{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T23:42:16Z","timestamp":1770680536359,"version":"3.49.0"},"reference-count":30,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T00:00:00Z","timestamp":1650672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Axioms"],"abstract":"<jats:p>Multi-secret image sharing technology shares multiple secret images among shared images for participants and the recovery requires enough shared images for fulfilling the security property. Simultaneously, the adopted Boolean method preserves high performance. The proposed (k, n, m) multi-secret image sharing scheme shares m secret images among n participants and gathering k participants\u2019 shared images perfectly recovers these m secret images. The proposed scheme exhibits high performance because of the usage of Boolean-based processing. Moreover, the usage of a sharing matrix based strategy acquires perfect reconstruction of the secret images under (k, n) thresholds. Two proposed schemes, the source-random-mixed (SRM) and the source-random-separate (SRS) methods, are presented in this study from different strategies of sharing the random image mixed with the secret images or separated to the secret images, respectively. Moreover, the proposed SRS method exhibits the better sharing capacity. Experimental results show that the proposed schemes perform well on sharing efficiency and security.<\/jats:p>","DOI":"10.3390\/axioms11050197","type":"journal-article","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T08:14:06Z","timestamp":1650701646000},"page":"197","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Boolean-Based (k, n, m) Multi-Secret Image Sharing"],"prefix":"10.3390","volume":"11","author":[{"given":"Chien-Chang","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, Tamkang University, New Taipei City 25137, Taiwan"}]},{"given":"Cheng-Shian","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Tamkang University, New Taipei City 25137, Taiwan"}]},{"given":"Jia-Zhan","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Tamkang University, New Taipei City 25137, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s13735-018-0161-3","article-title":"A survey paper on secret image sharing schemes","volume":"8","author":"Chanu","year":"2019","journal-title":"Int. J. Multimed. Inf. Retr."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret image sharing","volume":"26","author":"Thien","year":"2002","journal-title":"Comput. Graph."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1016\/j.jss.2012.09.027","article-title":"Invertible secret image sharing for gray level and dithered cover images","volume":"86","author":"Ulutas","year":"2013","journal-title":"J. Syst. Softw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1852","DOI":"10.1016\/j.jss.2012.02.046","article-title":"A user-friendly secret image sharing scheme with reversible steganography based on cellular automata","volume":"85","author":"Wu","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1016\/j.patcog.2006.11.018","article-title":"Two secret sharing schemes based on Boolean operations","volume":"40","author":"Wang","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_7","first-page":"16","article-title":"Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations","volume":"47","author":"Kabirirad","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.jvcir.2011.11.005","article-title":"A fast progressive image transmission scheme using block truncation coding by pattern fitting","volume":"23","author":"Dhara","year":"2012","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1016\/j.patcog.2007.09.004","article-title":"Friendly progressive visual secret sharing","volume":"41","author":"Fang","year":"2008","journal-title":"Pattern Recognit."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.jss.2009.10.012","article-title":"Progressive sharing for a secret image","volume":"83","author":"Huang","year":"2009","journal-title":"J. Syst. Softw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3652","DOI":"10.1016\/j.patcog.2007.04.001","article-title":"VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches","volume":"40","author":"Lin","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.sigpro.2010.06.012","article-title":"Efficient multi-secret image sharing based on Boolean operations","volume":"91","author":"Chen","year":"2011","journal-title":"Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2014.01.001","article-title":"A secure Boolean-based multi-secret image sharing scheme","volume":"92","author":"Chen","year":"2014","journal-title":"J. Syst. Softw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1016\/j.patrec.2005.09.021","article-title":"Secret image sharing with smaller shadow images","volume":"27","author":"Wang","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"033018-1","DOI":"10.1117\/1.1993627","article-title":"New visual cryptography system based on circular shadow image and fixed angle segmentation","volume":"14","author":"Chen","year":"2005","journal-title":"J. Electron. Imaging"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3633","DOI":"10.1016\/j.patcog.2007.03.012","article-title":"Sharing multiple secrets in visual cryptography","volume":"40","author":"Shyu","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1016\/j.jvcir.2010.08.006","article-title":"Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion","volume":"21","author":"Lin","year":"2010","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.csi.2004.12.006","article-title":"Sharing visual multi-secrets using circle shares","volume":"28","author":"Wu","year":"2005","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Naor, M., and Shamir, A. (1995). Visual Cryptography. Proc. Int. Conf. Adv. Cryptol., 1\u201312.","DOI":"10.1007\/BFb0053419"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"5618","DOI":"10.1109\/TIP.2017.2738561","article-title":"Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing","volume":"26","author":"Bao","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7113","DOI":"10.1007\/s11042-015-2634-1","article-title":"Highly efficient and secure multi-secret image sharing scheme","volume":"75","author":"Chen","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"37473","DOI":"10.1109\/ACCESS.2019.2902853","article-title":"A note on multiple secret sharing using Chinese remainder theorem and exclusive-or","volume":"7","author":"Prasetyo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A.K., Ghosh, D., Maitra, P., Nag, A., and Saha, H.N. (2018, January 8\u201310). A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations. Proceedings of the 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON.2018.8796568"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jvcir.2018.10.014","article-title":"A(t,n)-multi secret image sharing scheme based on Boolean operations","volume":"57","author":"Kabirirad","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.image.2017.10.012","article-title":"Hierarchical secret image sharing scheme in compressed sensing","volume":"61","author":"Bhattacharjee","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"21241","DOI":"10.1007\/s11042-020-08823-8","article-title":"Multi-secret image sharing based on elementary cellular automata with steganography","volume":"79","author":"Azza","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"13247","DOI":"10.1007\/s11042-019-08524-x","article-title":"Multiple secret image sharing with general access structure","volume":"79","author":"Chen","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2896","DOI":"10.1109\/TCSVT.2020.3025527","article-title":"A Common Method of Share Authentication in Image Secret Sharing","volume":"31","author":"Yan","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Yan, X., Qi, J., Lu, Y., and Zhou, X. (2020). Secret image sharing with dealer-participatory and non-dealer-participatory mutual shadow authentication capabilities. Mathematics, 8.","DOI":"10.3390\/math8020234"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.jpdc.2019.04.003","article-title":"Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing","volume":"130","author":"Li","year":"2019","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["Axioms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2075-1680\/11\/5\/197\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:59:17Z","timestamp":1760137157000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2075-1680\/11\/5\/197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,23]]},"references-count":30,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["axioms11050197"],"URL":"https:\/\/doi.org\/10.3390\/axioms11050197","relation":{},"ISSN":["2075-1680"],"issn-type":[{"value":"2075-1680","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,23]]}}}