期刊文献+

基于矩阵乘法的可压缩门限图像共享方案 被引量:4

A Compressible Threshold Image Sharing Scheme Based on Matrix Projection
原文传递
导出
摘要 基于矩阵乘法秘密共享思想,提出了一种新的可压缩的图像秘密共享方案。本方案利用可压缩矩阵乘法算法直接生成影子图像,有效地克服了秘密图像需进行置乱预处理的缺陷,并且方案的复杂度较低。本方案生成的影子图像仅为原秘密图像的1/t,有效地压缩了影子图像的尺寸。 Based on matrix multiplication secret sharing theory, a new compressible image sharing scheme is proposed. Taking advantage of compressible matrix projection, this scheme directly creates shadow image so as to, consequently, effectively overcome the drawback which requires the secret image is permutated before it is shared in literature. Besides, its complex degree is lower than the scheme's one in literature. Meanwhile, this scheme reduces the size of each shadow image to become lit of the secret image's one.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1003-1006,共4页 Geomatics and Information Science of Wuhan University
关键词 矩阵乘法 影子图像 可压缩的图像共享 matrix projection shadow image compressible image sharing
  • 相关文献

参考文献10

  • 1Shamir A. How to Share a Secret[J]. Commun ACM, 1979, 24(11) :612-613
  • 2Blakley G R. Safeguarding Cryptographic Keys[C]. AFIPS 1979 Natl Comput Conf, NewYork, 1979
  • 3Karnin E D, Greene J W, Hellman M E. On Sha- ring Secret Systems[J]. IEEE Transactions on Information Theory, 1983, IT-29:35-41
  • 4Naor M, Shamir A. Visual Cryptography[C].Advances in Cryptology-Eurocrypt'94, Berlin, 1994
  • 5Naor M, Shamir A. Visual Cryptography Ⅱ: Improving the Contrast Via the Cover Base[M]. Theory of Cryptography Library. Lecture Notes in Computer Science, Berlin, 1997
  • 6Thien C C, Lin J C. Secret Image Sharing[J]. Computer&Graphic, 2002,26 (5) : 765-770
  • 7Li Bai. A Reliable (k, n) Image Secret Sharing Scheme [C]. Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on Sept, Indiana, USA, 2006
  • 8Li Bai. A Strong Ramp Secret Sharing Scheme Using Matrix Projection[C]. World of Wireless, Mobile and Multimedia Networks International Symposium, Buffalo, New York, USA, 2006
  • 9Yang C C,Chang T Y, Hwang M S. A (t,n) Multisecret Sharing Scheme[J].Applied Mathematics and Computation, 2004, 151(2):483-490
  • 10庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26

二级参考文献1

共引文献25

同被引文献31

  • 1Shamir A.How to Share a Secret[J].Communications of ACM,1979,24(11):612-613.
  • 2Blakley G R.Safeguarding Cryptographic Keys[C]//Proc.of AFIPS National Computer Conference.New York,USA:[s.n.],1979.
  • 3Naor M,Shamir A.Visual Cryptography[C]//Proc.of EURO-CRYPYT'94.Berlin,Germany:Springer-Verlag,1995.
  • 4Thien C,Lin J.Secret Image Sharing[J].Computer Graphics,2002,26(1):765-770.
  • 5Fang Wen-Pinn.Secret Image Sharing Safety[C]//Proc.of the 14th Asia-Pacific Conference on Communications.Tokyo,Japan:[s.n.],2008.
  • 6Li Bai.A Reliable (k,n) Image Sharing Scheme[C]//Proc.of DASC'06.Indianapolis,USA:[s.n.],2006.
  • 7Karnin E D,Greene J W,Hellman M E.On Sharing Secret Systems[J].IEEE Trans.on Information Theory,1983,29(1):35-41.
  • 8Li Bai.Strong Ramp Secret Sharing Scheme Using Matrix Projection[J].IEEE Computer Society,2006,17(1):652-656.
  • 9Li Bai.A Reliable (k,n) Image Secret Sharing Scheme.. Dependable, Autonomic and Secure Computing 2nd IEEE International Symposium on . 2006
  • 10Blakley G R.Safeguarding cryptographic keys. Managing Requirements Knowledge International Workshop on . 1899

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部