{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:56:52Z","timestamp":1772679412358,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602491"],"award-info":[{"award-number":["61602491"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Program of the National University of Defense Technology","award":["ZK-17-02-07"],"award-info":[{"award-number":["ZK-17-02-07"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Thien-and-Lin\u2019s polynomial-based secret image sharing (PSIS) is utilized as the basic method to achieve PSISs with better performances, such as meaningful shares, two-in-one property and shares with different priorities. However, this (k,n) threshold PSIS cannot achieve lossless recovery for pixel values more than 250. Furthermore, current solutions to lossless recovery for PSIS have several natural drawbacks, such as large computational costs and random pixel expansion. In this paper, a lossless and efficient (k,n) threshold PSIS scheme with reduced shadow size is presented. For lossless recovery and efficiency, two adjacent pixels are specified as a secret value, the prime in the sharing polynomial is replaced with 65,537, and then the additional screening operation can ensure each shared value in the range [0,65,535]. To reduce shadows size and improve security, only the first k\u22121 coefficients are embedded with secret values and the last coefficient is assigned randomly. To prevent the leakage of secrets, generalized Arnold permutation with special key generating strategy is performed on the secret image prior to sharing process without key distribution. Both theoretical analyses and experiments are conducted to demonstrate the effectiveness of the proposed scheme.<\/jats:p>","DOI":"10.3390\/sym10070249","type":"journal-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T10:56:52Z","timestamp":1530529012000},"page":"249","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4381-4413","authenticated-orcid":false,"given":"Xuan","family":"Zhou","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Hefei 230037, China"}]},{"given":"Yuliang","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei 230037, China"}]},{"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei 230037, China"}]},{"given":"Yongjie","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei 230037, China"}]},{"given":"Lintao","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei 230037, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,7,1]]},"reference":[{"key":"ref_1","unstructured":"Naor, M., and Shamir, A. (1994). Visual cryptography. Workshop on the Theory and Application of of Cryptographic Techniques, Springer."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Weir, J., and Yan, W. (2010). A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security V, Springer.","DOI":"10.1007\/978-3-642-14298-7_5"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11554-015-0540-4","article-title":"An enhanced threshold visual secret sharing based on random grids","volume":"14","author":"Yan","year":"2015","journal-title":"J. Real-Time Image Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Xie, D., Li, L., Peng, H., and Yang, Y. (2017). A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes. PLoS ONE, 12.","DOI":"10.1371\/journal.pone.0168674"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret image sharing","volume":"26","author":"Thien","year":"2002","journal-title":"Comput. Graph."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","article-title":"Invertible secret image sharing with steganography","volume":"31","author":"Lin","year":"2010","journal-title":"Pattern Recognit. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"7677","DOI":"10.1007\/s11042-016-3429-8","article-title":"A secure image sharing scheme with high quality stego-images based on steganography","volume":"76","author":"He","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_9","first-page":"1168","article-title":"Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images","volume":"7","author":"Mao","year":"2016","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1600","DOI":"10.1016\/j.imavis.2010.04.003","article-title":"Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability","volume":"28","author":"Yang","year":"2010","journal-title":"Image Vis. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1016\/j.jvcir.2013.09.010","article-title":"Sharing more information in gray visual cryptography scheme","volume":"24","author":"Li","year":"2013","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.jvcir.2013.07.005","article-title":"Essential secret image sharing scheme with different importance of shadows","volume":"24","author":"Li","year":"2013","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.patrec.2011.09.030","article-title":"A hierarchical threshold secret image sharing","volume":"33","author":"Guo","year":"2012","journal-title":"Pattern Recognit. Lett."},{"key":"ref_14","first-page":"135","article-title":"An Expandable Essential Secret Image Sharing Structure","volume":"7","author":"Chen","year":"2016","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"ref_15","first-page":"46","article-title":"A Friendly and Verifiable Image Sharing Method","volume":"1","author":"Chen","year":"2016","journal-title":"J. Netw. Intell."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"15021","DOI":"10.1109\/ACCESS.2018.2811722","article-title":"Secret Image Sharing Based on Encrypted Pixels","volume":"6","author":"Zhou","year":"2018","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.image.2018.05.001","article-title":"Improving recovered image quality in secret image sharing by simple modular arithmetic","volume":"66","author":"Wu","year":"2018","journal-title":"Signal Process. Image Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"5618","DOI":"10.1109\/TIP.2017.2738561","article-title":"Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing","volume":"26","author":"Bao","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Liu, L., Lu, Y., Yan, X., and Wang, H. (2017). Greyscale-images-oriented progressive secret sharing based on the linear congruence equation. Multimed. Tools Appl., 1\u201328.","DOI":"10.1007\/s11042-017-5435-x"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., and Liu, H. (2017, January 16\u201318). Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold. Proceedings of the International Conference on Cloud Computing and Security, Nanjing, China.","DOI":"10.1007\/978-3-319-68542-7_36"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3652","DOI":"10.1016\/j.patcog.2007.04.001","article-title":"VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches","volume":"40","author":"Lin","year":"2007","journal-title":"Pattern Recognit."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ulutas, G., Nabiyev, V.V., and Ulutas, M. (2009, January 14\u201316). Polynomial approach in a secret image sharing using quadratic residue. Proceedings of the International Symposium on Computer and Information Sciences, Guzelyurt, Northern Cyprus.","DOI":"10.1109\/ISCIS.2009.5291886"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","article-title":"Improvements of image sharing with steganography and authentication","volume":"80","author":"Yang","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.4018\/IJDCF.2018040107","article-title":"Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery","volume":"10","author":"Ding","year":"2018","journal-title":"Int. J. Digit. Crime Forens. IJDCF"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"033019","DOI":"10.1117\/1.1993625","article-title":"Progressive color visual cryptography","volume":"14","author":"Jin","year":"2005","journal-title":"J. Electr. Imaging"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.jvcir.2012.01.003","article-title":"Improvements of a two-in-one image secret sharing scheme based on gray mixing model","volume":"23","author":"Li","year":"2012","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_27","first-page":"548","article-title":"Matrix transformation of digital image and its periodicity","volume":"11","author":"Qi","year":"2001","journal-title":"Prog. Nat. Sci. Mater. Int."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/249\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:10:55Z","timestamp":1760195455000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/10\/7\/249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,1]]},"references-count":27,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,7]]}},"alternative-id":["sym10070249"],"URL":"https:\/\/doi.org\/10.3390\/sym10070249","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,1]]}}}