期刊文献+

基于恒权码的(2,n)视觉密码方案

(2,n) Visual Cryptography Scheme Based on Constant Weight Code
下载PDF
导出
摘要 通过研究恒权码与(2,n)视觉密码方案的关系,利用steiner系统构造恒权码,提出了基于恒权码的(2,n)视觉密码方案,在证明其存在性的同时,给出了该方案的构造方法。与现有方案相比,能较好地折衷像素扩展度和相对差。实验结果表明,该方案在保证相对差接近极大值的前提下,大大降低了像素扩展度。 Based on constant weight code constructed from steiner system, a (2,n) visual cryptography scheme is proposed through research on the relation between constant weight code and (2,n) visual cryptography scheme. The design method is proposed in process of the scheme's existence proof. The scheme can balance performance between pixe/expansion and contrast much better as contrast to existing schemes. Expefimenta/results demonstrate that pixel expansion decreases greatly and contrast is closing to maximum in the scheme.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第2期114-116,119,共4页 Computer Engineering
关键词 视觉密码 恒权码 秘密分享 门限方案 visual cryptography scheme constant weight code secret sharing threshold scheme
  • 相关文献

参考文献9

  • 1Naor M, Shamir A. Visual Cryptography[C]//Advances in Cryptology Eurocrypt'94, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1995: 1-12.
  • 2Ateniese G, Blundo C, Santis A, et al. Visual Cryptography for General Access Structures[J], Information and Computation, 1996, 129(2): 86-106.
  • 3Blundo C, Santis A, Stinson D R. On the Contrast in Visual Cryptography Schemes[J]. Journal of Cryptology, 1999, 12(4): 261- 289.
  • 4房礼国 郁滨.一种像素扩展度最优的(2,n)可视门限方案.电子技术学院学报,2006,18(7):11-15.
  • 5郁滨,房礼国.外形比例不失真的可视门限方案的研究[J].计算机工程与设计,2006,27(11):1998-1999. 被引量:6
  • 6Droste S. New Results on Visual Cryptography[C]//Advance in Cryptography Eurocrypt'96, Lecture Notes in Computer Science. Berlin: Springer, 1996: 401-415.
  • 7Brouwer A E, Shearer J B, Sloane N J A, et al. A New Table of Constant Weight Codes[J]. IEEE Trans. on Information Theory, 1990, 36(6): 1334-1380.
  • 8靳蕃,陈志.组合编码原理及应用[M].上海:上海科学技术出版社,1994.
  • 9Williams F J M, Sloane N J A. The Theory of Error-correcting Codes{M]. Amstel'dam, North-Holland: [s. n.], 1979.

二级参考文献10

  • 1Moni Naor,Adi Shamir.Visual cryptography[C].Berlin:Springer Verlag,1995.1-12.
  • 2Ateniese G,Blundo C,De Santis A,et al.Visual cryptography for general access structures[J].Information and Computation,1996,(2):86-106.
  • 3Blundo C,D'Arco P,De Santis A,et al.Contrast optimal threshold visual cryptography schemes[J].SIAM J Discrete Math,2003,(2):224-261.
  • 4Hofmeister T,Krause M,Simon H U.Contrast optimal k out of n secret sharing schemes in visual cryptography[J].Theoretical Computer Science,2000,(2):471-485.
  • 5Ateniese G,Blundo C,De Santis A,et al.Constructions and bounds for visual cryptography[C].Berlin:Springer-Verlag,416-428.
  • 6Blundo C,De Santis A,Stinson D R.On the contrast in visual cryptography schemes[J].Journal of Cryptology,1999,(4):261-289.
  • 7候永昌 杜淑芬.像素不扩展之彩色视觉密码技术[J].Journal of Information Technology and Society,2004,(4):95-110.
  • 8Eisen P A,Stinson D R.Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[J].Designs,Codes and Cryptography,2002,(1):15-61.
  • 9Ateniese G,Blundo C,Santis A De,et al.Extended capabilities for visual cryptography[J].Theoretical Computer Science,2001,(1):143-161.
  • 10Yang Ching-Nung,Chen Tse-Shih.Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion[J].Pattern Recognition Letters,2005,(2):193-206.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部