic>)-threshold scheme</kwd>
<kwd>admissible tracks</kwd>
<kwd>chaos</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_infor420_s_001">
<label>1</label>
<title>Introduction</title>
<p>A secret sharing scheme is any method of distributing a secret amongst a number of participants in such a way that any authorized group of participants can recover the secret, while unauthorized sets of participants are unable to obtain any information about the secret using their shares. In a <italic>k</italic>-out-of-<italic>n</italic> secret sharing scheme, there are <italic>n</italic> participants and every collection of <italic>k</italic> or more participants is authorized to recover the secret, while fewer than <italic>k</italic> participants constitute an unauthorized set. The number <italic>k</italic> is referred to as the threshold and the scheme is usually referred to as a <inline-formula id="j_infor420_ineq_008"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-threshold secret sharing scheme, or a <inline-formula id="j_infor420_ineq_009"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-scheme for short. While there exist other approaches such as those where authorized sets of participants are specified by properties other than merely the size of the subset, in this work we focus on <inline-formula id="j_infor420_ineq_010"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-schemes.</p>
<p>The concept of secret sharing was introduced in 1979 independently by Shamir (<xref ref-type="bibr" rid="j_infor420_ref_038">1979</xref>) and Blakley <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_005">1979</xref>). Shamir’s method is based on polynomial interpolation in the field <inline-formula id="j_infor420_ineq_011"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> of integers modulo <italic>p</italic>, whereas Blakley’s method is based on hyperplane geometry. In the early eighties, Mignotte (<xref ref-type="bibr" rid="j_infor420_ref_033">1982</xref>) and Asmuth and Bloom (<xref ref-type="bibr" rid="j_infor420_ref_002">1983</xref>) proposed a threshold secret sharing approach based on the Chinese remainder theorem. Secret sharing schemes are important primitives in a number of cryptographic applications such as threshold signature (authentication) schemes (Desmedt and Frankel, <xref ref-type="bibr" rid="j_infor420_ref_013">1991</xref>), access control (Naor and Wool, <xref ref-type="bibr" rid="j_infor420_ref_034">1998</xref>), electronic voting (Schoenmakers, <xref ref-type="bibr" rid="j_infor420_ref_037">1999</xref>), distributed storage systems (Wylie <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_047">2000</xref>), etc.</p>
<p>Because of the widespread use of digital images, development of secret image sharing schemes (SIS) where the secret is a digital image have attracted the attention of researchers. In the context of an SIS, shares are often referred to as shadow images. We refer to a <inline-formula id="j_infor420_ineq_012"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-threshold secret image sharing scheme as a <inline-formula id="j_infor420_ineq_013"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS for short. There are challenges specific to secret image sharing. For example, secret sharing was originally introduced for sharing cryptographic keys, thus sizes of shares were not much of a concern. On the other hand, since digital images are typically large, one is concerned with how large each shadow image is in comparison to the original secret. While Shamir’s scheme produces shares of the same size as the secret itself, Thien and Lin (<xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>) proposed a <inline-formula id="j_infor420_ineq_014"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS inspired by Shamir’s scheme whose shadow images are of size <inline-formula id="j_infor420_ineq_015"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$1/k$]]></tex-math></alternatives></inline-formula> the size of the secret. Lin and Tsai (<xref ref-type="bibr" rid="j_infor420_ref_031">2004</xref>) extended Shamir’s scheme in proposing a secret image sharing scheme with the capabilities of steganography and authentication. Chang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_008">2008</xref>) showed that this scheme suffers from weak authentication and low quality of stego-images. In Bai (<xref ref-type="bibr" rid="j_infor420_ref_003">2006</xref>), Bai proposed a <inline-formula id="j_infor420_ineq_016"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS based on matrix projection in conjunction with Thien and Lin’s approach (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>). del Rey (<xref ref-type="bibr" rid="j_infor420_ref_011">2008</xref>) proposed a <inline-formula id="j_infor420_ineq_017"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(2,n)$]]></tex-math></alternatives></inline-formula>-SIS using binary matrices. Rey’s scheme is shown to suffer from some drawbacks if the matrices are not of low enough rank (Elsheh and Hamza, <xref ref-type="bibr" rid="j_infor420_ref_016">2010</xref>). Many Shamir-based SIS use arithmetic in the fields <inline-formula id="j_infor420_ineq_018"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mn>251</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{251}}$]]></tex-math></alternatives></inline-formula> or <inline-formula id="j_infor420_ineq_019"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mn>257</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{257}}$]]></tex-math></alternatives></inline-formula> to accommodate 8-bit intensity values of digital images. This choice renders such schemes lossy since they involve truncation of some values. Hu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_023">2012</xref>) proposed a lossless <inline-formula id="j_infor420_ineq_020"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS over the Galois field <inline-formula id="j_infor420_ineq_021"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{{2^{8}}}}$]]></tex-math></alternatives></inline-formula>. In El-Latif <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_015">2013</xref>), Abd El-Latif <italic>et al.</italic> proposed a secret image sharing scheme based on random grids and error diffusion and a chaotic cat map for the generation of meaningful shadow images. Wu (<xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>) proposed a variant of Thien–Lin’s scheme (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>) which uses prime number 257 as a replacement for 251 in Thien–Lin’s approach. Wu’s scheme has a low distortion rate, and is more applicable for light images (Wu, <xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>). However, due the overflow caused in the generation phase of this scheme, reconstruction of the secret image is more computationally intensive than in the case of Thien–Lin’s scheme. In Zarepour-Ahmadabadi <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_048">2016</xref>), Zarepour-Ahmadabadi <italic>et al.</italic> proposed an SIS based on cellular automata. Deng <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_012">2017</xref>) proposed a <inline-formula id="j_infor420_ineq_022"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(2,n)$]]></tex-math></alternatives></inline-formula>-threshold SIS based on basic vector operations and coherence superposition. Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>) proposed a variant of Thien and Lin’s scheme based on cyclic shifting to improve the quality of the reconstructed secret image. Kabirirad and Eslami (<xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>) proposed a multi secret SIS based on Boolean operations whose drawback is that each generated shadow image has the same size as the secret image. Ghebleh and Kanso (<xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>) proposed a <inline-formula id="j_infor420_ineq_023"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS based on Shamir’s approach and arithmetic in a field <inline-formula id="j_infor420_ineq_024"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> where <italic>p</italic> is a large prime, to facilitate the use of (concatenated) multiple intensity values of the secret image as a single coefficient. While still lossy, this method enhances the quality of the reconstructed secret. Ding <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_014">2018</xref>) proposed a scheme based on matrix theory and Shamir’s construction. Recently, Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor420_ref_029">2018</xref>) proposed a <inline-formula id="j_infor420_ineq_025"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-threshold secret sharing scheme for medical images based on Shamir’s approach and the high redundancy in medical images. Some secret image sharing schemes such as Chang and Hwang (<xref ref-type="bibr" rid="j_infor420_ref_006">1998</xref>), Chang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_007">2006</xref>), Chen <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_010">2009</xref>), Le <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_030">2011</xref>) employ vector quantization (VQ) methods (Gray, <xref ref-type="bibr" rid="j_infor420_ref_022">1984</xref>; Gersho and Gray, <xref ref-type="bibr" rid="j_infor420_ref_019">2012</xref>; Simić <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_040">2018</xref>) to compress the secret image, which results in further reduction in the sizes of the shadow images.</p>
<p>A majority of existing secret image sharing schemes in the literature are based on one of Shamir’s (<xref ref-type="bibr" rid="j_infor420_ref_038">1979</xref>), Blakley’s <italic>et al.</italic>, (<xref ref-type="bibr" rid="j_infor420_ref_005">1979</xref>), Mignotte’s, (<xref ref-type="bibr" rid="j_infor420_ref_033">1982</xref>) and Asmuth and Bloom’s, (<xref ref-type="bibr" rid="j_infor420_ref_002">1983</xref>) approaches. Furthermore, many of the existing schemes are lossy and restore the secret image with some distortion which may not be acceptable in certain applications. Moreover, some existing SIS suffer from weak authentication and security issues. The aim of this research is to present a secret sharing scheme that has improved performance over existing work.</p>
<p>In this paper, we propose a lossless linear algebraic <inline-formula id="j_infor420_ineq_026"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS. As illustrated later, the proposed scheme is a generalization of Shamir’s secret sharing scheme based on polynomial interpolation. The scheme associates a vector <inline-formula id="j_infor420_ineq_027"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> to the <italic>i</italic>th participant in the <italic>k</italic>-dimensional vector space <inline-formula id="j_infor420_ineq_028"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}^{k}}$]]></tex-math></alternatives></inline-formula> over the Galois field <inline-formula id="j_infor420_ineq_029"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula>, where <italic>q</italic> is a power of 2. The <italic>i</italic>th share is then computed as a linear combination of the vectors <inline-formula id="j_infor420_ineq_030"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> with coefficients computed from the secret. For the threshold property of secret sharing, and for security of shares, some admissibility conditions (such as linear independence of certain sets) are enforced on the vectors <inline-formula id="j_infor420_ineq_031"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula>. Empirical results presented in the paper illustrate the proposed scheme’s performance. These include security of shadow images and the recovery process. More specifically, it is shown that the produced shadow images satisfy randomness properties which in turn means that the shadow images do not reveal any meaningful information about the secret image. Moreover, shadow images have little or no correlation. It is also shown that any unauthorized collection of shadow images fails to produce any information about the secret image. The proposed scheme is lossless, which means that it can be used for sharing any type of digital data (as secret), including text and binary files such as compressed images generated via vector quantization.</p>
<p>The paper is organized as follows: In Section <xref rid="j_infor420_s_002">2</xref>, we present the necessary background and notation. Section <xref rid="j_infor420_s_003">3</xref> provides a detailed description of the proposed scheme. Simulations are presented in Section <xref rid="j_infor420_s_011">4</xref> to showcase the efficiency of the scheme, the properties of the generated shadow images and security analysis. Section <xref rid="j_infor420_s_020">5</xref> presents a comparison of the scheme with existing work. Finally, we end the paper with some concluding remarks.</p>
</sec>
<sec id="j_infor420_s_002">
<label>2</label>
<title>Background and Notation</title>
<p>We propose a secret image sharing scheme based on Shamir’s approach (Shamir, <xref ref-type="bibr" rid="j_infor420_ref_038">1979</xref>). In this section we lay out the necessary background and notation, as well as differences between the proposed scheme and Shamir’s scheme.</p>
<p>Shamir’s <inline-formula id="j_infor420_ineq_032"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-scheme is based on polynomial interpolation in the field <inline-formula id="j_infor420_ineq_033"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> where <italic>p</italic> is a prime number. To share secret <inline-formula id="j_infor420_ineq_034"><alternatives>
<mml:math><mml:mi mathvariant="italic">D</mml:mi><mml:mo stretchy="false">∈</mml:mo><mml:mo fence="true" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">p</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$D\in \{0,1,\dots ,p-1\}$]]></tex-math></alternatives></inline-formula>, a polynomial 
<disp-formula id="j_infor420_eq_001">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">f</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">x</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mi mathvariant="italic">x</mml:mi><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:msup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo stretchy="false">⋯</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:msup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ f(x)={a_{0}}+{a_{1}}x+{a_{2}}{x^{2}}+\cdots +{a_{k-1}}{x^{k-1}}\]]]></tex-math></alternatives>
</disp-formula> 
is chosen at random with <inline-formula id="j_infor420_ineq_035"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi mathvariant="italic">D</mml:mi></mml:math>
<tex-math><![CDATA[${a_{0}}=D$]]></tex-math></alternatives></inline-formula>. Then the values <inline-formula id="j_infor420_ineq_036"><alternatives>
<mml:math><mml:mi mathvariant="italic">f</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$f(i)$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_037"><alternatives>
<mml:math><mml:mi mathvariant="italic">i</mml:mi><mml:mo stretchy="false">∈</mml:mo><mml:mo fence="true" stretchy="false">{</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$i\in \{1,2,\dots ,n\}$]]></tex-math></alternatives></inline-formula> are computed and distributed to the participants as shares. With the obvious conditions that <inline-formula id="j_infor420_ineq_038"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal">&lt;</mml:mo><mml:mi mathvariant="italic">p</mml:mi></mml:math>
<tex-math><![CDATA[$k\leqslant n<p$]]></tex-math></alternatives></inline-formula>, the polynomial interpolation theorem guarantees that every <italic>k</italic> shares suffice to recover <inline-formula id="j_infor420_ineq_039"><alternatives>
<mml:math><mml:mi mathvariant="italic">f</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">x</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$f(x)$]]></tex-math></alternatives></inline-formula>, and in particular the secret <italic>D</italic>. Following the notation of Spiez <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_041">2009</xref>), Schinzel <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_036">2010</xref>), this can be generalized by fixing pairwise distinct nonzero values <inline-formula id="j_infor420_ineq_040"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">∈</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${x_{1}},{x_{2}},\dots ,{x_{n}}\in {\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> and using <inline-formula id="j_infor420_ineq_041"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi mathvariant="italic">f</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[${y_{i}}=f({x_{i}})$]]></tex-math></alternatives></inline-formula> as the <italic>i</italic>th share. With this notation, computation of shares can be summarized as 
<disp-formula id="j_infor420_eq_002">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mo>⋮</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>=</mml:mo><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt 4.0pt 4.0pt" equalrows="false" columnlines="none none none none" equalcolumns="false" columnalign="center center center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo>…</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo>…</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mo>⋮</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo>⋮</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo>⋮</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo stretchy="false">⋱</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo>⋮</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mo>…</mml:mo><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mtable equalrows="false" equalcolumns="false" columnalign="center"><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mo>⋮</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \left(\begin{array}{c}{y_{1}}\\ {} {y_{2}}\\ {} \vdots \\ {} {y_{n}}\end{array}\right)=\left(\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& {x_{1}}\hspace{1em}& {x_{1}^{2}}\hspace{1em}& \dots \hspace{1em}& {x_{1}^{k-1}}\\ {} 1\hspace{1em}& {x_{2}}\hspace{1em}& {x_{2}^{2}}\hspace{1em}& \dots \hspace{1em}& {x_{2}^{k-1}}\\ {} \vdots \hspace{1em}& \vdots \hspace{1em}& \vdots \hspace{1em}& \ddots \hspace{1em}& \vdots \\ {} 1\hspace{1em}& {x_{n}}\hspace{1em}& {x_{n}^{2}}\hspace{1em}& \dots \hspace{1em}& {x_{n}^{k-1}}\end{array}\right)\left(\begin{array}{c}{a_{0}}\\ {} {a_{1}}\\ {} \vdots \\ {} {a_{k-1}}\end{array}\right).\]]]></tex-math></alternatives>
