(n , n ) Multi-Secret Image Sharing Scheme with Enhanced Quality Meaningful Shares
Published Online: Sep 12, 2025
Page range: 74 - 85
DOI: https://doi.org/10.2478/ias-2025-0005
Keywords
© 2025 Yogesh K. Meghrajani et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In today’s digital era, security of shared images is more prevalent. Visual secret sharing (VSS) or secret image sharing (SIS) schemes offer the security of the shared images from theft, modification, and destruction compared to raw images. VSS schemes encrypt the secret image before sharing, using cryptographic techniques. In traditional VSS schemes, the poor contrast of recovered image is inevitable due to its stacking property. Thus, Boolean-based secret sharing schemes have received widespread accolades by adding little computation to improve the quality of recovered images. Additionally, the use of multi secret sharing (MSS) schemes increases the sharing capacity of VSS schemes. Several researchers [1],[2],[3],[4],[5],[6] have proposed Boolean-based MSS schemes for sharing multiple secrets using meaningless shares. Chen and Wu [1] presented a Boolean-based MSS scheme but their scheme has a sharing capacity of (
In the aforementioned schemes, the third party can evidently suspect the presence of a secret because of the meaningless share images. Thus, to overcome this problem, a meaningful VSS scheme is adopted to share a secret image. An RG-based meaningful VSS scheme was proposed by Hou et al. [13]. Further, Boolean-based meaningful VSS schemes were proposed by [14], An authenticatable (2, 3) secret sharing scheme was proposed by [15], and [16] presented an essential secret image sharing approach. Other meaningful VSS schemes are based on general meaningful shadow construction [17] and turtle shell structure matrix [18]. Additionally, Kapadiya et al. [19] showed a Boolean-based VSS technique to generate meaningful shares by embedding a different number of bits of secret image. Their study showed that embedding four bits of secret image into meaningful shares offers optimal results.
The aforementioned meaningful VSS schemes are extended for sharing multiple secret images. Refs. [20], [21], [22], [23] proposed Boolean-based meaningful MSS schemes and [24] proposed RG-based meaningful MSS scheme. Reddy and Prasad [20] generated meaningful shares by using Boolean-based operations. Though their scheme achieved lossless recovery of secret images, the number of meaningful shares is three times the number of secrets. Shivani et al. [21] proposed XOR-based meaningful MSS scheme for store-and-forward telemedicine applications. Their scheme encrypts n secrets using n cover images and a secret key to generate n meaningful shares. The secret key is utilized during encoding and decoding to generate an additional or master share. The secret key is required to transmit along with
The rest of this paper is organized as follows: Section II presents the proposed scheme. Section III describes experimental results and analysis. Section IV explains comparison and discussion. Lastly, we conclude this study in Section V.
This section explains an efficient (
This section describes the process of random share generation, followed by meaningful share generation. During encryption, secret images
In the random share generation process, cover images are considered as input images to generate random shares of size
Step 1:
Where,
Eq. (1) applies a bitwise XOR operation to the higher nibble of all cover images. The share images contain these higher nibble, which are used to randomize the content of the secret image. The result of the bitwise XOR operation is passed as input to the SHA-256 algorithm, which converts it into 1 * 64 hexadecimal hash value. Next,
Step 2:
Although
Where,
Step 3:
Using a single random image for all secret images poses a security threat to the scheme. Therefore, different random images are generated using the base random image. Moreover, since only a nibble of a random image is required in the encoding phase, one random image is used in two meaningful shares.
Where,
Meaningful shares are generated by embedding the nibble of cover and secret images. The security of secret images is ensured by incorporating random shares, while their appearance is maintained by inserting the high nibble of cover images into the high nibble of meaningful shares. In the proposed scheme, the following steps are included in the encoding phase.
Here,
For two secret images,
For example, consider two secret images, two cover images, and a random share image, where pixel values are:
Theorem 1 Meaningful shares
Proof 1 During the encryption process, meaningful shares are generated by embedding the high nibble of cover images into the high nibble of meaningful shares. The high nibble contributes significantly to the overall image appearance, whereas low-order bits contribute to more subtle intensity details in the image. For an 8-bit grayscale image, each pixel has maximum value of 255. The maximum contribution of the high nibble is 240, while the maximum contribution of the low nibble is 15. Since high nibble of meaningful share images is identical to the high nibble of their corresponding cover images, the worst-case difference between cover image pixels and meaningful share pixels is 15. This ensures a high degree of similarity of meaningful shares and cover images.
