期刊文献+

一种基于排列的(2,n)可视门限方案 被引量:5

(2,n) Visual Threshold Scheme Based on Permutation
下载PDF
导出
摘要 像素扩展度和对比度是视觉加密方案中两个重要的指标,同时使二者达到最优在理论上是非常困难的。运用排列的方法设计出一种(2,n)方案,从理论上证明了其存在性,并给出了该方案的构造方法。软件仿真结果表明,该方案能够折衷考虑二者之间的矛盾,在像素扩展度较小的情况下,使对比度接近最优。 Two parameters, pixel expansion and contrast, are very important in visual cryptography. It's very difficult to optimize both of them in theory. Based on permutation, a (2,n) scheme, which existence has been proved theoretically, is proposed. The method of construction has been carried out. Simulation results demonstrate that this scheme can balance performance between pixel expansion and contrast, i.e., when the contrast is close to optimality, the pixel expansion is relatively minor .
作者 房礼国 郁滨
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期157-159,162,共4页 Computer Engineering
关键词 视觉加密 可视秘密共享方案 可视门限方案 排列 Visual cryptography Visual secret sharing scheme Visual threshold scheme(VTS) Permutation
  • 相关文献

参考文献10

  • 1Adi S.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Steven R.Coding and Information Theory[M].Berlin:Springer-Verlag,1998.
  • 3Moni N,Adi S.Visual Cryptography[C]//Proc.of Advances in Cryptology Eurocrypt.1995.
  • 4Ateniese G,Blundo C,De Santis A.Visual Cryptography for General Access Structures[J].Information and Computation,1996,129(2):86-106.
  • 5Ateniese G,Blundo C,De Santis A.Constructions and Bounds for Visual Cryptography[C]//Proc.of the 23rd International Colloquium on Automata,Languages and Programming.1996.
  • 6Blundo C,De Santis A,Stinson D R.On the Contrast in Visual Cryptography Schemes[J].Journal of Cryptology,1999,12(4):261-289.
  • 7Hou Y C,Tu S F.Visual Cryptography Techniques for Color Images without Pixel Expansion[J].Journal of Information Technology and Society,2004,4(1):95-110.
  • 8Franklin M F.Cyclic Generation of Orthogonal Latin Squares[J].Ars Combinatoria,1984,17(1):129-140.
  • 9Ateniese G,Blundo C,De Santis A.Extended Capabilities for Visual Cryptography[J].Theoretical Computer Science,2001,250(1/2):143-161.
  • 10Blundo C,Darco P,De Santis A.Contrast Optimal Threshold Visual Cryptography Schemes[J].Discrete Mathematics,2003,16(2):224-261.

同被引文献37

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 3郁滨,王翠.像素不扩展的MSM视觉密码方案[J].信息工程大学学报,2007,8(2):156-160. 被引量:7
  • 4徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.
  • 5NAOR M, SHAMIR A. Visual cryptography[ EB/OL]. [ 2008 - 10 -23 ]. http://people, csail, mit. edu/rivest/voting/papers/Naor-Shamir-VisualCryptography. ps .
  • 6ATENIESE G, BLUNDO C, De SANTIS A, et al. Visual cryptography for general access structures[ J]. Information and Computation, 1996, 129(2) : 86 - 106.
  • 7邱善福.新视觉化密码编码法的分析[D].台湾:台湾国立交通大学资讯科学研究所,2001.
  • 8DROSTE S. New results on visual cryptography[ EB/OL]. [ 2008 - 10 -25]. http://dsns, csie. nctu. edu. tw/research/crypto/HTML/ PDF/C96/401. PDF.
  • 9HOU Y C, TU S F. A visual cryptographie technique for chromatic images using muhi-pixel encoding method[ J]. Journal of Research and Practice in Information Technology, 2005, 37(2) : 179 - 182.
  • 10Naor M,Shamir A.Visual cryptography[C]//Advances in Cryptology-Eurocrypt'94.Lecture Notes in Computer Science.Berlin:Springer-Verlag,1995,950:1-12.

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部