期刊文献+

外形比例不失真的可视门限方案的研究 被引量:6

Research on aspect ratio invariant visual threshold schemes
下载PDF
导出
摘要 运用视觉密码方案对正方形图片加密,如果方案的像素扩展度m不是一个整数的平方,加密后图片会从正方形变为矩形,从而导致信息的丢失。本文在理论上证明了两种改进的外形比例不失真方案的关系,针对改进方案不能对某些图片边缘部分加密的问题,给出了先扩充图片再加密的方案,仿真实验表明,本方案是有效的。 If the pixel expansion m is not a square value, the secret image - a foursquare will be changed to a rectangle and consequently lead to the loss of information after performing the VCS technique. The relationship between two improved schemes, which solved the problem of aspect ratio variant is proved. At the same time a scheme of encrypting after increasing the secret image is provided to encrypt the edge of the image. Simulation results demonstrate that this scheme is effective.
作者 郁滨 房礼国
出处 《计算机工程与设计》 CSCD 北大核心 2006年第11期1998-1999,2014,共3页 Computer Engineering and Design
关键词 视觉密码 视觉密码方案 外形比例 不失真 像素扩展度 visual cryptography visual cryptography scheme aspect ratio invariant pixel expansion
  • 相关文献

参考文献10

  • 1Moni Naor,Adi Shamir.Visual cryptography[C].Berlin:Springer Verlag,1995.1-12.
  • 2Ateniese G,Blundo C,De Santis A,et al.Visual cryptography for general access structures[J].Information and Computation,1996,(2):86-106.
  • 3Blundo C,D'Arco P,De Santis A,et al.Contrast optimal threshold visual cryptography schemes[J].SIAM J Discrete Math,2003,(2):224-261.
  • 4Hofmeister T,Krause M,Simon H U.Contrast optimal k out of n secret sharing schemes in visual cryptography[J].Theoretical Computer Science,2000,(2):471-485.
  • 5Ateniese G,Blundo C,De Santis A,et al.Constructions and bounds for visual cryptography[C].Berlin:Springer-Verlag,416-428.
  • 6Blundo C,De Santis A,Stinson D R.On the contrast in visual cryptography schemes[J].Journal of Cryptology,1999,(4):261-289.
  • 7候永昌 杜淑芬.像素不扩展之彩色视觉密码技术[J].Journal of Information Technology and Society,2004,(4):95-110.
  • 8Eisen P A,Stinson D R.Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[J].Designs,Codes and Cryptography,2002,(1):15-61.
  • 9Ateniese G,Blundo C,Santis A De,et al.Extended capabilities for visual cryptography[J].Theoretical Computer Science,2001,(1):143-161.
  • 10Yang Ching-Nung,Chen Tse-Shih.Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion[J].Pattern Recognition Letters,2005,(2):193-206.

共引文献1

同被引文献45

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2甘明,甘志,陈克非.具有掩盖图像的可视秘密共享方案[J].计算机应用与软件,2005,22(7):1-2. 被引量:12
  • 3易枫,王道顺,罗平,戴一奇.两种新的彩色图像(n,n)分存方案[J].通信学报,2007,28(5):30-35. 被引量:6
  • 4郁滨,王翠.像素不扩展的MSM视觉密码方案[J].信息工程大学学报,2007,8(2):156-160. 被引量:7
  • 5Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
  • 6Blakley G R. Safeguarding cryptographic keys [C]. Proceedings of the National Computer Conference, 1979, 48: 242-268.
  • 7Naor M and Shamir A. Visual cryptography. Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science, 1995, Vol.950: 1-12.
  • 8徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.
  • 9Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharing threshold visual cryptography [C]. CIS Workshops 2007, Harbin, 2007: 815-818.
  • 10Ateniese G, Blundo C, De Santis A, and Stinson D R. Visual cryptography for general access structures. Information and Computation, 1996, 129: 86-106.

引证文献6

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部