期刊文献+

基于(t,n)门限的可防欺骗的图像隐藏方案 被引量:1

An Image Hiding Scheme Preventing Cheat Based on(t,n) Threshold
下载PDF
导出
摘要 为了保证秘密图像可以在不安全的网络环境下安全的传输,设计了一个具体完整、实践性强的基于(t,n)门限的可防欺骗的图像隐藏方案。在保证方案的效率及安全性的基础上,通过二次拉格朗日插值算法完成共享秘密的分割以完成(t,n)门限的过程,同时,通过单向散列函数防止了攻击者篡改嵌入了共享秘密后的影子图像,也防止了欺骗者给出虚假的影子图像,保证了秘密的数字图像在不安全的网络环境中的安全传输,具有较好的理论和实践价值。 In order to guarantee the safe transmission of a secret image through an unsafe network, this paper proposes a new preventing cheat image hiding scheme based on( t, n )threshold, that is complete and practicable. On the base of guaranteeing the efficiency and security of this scheme, it applies the method of Lagrange Interpolating Polynomial to divide the share secret and to complete the ( t, n ) threshold process. On the same time, it applies Hash function to prevent cheater tampering the image that contains the share secret and to prevent cheater giving false shadow image. So it guarantees the safe transmission of a secret image through an unsafe network, it is valuable in theory and practice.
作者 陈继超 谢柯
出处 《计算机技术与发展》 2006年第9期208-209,212,共3页 Computer Technology and Development
关键词 门限 拉格朗日插值 散列函数 threshold Lagrange interpolating Hash function
  • 相关文献

参考文献6

  • 1Bourbakits N,Alexopoulous C.Picture Data Encryption Using Scan Patterns[J].Pattern Recognition,1992,25 (6):567-581.
  • 2Chang C C,Hwang M S,Chen T S.A new Encryption Algorithm for Image Cryptosystems[J].Journal of Systems and Software,2001,58:83-91.
  • 3Kuo C J.Novel Image Encryption Techniques and its Applications in Progressive Transmission[J].Journal of Electronic Imaging,1993,2 (4):345-351.
  • 4Blakley G R.Safeguarding Cryptographic Keys[A].Proceedings of the National Computer Conference[C].US:American Federation of Information Procession Societies,1979.242 -268.
  • 5Shamir A.How to Share a Secret[J].Communication of ACM,1979,22:612-613.
  • 6Chang Chin-Chen,Lin Iuon-Chang.Anew (t,n) Threshold Image Hiding Scheme for Sharing a Secret Color Image[A].Proceedings of ICCT2003[C].Beijing:Press of BJUPT,2003.

同被引文献6

  • 1BOURBAKITS N, ALEXOPOULOUS C. Picture data eneryption using scan patterns[J]. Pattern Recognition ,1992,25 (6):567-581.
  • 2CHANG C C, HWANG M S, CHEN T S. A new encryption algorithm for image cryptosystems[J]. Journal of Syst- ems and Software,2001,58:83-91.
  • 3KUO C J. Novel image encryption techniques and its applications in progressive transmission[J].Journal of ElectronicImaging, 1993,2(4):345-351.
  • 4Chen Changchin, CHANG Liniuon. A new (t3n) threshold image hiding schemd for sharing a secret color image[C]. Proceedings of ICCT'2003 [C]. Beijing :Press of BJUlYF, 2003.
  • 5BLAKLEY G R. Safeguarding cryptographic keys[C]. Pro ceedings of the National Computer Conference. US:American Federation of Information Procession Societies,1979: 242-268.
  • 6SHAMIR A. How to share a secret[J]. Communication of ACM, 1979,22:612-613.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部