To quantify the similarity, Peak signal to noise ratio (PSNR) is calculated. PSNR [25] is defined as,
PSNR is a renowned numerical parameter to measure the visual quality of a given image. A higher PSNR value indicates better match between the images under observation. A PSNR value above 30 dB signifies high-quality images [26], which in our case, refers to meaningful shares. The worst-case PSNR is 24.61 dB, assuming all low-nibble pixel values of
The encryption algorithm describes the procedure to generate
Input:
Output:
Define: 1: for 2: for 3: for // Generate intermediate random shares 4: Follow the Eq. (1) to generate // Generate meaningful shares 6: for 7:
8:
9: end for 10: end for 11: end for 12: end for 13: return
The secret image decryption process is explained in this section.
Sheer meaningful shares are required to generate random shares in the recovery phase. Thus, meaningful shares of size
Here,
Meaningful shares and generated random shares together reconstruct secret images. Theoretically, the cover image and secret image cannot be completely embedded in a meaningful share. Therefore, the high nibble of these images are utilized to generate meaningful shares. Since the low nibble of secret images are not transmitted, they are randomly generated during reconstruction. The decryption procedure is as follows:
For two meaningful shares,
Continuing the encoding phase example, where the meaningful share pixel values are
Theorem 2 Revealed secret images
Proof 2 High nibble of reconstructed secret images are identical to high nibble of secret images, whereas random generation of low nibble causes dissimilar values. The scenario is the same as explained in Theorem 1 between
The decryption algorithm shows the procedure to reveal
Input :
Output :
Define: 1: for 2: for 3: for // Generate intermediate random shares 4: Follow the Eq. (8) to generate // Generate reconstructed secret images 6: for 7:
8:
9: end for 10: end for 11: end for 12: end for 13: return
Experimental results using a set of different secret images for grayscale and color images are shown in Figure 1 and Figure 2 respectively. All experiments were conducted on 512*512 images using MATLAB R2016, running on a system with an Intel Core i5 processor and 6 GB of RAM. Figure 1 (
A secret image with substantial regions of similar grayscale intensity values is vulnerable to the threshold security of the scheme. Threshold security is considered compromised if one can recover partial information of secret images from
The imperceptibility parameter falls within the acceptable range in terms of PSNR [21]. High imperceptibility between meaningful share and cover images indicates a high visual quality of the meaningful shares, whereas high perceptibility between secret and reconstructed images shows high contrast of recovered images. Objective or mathematical analysis of imperceptibility is conducted using PSNR. Average PSNR value between meaningful share and cover images for grayscale images of Figure 1 is 32.97 dB. Similar comparison for color images of Figure 2 is 31.77 dB. Moreover, the average PSNR value between secret and recovered images for grayscale images in Figure 1 is 34.72 dB, and for color images in Figure 2, the PSNR value is 32.25 dB. In meaningful MSS schemes, there is a trade-off between the recovered image and the share image. Notably, the PSNR of the recovered and share images in the proposed scheme exceeds 30 dB, indicating high-quality of reconstruction and meaningful shares.

Proposed (3,3) MSS meaningful scheme for grayscale images (a)–(c) Secret images

Proposed (2,2) MSS meaningful scheme for color images (a, b) Secret images

Proposed MSS meaningful scheme for computer-synthesized images. (a)–(c) Secret images
Sharing Capacity: Sharing capacity is an important efficiency performance parameter relating secret images, share images, and pixel expansion. The sharing capacity is defined as [1, 27]:
A higher value of sharing capacity indicates greater efficiency. Typically, it is limited to 1. In the proposed scheme, the size of all meaningful share images is the same as the size of secret images. Hence, it offers a pixel expansion as 1. Moreover, our scheme requires
Hiding Capacity: The hiding capacity is defined as [1, 27],
In addition to image sharing applications, the proposed scheme can also be used in image hiding schemes [1, 27]. As the size of secret images and cover images is same, the hiding capacity of the proposed scheme is also 1. The high sharing capacity and high hiding capacity of the proposed scheme reduce storage burden and transmission bandwidth.
Management Efficiency: Management efficiency term is introduced by Yan et al. [17] which means meaningful cover images increase management efficiency and decrease suspicion. Furthermore, a higher sharing capacity also increases management efficiency. As the proposed scheme requires
Computational Complexity: Encryption and decryption involve SHA-256 algorithm, circular padding, Torus automorphism, modulo operation, circular left shift operation, and XOR operations. The computational complexity of each function but SHA-256 is O (M * M), while for SHA-256, it is O (1). Hence, for
Limitations: The proposed scheme utilizes a nibble for hiding an encrypted secret and a nibble for cover image without utilizing any additional share. The proposed scheme ensures high-quality reconstruction and meaningful shares and cannot be distinguished by the human visual system. However, it is inherently constrained in achieving lossless reconstruction.