</disp-formula> 
Let <inline-formula id="j_infor420_ineq_042"><alternatives>
<mml:math><mml:mi mathvariant="bold">a</mml:mi><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$\mathbf{a}=({a_{0}},{a_{1}},\dots ,{a_{k-1}})$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_043"><alternatives>
<mml:math><mml:mi mathvariant="bold">y</mml:mi><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$\mathbf{y}=({y_{1}},{y_{2}},\dots ,{y_{n}})$]]></tex-math></alternatives></inline-formula>, and <italic>X</italic> be the <inline-formula id="j_infor420_ineq_044"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$n\times k$]]></tex-math></alternatives></inline-formula> matrix in the above equation. For convenience, we identify vectors such as <bold>a</bold> and <bold>y</bold> with their row or column matrix representation. Then the above equation can be written as 
<disp-formula id="j_infor420_eq_003">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="bold">y</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">X</mml:mi><mml:mi mathvariant="bold">a</mml:mi><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \mathbf{y}=X\mathbf{a}.\]]]></tex-math></alternatives>
</disp-formula> 
Simple linear algebra gives the following: 
<list>
<list-item id="j_infor420_li_001">
<label>•</label>
<p>For guaranteed recovery of the secret <inline-formula id="j_infor420_ineq_045"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{0}}$]]></tex-math></alternatives></inline-formula> from any <italic>k</italic> shares, all <inline-formula id="j_infor420_ineq_046"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$k\times k$]]></tex-math></alternatives></inline-formula> submatrices of <italic>X</italic> must be nonsingular. While in the field of real numbers this condition is satisfied by the assumption that the components of the track <inline-formula id="j_infor420_ineq_047"><alternatives>
<mml:math><mml:mi mathvariant="bold">x</mml:mi><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$\mathbf{x}=({x_{1}},{x_{2}},\dots ,{x_{n}})$]]></tex-math></alternatives></inline-formula> are positive and pairwise distinct, in a finite field <inline-formula id="j_infor420_ineq_048"><alternatives>
<mml:math><mml:mi mathvariant="double-struck">F</mml:mi></mml:math>
<tex-math><![CDATA[$\mathbb{F}$]]></tex-math></alternatives></inline-formula> this is not necessarily the case. For example, the matrices 
<disp-formula id="j_infor420_eq_004">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>3</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>4</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced><mml:mspace width="1em"/><mml:mtext>and</mml:mtext><mml:mspace width="1em"/><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt" equalrows="false" columnlines="none none" equalcolumns="false" columnalign="center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>3</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>3</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>5</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>5</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>6</mml:mn></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msup><mml:mrow><mml:mn>6</mml:mn></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msup></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \left(\begin{array}{c@{\hskip4.0pt}c}1\hspace{1em}& {3^{2}}\\ {} 1\hspace{1em}& {4^{2}}\end{array}\right)\hspace{1em}\text{and}\hspace{1em}\left(\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c}1\hspace{1em}& {3^{2}}\hspace{1em}& {3^{3}}\\ {} 1\hspace{1em}& {5^{2}}\hspace{1em}& {5^{3}}\\ {} 1\hspace{1em}& {6^{2}}\hspace{1em}& {6^{3}}\end{array}\right)\]]]></tex-math></alternatives>
</disp-formula> 
are singular over <inline-formula id="j_infor420_ineq_049"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mn>7</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{7}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor420_li_002">
<label>•</label>
<p>If a <inline-formula id="j_infor420_ineq_050"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>×</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k-1)\times (k-1)$]]></tex-math></alternatives></inline-formula> submatrix of <italic>X</italic> induced by the rows <inline-formula id="j_infor420_ineq_051"><alternatives>
<mml:math><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$2,3,\dots ,k$]]></tex-math></alternatives></inline-formula> and columns <inline-formula id="j_infor420_ineq_052"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${j_{1}},{j_{2}},\dots ,{j_{k-1}}$]]></tex-math></alternatives></inline-formula> is singular, then the <inline-formula id="j_infor420_ineq_053"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:math>
<tex-math><![CDATA[$k-1$]]></tex-math></alternatives></inline-formula> shares <inline-formula id="j_infor420_ineq_054"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${y_{{j_{1}}}},{y_{{j_{2}}}},\dots ,{y_{{j_{k-1}}}}$]]></tex-math></alternatives></inline-formula> suffice to recover the secret <inline-formula id="j_infor420_ineq_055"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{0}}$]]></tex-math></alternatives></inline-formula>. Thus for the threshold property of the secret sharing scheme to be satisfied, we need all such <inline-formula id="j_infor420_ineq_056"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>×</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k-1)\times (k-1)$]]></tex-math></alternatives></inline-formula> submatrices of <italic>X</italic> to be nonsingular.</p>
</list-item>
</list> 
The track <inline-formula id="j_infor420_ineq_057"><alternatives>
<mml:math><mml:mi mathvariant="bold">x</mml:mi><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$\mathbf{x}=({x_{1}},{x_{2}},\dots ,{x_{n}})$]]></tex-math></alternatives></inline-formula> is said to be admissible if it satisfies the nonsingularity conditions discussed above. Admissible tracks are studied in Schinzel <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_036">2010</xref>), Spież <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_042">2012</xref>).</p>
<p>In this work, we consider a general matrix <italic>X</italic> for computation of the shares vector <bold>y</bold>. By destroying the algebraic relations between columns of <italic>X</italic>, this idea allows more “randomness” in the shares, thus potentially making the scheme more secure. On the other hand, the lack of algebraic relations in <italic>X</italic> renders the theoretical study admissibility impractical, and each <italic>X</italic> must be verified directly. We propose to choose <italic>X</italic> randomly from the set of all <inline-formula id="j_infor420_ineq_058"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$n\times k$]]></tex-math></alternatives></inline-formula> matrices over the given field, then check its admissibility. If the field has large enough cardinality, this process has a high probability of success.</p>
<p>Thien and Lin (<xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>) proposed a secret image sharing scheme (SIS) where all coefficients of the polynomial <inline-formula id="j_infor420_ineq_059"><alternatives>
<mml:math><mml:mi mathvariant="italic">f</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">x</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$f(x)$]]></tex-math></alternatives></inline-formula>, namely components of <bold>a</bold>, are chosen from the secret. As long as the secret image is properly shuffled to eliminate correlations between entries of <bold>a</bold>, this scheme works similarly to Shamir’s scheme with the following two advantages:</p>
<list>
<list-item id="j_infor420_li_003">
<label>•</label>
<p>While in Shamir’s scheme each share has the same size as the secret, shares of Thien and Lin’s scheme have size <inline-formula id="j_infor420_ineq_060"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$1/k$]]></tex-math></alternatives></inline-formula> of the size of the secret.</p>
</list-item>
<list-item id="j_infor420_li_004">
<label>•</label>
<p>A singular <inline-formula id="j_infor420_ineq_061"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>×</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k-1)\times (k-1)$]]></tex-math></alternatives></inline-formula> submatrix of <italic>X</italic> would compromise the threshold property only for one coefficient <inline-formula id="j_infor420_ineq_062"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{i}}$]]></tex-math></alternatives></inline-formula> which is only part of the secret. So while admissibility of <italic>X</italic> must be checked, if it is overlooked, it does not necessarily compromise the whole secret.</p>
</list-item>
</list>
<p>We follow the same approach in this work and pick all components of the vector <bold>a</bold> from the shuffled secret image. Since a digital image typically has a large size compared to the parameters <italic>k</italic> and <italic>n</italic> of the scheme, elements of the secret are processed <italic>k</italic> at a time. This can be utilized by allowing <bold>y</bold> and <bold>a</bold> to have more than one column. More specifically, we write the proposed SIS as 
<disp-formula id="j_infor420_eq_005">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">Y</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">X</mml:mi><mml:mi mathvariant="italic">S</mml:mi><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ Y=XS,\]]]></tex-math></alternatives>
</disp-formula> 
where <italic>S</italic> is a <inline-formula id="j_infor420_ineq_063"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">m</mml:mi></mml:math>
<tex-math><![CDATA[$k\times m$]]></tex-math></alternatives></inline-formula> matrix obtained by padding, shuffling, and reshaping the secret image, <italic>X</italic> is an admissible <inline-formula id="j_infor420_ineq_064"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$n\times k$]]></tex-math></alternatives></inline-formula> transformation matrix, and the <inline-formula id="j_infor420_ineq_065"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">m</mml:mi></mml:math>
<tex-math><![CDATA[$n\times m$]]></tex-math></alternatives></inline-formula> matrix <italic>Y</italic> is the matrix of shares, whose <italic>i</italic>th row constitutes the <italic>i</italic>th share.</p>
<p>The final difference between the proposed scheme, Shamir’s, and Thien and Lin’s schemes is the use of the field <inline-formula id="j_infor420_ineq_066"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_067"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">α</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{\alpha }}$]]></tex-math></alternatives></inline-formula> instead of <inline-formula id="j_infor420_ineq_068"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> where <italic>p</italic> is a prime. Since digital media typically contain values from a domain <inline-formula id="j_infor420_ineq_069"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">α</mml:mi></mml:mrow></mml:msup><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{0,1,\dots ,{2^{\alpha }}-1\}$]]></tex-math></alternatives></inline-formula>, the use of a field <inline-formula id="j_infor420_ineq_070"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> involves truncation of some values which renders such secret sharing schemes lossy. Depending on the application, this might be acceptable or not. While computations in <inline-formula id="j_infor420_ineq_071"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">p</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{p}}$]]></tex-math></alternatives></inline-formula> are faster, the field <inline-formula id="j_infor420_ineq_072"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_073"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">α</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{\alpha }}$]]></tex-math></alternatives></inline-formula> is the natural choice for a lossless scheme. Since digital images typically consist of bytes of information, it is convenient for <italic>α</italic> to be a multiple of 8. If <inline-formula id="j_infor420_ineq_074"><alternatives>
<mml:math><mml:mi mathvariant="italic">α</mml:mi><mml:mo>=</mml:mo><mml:mn>8</mml:mn><mml:mi mathvariant="italic">β</mml:mi></mml:math>
<tex-math><![CDATA[$\alpha =8\beta $]]></tex-math></alternatives></inline-formula>, the entries <inline-formula id="j_infor420_ineq_075"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${s_{ij}}$]]></tex-math></alternatives></inline-formula> of the matrix <italic>S</italic> are each a concatenation of <italic>β</italic> entries of the secret image.</p>
<p>It should be noted that as mentioned above, for the random selection of the transformation matrix <italic>X</italic> to have a high probability of admissibility, the field <inline-formula id="j_infor420_ineq_076"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> must have a large cardinality. In the empirical analysis presented in this work we choose <inline-formula id="j_infor420_ineq_077"><alternatives>
<mml:math><mml:mi mathvariant="italic">α</mml:mi><mml:mo>=</mml:mo><mml:mn>16</mml:mn></mml:math>
<tex-math><![CDATA[$\alpha =16$]]></tex-math></alternatives></inline-formula> and carry all computations in the field <inline-formula id="j_infor420_ineq_078"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_079"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>16</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{16}}$]]></tex-math></alternatives></inline-formula>.</p>
</sec>
<sec id="j_infor420_s_003">
<label>3</label>
<title>The Proposed Scheme</title>
<p>Following the notation of the previous section, the proposed SIS is summarized as 
<disp-formula id="j_infor420_eq_006">
<label>(1)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">Y</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">X</mml:mi><mml:mi mathvariant="italic">S</mml:mi><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ Y=XS,\]]]></tex-math></alternatives>
</disp-formula> 
where <italic>X</italic> is an admissible transformation matrix, <italic>S</italic> is the secret image (subjected to concatenation of entries, shuffling, padding and reshaping), and <italic>Y</italic> is the shares matrix. All these matrices have entries from a field <inline-formula id="j_infor420_ineq_080"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_081"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">α</mml:mi></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn><mml:mi mathvariant="italic">β</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{\alpha }}={2^{8\beta }}$]]></tex-math></alternatives></inline-formula> for some chosen parameter <italic>β</italic>. In this section, we present in more detail the generation of the matrices <italic>X</italic> and <italic>S</italic>, and the generation of shadow images using them. For added security, the secret image may be divided into several blocks, where each block is processed separately (with an independent transformation matrix <italic>X</italic>). In this case a parameter <italic>m</italic> specified by the user defines the number of columns of the matrix <italic>S</italic> corresponding to each block.</p>
<p>The parameters of the proposed scheme which are kept constant throughout this section are the number <italic>β</italic> of bytes in each entry of <italic>S</italic>, the number <italic>n</italic> of the participants, the threshold <italic>k</italic>, and the block size <italic>m</italic>. With fixed <italic>β</italic>, we also fix an ordering of the elements of the field <inline-formula id="j_infor420_ineq_082"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_083"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn><mml:mi mathvariant="italic">β</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{8\beta }}$]]></tex-math></alternatives></inline-formula>, say <inline-formula id="j_infor420_ineq_084"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">f</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">f</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}=\{{f_{0}},{f_{1}},{f_{2}},\dots ,{f_{q-1}}\}$]]></tex-math></alternatives></inline-formula> where <inline-formula id="j_infor420_ineq_085"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">f</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math>
<tex-math><![CDATA[${f_{0}}=0$]]></tex-math></alternatives></inline-formula>. Throughout our discussions, we use the correspondence 
<disp-formula id="j_infor420_eq_007">
<label>(2)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">i</mml:mi><mml:mo stretchy="false">⟷</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">f</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ i\longleftrightarrow {f_{i}}\]]]></tex-math></alternatives>
</disp-formula> 
to move between the field <inline-formula id="j_infor420_ineq_086"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> and the group <inline-formula id="j_infor420_ineq_087"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">Z</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{Z}_{q}}$]]></tex-math></alternatives></inline-formula> of integers modulo <italic>q</italic>.</p>
<sec id="j_infor420_s_004">
<label>3.1</label>
<title>The Cat Map</title>
<p>Arnold’s cat map (Arnol’d and Avez, <xref ref-type="bibr" rid="j_infor420_ref_001">1968</xref>; Rong and Xiaoning, <xref ref-type="bibr" rid="j_infor420_ref_035">1998</xref>) is a chaotic map studied extensively in the literature. It is known to generate pseudo-random numbers which are essential in cryptographic applications (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_009">2004</xref>; Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_025">2012</xref>, <xref ref-type="bibr" rid="j_infor420_ref_026">2013</xref>, <xref ref-type="bibr" rid="j_infor420_ref_027">2015</xref>). Chen <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_009">2004</xref>) proposed a 3-dimensional generalization of the cat map defined by 
<disp-formula id="j_infor420_eq_008">
