MULTILEVEL COMPARTMENT THRESHOLD SECRET IMAGE SHARING SCHEME

Published 2025-12-31
PHYSICS-MATHEMATICS Vol. 82 No. 4 (2025)
Том 82 №4 (2025)
Authors:
  • NABIYEV V.
  • SOLEYMANZADEH K.
PDF

Traditional secret sharing schemes assume that all participants within a group or compartment possess equal authority in reconstructing the secret. However, in many real-world applications, such as hierarchical organizational structures or secure multi-party collaborations, this assumption does not hold. To address this limitation, we propose a novel Multilevel Compartment Threshold Secret Image Sharing (MCT-SIS) scheme that introduces hierarchical privileges within each compartment. Our scheme is based on a combination of Tassa’s hierarchical access structure and Ghodosi’s compartment model, and utilizes Birkhoff interpolation and polynomial-based techniques to achieve robust and flexible secret image sharing. Participants are grouped into disjoint compartments, each with multiple levels of access, and the secret image is shared such that it can only be reconstructed when both compartmental and hierarchical threshold conditions are satisfied. The scheme ensures perfect secrecy, lossless reconstruction, and reduced storage overhead. Experimental results validate its feasibility and demonstrate its applicability to environments requiring fine-grained access control, such as collaborative data vaults, medical imaging systems, and secure multi-agency operations.

NABIYEV V.

PhD, professor, faculty of engineering, department of computer engineering, Karadeniz Technical university, Trabzon, Turkey

Е-mail: vasif@ktu.edu.tr, https://orcid.org/0000-0003-0314-8134

SOLEYMANZADEH K.

PhD, teacher, faculty of engineering and natural sciences, software engineering department, Istanbul health and technology university, İstanbul, Turkey

Е-mail: katira.soleymanzadeh@istun.edu.tr, https://orcid.org/0000-0002-7557-2877

  1. Shamir A. How to share a secret. Communications of the ACM, 22(11), 1979, 612–613. DOI: https://doi.org/10.1145/359168.359176
  2. Blakley G. R. Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 1979, 313–317. DOI: https://doi.org/10.1109/MARK.1979.8817296
  3. Simmons G. J. How to (really) share a secret. Advances in Cryptology–CRYPTO’88, 1988, 390–448. DOI: https://doi.org/10.1007/0-387-34799-2_30
  4. Tassa T., & Dyn N. Multipartite secret sharing by bivariate interpolation. Journal of Cryptology, 22(2), 2009, 227–258. DOI: https://doi.org/10.1007/s00145-008-9027-9
  5. Brickell E. F., Gordon D. M., McCurley K. S., & Wilson D. B. Fast exponentiation with precomputation. In Advances in Cryptology–EUCRYPT’87, 1987, 200–207. DOI: https://doi.org/10.1007/3-540-47555-9_18
  6. Ghodosi H., Pieprzyk J., & Safavi-Naini R. Secret sharing in multilevel and compartmented groups. Information Security and Privacy, 1998, 367–378. DOI: https://doi.org/10.1007/BFb0053748
  7. Thien C. C., & Lin J. C. Secret image sharing. Computers & Graphics, 26(5), 2002, 765–770. DOI: https://doi.org/10.1016/S0097-8493(02)00131-0
  8. Lin C. C., & Tsai W. H. Secret image sharing with steganography and authentication. Journal of Systems and Software, 73(3), 2003, 405–414. DOI: https://doi.org/10.1016/S0164-1212(03)00239-5
  9. Wang R. Z., Lin C. F., & Tsai J. C. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3), 2000, 671–683. DOI: https://doi.org/10.1016/S0031-3203(00)00015-7
  10. Wu H. C., & Shih F. Y. A simple image sharing scheme. Pattern Recognition Letters, 25(8), 2004, 979–992. DOI: https://doi.org/10.1016/j.patrec.2003.10.013
  11. Chin-Chen Chang, Tsai-Yang Lin, & Chia-Chen Chang. A novel secret image sharing scheme for true-color images with size constraint. IEEE Transactions on Circuits and Systems for Video Technology, 16(5), 2004, 587–592.
  12. Guo J., Chen C. C., & Qin Y. A hierarchical threshold secret sharing approach. Pattern Recognition Letters, 33(1), 2012, 83–91. DOI: https://doi.org/10.1016/j.patrec.2011.09.030
  13. Tassa T. Hierarchical secret sharing. Journal of Cryptology, 20(2), 2007, 237–264. DOI: https://doi.org/10.1007/s00145-006-0334-8
  14. Pakniat N., & Eslami Z. An improved secret image sharing scheme with hierarchical threshold access structure. Journal of Information Security and Applications, 58, 2021, 102770.
  15. Jin Y., Wang S., & Zhang X. A deep learning-based secure image sharing scheme with adaptive thresholding. IEEE Access, 9, 2021, 107246–107258. DOI: https://doi.org/10.1109/ACCESS.2021.3075282
  16. Zhang M., Liu Y., & Yang H. Blockchain-based secret image sharing for Internet of Things security. Future Generation Computer Systems, 141, 2023, 56–68.
  17. Kim H., Park J., & Kim Y. Federated threshold secret sharing in privacy-preserving medical applications. Computers in Biology and Medicine, 149, 2022, 106003.
secret image sharing, threshold scheme, multilevel compartment, Birkhoff interpolation, hierarchical security

How to Cite

MULTILEVEL COMPARTMENT THRESHOLD SECRET IMAGE SHARING SCHEME. (2025). Scientific Journal "Bulletin of the K. Zhubanov Aktobe Regional University", 82(4), 23-33. https://doi.org/10.70239/arsu.2025.t82.n4.03