Security of the proposed scheme is also analyzed using brute-force attack. Brute-force attack is a comprehensive trial and error method to decrypt data using all possible combinations. In VSS or MSS schemes where images are utilized, the search space for brute-force attacks increases manifold. Single grayscale image of size
Another threat to the proposed scheme is that an attacker could recover the secret image
The entropy can be used to measure the randomness of the share images. Higher entropy leads to increased randomness which ensures that the share looks random and reveals no information about the secret image. In-formation entropy is defined as,
To ensure the randomness of the shares, entropy calculation is carried out for three meaningful share images of Figure 1. For a grayscale image, the maximum entropy value is 8, while values between 6 and 8 are regarded as high entropy. Experimental results exhibit entropy values for Figure 1g–i as 7.17, 7.72, and 7.38 respectively with an average entropy value as 7.42. High entropy value of the experimental results validates the share security of the proposed scheme.
The comparison between the proposed scheme and related MSS schemes is based on type of image, symmetric function, sharing capacity, quality of recovery, share type, and management efficiency. Type of image represents different image formats supported by the scheme, like binary or gray. Symmetric function indicates use of identical function in sharing and recovery procedures [4]. Symmetric function helps in system development by reducing implementation overhead. Table 1 illustrates the comparison of related MSS schemes with the proposed scheme. Though Chen and Wu scheme [1] supports binary and gray secret image type and provides lossless reconstruction of secret images, their scheme has low sharing capacity and does not fulfill symmetric function criteria. Refs. [2] and [3] have high sharing capacity but do not have symmetric function. Management efficiency of the related MSS schemes [1, 2, 3, 4, 5, 6] is low as their share type is meaningless.
Comparison between Related MSS Schemes and the Proposed Scheme.
[1] | Binary, Gray | No | ( |
Lossless | Meaningless | Low |
[2] | Gray | No | ( |
Lossless | Meaningless | Low |
[3] | Gray | No | ( |
Lossless | Meaningless | Low |
[4] | Gray | Yes | ( |
High quality | Meaningless | Low |
[5] | Gray | Yes | ( |
Lossless | Meaningless | Low |
[6] | Gray | Yes | ( |
Lossless | Meaningless | Low |
The Proposed Scheme | Gray | Yes | ( |
High quality | Meaningful | High |
Furthermore, Table 2 shows secret sharing schemes comprise of both meaningful and multiple shares using type of images, decoding method, sharing capacity, average PSNR between meaningful shares and cover images, average PSNR between secret and recovered images, and management efficiency. Schemes [20] and [21] proposed meaningful share-based schemes using Boolean operation for sharing multiple secret images. Here, Reddy and Prasad [20] achieve lossless recovery of secret images using Boolean OR, AND, and XOR operations but their scheme has sharing capacity of (
Comparison between Related Meaningful and Multiple Share-based MSS Schemes and the Proposed Scheme.
Type of image | Gray | Gray | Binary | Binary | Gray |
Decoding method | Boolean [OR, AND, XOR] | Boolean [XOR] | Random grid | Boolean [XOR] | Boolean [XOR] |
Sharing capacity Share type | ( |
( |
( |
( |
( |
Average PSNR between meaningful shares and cover images | 57 dB (2 |
17.28 dB | < 11 dB | < 10 dB | 33 dB |
Average PSNR between secret and recovered images | Infinity | 68 dB | Low | < 22 dB | 34.72 dB |
Management efficiency | Low | Low | High | High | High |
Compared to [20] and [21], the proposed scheme attains high efficiency in terms of sharing capacity as (
Though subjective analysis of [21] scheme shows better performance in recovered image quality compared to the proposed scheme, the human eye cannot distinguish between their scheme and the proposed scheme. Whereas, subjective and objective analyses of [21] show poor visual quality of shares compared to the proposed scheme as meaningful shares of [21] have average PSNR of 17.28 dB compared to 33 dB of the proposed scheme. Furthermore, management efficiency of the proposed scheme is higher compared to [20] and [21].
Ref. [24] proposed a meaningful multi-secret sharing scheme using random grids. Though their scheme can share
This manuscript describes an efficient (