<label>(3)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi mathvariant="italic">A</mml:mi><mml:msub><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mspace width="1em"/><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="normal">mod</mml:mi><mml:mspace width="2.5pt"/><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {\mathbf{x}_{i}}=A{\mathbf{x}_{i-1}}\hspace{1em}(\mathrm{mod}\hspace{2.5pt}1),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor420_ineq_088"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{x}_{i}}$]]></tex-math></alternatives></inline-formula> is the state vector of the map whose entries are in the interval <inline-formula id="j_infor420_ineq_089"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$[0,1)$]]></tex-math></alternatives></inline-formula>, and 
<disp-formula id="j_infor420_eq_009">
<label>(4)</label><alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">A</mml:mi><mml:mo>=</mml:mo><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mspace width="-0.1667em"/><mml:mspace width="-0.1667em"/><mml:mtable columnspacing="4.0pt 4.0pt" equalrows="false" columnlines="none none" equalcolumns="false" columnalign="center center center"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mtd></mml:mtr></mml:mtable><mml:mspace width="-0.1667em"/><mml:mspace width="-0.1667em"/></mml:mrow></mml:mfenced></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ A=\left(\hspace{-0.1667em}\hspace{-0.1667em}\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c}1+{a_{x}}{a_{z}}{b_{y}}\hspace{1em}& {a_{z}}\hspace{1em}& {a_{y}}+{a_{x}}{a_{z}}+{a_{x}}{a_{y}}{a_{z}}{b_{y}}\\ {} {b_{z}}+{a_{x}}{b_{y}}+{a_{x}}{a_{z}}{b_{y}}{b_{z}}\hspace{1em}& {a_{z}}{b_{z}}+1\hspace{1em}& {a_{y}}{b_{z}}+{a_{x}}{a_{y}}{a_{z}}{b_{y}}{b_{z}}+{a_{x}}{a_{z}}{b_{z}}+{a_{x}}{a_{y}}{b_{y}}+{a_{x}}\\ {} {a_{x}}{b_{x}}{b_{y}}+{b_{y}}\hspace{1em}& {b_{x}}\hspace{1em}& {a_{x}}{a_{y}}{b_{x}}{b_{y}}+{a_{x}}{b_{x}}+{a_{y}}{b_{y}}+1\end{array}\hspace{-0.1667em}\hspace{-0.1667em}\right)\]]]></tex-math></alternatives>
</disp-formula> 
is defined using positive integer parameters <inline-formula id="j_infor420_ineq_090"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{x}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_091"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{y}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_092"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{z}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_093"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${b_{x}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_094"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${b_{y}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_095"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${b_{z}}$]]></tex-math></alternatives></inline-formula>. It is known (Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_009">2004</xref>; Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_025">2012</xref>) that iterated applications of this map generate a pseudo-random sequence of values in the interval <inline-formula id="j_infor420_ineq_096"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$[0,1)$]]></tex-math></alternatives></inline-formula> by taking components of the state vector.</p>
</sec>
<sec id="j_infor420_s_005">
<label>3.2</label>
<title>Generation of the Transformation Matrix <italic>X</italic></title>
<p>An admissible transformation matrix must be generated for each block of the secret. To avoid unnecessary complications, we refrain from including a block index in the notation and refer to this matrix simply as <italic>X</italic>. Let <inline-formula id="j_infor420_ineq_097"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> denote the <italic>i</italic>th row of <italic>X</italic> where <inline-formula id="j_infor420_ineq_098"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math>
<tex-math><![CDATA[$1\leqslant i\leqslant n$]]></tex-math></alternatives></inline-formula>. For <italic>X</italic> to be admissible, the following conditions must be satisfied:</p>
<list>
<list-item id="j_infor420_li_005">
<label>(A1)</label>
<p>Every <inline-formula id="j_infor420_ineq_099"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$k\times k$]]></tex-math></alternatives></inline-formula> submatrix of <italic>X</italic> is nonsingular.</p>
</list-item>
<list-item id="j_infor420_li_006">
<label>(A2)</label>
<p>Every <inline-formula id="j_infor420_ineq_100"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>×</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k-1)\times (k-1)$]]></tex-math></alternatives></inline-formula> submatrix of <italic>X</italic> is nonsingular.</p>
</list-item>
</list>
<p>The condition (A1) means that every <italic>k</italic> of the vectors <inline-formula id="j_infor420_ineq_101"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">n</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{1}},\dots ,{\mathbf{v}_{n}}$]]></tex-math></alternatives></inline-formula> must be linearly independent in the vector space <inline-formula id="j_infor420_ineq_102"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}^{k}}$]]></tex-math></alternatives></inline-formula>. One would imagine that for this condition to be satisfied, <italic>n</italic> cannot be too large. On the other hand, provided that <inline-formula id="j_infor420_ineq_103"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> has large enough cardinality, this does not pose a practical restrain on the proposed scheme. Indeed it is known (Maneri and Silverman, <xref ref-type="bibr" rid="j_infor420_ref_032">1966</xref>) that the maximum number of such vectors (the maximum possible choice of <italic>n</italic>) is at least <inline-formula id="j_infor420_ineq_104"><alternatives>
<mml:math><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">|</mml:mo><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn><mml:mi mathvariant="italic">β</mml:mi></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math>
<tex-math><![CDATA[$|{\mathbb{F}_{q}}|+1={2^{8\beta }}+1$]]></tex-math></alternatives></inline-formula> which is much larger than practical requirements of an SIS.</p>
<fig id="j_infor420_fig_001">
<label>Algorithm 1</label>
<caption>
<p>Generation of a transformation matrix</p>
</caption>
<graphic xlink:href="infor420_g001.jpg"/>
</fig>
<p>Our approach for generation of an admissible transformation matrix <italic>X</italic>, as described in Algorithm <xref rid="j_infor420_fig_001">1</xref>, is to populate a <inline-formula id="j_infor420_ineq_105"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$n\times k$]]></tex-math></alternatives></inline-formula> matrix by randomly chosen nonzero elements of <inline-formula id="j_infor420_ineq_106"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula>, then to test whether this matrix is admissible. If not, the matrix at hand is simply discarded and a new one is generated. The simple structure of the cat map used to generate pseudo-random numbers accommodates fast generation of these matrices. On the other hand, testing admissibility is more computation-intensive since it involves verifying non-singularity of all <inline-formula id="j_infor420_ineq_107"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$k\times k$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_108"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>×</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k-1)\times (k-1)$]]></tex-math></alternatives></inline-formula> submatrices. Our experimental results presented in Table <xref rid="j_infor420_tab_001">1</xref>, with <inline-formula id="j_infor420_ineq_109"><alternatives>
<mml:math><mml:mi mathvariant="italic">β</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn></mml:math>
<tex-math><![CDATA[$\beta =2$]]></tex-math></alternatives></inline-formula> and small values of <italic>k</italic> and <italic>n</italic>, show that with high probability, the first generated matrix is indeed admissible.</p>
<table-wrap id="j_infor420_tab_001">
<label>Table 1</label>
<caption>
<p>The ratio of admissible matrices <italic>X</italic> out of 10000 randomly generated <inline-formula id="j_infor420_ineq_110"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$n\times k$]]></tex-math></alternatives></inline-formula> matrices.</p>
</caption>
<table>
<thead>
<tr>
<td rowspan="3" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>n</italic></td>
<td colspan="5" style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>k</italic></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">2</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">3</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">4</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">5</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">6</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">2</td>
<td style="vertical-align: top; text-align: left">0.9999</td>
<td style="vertical-align: top; text-align: left">–</td>
<td style="vertical-align: top; text-align: left">–</td>
<td style="vertical-align: top; text-align: left">–</td>
<td style="vertical-align: top; text-align: left">–</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">3</td>
<td style="vertical-align: top; text-align: left">0.9996</td>
<td style="vertical-align: top; text-align: left">0.9997</td>
<td style="vertical-align: top; text-align: left">–</td>
<td style="vertical-align: top; text-align: left">–</td>
<td style="vertical-align: top; text-align: left">–</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">4</td>
<td style="vertical-align: top; text-align: left">1.0000</td>
<td style="vertical-align: top; text-align: left">0.9998</td>
<td style="vertical-align: top; text-align: left">0.9999</td>
<td style="vertical-align: top; text-align: left">–</td>
<td style="vertical-align: top; text-align: left">–</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">5</td>
<td style="vertical-align: top; text-align: left">1.0000</td>
<td style="vertical-align: top; text-align: left">0.9989</td>
<td style="vertical-align: top; text-align: left">0.9994</td>
<td style="vertical-align: top; text-align: left">0.9996</td>
<td style="vertical-align: top; text-align: left">–</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">6</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9997</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9991</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9987</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9988</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.9992</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor420_s_006">
<label>3.3</label>
<title>Generation of the Matrix <italic>S</italic></title>
<p>The matrix <italic>S</italic> of Eq. (<xref rid="j_infor420_eq_006">1</xref>) is generated from the plain secret image <italic>P</italic>. Since <italic>S</italic> is of size <inline-formula id="j_infor420_ineq_111"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">m</mml:mi></mml:math>
<tex-math><![CDATA[$k\times m$]]></tex-math></alternatives></inline-formula>, it contains <inline-formula id="j_infor420_ineq_112"><alternatives>
<mml:math><mml:mi mathvariant="italic">b</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">m</mml:mi><mml:mi mathvariant="italic">k</mml:mi><mml:mi mathvariant="italic">β</mml:mi></mml:math>
<tex-math><![CDATA[$b=mk\beta $]]></tex-math></alternatives></inline-formula> bytes of <italic>P</italic>. We assume <italic>P</italic> is padded in preprocessing so that its size in bytes is a multiple of <italic>b</italic>. The plain secret image <italic>P</italic> is also shuffled in preprocessing. The shuffling is performed according to the outputs of the cat map as follows. A pseudo-random sequence <italic>R</italic> of length <inline-formula id="j_infor420_ineq_113"><alternatives>
<mml:math><mml:mo stretchy="false">|</mml:mo><mml:mi mathvariant="italic">P</mml:mi><mml:mo stretchy="false">|</mml:mo></mml:math>
<tex-math><![CDATA[$|P|$]]></tex-math></alternatives></inline-formula> is generated similarly to lines 1–5 of Algorithm <xref rid="j_infor420_fig_001">1</xref> with initial state <inline-formula id="j_infor420_ineq_114"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbf{x}^{\prime }_{0}}$]]></tex-math></alternatives></inline-formula>, then a permutation <italic>π</italic> is found which sorts <italic>R</italic>. The shuffled image <italic>Q</italic> is obtained by applying the permutation <italic>π</italic> on <italic>P</italic>.</p>
<p>For each block, a matrix <italic>S</italic> is generated using the next <italic>b</italic> bytes of <italic>Q</italic>. Algorithm <xref rid="j_infor420_fig_002">2</xref> presents details of this process. Again we refrain from indicating a block index in the naming of variables such as <italic>S</italic> to avoid cumbersome notation.</p>
<fig id="j_infor420_fig_002">
<label>Algorithm 2</label>
<caption>
<p>Generation of the matrix <italic>S</italic></p>
</caption>
<graphic xlink:href="infor420_g002.jpg"/>
</fig>
</sec>
<sec id="j_infor420_s_007">
<label>3.4</label>
<title>Generation of Shadow Images</title>
<p>For each block, with the matrices <italic>X</italic> and <italic>S</italic> in hand, the share matrix <italic>Y</italic> can be computed according to Eq. (<xref rid="j_infor420_eq_006">1</xref>). For each <inline-formula id="j_infor420_ineq_115"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math>
<tex-math><![CDATA[$1\leqslant i\leqslant n$]]></tex-math></alternatives></inline-formula>, the <italic>i</italic>th row of the resulting matrix <italic>Y</italic> constitutes a block of the <italic>i</italic>th share. The <italic>i</italic>th shadow image is generated from the collection of all such rows by converting each element to an integer via the correspondence of Eq. (<xref rid="j_infor420_eq_007">2</xref>), then breaking each integer value to <italic>β</italic> bytes. For added security we shuffle the <italic>i</italic>th shadow image according to a pseudo-random sequence <inline-formula id="j_infor420_ineq_116"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">R</mml:mi></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${R^{(i)}}$]]></tex-math></alternatives></inline-formula> of length <inline-formula id="j_infor420_ineq_117"><alternatives>
<mml:math><mml:mstyle displaystyle="false"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:mo stretchy="false">|</mml:mo><mml:mi mathvariant="italic">P</mml:mi><mml:mo stretchy="false">|</mml:mo></mml:math>
<tex-math><![CDATA[$\frac{1}{k}|P|$]]></tex-math></alternatives></inline-formula> generated similarly to lines 1–5 of Algorithm <xref rid="j_infor420_fig_001">1</xref> with initial state <inline-formula id="j_infor420_ineq_118"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbf{x}_{0}^{(i)}}$]]></tex-math></alternatives></inline-formula>. Let <inline-formula id="j_infor420_ineq_119"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">π</mml:mi></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${\pi ^{(i)}}$]]></tex-math></alternatives></inline-formula> denote the permutation which sorts <inline-formula id="j_infor420_ineq_120"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">R</mml:mi></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${R^{(i)}}$]]></tex-math></alternatives></inline-formula>. We denote the shuffled shadow image that is obtained by applying <inline-formula id="j_infor420_ineq_121"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">π</mml:mi></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${\pi ^{(i)}}$]]></tex-math></alternatives></inline-formula> to the <italic>i</italic>th shadow image by <inline-formula id="j_infor420_ineq_122"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{i}}$]]></tex-math></alternatives></inline-formula>. The share (shadow image) <inline-formula id="j_infor420_ineq_123"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{i}}$]]></tex-math></alternatives></inline-formula> may be reshaped to a rectangular array for presentation as an image.</p>
</sec>
<sec id="j_infor420_s_008">
<label>3.5</label>
<title>Secret Key</title>
<p>The secret key of the proposed scheme consists of the parameters <inline-formula id="j_infor420_ineq_124"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{x}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_125"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{y}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_126"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${a_{z}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_127"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${b_{x}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_128"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${b_{y}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_129"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${b_{z}}$]]></tex-math></alternatives></inline-formula> of the cat matrix, as well as the initial states <inline-formula id="j_infor420_ineq_130"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{x}_{0}}$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_131"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbf{x}^{\prime }_{0}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_132"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbf{x}_{0}^{(i)}}$]]></tex-math></alternatives></inline-formula>, where <inline-formula id="j_infor420_ineq_133"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math>
<tex-math><![CDATA[$1\leqslant i\leqslant n$]]></tex-math></alternatives></inline-formula>. It should be noted that for added security, different cat matrices may be used for the preprocessing (shuffling) and the transformation matrices.</p>
</sec>
<sec id="j_infor420_s_009">
<label>3.6</label>
<title>Recovery of the Secret Image</title>
<p>We assume that the secret key of the scheme is held at a central authority and is released upon the presentation of shadow images by any authorized set of participants. Suppose that <italic>k</italic> shadow images <inline-formula id="j_infor420_ineq_134"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{{i_{1}}}},{H_{{i_{2}}}},\dots ,{H_{{i_{k}}}}$]]></tex-math></alternatives></inline-formula> are presented to the central authority. The recovery of the secret image is carried out as follows. 
<list>
<list-item id="j_infor420_li_007">
<label>•</label>
<p>Apply the inverse of the shuffling permutation <inline-formula id="j_infor420_ineq_135"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mi mathvariant="italic">π</mml:mi></mml:mrow><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${\pi ^{({i_{j}})}}$]]></tex-math></alternatives></inline-formula> on each shadow image <inline-formula id="j_infor420_ineq_136"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{{i_{j}}}}$]]></tex-math></alternatives></inline-formula>, for <inline-formula id="j_infor420_ineq_137"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$1\leqslant j\leqslant k$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor420_li_008">
<label>•</label>
<p>Each shadow image is converted to a sequence of elements of <inline-formula id="j_infor420_ineq_138"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> by grouping every <italic>β</italic> bytes into a single integer, and via the correspondence in Eq. (<xref rid="j_infor420_eq_007">2</xref>). The resulting sequences are then broken-up into blocks, using which a <inline-formula id="j_infor420_ineq_139"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">m</mml:mi></mml:math>
<tex-math><![CDATA[$k\times m$]]></tex-math></alternatives></inline-formula> submatrix <inline-formula id="j_infor420_ineq_140"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">Y</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$\tilde{Y}$]]></tex-math></alternatives></inline-formula> of the matrix <italic>Y</italic> associated with each block are obtained. More specifically, each <inline-formula id="j_infor420_ineq_141"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">Y</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$\tilde{Y}$]]></tex-math></alternatives></inline-formula> consists of the rows <inline-formula id="j_infor420_ineq_142"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${i_{1}},{i_{2}},\dots ,{i_{k}}$]]></tex-math></alternatives></inline-formula> of the corresponding matrix <italic>Y</italic>.</p>
</list-item>
<list-item id="j_infor420_li_009">
<label>•</label>
<p>Using the secret key, the matrix <italic>X</italic> associated with each block is constructed. We then let <inline-formula id="j_infor420_ineq_143"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">X</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$\tilde{X}$]]></tex-math></alternatives></inline-formula> be the <inline-formula id="j_infor420_ineq_144"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$k\times k$]]></tex-math></alternatives></inline-formula> submatrix of <italic>X</italic> induced by the rows <inline-formula id="j_infor420_ineq_145"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${i_{1}},{i_{2}},\dots ,{i_{k}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor420_li_010">
<label>•</label>
<p>By Eq. (<xref rid="j_infor420_eq_006">1</xref>), we have <inline-formula id="j_infor420_ineq_146"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">Y</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover><mml:mo>=</mml:mo><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">X</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover><mml:mi mathvariant="italic">S</mml:mi></mml:math>
<tex-math><![CDATA[$\tilde{Y}=\tilde{X}S$]]></tex-math></alternatives></inline-formula>. On the other hand, by admissibility of <italic>X</italic>, the matrix <inline-formula id="j_infor420_ineq_147"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">X</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$\tilde{X}$]]></tex-math></alternatives></inline-formula> is nonsingular. Thus we may compute <inline-formula id="j_infor420_ineq_148"><alternatives>
<mml:math><mml:mi mathvariant="italic">S</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">X</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">Y</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$S={(\tilde{X})^{-1}}\tilde{Y}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor420_li_011">
<label>•</label>
<p>By reversing the transformation of Algorithm <xref rid="j_infor420_fig_002">2</xref>, the shuffled secret image <italic>Q</italic> is reconstructed block by block. The plain secret image <italic>P</italic> is now obtained by generating the shuffling permutation <italic>π</italic> and applying its inverse on <italic>Q</italic>, then removing the padding.</p>
</list-item>
</list>
</p>
</sec>
<sec id="j_infor420_s_010">
<label>3.7</label>
<title>Delivery of Shares</title>
<p>As outlined above, the secret image can be easily reconstructed upon the presence of the secret key and at least <italic>k</italic> shadow images. Therefore, the security of the proposed scheme is compromised if an unauthorized party gets hold of the shares. Therefore, the dealer must securely transmit each shadow image <inline-formula id="j_infor420_ineq_149"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{i}}$]]></tex-math></alternatives></inline-formula> to its corresponding participant. Depending on the application, this can be accomplished using a secure channel, a cryptographic scheme through a public channel such as one of those proposed in Chen <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_009">2004</xref>), Kanso and Ghebleh (<xref ref-type="bibr" rid="j_infor420_ref_025">2012</xref>), Fu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_018">2018</xref>) or a steganographic scheme which hides the presence of shadow images such as one of those proposed in Ghebleh and Kanso (<xref ref-type="bibr" rid="j_infor420_ref_020">2014</xref>), Fridrich <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_017">2002</xref>).</p>
</sec>
</sec>
<sec id="j_infor420_s_011">
<label>4</label>
<title>PerformanceAnalysis</title>
<p>In this section, we demonstrate the efficiency of the proposed scheme and its robustness against a number of attacks. The simulation results are based on the following parameters: the number of bytes per value <inline-formula id="j_infor420_ineq_150"><alternatives>
<mml:math><mml:mi mathvariant="italic">β</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn></mml:math>
<tex-math><![CDATA[$\beta =2$]]></tex-math></alternatives></inline-formula>, the number of participants <inline-formula id="j_infor420_ineq_151"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
<tex-math><![CDATA[$n=6$]]></tex-math></alternatives></inline-formula>, the threshold (minimum number of participants in an authorized set) <inline-formula id="j_infor420_ineq_152"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$k=4$]]></tex-math></alternatives></inline-formula>, and <inline-formula id="j_infor420_ineq_153"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo>=</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$m=1024$]]></tex-math></alternatives></inline-formula>. For the tests presented in this section, we use the cat matrix 
<disp-formula id="j_infor420_eq_010">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">A</mml:mi><mml:mo>=</mml:mo><mml:mfenced separators="" open="(" close=")"><mml:mrow><mml:mtable columnspacing="4.0pt 4.0pt" equalrows="false" columnlines="none none" equalcolumns="false" columnalign="center center center"><mml:mtr><mml:mtd class="array"><mml:mn>469</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>117</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>703</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>1411</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>352</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>2115</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>126</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>31</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mn>189</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ A=\left(\begin{array}{c@{\hskip4.0pt}c@{\hskip4.0pt}c}469\hspace{1em}& 117\hspace{1em}& 703\\ {} 1411\hspace{1em}& 352\hspace{1em}& 2115\\ {} 126\hspace{1em}& 31\hspace{1em}& 189\end{array}\right)\]]]></tex-math></alternatives>
</disp-formula> 
obtained using the parameters <inline-formula id="j_infor420_ineq_154"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">a</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo>;</mml:mo><mml:mspace width="0.1667em"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">b</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>117</mml:mn><mml:mo>;</mml:mo><mml:mspace width="0.1667em"/><mml:mn>31</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>3</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$({a_{x}},{a_{y}},{a_{z}};\hspace{0.1667em}{b_{x}},{b_{y}},{b_{z}})=(2,1,117;\hspace{0.1667em}31,2,3)$]]></tex-math></alternatives></inline-formula>.</p>
<p>Recall that each block of the process involves <inline-formula id="j_infor420_ineq_155"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mi mathvariant="italic">k</mml:mi><mml:mi mathvariant="italic">β</mml:mi><mml:mo>=</mml:mo><mml:mn>8192</mml:mn></mml:math>
<tex-math><![CDATA[$mk\beta =8192$]]></tex-math></alternatives></inline-formula> bytes of the secret, resulting in 4096 elements of the field <inline-formula id="j_infor420_ineq_156"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> with <inline-formula id="j_infor420_ineq_157"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>16</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{16}}$]]></tex-math></alternatives></inline-formula>. Consider the standard grayscale image Lena of size <inline-formula id="j_infor420_ineq_158"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> presented in Fig. <xref rid="j_infor420_fig_003">1</xref> to be the secret image. Then each shadow image consists of 65536 bytes since the size of each share is <inline-formula id="j_infor420_ineq_159"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$1/k$]]></tex-math></alternatives></inline-formula> the size of the secret. For presentation, each <inline-formula id="j_infor420_ineq_160"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{i}}$]]></tex-math></alternatives></inline-formula> (<inline-formula id="j_infor420_ineq_161"><alternatives>
<mml:math><mml:mn>1</mml:mn><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo>⩽</mml:mo><mml:mi mathvariant="italic">n</mml:mi></mml:math>
<tex-math><![CDATA[$1\leqslant i\leqslant n$]]></tex-math></alternatives></inline-formula>) is reshaped into a <inline-formula id="j_infor420_ineq_162"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula> matrix also denoted by <inline-formula id="j_infor420_ineq_163"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{i}}$]]></tex-math></alternatives></inline-formula>. Figure <xref rid="j_infor420_fig_004">2</xref> depicts the six shadow images corresponding to the test image Lena.</p>
<fig id="j_infor420_fig_003">
<label>Fig. 1</label>
<caption>
<p>The secret image Lena of size <inline-formula id="j_infor420_ineq_164"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor420_g003.jpg"/>
</fig>
<fig id="j_infor420_fig_004">
<label>Fig. 2</label>
<caption>
<p>The shadow images <inline-formula id="j_infor420_ineq_165"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{1}},{H_{2}},\dots ,{H_{6}}$]]></tex-math></alternatives></inline-formula> corresponding to the test image Lena, where each shadow image has size <inline-formula id="j_infor420_ineq_166"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor420_g004.jpg"/>
</fig>
<sec id="j_infor420_s_012">
<label>4.1</label>
<title>Histogram Analysis</title>
<p>The histogram of a given digital image displays the distribution of its tonality. For a meaningful image such as the test Lena image, the histogram shows non-uniform distribution of its tonality, and hence one can derive some information about the content of the image. However, for a truly random image the histogram is almost flat, so no useful information about the image can be derived from it. This test shows that the histogram of each shadow image is almost flat, that is the intensity values are uniformly distributed in <inline-formula id="j_infor420_ineq_167"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mn>255</mml:mn><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{0,1,\dots ,255\}$]]></tex-math></alternatives></inline-formula>. Hence, no useful information about the secret can be derived from the shadow images. Figure <xref rid="j_infor420_fig_005">3</xref> depicts the histograms of the test image Lena and one sample shadow image from <inline-formula id="j_infor420_ineq_168"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{1}},{H_{2}},\dots ,{H_{6}}$]]></tex-math></alternatives></inline-formula>. The histograms of the other shadow images show similar behaviour.</p>
<fig id="j_infor420_fig_005">
<label>Fig. 3</label>
<caption>
<p>The histogram of the Lena image (left) and the histogram of a sample shadow image (right).</p>
</caption>
<graphic xlink:href="infor420_g005.jpg"/>
</fig>
</sec>
<sec id="j_infor420_s_013">
<label>4.2</label>
<title>Correlation Analysis</title>
<p>Correlation analysis is a randomness test that identifies the strength of relationships between adjacent pixels. Meaningful images such as the test image Lena possess high correlation between adjacent pixels. This test shows that shadow images generated by the proposed scheme have almost no correlation between adjacent pixels.</p>
<p>Consider a sample shadow image, and select <inline-formula id="j_infor420_ineq_169"><alternatives>
<mml:math><mml:mi mathvariant="italic">N</mml:mi><mml:mo>=</mml:mo><mml:mn>10000</mml:mn></mml:math>
<tex-math><![CDATA[$N=10000$]]></tex-math></alternatives></inline-formula> random pairs of adjacent pixels <inline-formula id="j_infor420_ineq_170"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${x_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_171"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${y_{i}}$]]></tex-math></alternatives></inline-formula> in the horizontal, vertical and diagonal directions. The correlation coefficient between the two sequences <inline-formula id="j_infor420_ineq_172"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\{{x_{t}}\}_{t=1}^{N}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_173"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\{{y_{t}}\}_{t=1}^{N}}$]]></tex-math></alternatives></inline-formula> is given by 
<disp-formula id="j_infor420_eq_011">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mi mathvariant="italic">E</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">x</mml:mi><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">y</mml:mi><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo fence="true" stretchy="false">]</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mstyle><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ {C_{xy}}=\frac{E[(x-{\mu _{x}})(y-{\mu _{y}})]}{{\sigma _{x}}{\sigma _{y}}},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor420_ineq_174"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mu _{x}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_175"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">μ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mu _{y}}$]]></tex-math></alternatives></inline-formula> denote the mean values of <italic>x</italic> and <italic>y</italic>, respectively; <inline-formula id="j_infor420_ineq_176"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\sigma _{x}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_177"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">σ</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\sigma _{y}}$]]></tex-math></alternatives></inline-formula> denote their standard deviations, and <inline-formula id="j_infor420_ineq_178"><alternatives>
<mml:math><mml:mi mathvariant="italic">E</mml:mi><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mo>·</mml:mo><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$E[\cdot ]$]]></tex-math></alternatives></inline-formula> is the expected value. The correlation coefficient <inline-formula id="j_infor420_ineq_179"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">C</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">x</mml:mi><mml:mi mathvariant="italic">y</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">∈</mml:mo><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[${C_{xy}}\in [-1,1]$]]></tex-math></alternatives></inline-formula>, where a value 0 indicates no correlation and a value <inline-formula id="j_infor420_ineq_180"><alternatives>
<mml:math><mml:mo>±</mml:mo><mml:mn>1</mml:mn></mml:math>
<tex-math><![CDATA[$\pm 1$]]></tex-math></alternatives></inline-formula> indicates complete correlation between the two sequences.</p>
<p>Table <xref rid="j_infor420_tab_002">2</xref> presents the correlation coefficients between <inline-formula id="j_infor420_ineq_181"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\{{x_{t}}\}_{t=1}^{N}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_182"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\{{y_{t}}\}_{t=1}^{N}}$]]></tex-math></alternatives></inline-formula> in (i) the Lena image and (ii) the shadow images. This table shows that the shadow images are almost free of any correlation between adjacent pixels in the horizontal, vertical and diagonal directions.</p>
<table-wrap id="j_infor420_tab_002">
<label>Table 2</label>
<caption>
<p>Correlation coefficients of adjacent pixels in the Lena image and its corresponding shadow images.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Lena</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_183"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_184"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_185"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_186"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_187"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_188"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{6}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Horizontal</td>
<td style="vertical-align: top; text-align: left">0.972726</td>
<td style="vertical-align: top; text-align: left">0.005061</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_189"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.000394</mml:mn></mml:math>
<tex-math><![CDATA[$-0.000394$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_190"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.002141</mml:mn></mml:math>
<tex-math><![CDATA[$-0.002141$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.006671</td>
<td style="vertical-align: top; text-align: left">0.020705</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_191"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.013311</mml:mn></mml:math>
<tex-math><![CDATA[$-0.013311$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Vertical</td>
<td style="vertical-align: top; text-align: left">0.985929</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_192"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.009293</mml:mn></mml:math>
<tex-math><![CDATA[$-0.009293$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.011721</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_193"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.013857</mml:mn></mml:math>
<tex-math><![CDATA[$-0.013857$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_194"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.010711</mml:mn></mml:math>
<tex-math><![CDATA[$-0.010711$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">0.010801</td>
<td style="vertical-align: top; text-align: left">0.026160</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Diagonal</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.962357</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_195"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.014346</mml:mn></mml:math>
<tex-math><![CDATA[$-0.014346$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_196"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.005839</mml:mn></mml:math>
<tex-math><![CDATA[$-0.005839$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.011137</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_197"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.011505</mml:mn></mml:math>
<tex-math><![CDATA[$-0.011505$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_198"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.006731</mml:mn></mml:math>
<tex-math><![CDATA[$-0.006731$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_199"><alternatives>
<mml:math><mml:mo>−</mml:mo><mml:mn>0.002312</mml:mn></mml:math>
<tex-math><![CDATA[$-0.002312$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Furthermore, Fig. <xref rid="j_infor420_fig_006">4</xref> depicts plots of randomly selected adjacent pixels <inline-formula id="j_infor420_ineq_200"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$({x_{t}},{y_{t}})$]]></tex-math></alternatives></inline-formula> in the horizontal, vertical and diagonal directions, where <inline-formula id="j_infor420_ineq_201"><alternatives>
<mml:math><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">N</mml:mi></mml:math>
<tex-math><![CDATA[$t=1,2,\dots ,N$]]></tex-math></alternatives></inline-formula>, for the image Lena and a sample shadow image. In the case of Lena, one can easily observe the accumulation of vertices along the line <inline-formula id="j_infor420_ineq_202"><alternatives>
<mml:math><mml:mi mathvariant="italic">y</mml:mi><mml:mo>=</mml:mo><mml:mi mathvariant="italic">x</mml:mi></mml:math>
<tex-math><![CDATA[$y=x$]]></tex-math></alternatives></inline-formula>. However, for the shadow image the vertices are uniformly spread in <inline-formula id="j_infor420_ineq_203"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>255</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo><mml:mo>×</mml:mo><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>255</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[0,255]\times [0,255]$]]></tex-math></alternatives></inline-formula>, which is the case for a truly random image. Hence, the shadow images are almost free of any correlation between adjacent pixels.</p>
<fig id="j_infor420_fig_006">
<label>Fig. 4</label>
<caption>
<p>Plots of <inline-formula id="j_infor420_ineq_204"><alternatives>
<mml:math><mml:mi mathvariant="italic">N</mml:mi><mml:mo>=</mml:mo><mml:mn>10000</mml:mn></mml:math>
<tex-math><![CDATA[$N=10000$]]></tex-math></alternatives></inline-formula> randomly selected adjacent pairs of pixels in the test image Lena (left), and those of a sample shadow image (right) in the horizontal, vertical and diagonal directions.</p>
</caption>
<graphic xlink:href="infor420_g006.jpg"/>
</fig>
<p>We repeat this test on 100 test images of various sizes and different structures. Each test image results in 6 shadow images. We compute the correlation coefficients between 10000 pairs of adjacent pixels in the horizontal, vertical and diagonal directions for a sample shadow image from the 6 shadow images. The obtained results are similar to those of <inline-formula id="j_infor420_ineq_205"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{1}},{H_{2}},\dots ,{H_{6}}$]]></tex-math></alternatives></inline-formula>, hence we omit them.</p>
</sec>
<sec id="j_infor420_s_014">
<label>4.3</label>
<title>Entropy Analysis</title>
<p>Entropy (Shannon, <xref ref-type="bibr" rid="j_infor420_ref_039">1951</xref>) measures the unpredictability of information content. The entropy <inline-formula id="j_infor420_ineq_206"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$H(s)$]]></tex-math></alternatives></inline-formula> for a source <italic>s</italic> producing <inline-formula id="j_infor420_ineq_207"><alternatives>
<mml:math><mml:mi>ℓ</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>8</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$\ell ={2^{8}}$]]></tex-math></alternatives></inline-formula> distinct symbols is defined by 
<disp-formula id="j_infor420_eq_012">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo>−</mml:mo>
<mml:munderover accentunder="false" accent="false"><mml:mrow><mml:mstyle displaystyle="true"><mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>ℓ</mml:mi></mml:mrow></mml:munderover><mml:mi mathvariant="italic">P</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:msub><mml:mrow><mml:mo movablelimits="false">log</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mi mathvariant="italic">P</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ H(s)=-{\sum \limits_{i=1}^{\ell }}P({s_{i}}){\log _{2}}P({s_{i}}),\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor420_ineq_208"><alternatives>
<mml:math><mml:mi mathvariant="italic">P</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$P({s_{i}})$]]></tex-math></alternatives></inline-formula> is the probability of occurrence of <inline-formula id="j_infor420_ineq_209"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${s_{i}}$]]></tex-math></alternatives></inline-formula> in <italic>s</italic>.</p>
<p>This test shows that the entropy measures <inline-formula id="j_infor420_ineq_210"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$H(s)$]]></tex-math></alternatives></inline-formula> for shadow images generated by the proposed scheme are close to those of truly random images i.e. <inline-formula id="j_infor420_ineq_211"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo stretchy="false">≈</mml:mo><mml:mn>8</mml:mn></mml:math>
<tex-math><![CDATA[$H(s)\approx 8$]]></tex-math></alternatives></inline-formula>. Table <xref rid="j_infor420_tab_003">3</xref> presents the entropy measures for those images. Hence, it confirms the unpredictability of generated shadow images.</p>
<table-wrap id="j_infor420_tab_003">
<label>Table 3</label>
<caption>
<p>Entropy measures for the image Lena and its six corresponding shadow images.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Lena</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_212"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_213"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_214"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_215"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_216"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{5}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_217"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${H_{6}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_218"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$H(s)$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.445507</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.997247</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.997184</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.997029</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.997582</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.997022</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.997080</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>We repeat this test on 100 test images of various sizes and different structures. Each test image results in 6 shadow images. We compute the entropy measure for a sample shadow image from the 6 shadow images. The obtained results are also close to those of truly random images, hence we omit them.</p>
</sec>
<sec id="j_infor420_s_015">
<label>4.4</label>
<title>Randomness Analysis</title>
<p>To showcase the randomness of the shadow images generated by the proposed secret sharing scheme, we subject the six shadow images corresponding to the test image Lena to the Statistical Test Suite (STS) published by the National Institute of Standards and Technology (NIST) (Bassham <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_004">2010</xref>). The outcome of all tests turns out to be satisfactory. Furthermore, we repeat this test on 60 shadow images each of size <inline-formula id="j_infor420_ineq_219"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula> obtained from running the proposed scheme on the secret image Lena for 10 different secret keys. Table <xref rid="j_infor420_tab_004">4</xref> presents the results of each statistical test.</p>
<table-wrap id="j_infor420_tab_004">
<label>Table 4</label>
<caption>
<p>Statistical Test Suite results for 60 shadow images corresponding to the test secret image Lena for ten different secret keys. The minimum pass rate for each statistical test with the exception of the random excursion (variant) test is approximately 57 for a sample size 60 sequences. The minimum pass rate for the random excursion (variant) test is approximately 29 for a sample size 32 sequences (Bassham <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_004">2010</xref>).</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Statistical test</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>P</italic>-value</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Result</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Frequency</td>
<td style="vertical-align: top; text-align: left">0.437274</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_220"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Block-frequency</td>
<td style="vertical-align: top; text-align: left">0.911413</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_221"><alternatives>
<mml:math><mml:mn>59</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$59/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cumulative-sums (forward)</td>
<td style="vertical-align: top; text-align: left">0.772760</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_222"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Cumulative-sums (reverse)</td>
<td style="vertical-align: top; text-align: left">0.671779</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_223"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Runs</td>
<td style="vertical-align: top; text-align: left">0.014216</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_224"><alternatives>
<mml:math><mml:mn>59</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$59/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Longest-runs</td>
<td style="vertical-align: top; text-align: left">0.568055</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_225"><alternatives>
<mml:math><mml:mn>59</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$59/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Rank</td>
<td style="vertical-align: top; text-align: left">0.148094</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_226"><alternatives>
<mml:math><mml:mn>59</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$59/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">FFT</td>
<td style="vertical-align: top; text-align: left">0.500934</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_227"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Non-overlapping-templates</td>
<td style="vertical-align: top; text-align: left">0.976060</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_228"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Overlapping-templates</td>
<td style="vertical-align: top; text-align: left">0.407091</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_229"><alternatives>
<mml:math><mml:mn>59</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$59/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Universal</td>
<td style="vertical-align: top; text-align: left">0.378138</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_230"><alternatives>
<mml:math><mml:mn>58</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$58/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Approximate entropy</td>
<td style="vertical-align: top; text-align: left">0.468595</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_231"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Random-excursions</td>
<td style="vertical-align: top; text-align: left">0.534146</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_232"><alternatives>
<mml:math><mml:mn>32</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>32</mml:mn></mml:math>
<tex-math><![CDATA[$32/32$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Random-excursions variant</td>
<td style="vertical-align: top; text-align: left">0.350485</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_233"><alternatives>
<mml:math><mml:mn>32</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>32</mml:mn></mml:math>
<tex-math><![CDATA[$32/32$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Serial 1</td>
<td style="vertical-align: top; text-align: left">0.437274</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_234"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Serial 2</td>
<td style="vertical-align: top; text-align: left">0.949602</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_235"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Linear-complexity</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.437274</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_236"><alternatives>
<mml:math><mml:mn>60</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mn>60</mml:mn></mml:math>
<tex-math><![CDATA[$60/60$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor420_s_016">
<label>4.5</label>
<title>Similarity Analysis</title>
<p>Similarity measures such as the Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_046">2011</xref>) are two common measures used to study the similarity between random looking images. The NPCR and UACI are defined by 
<disp-formula id="j_infor420_eq_013">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mtext>NPCR</mml:mtext><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:msub><mml:mrow><mml:mo largeop="false" movablelimits="false">∑</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:msub><mml:mi mathvariant="italic">D</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">M</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:mo mathvariant="normal">,</mml:mo><mml:mspace width="1em"/><mml:mtext>where</mml:mtext><mml:mspace width="2.5pt"/><mml:mi mathvariant="italic">D</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfenced separators="" open="{" close=""><mml:mrow><mml:mtable columnspacing="4.0pt" equalrows="false" columnlines="none" equalcolumns="false" columnalign="left left"><mml:mtr><mml:mtd class="array"><mml:mn>1</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mtext>if</mml:mtext><mml:mspace width="2.5pt"/><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo stretchy="false">≠</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd class="array"><mml:mn>0</mml:mn><mml:mspace width="1em"/></mml:mtd><mml:mtd class="array"><mml:mtext>otherwise</mml:mtext><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:mrow></mml:mfenced></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \text{NPCR}=\frac{{\textstyle\sum _{i,j}}D(i,j)}{M\times N},\hspace{1em}\text{where}\hspace{2.5pt}D(i,j)=\left\{\begin{array}{l@{\hskip4.0pt}l}1\hspace{1em}& \text{if}\hspace{2.5pt}{P_{1}}(i,j)\ne {P_{2}}(i,j),\\ {} 0\hspace{1em}& \text{otherwise},\end{array}\right.\]]]></tex-math></alternatives>
</disp-formula> 
and 
<disp-formula id="j_infor420_eq_014">
<alternatives>
<mml:math display="block"><mml:mtable displaystyle="true"><mml:mtr><mml:mtd><mml:mtext>UACI</mml:mtext><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">M</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">N</mml:mi></mml:mrow></mml:mfrac></mml:mstyle><mml:munder><mml:mrow><mml:mstyle displaystyle="true"><mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi></mml:mrow></mml:munder><mml:mstyle displaystyle="true"><mml:mfrac><mml:mrow><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>−</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">i</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">j</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mn>255</mml:mn></mml:mrow></mml:mfrac></mml:mstyle><mml:mo mathvariant="normal">,</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math>
<tex-math><![CDATA[\[ \text{UACI}=\frac{1}{M\times N}\sum \limits_{i,j}\frac{|{P_{1}}(i,j)-{P_{2}}(i,j)|}{255},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor420_ineq_237"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{1}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_238"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">P</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${P_{2}}$]]></tex-math></alternatives></inline-formula> are <inline-formula id="j_infor420_ineq_239"><alternatives>
<mml:math><mml:mi mathvariant="italic">M</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">N</mml:mi></mml:math>
<tex-math><![CDATA[$M\times N$]]></tex-math></alternatives></inline-formula> images.</p>
<p>It is shown in Wu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor420_ref_046">2011</xref>) that for gray images the ideal PSNR and UACI measures are <inline-formula id="j_infor420_ineq_240"><alternatives>
<mml:math><mml:mn>99.6094</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.6094\% $]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_241"><alternatives>
<mml:math><mml:mn>33.4635</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.4635\% $]]></tex-math></alternatives></inline-formula>, respectively. Furthermore, the acceptance intervals for the null hypothesis for <italic>α</italic>-level of significance, where <inline-formula id="j_infor420_ineq_242"><alternatives>
<mml:math><mml:mi mathvariant="italic">α</mml:mi><mml:mo stretchy="false">∈</mml:mo><mml:mo fence="true" stretchy="false">{</mml:mo><mml:mn>0.001</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>0.01</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>0.05</mml:mn><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\alpha \in \{0.001,0.01,0.05\}$]]></tex-math></alternatives></inline-formula> are as presented in Table <xref rid="j_infor420_tab_005">5</xref> (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_046">2011</xref>).</p>
<table-wrap id="j_infor420_tab_005">
<label>Table 5</label>
<caption>
<p>Acceptance intervals for the null hypothesis with different levels of significance (Wu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_046">2011</xref>).</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameter</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Size</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">0.05-level</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">0.01-level</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">0.001-level</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">NPCR</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_243"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_244"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5693</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5693,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_245"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5527</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5527,100]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_246"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>99.5341</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>100</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[99.5341,100]$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">UACI</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_247"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_248"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.2824</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.6447</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.2824,33.6447]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_249"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.2255</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.7016</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.2255,33.7016]$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_250"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>33.1594</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>33.7677</mml:mn><mml:mo fence="true" stretchy="false">]</mml:mo></mml:math>
<tex-math><![CDATA[$[33.1594,33.7677]$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In this test, we use the NPCR and UACI to measure the similarity between all possible pairs of shadow images corresponding to the test secret image Lena. It can be observed from the resulting measures presented in Table <xref rid="j_infor420_tab_006">6</xref> that all measures are close to the ideal PSNR and UACI measures <inline-formula id="j_infor420_ineq_251"><alternatives>
<mml:math><mml:mn>99.6094</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.6094\% $]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_252"><alternatives>
<mml:math><mml:mn>33.4635</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.4635\% $]]></tex-math></alternatives></inline-formula>, respectively.</p>
<table-wrap id="j_infor420_tab_006">
<label>Table 6</label>
<caption>
<p>The NPCR and UACI measures between the six shadow images corresponding to the test image Lena.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Pair of shadow images</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">NPCR</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">UACI</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_253"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{1}},{H_{2}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_254"><alternatives>
<mml:math><mml:mn>99.57</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.57\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_255"><alternatives>
<mml:math><mml:mn>33.53</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.53\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_256"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{1}},{H_{3}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_257"><alternatives>
<mml:math><mml:mn>99.57</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.57\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_258"><alternatives>
<mml:math><mml:mn>33.46</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.46\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_259"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{1}},{H_{4}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_260"><alternatives>
<mml:math><mml:mn>99.61</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.61\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_261"><alternatives>
<mml:math><mml:mn>33.52</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.52\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_262"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{1}},{H_{5}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_263"><alternatives>
<mml:math><mml:mn>99.59</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.59\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_264"><alternatives>
<mml:math><mml:mn>33.37</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.37\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_265"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{1}},{H_{6}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_266"><alternatives>
<mml:math><mml:mn>99.62</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.62\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_267"><alternatives>
<mml:math><mml:mn>33.48</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.48\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_268"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{2}},{H_{3}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_269"><alternatives>
<mml:math><mml:mn>99.62</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.62\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_270"><alternatives>
<mml:math><mml:mn>33.58</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.58\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_271"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{2}},{H_{4}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_272"><alternatives>
<mml:math><mml:mn>99.61</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.61\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_273"><alternatives>
<mml:math><mml:mn>33.42</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.42\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_274"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{2}},{H_{5}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_275"><alternatives>
<mml:math><mml:mn>99.62</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.62\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_276"><alternatives>
<mml:math><mml:mn>33.53</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.53\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_277"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{2}},{H_{6}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_278"><alternatives>
<mml:math><mml:mn>99.59</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.59\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_279"><alternatives>
<mml:math><mml:mn>33.54</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.54\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_280"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{3}},{H_{4}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_281"><alternatives>
<mml:math><mml:mn>99.58</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.58\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_282"><alternatives>
<mml:math><mml:mn>33.55</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.55\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_283"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{3}},{H_{5}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_284"><alternatives>
<mml:math><mml:mn>99.61</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.61\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_285"><alternatives>
<mml:math><mml:mn>33.47</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.47\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_286"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{3}},{H_{6}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_287"><alternatives>
<mml:math><mml:mn>99.60</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.60\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_288"><alternatives>
<mml:math><mml:mn>33.60</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.60\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_289"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{4}},{H_{5}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_290"><alternatives>
<mml:math><mml:mn>99.61</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.61\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_291"><alternatives>
<mml:math><mml:mn>33.64</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.64\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_292"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{4}},{H_{6}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_293"><alternatives>
<mml:math><mml:mn>99.61</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.61\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_294"><alternatives>
<mml:math><mml:mn>33.49</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.49\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_295"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>5</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">H</mml:mi></mml:mrow><mml:mrow><mml:mn>6</mml:mn></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:math>
<tex-math><![CDATA[$\{{H_{5}},{H_{6}}\}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_296"><alternatives>
<mml:math><mml:mn>99.59</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$99.59\% $]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_297"><alternatives>
<mml:math><mml:mn>33.47</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$33.47\% $]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>On the basis of the obtained measures, we conclude that the shadow images generated by the proposed scheme are random-like in comparison with one another.</p>
</sec>
<sec id="j_infor420_s_017">
<label>4.6</label>
<title>Security Analysis</title>
<p>The security of the proposed scheme depends on keeping the secret key <inline-formula id="j_infor420_ineq_298"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">K</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${K_{0}}$]]></tex-math></alternatives></inline-formula> and the shadow images secure. In this proposal, the key is held at a central authority and is not shared between the participants. On the other hand, the shadow images are securely transmitted to the participant. An unauthorized person has to get hold of the secret key and at least <italic>k</italic> shadow images to reconstruct the secret image. Now, guessing the secret key is unrealistic since it consists of six double precision floating point values in the interval <inline-formula id="j_infor420_ineq_299"><alternatives>
<mml:math><mml:mo fence="true" stretchy="false">[</mml:mo><mml:mn>0</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$[0,1)$]]></tex-math></alternatives></inline-formula> which constitute the initial states <inline-formula id="j_infor420_ineq_300"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{x}_{0}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_301"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="bold">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbf{x}^{\prime }_{0}}$]]></tex-math></alternatives></inline-formula> of the cat map, and six or twelve (depending on whether the same cat matrix is used for the generation of transformation matrices and shuffling the secret image or not) positive integers for parameters of the cat matrix. Furthermore, the final stage which consists of shuffling the shares is accomplished by using the cat map with three initial states and six control parameters for each share. Moreover, Fig. <xref rid="j_infor420_fig_007">5</xref> shows the high sensitivity of the cat map to its initial states and control parameters. This figure presents the time series plot of <inline-formula id="j_infor420_ineq_302"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>100</mml:mn></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\{{x_{t}}\}_{t=0}^{100}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_303"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mo fence="true" stretchy="false">{</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup><mml:mo fence="true" stretchy="false">}</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="italic">t</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mn>100</mml:mn></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\{{x^{\prime }_{i}}\}_{t=0}^{100}}$]]></tex-math></alternatives></inline-formula> generated by the cat map defined in Eq. (<xref rid="j_infor420_eq_008">3</xref>), where <inline-formula id="j_infor420_ineq_304"><alternatives>
<mml:math><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup><mml:mo stretchy="false">|</mml:mo><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>10</mml:mn></mml:mrow><mml:mrow><mml:mo>−</mml:mo><mml:mn>15</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$|{x_{0}}-{x^{\prime }_{0}}|={10^{-15}}$]]></tex-math></alternatives></inline-formula>. It is evident from this figure that after about ten iterations the two series become far apart from each other. Nonetheless, for security issues, a chaotic map such as the cat map is usually iterated at least 200 times without considering its outputs. Likewise, guessing <italic>k</italic> shadow images, where each shadow image consists of <inline-formula id="j_infor420_ineq_305"><alternatives>
<mml:math><mml:mi mathvariant="italic">L</mml:mi><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$L/k$]]></tex-math></alternatives></inline-formula> bytes, is equivalent to guess the secret image since one has to guess <italic>L</italic> bytes (<italic>L</italic> is the length of the secret).</p>
<fig id="j_infor420_fig_007">
<label>Fig. 5</label>
<caption>
<p>Time series plot of the <italic>x</italic>-values of the cat map defined in Eq. (<xref rid="j_infor420_eq_008">3</xref>) for two different initial states <inline-formula id="j_infor420_ineq_306"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$({x_{0}},{y_{0}},{z_{0}})$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_307"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">y</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">z</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$({x^{\prime }_{0}},{y_{0}},{z_{0}})$]]></tex-math></alternatives></inline-formula> such that <inline-formula id="j_infor420_ineq_308"><alternatives>
<mml:math><mml:mo stretchy="false">|</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow></mml:msub><mml:mo>−</mml:mo><mml:msubsup><mml:mrow><mml:mi mathvariant="italic">x</mml:mi></mml:mrow><mml:mrow><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mo>′</mml:mo></mml:mrow></mml:msubsup><mml:mo stretchy="false">|</mml:mo><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>10</mml:mn></mml:mrow><mml:mrow><mml:mo>−</mml:mo><mml:mn>15</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$|{x_{0}}-{x^{\prime }_{0}}|={10^{-15}}$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor420_g007.jpg"/>
</fig>
<p>In the scenario where <inline-formula id="j_infor420_ineq_309"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k-1)$]]></tex-math></alternatives></inline-formula> shadow images are present, the unauthorized set of less than <italic>k</italic> participants cannot reveal any useful information about the secret image. This is due to the fact that the secret key is unknown and that one of the shadow images is missing. This can be observed from the following example. Consider a single <inline-formula id="j_infor420_ineq_310"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">m</mml:mi></mml:math>
<tex-math><![CDATA[$k\times m$]]></tex-math></alternatives></inline-formula> block <italic>S</italic> which can be obtained as follows: <inline-formula id="j_infor420_ineq_311"><alternatives>
<mml:math><mml:mi mathvariant="italic">S</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">X</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo>−</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">Y</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$S={(\tilde{X})^{-1}}\tilde{Y}$]]></tex-math></alternatives></inline-formula>. Now if the <inline-formula id="j_infor420_ineq_312"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$k\times k$]]></tex-math></alternatives></inline-formula> submatrix <inline-formula id="j_infor420_ineq_313"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">X</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$\tilde{X}$]]></tex-math></alternatives></inline-formula> induced by the rows <inline-formula id="j_infor420_ineq_314"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${i_{1}},{i_{2}},\dots ,{i_{k}}$]]></tex-math></alternatives></inline-formula> of <italic>X</italic> is unknown and one of the rows of <inline-formula id="j_infor420_ineq_315"><alternatives>
<mml:math><mml:mover accent="true"><mml:mrow><mml:mi mathvariant="italic">Y</mml:mi></mml:mrow><mml:mo stretchy="false">˜</mml:mo></mml:mover></mml:math>
<tex-math><![CDATA[$\tilde{Y}$]]></tex-math></alternatives></inline-formula> is unknown, then the probability of guessing the missing elements in <inline-formula id="j_infor420_ineq_316"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula>, where <inline-formula id="j_infor420_ineq_317"><alternatives>
<mml:math><mml:mi mathvariant="italic">q</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mn>16</mml:mn></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$q={2^{16}}$]]></tex-math></alternatives></inline-formula>, correctly is about <inline-formula id="j_infor420_ineq_318"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">q</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi mathvariant="italic">m</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${(1/q)^{{k^{2}}+m}}$]]></tex-math></alternatives></inline-formula>, which renders the brute force attack infeasible for <inline-formula id="j_infor420_ineq_319"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo mathvariant="normal">&gt;</mml:mo><mml:mn>100</mml:mn></mml:math>
<tex-math><![CDATA[$m>100$]]></tex-math></alternatives></inline-formula>.</p>
</sec>
<sec id="j_infor420_s_018">
<label>4.7</label>
<title>Running Speed</title>
<p>In the proposed <inline-formula id="j_infor420_ineq_320"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-threshold SIS, the generation of admissible vectors in <inline-formula id="j_infor420_ineq_321"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}^{k}}$]]></tex-math></alternatives></inline-formula> is image independent. Therefore, a dealer can generate the number of admissible vectors needed for the encoding of any secret image prior to the encoding process. Now, the complexity of multiplication of an <inline-formula id="j_infor420_ineq_322"><alternatives>
<mml:math><mml:mi mathvariant="italic">r</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">s</mml:mi></mml:math>
<tex-math><![CDATA[$r\times s$]]></tex-math></alternatives></inline-formula> matrix by an <inline-formula id="j_infor420_ineq_323"><alternatives>
<mml:math><mml:mi mathvariant="italic">s</mml:mi><mml:mo>×</mml:mo><mml:mi mathvariant="italic">t</mml:mi></mml:math>
<tex-math><![CDATA[$s\times t$]]></tex-math></alternatives></inline-formula> matrix is <inline-formula id="j_infor420_ineq_324"><alternatives>
<mml:math><mml:mi mathvariant="italic">O</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">r</mml:mi><mml:mi mathvariant="italic">s</mml:mi><mml:mi mathvariant="italic">t</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$O(rst)$]]></tex-math></alternatives></inline-formula>. Thus, the complexity of computing the <italic>n</italic> shadow images is <inline-formula id="j_infor420_ineq_325"><alternatives>
<mml:math><mml:mi mathvariant="italic">O</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">L</mml:mi><mml:mi mathvariant="italic">n</mml:mi><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$O(Lnk)$]]></tex-math></alternatives></inline-formula>. Table <xref rid="j_infor420_tab_007">7</xref> reports the running times under the aforementioned scenario for generation of shadow images for a secret image of size <inline-formula id="j_infor420_ineq_326"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup><mml:mo>×</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${2^{s}}\times {2^{s}}$]]></tex-math></alternatives></inline-formula> for <inline-formula id="j_infor420_ineq_327"><alternatives>
<mml:math><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>8</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>9</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mn>13</mml:mn></mml:math>
<tex-math><![CDATA[$s=8,9,\dots ,13$]]></tex-math></alternatives></inline-formula>. The reported results are obtained using MATLAB R2016a on a desktop machine with an Intel<sup>®</sup> Core™ i7-4770 processor and 8 GB of memory, running Windows 10.</p>
<table-wrap id="j_infor420_tab_007">
<label>Table 7</label>
<caption>
<p>The running times for encoding secret image of size <inline-formula id="j_infor420_ineq_328"><alternatives>
<mml:math><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup><mml:mo>×</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[${2^{s}}\times {2^{s}}$]]></tex-math></alternatives></inline-formula> for <inline-formula id="j_infor420_ineq_329"><alternatives>
<mml:math><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>8</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>9</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mn>13</mml:mn></mml:math>
<tex-math><![CDATA[$s=8,9,\dots ,13$]]></tex-math></alternatives></inline-formula> into <inline-formula id="j_infor420_ineq_330"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
<tex-math><![CDATA[$n=6$]]></tex-math></alternatives></inline-formula> shadow images using the proposed scheme with <inline-formula id="j_infor420_ineq_331"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$k=4$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_332"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo>=</mml:mo><mml:mn>1024</mml:mn></mml:math>
<tex-math><![CDATA[$m=1024$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>s</italic></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">8</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">9</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">10</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">11</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">12</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">13</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Time in seconds</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.098432</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.391386</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1.587491</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">6.390270</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">26.010420</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">106.111304</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Furthermore, Fig. <xref rid="j_infor420_fig_008">6</xref> shows the running times for encoding the image Lena into <italic>n</italic> shadow images using the proposed scheme with <inline-formula id="j_infor420_ineq_333"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$k=4$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_334"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$m={2^{s}}$]]></tex-math></alternatives></inline-formula>, for <inline-formula id="j_infor420_ineq_335"><alternatives>
<mml:math><mml:mi mathvariant="italic">s</mml:mi><mml:mo>=</mml:mo><mml:mn>8</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>9</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mo>…</mml:mo><mml:mo mathvariant="normal">,</mml:mo><mml:mn>15</mml:mn></mml:math>
<tex-math><![CDATA[$s=8,9,\dots ,15$]]></tex-math></alternatives></inline-formula>.</p>
<fig id="j_infor420_fig_008">
<label>Fig. 6</label>
<caption>
<p>The running times for generation of <italic>n</italic> shadow images (each of size <inline-formula id="j_infor420_ineq_336"><alternatives>
<mml:math><mml:mn>256</mml:mn><mml:mo>×</mml:mo><mml:mn>256</mml:mn></mml:math>
<tex-math><![CDATA[$256\times 256$]]></tex-math></alternatives></inline-formula>) by the proposed scheme where <inline-formula id="j_infor420_ineq_337"><alternatives>
<mml:math><mml:mi mathvariant="italic">k</mml:mi><mml:mo>=</mml:mo><mml:mn>4</mml:mn></mml:math>
<tex-math><![CDATA[$k=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor420_ineq_338"><alternatives>
<mml:math><mml:mi mathvariant="italic">n</mml:mi><mml:mo>=</mml:mo><mml:mn>6</mml:mn></mml:math>
<tex-math><![CDATA[$n=6$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor420_ineq_339"><alternatives>
<mml:math><mml:mi mathvariant="italic">m</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="italic">s</mml:mi></mml:mrow></mml:msup></mml:math>
<tex-math><![CDATA[$m={2^{s}}$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor420_g008.jpg"/>
</fig>
</sec>
<sec id="j_infor420_s_019">
<label>4.8</label>
<title>Error-Resilient Capability</title>
<p>This section shows that the proposed scheme has some error-resilient capability. If some shadow images were disturbed by some noise such as salt and pepper of ratio 0.05 and 0.1, then the secret image can be reconstructed as shown in Fig. <xref rid="j_infor420_fig_009">7</xref>.</p>
<fig id="j_infor420_fig_009">
<label>Fig. 7</label>
<caption>
<p>The reconstructed image Lena resulting from four shadow images where one of them is subjected to salt and peppers noise with ratio: 0.05 (left) and 0.1 (right).</p>
</caption>
<graphic xlink:href="infor420_g009.jpg"/>
</fig>
<p>Furthermore, we show that if some shadow images are cropped by a certain percentage, then the secret image can still be reconstructed. Figure <xref rid="j_infor420_fig_010">8</xref> presents a shadow image cropped by <inline-formula id="j_infor420_ineq_340"><alternatives>
<mml:math><mml:mn>5</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$5\% $]]></tex-math></alternatives></inline-formula> and another one cropped by <inline-formula id="j_infor420_ineq_341"><alternatives>
<mml:math><mml:mn>10</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$10\% $]]></tex-math></alternatives></inline-formula>. Figure <xref rid="j_infor420_fig_011">9</xref> (left) presents the reconstructed secret image Lena resulting from four shadow images where one of them is cropped by <inline-formula id="j_infor420_ineq_342"><alternatives>
<mml:math><mml:mn>5</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$5\% $]]></tex-math></alternatives></inline-formula>, whereas Fig. <xref rid="j_infor420_fig_011">9</xref> (right) presents the reconstructed secret image Lena resulting from four shadow images where one of them is cropped by <inline-formula id="j_infor420_ineq_343"><alternatives>
<mml:math><mml:mn>10</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$10\% $]]></tex-math></alternatives></inline-formula>. Thus, it is evident that the proposed scheme is resistant to the cropping attack.</p>
<fig id="j_infor420_fig_010">
<label>Fig. 8</label>
<caption>
<p>A shadow image cropped by <inline-formula id="j_infor420_ineq_344"><alternatives>
<mml:math><mml:mn>5</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$5\% $]]></tex-math></alternatives></inline-formula> (left) and another one cropped by <inline-formula id="j_infor420_ineq_345"><alternatives>
<mml:math><mml:mn>10</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$10\% $]]></tex-math></alternatives></inline-formula> (right).</p>
</caption>
<graphic xlink:href="infor420_g010.jpg"/>
</fig>
<fig id="j_infor420_fig_011">
<label>Fig. 9</label>
<caption>
<p>The reconstructed image Lena resulting by the proposed scheme from four shadow images where one shadow image is subjected to cropping by <inline-formula id="j_infor420_ineq_346"><alternatives>
<mml:math><mml:mn>5</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$5\% $]]></tex-math></alternatives></inline-formula> (left) and <inline-formula id="j_infor420_ineq_347"><alternatives>
<mml:math><mml:mn>10</mml:mn><mml:mi mathvariant="normal">%</mml:mi></mml:math>
<tex-math><![CDATA[$10\% $]]></tex-math></alternatives></inline-formula> (right).</p>
</caption>
<graphic xlink:href="infor420_g011.jpg"/>
</fig>
</sec>
</sec>
<sec id="j_infor420_s_020">
<label>5</label>
<title>Comparison with Existing Work</title>
<p>In this section we compare the performance of the proposed approach, referred to by Pr-SIS, with few existing <inline-formula id="j_infor420_ineq_348"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS schemes: TL (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>), Wu (<xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>), KG (Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>), KE (Kabirirad and Eslami, <xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>) and GK (Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>). All comparisons are performed with <inline-formula id="j_infor420_ineq_349"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo mathvariant="normal">,</mml:mo><mml:mn>4</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)=(2,4)$]]></tex-math></alternatives></inline-formula> with the secret image Pirate of size <inline-formula id="j_infor420_ineq_350"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula> presented in Fig. <xref rid="j_infor420_fig_012">10</xref>. The sizes of the generated shadows images are presented in Table <xref rid="j_infor420_tab_008">8</xref>.</p>
<p>In Table <xref rid="j_infor420_tab_009">9</xref>, we present the correlation coefficients between <inline-formula id="j_infor420_ineq_351"><alternatives>
<mml:math><mml:mi mathvariant="italic">N</mml:mi><mml:mo>=</mml:mo><mml:mn>10000</mml:mn></mml:math>
<tex-math><![CDATA[$N=10000$]]></tex-math></alternatives></inline-formula> pairs of randomly selected adjacent pixels in the horizontal, vertical and diagonal directions of sample shadow images generated by TL (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>), Wu (Wu, <xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>), KG (Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>), KE (Kabirirad and Eslami, <xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>), GK (Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>) and Pr-SIS. It is evident from this table that all schemes generate shadow images almost free of any correlation between adjacent pixels.</p>
<fig id="j_infor420_fig_012">
<label>Fig. 10</label>
<caption>
<p>The test image Pirate of size <inline-formula id="j_infor420_ineq_352"><alternatives>
<mml:math><mml:mn>512</mml:mn><mml:mo>×</mml:mo><mml:mn>512</mml:mn></mml:math>
<tex-math><![CDATA[$512\times 512$]]></tex-math></alternatives></inline-formula>.</p>
</caption>
<graphic xlink:href="infor420_g012.jpg"/>
</fig>
<table-wrap id="j_infor420_tab_008">
<label>Table 8</label>
<caption>
<p>The size of shadow images generated by the scheme under comparison.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Scheme</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Size of shadow image</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Lossy</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">TL (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_353"><alternatives>
<mml:math><mml:mi mathvariant="italic">L</mml:mi><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$L/k$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Yes</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Wu (Wu, <xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_354"><alternatives>
<mml:math><mml:mi mathvariant="italic">L</mml:mi><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$L/k$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Yes</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KG (Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_355"><alternatives>
<mml:math><mml:mi mathvariant="italic">L</mml:mi><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$L/k$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Yes</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KE (Kabirirad and Eslami, <xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>)</td>
<td style="vertical-align: top; text-align: left"><italic>L</italic></td>
<td style="vertical-align: top; text-align: left">No</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">GK (Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>)</td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor420_ineq_356"><alternatives>
<mml:math><mml:mi mathvariant="italic">L</mml:mi><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo>−</mml:mo><mml:mn>1</mml:mn><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$L/(k-1)$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">Yes</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Pr-SIS</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_357"><alternatives>
<mml:math><mml:mi mathvariant="italic">L</mml:mi><mml:mo mathvariant="normal" stretchy="false">/</mml:mo><mml:mi mathvariant="italic">k</mml:mi></mml:math>
<tex-math><![CDATA[$L/k$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">No</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="j_infor420_tab_009">
<label>Table 9</label>
<caption>
<p>Correlation coefficients of pairs of adjacent pixels in sample shadow images generated by (i) TL, (ii) Wu, (iii) KG, (iv) GK and (v) Pr-SIS.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Scheme</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Horizontal</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Vertical</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Diagonal</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">TL (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>)</td>
<td style="vertical-align: top; text-align: left">0.001429</td>
<td style="vertical-align: top; text-align: left">−0.002693</td>
<td style="vertical-align: top; text-align: left">−0.012811</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Wu (Wu, <xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>)</td>
<td style="vertical-align: top; text-align: left">0.015723</td>
<td style="vertical-align: top; text-align: left">−0.008210</td>
<td style="vertical-align: top; text-align: left">0.006800</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KG (Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>)</td>
<td style="vertical-align: top; text-align: left">−0.004502</td>
<td style="vertical-align: top; text-align: left">−0.007861</td>
<td style="vertical-align: top; text-align: left">−0.008209</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KE (Kabirirad and Eslami, <xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">−0.085000</td>
<td style="vertical-align: top; text-align: left">0.050000</td>
<td style="vertical-align: top; text-align: left">−0.189000</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">GK (Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">−0.004358</td>
<td style="vertical-align: top; text-align: left">−0.007642</td>
<td style="vertical-align: top; text-align: left">−0.007148</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Pr-SIS</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">−0.003981</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">−0.008036</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.009603</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Table <xref rid="j_infor420_tab_010">10</xref> presents the entropy measures of sample shadow images of the schemes under comparison.</p>
<table-wrap id="j_infor420_tab_010">
<label>Table 10</label>
<caption>
<p>The entropy measures of sample shadow images generated by the scheme under comparison.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Scheme</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor420_ineq_358"><alternatives>
<mml:math><mml:mi mathvariant="italic">H</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">s</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$H(s)$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">TL (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>)</td>
<td style="vertical-align: top; text-align: left">7.901762</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Wu (Wu, <xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>)</td>
<td style="vertical-align: top; text-align: left">7.943923</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KG (Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>)</td>
<td style="vertical-align: top; text-align: left">7.908187</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KE (Kabirirad and Eslami, <xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">7.999300</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">GK (Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">7.999249</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Pr-SIS</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">7.998559</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Table <xref rid="j_infor420_tab_011">11</xref> presents the mean absolute difference of the secret image Pirate and the reconstructed image by the schemes under comparison. This table also presents the Peak Signal to Noise Ratio (PSNR) and The Structural Similarity (SSIM) measures between the secret image and the reconstructed one (Wang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor420_ref_044">2004</xref>).</p>
<table-wrap id="j_infor420_tab_011">
<label>Table 11</label>
<caption>
<p>The number of errors in the reconstructed image, the mean absolute difference between the two images as well as their PSNR and SSIM measures.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Scheme</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Number of modified pixels</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Number of modified LSB</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Mean absolute difference</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">PSNR</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">SSIM</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">TL (Thien and Lin, <xref ref-type="bibr" rid="j_infor420_ref_043">2002</xref>)</td>
<td style="vertical-align: top; text-align: left">39360</td>
<td style="vertical-align: top; text-align: left">79205</td>
<td style="vertical-align: top; text-align: left">0.735153</td>
<td style="vertical-align: top; text-align: left">42.528821</td>
<td style="vertical-align: top; text-align: left">0.999906</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Wu (Wu, <xref ref-type="bibr" rid="j_infor420_ref_045">2013</xref>)</td>
<td style="vertical-align: top; text-align: left">113</td>
<td style="vertical-align: top; text-align: left">218</td>
<td style="vertical-align: top; text-align: left">0.006897</td>
<td style="vertical-align: top; text-align: left">57.703019</td>
<td style="vertical-align: top; text-align: left">0.999948</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KG (Kanso and Ghebleh, <xref ref-type="bibr" rid="j_infor420_ref_028">2017</xref>)</td>
<td style="vertical-align: top; text-align: left">38350</td>
<td style="vertical-align: top; text-align: left">38350</td>
<td style="vertical-align: top; text-align: left">0.1462946</td>
<td style="vertical-align: top; text-align: left">56.478549</td>
<td style="vertical-align: top; text-align: left">0.999996</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">KE (Kabirirad and Eslami, <xref ref-type="bibr" rid="j_infor420_ref_024">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left"><italic>∞</italic></td>
<td style="vertical-align: top; text-align: left">1.000000</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">GK (Ghebleh and Kanso, <xref ref-type="bibr" rid="j_infor420_ref_021">2018</xref>)</td>
<td style="vertical-align: top; text-align: left">2729</td>
<td style="vertical-align: top; text-align: left">2729</td>
<td style="vertical-align: top; text-align: left">0.010410</td>
<td style="vertical-align: top; text-align: left">67.956168</td>
<td style="vertical-align: top; text-align: left">0.999996</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Pr-SIS</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><italic>∞</italic></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1.000000</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>On the basis of the above results it is evident that the proposed scheme is competitive with existing schemes. Many existing secret image sharing schemes use arithmetics in the finite files <inline-formula id="j_infor420_ineq_359"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <italic>q</italic> is a suitable prime. This yields in the need for truncation of values and, in turn, in all these schemes being lossy, and hence incapable of applications where the secret is sensitive. The proposed scheme, on the other hand, is defined on the field <inline-formula id="j_infor420_ineq_360"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}}$]]></tex-math></alternatives></inline-formula> where <italic>q</italic> is a power of 2. This choice is more suitable for handling binary data since with a proper choice of <italic>q</italic> one can avoid truncations of values. As shown in Table <xref rid="j_infor420_tab_008">8</xref>, among the schemes in comparison, only KE is lossless, but it is at a clear disadvantage to the proposed scheme Pr-SIS since each shadow image produced by KE has the same size as the original secret image.</p>
</sec>
<sec id="j_infor420_s_021">
<label>6</label>
<title>Concluding Remarks</title>
<p>In this research, we propose a lossless linear algebraic <inline-formula id="j_infor420_ineq_361"><alternatives>
<mml:math><mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mi mathvariant="italic">k</mml:mi><mml:mo mathvariant="normal">,</mml:mo><mml:mi mathvariant="italic">n</mml:mi><mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math>
<tex-math><![CDATA[$(k,n)$]]></tex-math></alternatives></inline-formula>-SIS which associates a vector <inline-formula id="j_infor420_ineq_362"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> to the <italic>i</italic>th participant in the vector space <inline-formula id="j_infor420_ineq_363"><alternatives>
<mml:math><mml:msubsup><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">q</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">k</mml:mi></mml:mrow></mml:msubsup></mml:math>
<tex-math><![CDATA[${\mathbb{F}_{q}^{k}}$]]></tex-math></alternatives></inline-formula>, where <italic>q</italic> is a power of 2. Admissibility conditions are imposed on the vectors <inline-formula id="j_infor420_ineq_364"><alternatives>
<mml:math><mml:msub><mml:mrow><mml:mi mathvariant="bold">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="italic">i</mml:mi></mml:mrow></mml:msub></mml:math>
<tex-math><![CDATA[${\mathbf{v}_{i}}$]]></tex-math></alternatives></inline-formula> to satisfy the threshold property of secret sharing. The scheme is shown to possess a number of characteristics such as robustness against standard statistical attacks, high level of security including sensitivity to its secret key, resilience to errors in shadow images, and reduction in the size of shadow images with respect to the size of the secret image. Another feature of the scheme is being lossless, which enables applications to digital media other than raw images. For example, the proposed scheme can be used for sharing textual data, JPEG images, video, etc.</p>
<p>The proposed scheme is very fast provided the admissibility of the transformation matrix is verified beforehand. This step is independent of the secret image and does not present any security risks to the process of secret image sharing. On the other hand, checking admissibility is costly in general and could be considered as a disadvantage of the proposed scheme if it is not performed independently of the secret sharing itself. Processing time and shadow image size can be further reduced if the proposed scheme is used in conjunction with image compression algorithms such as those based on vector quantization.</p>
</sec>
</body>
<back>
<ack id="j_infor420_ack_001">
<title>Acknowledgements</title>
<p>The authors are grateful to the anonymous referees whose remarks helped improve the presentation of this work.</p></ack>
<ref-list id="j_infor420_reflist_001">
<title>References</title>
<ref id="j_infor420_ref_001">
<mixed-citation publication-type="book"><string-name><surname>Arnol’d</surname>, <given-names>V.I.</given-names></string-name>, <string-name><surname>Avez</surname>, <given-names>A.</given-names></string-name> (<year>1968</year>). <source>Ergodic Problems of Classical Mechanics</source>. <publisher-name>W. A. Benjamin Inc.</publisher-name>, <publisher-loc>New York, Amsterdam</publisher-loc>. <comment>Translated from the French by A. Avez</comment>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_002">
<mixed-citation publication-type="journal"><string-name><surname>Asmuth</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Bloom</surname>, <given-names>J.</given-names></string-name> (<year>1983</year>). <article-title>A modular approach to key safeguarding</article-title>. <source>IEEE Transactions on Information Theory</source>, <volume>29</volume>(<issue>2</issue>), <fpage>208</fpage>–<lpage>210</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_003">
<mixed-citation publication-type="chapter"><string-name><surname>Bai</surname>, <given-names>L.</given-names></string-name> (<year>2006</year>). <chapter-title>A reliable (<italic>k, n</italic>) image secret sharing scheme</chapter-title>. In: <source>2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing</source>. <publisher-name>IEEE</publisher-name>, pp. <fpage>31</fpage>–<lpage>36</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_004">
<mixed-citation publication-type="other"><string-name><surname>Bassham</surname>, <given-names>L.</given-names> <suffix>III.</suffix></string-name>, <string-name><surname>Rukhin</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Soto</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Nechvatal</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Smid</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Barker</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Leigh</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Levenson</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Vangel</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Banks</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Heckert</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Dray</surname>, <given-names>J.</given-names></string-name> (2010). <italic>Sp 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications</italic>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_005">
<mixed-citation publication-type="chapter"><string-name><surname>Blakley</surname>, <given-names>G.R.</given-names></string-name> <etal>et al.</etal> (<year>1979</year>). <chapter-title>Safeguarding cryptographic keys</chapter-title>. In: <source>Proceedings of the National Computer Conference</source>, Vol. <volume>48</volume>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_006">
<mixed-citation publication-type="journal"><string-name><surname>Chang</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>R.J.</given-names></string-name> (<year>1998</year>). <article-title>Sharing secret images using shadow codebooks</article-title>. <source>Information Sciences</source>, <volume>111</volume>(<issue>1–4</issue>), <fpage>335</fpage>–<lpage>345</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_007">
<mixed-citation publication-type="chapter"><string-name><surname>Chang</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Chan</surname>, <given-names>C.S.</given-names></string-name>, <string-name><surname>Fan</surname>, <given-names>Y.H.</given-names></string-name> (<year>2006</year>). <chapter-title>A secret image sharing scheme based on vector quantization mechanism</chapter-title>. In: <source>International Conference on Embedded and Ubiquitous Computing</source>. <publisher-name>Springer</publisher-name>, pp. <fpage>469</fpage>–<lpage>478</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Chang</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Hsieh</surname>, <given-names>Y.P.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>C.H.</given-names></string-name> (<year>2008</year>). <article-title>Sharing secrets in stego images with authentication</article-title>. <source>Pattern Recognition</source>, <volume>41</volume>(<issue>10</issue>), <fpage>3130</fpage>–<lpage>3137</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Chen</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Mao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Chui</surname>, <given-names>C.K.</given-names></string-name> (<year>2004</year>). <article-title>A symmetric image encryption scheme based on 3D chaotic cat maps</article-title>. <source>Chaos, Solitons &amp; Fractals</source>, <volume>21</volume>(<issue>3</issue>), <fpage>749</fpage>–<lpage>761</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Chen</surname>, <given-names>L.S.T.</given-names></string-name>, <string-name><surname>Su</surname>, <given-names>W.K.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J.C.</given-names></string-name> (<year>2009</year>). <article-title>Secret image sharing based on vector quantization</article-title>. <source>International Journal of Circuits, Systems and Signal Processing</source>, <volume>3</volume>(<issue>3</issue>), <fpage>137</fpage>–<lpage>144</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_011">
<mixed-citation publication-type="chapter"><string-name><surname>del Rey</surname>, <given-names>A.M.</given-names></string-name> (<year>2008</year>). <chapter-title>A matrix-based secret sharing scheme for images</chapter-title>. In: <source>Iberoamerican Congress on Pattern Recognition</source>. <publisher-name>Springer</publisher-name>, pp. <fpage>635</fpage>–<lpage>642</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_012">
<mixed-citation publication-type="journal"><string-name><surname>Deng</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Wen</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Shi</surname>, <given-names>Z.</given-names></string-name> (<year>2017</year>). <article-title>Threshold multi-secret sharing scheme based on phase-shifting interferometry</article-title>. <source>Optics Communications</source>, <volume>387</volume>, <fpage>409</fpage>–<lpage>414</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_013">
<mixed-citation publication-type="chapter"><string-name><surname>Desmedt</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Frankel</surname>, <given-names>Y.</given-names></string-name> (<year>1991</year>). <chapter-title>Shared generation of authenticators and signatures</chapter-title>. In: <source>Annual International Cryptology Conference</source>. <publisher-name>Springer</publisher-name>, pp. <fpage>457</fpage>–<lpage>469</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Ding</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Gong</surname>, <given-names>Q.</given-names></string-name> (<year>2018</year>). <article-title>An image secret sharing method based on matrix theory</article-title>. <source>Symmetry</source>, <volume>10</volume>(<issue>10</issue>), <fpage>530</fpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>El-Latif</surname>, <given-names>A.A.A.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Peng</surname>, <given-names>J.L.</given-names></string-name>, <string-name><surname>Niu</surname>, <given-names>X.</given-names></string-name> (<year>2013</year>). <article-title>A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption</article-title>. <source>Optics &amp; Laser Technology</source>, <volume>54</volume>, <fpage>389</fpage>–<lpage>400</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_016">
<mixed-citation publication-type="chapter"><string-name><surname>Elsheh</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Hamza</surname>, <given-names>A.B.</given-names></string-name> (<year>2010</year>). <chapter-title>Comments on matrix-based secret sharing scheme for images</chapter-title>. In: <source>Iberoamerican Congress on Pattern Recognition</source>. <publisher-name>Springer</publisher-name>, pp. <fpage>169</fpage>–<lpage>175</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Fridrich</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Goljan</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Du</surname>, <given-names>R.</given-names></string-name> (<year>2002</year>). <article-title>Lossless data embedding—new paradigm in digital watermarking</article-title>. <source>EURASIP Journal on Advances in Signal Processing</source>, <volume>2002</volume>(<issue>2</issue>), <elocation-id>986842</elocation-id>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Fu</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>G.Y.</given-names></string-name>, <string-name><surname>Zhu</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>J.X.</given-names></string-name>, <string-name><surname>Lei</surname>, <given-names>W.M.</given-names></string-name> (<year>2018</year>). <article-title>A fast chaos-based colour image encryption algorithm using a hash function</article-title>. <source>Informatica</source>, <volume>29</volume>(<issue>4</issue>), <fpage>651</fpage>–<lpage>673</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_019">
<mixed-citation publication-type="book"><string-name><surname>Gersho</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Gray</surname>, <given-names>R.M.</given-names></string-name> (<year>2012</year>). <source>Vector Quantization and Signal Compression</source>, Vol. <volume>159</volume>. <publisher-name>Springer Science &amp; Business Media</publisher-name>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name> (<year>2014</year>). <article-title>A robust chaotic algorithm for digital image steganography</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>19</volume>(<issue>6</issue>), <fpage>1898</fpage>–<lpage>1907</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name> (<year>2018</year>). <article-title>A novel secret image sharing scheme using large primes</article-title>. <source>Multimedia Tools and Applications</source>, <volume>77</volume>(<issue>10</issue>), <fpage>11903</fpage>–<lpage>11923</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Gray</surname>, <given-names>R.</given-names></string-name> (<year>1984</year>). <article-title>Vector quantization</article-title>. <source>IEEE ASSP Magazine</source>, <volume>1</volume>(<issue>2</issue>), <fpage>4</fpage>–<lpage>29</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Hu</surname>, <given-names>W.T.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>M.C.</given-names></string-name>, <string-name><surname>Guo</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Ren</surname>, <given-names>Y.Z.</given-names></string-name> (<year>2012</year>). <article-title>Reversible secret image sharing with steganography and dynamic embedding</article-title>. <source>Security and Communication Networks</source>, <volume>5</volume>(<issue>11</issue>), <fpage>1267</fpage>–<lpage>1276</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_024">
<mixed-citation publication-type="journal"><string-name><surname>Kabirirad</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Eslami</surname>, <given-names>Z.</given-names></string-name> (<year>2018</year>). <article-title>A (<italic>t, n</italic>)-multi secret image sharing scheme based on Boolean operations</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>57</volume>, <fpage>39</fpage>–<lpage>47</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_025">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2012</year>). <article-title>A novel image encryption algorithm based on a 3D chaotic map</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>17</volume>(<issue>7</issue>), <fpage>2943</fpage>–<lpage>2959</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2013</year>). <article-title>A fast and efficient chaos-based keyed hash function</article-title>. <source>Communications in Nonlinear Science and Numerical Simulation</source>, <volume>18</volume>(<issue>1</issue>), <fpage>109</fpage>–<lpage>123</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_027">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>). <article-title>A structure-based chaotic hashing scheme</article-title>. <source>Nonlinear Dynamics</source>, <volume>81</volume>(<issue>1–2</issue>), <fpage>27</fpage>–<lpage>40</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_028">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2017</year>). <article-title>An efficient (<italic>t, n</italic>)-threshold secret image sharing scheme</article-title>. <source>Multimedia Tools and Applications</source>, <volume>76</volume>(<issue>15</issue>), <fpage>16369</fpage>–<lpage>16388</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_029">
<mixed-citation publication-type="journal"><string-name><surname>Kanso</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghebleh</surname>, <given-names>M.</given-names></string-name> (<year>2018</year>). <article-title>An efficient lossless secret sharing scheme for medical images</article-title>. <source>Journal of Visual Communication and Image Representation</source>, <volume>56</volume>, <fpage>245</fpage>–<lpage>255</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_030">
<mixed-citation publication-type="journal"><string-name><surname>Le</surname>, <given-names>T.H.N.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Chang</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Le</surname>, <given-names>H.B.</given-names></string-name> (<year>2011</year>). <article-title>A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images</article-title>. <source>Digital Signal Processing</source>, <volume>21</volume>(<issue>6</issue>), <fpage>734</fpage>–<lpage>745</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_031">
<mixed-citation publication-type="journal"><string-name><surname>Lin</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Tsai</surname>, <given-names>W.H.</given-names></string-name> (<year>2004</year>). <article-title>Secret image sharing with steganography and authentication</article-title>. <source>Journal of Systems and Software</source>, <volume>73</volume>(<issue>3</issue>), <fpage>405</fpage>–<lpage>414</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_032">
<mixed-citation publication-type="journal"><string-name><surname>Maneri</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Silverman</surname>, <given-names>R.</given-names></string-name> (<year>1966</year>). <article-title>A vector-space packing problem</article-title>. <source>Journal of Algebra</source>, <volume>4</volume>(<issue>3</issue>), <fpage>321</fpage>–<lpage>330</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_033">
<mixed-citation publication-type="chapter"><string-name><surname>Mignotte</surname>, <given-names>M.</given-names></string-name> (<year>1982</year>). <chapter-title>How to share a secret</chapter-title>. In: <source>Workshop on Cryptography</source>. <publisher-name>Springer</publisher-name>, pp. <fpage>371</fpage>–<lpage>375</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_034">
<mixed-citation publication-type="journal"><string-name><surname>Naor</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Wool</surname>, <given-names>A.</given-names></string-name> (<year>1998</year>). <article-title>Access control and signatures via quorum secret sharing</article-title>. <source>IEEE Transactions on Parallel and Distributed Systems</source>, <volume>9</volume>(<issue>9</issue>), <fpage>909</fpage>–<lpage>922</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_035">
<mixed-citation publication-type="book"><string-name><surname>Rong</surname>, <given-names>C.G.</given-names></string-name>, <string-name><surname>Xiaoning</surname>, <given-names>D.</given-names></string-name> (<year>1998</year>). <source>From Chaos to Order: Methodologies, Perspectives and Applications</source>, Vol. <volume>24</volume>. <publisher-name>World Scientific</publisher-name>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_036">
<mixed-citation publication-type="journal"><string-name><surname>Schinzel</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Spież</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Urbanowicz</surname>, <given-names>J.</given-names></string-name> (<year>2010</year>). <article-title>Admissible tracks in Shamir’s scheme</article-title>. <source>Finite Fields and Their Applications</source>, <volume>16</volume>(<issue>6</issue>), <fpage>449</fpage>–<lpage>462</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_037">
<mixed-citation publication-type="chapter"><string-name><surname>Schoenmakers</surname>, <given-names>B.</given-names></string-name> (<year>1999</year>). <chapter-title>A simple publicly verifiable secret sharing scheme and its application to electronic voting</chapter-title>. In: <source>Annual International Cryptology Conference</source>. <publisher-name>Springer</publisher-name>, pp. <fpage>148</fpage>–<lpage>164</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_038">
<mixed-citation publication-type="journal"><string-name><surname>Shamir</surname>, <given-names>A.</given-names></string-name> (<year>1979</year>). <article-title>How to share a secret</article-title>. <source>Communications of the ACM</source>, <volume>22</volume>(<issue>11</issue>), <fpage>612</fpage>–<lpage>613</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_039">
<mixed-citation publication-type="journal"><string-name><surname>Shannon</surname>, <given-names>C.E.</given-names></string-name> (<year>1951</year>). <article-title>Prediction and entropy of printed English</article-title>. <source>Bell System Technical Journal</source>, <volume>30</volume>(<issue>1</issue>), <fpage>50</fpage>–<lpage>64</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_040">
<mixed-citation publication-type="journal"><string-name><surname>Simić</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Perić</surname>, <given-names>Z.H.</given-names></string-name>, <string-name><surname>Savić</surname>, <given-names>M.S.</given-names></string-name> (<year>2018</year>). <article-title>Image coding algorithm based on Hadamard transform and simple vector quantization</article-title>. <source>Multimedia Tools and Applications</source>, <volume>77</volume>(<issue>5</issue>), <fpage>6033</fpage>–<lpage>6049</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_041">
<mixed-citation publication-type="other"><string-name><surname>Spiez</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Srebrny</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Urbanowicz</surname>, <given-names>J.</given-names></string-name> (2009). Secret sharing matrices. Preprint <uri>http://www.impan.pl/Preprints/p708.pdf</uri>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_042">
<mixed-citation publication-type="journal"><string-name><surname>Spież</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Srebrny</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Urbanowicz</surname>, <given-names>J.</given-names></string-name> (<year>2012</year>). <article-title>Remarks on the classical threshold secret sharing schemes</article-title>. <source>Fundamenta Informaticae</source>, <volume>114</volume>(<issue>3–4</issue>), <fpage>345</fpage>–<lpage>357</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_043">
<mixed-citation publication-type="journal"><string-name><surname>Thien</surname>, <given-names>C.C.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J.C.</given-names></string-name> (<year>2002</year>). <article-title>Secret image sharing</article-title>. <source>Computers &amp; Graphics</source>, <volume>26</volume>(<issue>5</issue>), <fpage>765</fpage>–<lpage>770</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_044">
<mixed-citation publication-type="journal"><string-name><surname>Wang</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Bovik</surname>, <given-names>A.C.</given-names></string-name>, <string-name><surname>Sheikh</surname>, <given-names>H.R.</given-names></string-name>, <string-name><surname>Simoncelli</surname>, <given-names>E.P.</given-names></string-name> <etal>et al.</etal> (<year>2004</year>). <article-title>Image quality assessment: from error visibility to structural similarity</article-title>. <source>IEEE Transactions on Image Processing</source>, <volume>13</volume>(<issue>4</issue>), <fpage>600</fpage>–<lpage>612</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_045">
<mixed-citation publication-type="journal"><string-name><surname>Wu</surname>, <given-names>K.S.</given-names></string-name> (<year>2013</year>). <article-title>A secret image sharing scheme for light images</article-title>. <source>EURASIP Journal on Advances in Signal Processing</source>, <volume>2013</volume>(<issue>1</issue>), <fpage>49</fpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_046">
<mixed-citation publication-type="journal"><string-name><surname>Wu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Noonan</surname>, <given-names>J.P.</given-names></string-name>, <string-name><surname>Agaian</surname>, <given-names>S.</given-names></string-name> <etal>et al.</etal> (<year>2011</year>). <article-title>NPCR and UACI randomness tests for image encryption</article-title> <source>Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT)</source>, <volume>1</volume>(<issue>2</issue>), <fpage>31</fpage>–<lpage>38</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_047">
<mixed-citation publication-type="journal"><string-name><surname>Wylie</surname>, <given-names>J.J.</given-names></string-name>, <string-name><surname>Bigrigg</surname>, <given-names>M.W.</given-names></string-name>, <string-name><surname>Strunk</surname>, <given-names>J.D.</given-names></string-name>, <string-name><surname>Ganger</surname>, <given-names>G.R.</given-names></string-name>, <string-name><surname>Kiliccote</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Khosla</surname>, <given-names>P.K.</given-names></string-name> (<year>2000</year>). <article-title>Survivable information storage systems</article-title>. <source>Computer</source>, <volume>33</volume>(<issue>8</issue>), <fpage>61</fpage>–<lpage>68</lpage>.</mixed-citation>
</ref>
<ref id="j_infor420_ref_048">
<mixed-citation publication-type="journal"><string-name><surname>Zarepour-Ahmadabadi</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Ahmadabadi</surname>, <given-names>M.S.</given-names></string-name>, <string-name><surname>Latif</surname>, <given-names>A.</given-names></string-name> (<year>2016</year>). <article-title>An adaptive secret image sharing with a new bitwise steganographic property</article-title>. <source>Information Sciences</source>, <volume>369</volume>, <fpage>467</fpage>–<lpage>480</lpage>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>