期刊文献+

基于概率法的防欺骗视觉密码方案 被引量:8

Anti-cheating visual cryptography scheme based on probability
下载PDF
导出
摘要 利用概率法构造了一种防欺骗视觉密码方案,在不需要其他额外信息的前提下,可发现欺骗者的存在。同时,本方案还可以控制秘密图像的恢复效果。仿真实验表明,该方案扩展度小,恢复效果好,并可以通过控制概率来调整秘密图像的恢复效果。 An anti-cheating Visual Cryptography Scheme (VCS) scheme based on probability, which can find the cheaters without extra information, was proposed. Meanwhile, the visual effects of recovered secret image could be controlled in this scheme. Performance analysis and simulation results show that this scheme has little pixel expansion and the visual effect of recovered secret image can be adjusted by controlling probability.
出处 《计算机应用》 CSCD 北大核心 2009年第7期1782-1784,共3页 journal of Computer Applications
关键词 视觉密码 概率法 共享份 欺骗者 visual cryptography probability share cheater
  • 相关文献

参考文献10

  • 1NAOR M, SHAMIR A. Visual cryptography[ EB/OL]. [ 2008 - 10 -23 ]. http://people, csail, mit. edu/rivest/voting/papers/Naor-Shamir-VisualCryptography. ps .
  • 2房礼国,郁滨.一种基于排列的(2,n)可视门限方案[J].计算机工程,2007,33(9):157-159. 被引量:5
  • 3房礼国 郁滨.一种像素扩展度最优的(2,n)可视门限方案.电子技术学院学报,2006,18(7):11-15.
  • 4ATENIESE G, BLUNDO C, De SANTIS A, et al. Visual cryptography for general access structures[ J]. Information and Computation, 1996, 129(2) : 86 - 106.
  • 5邱善福.新视觉化密码编码法的分析[D].台湾:台湾国立交通大学资讯科学研究所,2001.
  • 6DROSTE S. New results on visual cryptography[ EB/OL]. [ 2008 - 10 -25]. http://dsns, csie. nctu. edu. tw/research/crypto/HTML/ PDF/C96/401. PDF.
  • 7HOU Y C, TU S F. A visual cryptographie technique for chromatic images using muhi-pixel encoding method[ J]. Journal of Research and Practice in Information Technology, 2005, 37(2) : 179 - 182.
  • 8颜浩,甘志,陈克非.可防止欺骗的可视密码分享方案[J].上海交通大学学报,2004,38(1):107-110. 被引量:16
  • 9郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 10徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.

二级参考文献25

  • 1[1]Naor M, Shamir A. Visual cryptography[J]. Lecture Notes in Computer Science, 1995, 950(1):1-12.
  • 2[2]Shamir A. How to share a secret[J].Communications of the ACM, 1979, 22(11):612-613.
  • 3[3]Ateniese G, Blundo G, Santis A D, et al. Visual cryptography for general access structures[J]. Electronic Colloquium on Computational Complexity,1996, 129(2):86-106.
  • 4[4]Koga H, Yamamoto H. Proposal of a lattice-based visual secret sharing scheme for color and gray-scale image[J]. IEICE Transaction on Fundamentals, 1998,E81-A(6): 1262- 1269.
  • 5[5]Santis A D, Blundo C, Arco P D, et al. Contrast optimal threshold visual cryptography schemes [J].SIAM Journal on Discrete Mathematics, 1998, 16(2) :224-261.
  • 6[6]Blundo C, Santis A D, Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptology, 1999, 12(4):261-289.
  • 7[7]Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography[J]. IEICE Transactions on Funcamentals of Electronics, 1999, E82-A (10): 2172 -2177.
  • 8[8]Biehl I, Wetzel S. Traceable visual cryptography[J].Proceedings of the First International Conference on Information and Communication Security, 1997,LNCS1334 (3): 61 - 71.
  • 9[9]Ateniese G, Blundo C, Santis A D, et al. Extended capabilities for visual cryptography [J]. Theoretical Computer Science, 2001, 250(1- 2): 143- 161.
  • 10Naor M, Shamir A. Visual Cryptography. Advances in Cryptology EUROCRYPT94' LNSC 950, 1994: 112.

共引文献26

同被引文献62

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2易枫,王道顺,戴一奇.彩色图像的可视分存方案[J].计算机辅助设计与图形学学报,2006,18(11):1770-1775. 被引量:3
  • 3徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.
  • 4Shamir A. How to share a secret. Communication of the ACM, 1979; 22(11) : 612-613.
  • 5Blakley G R. Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 1979 ; 48 : 242-268.
  • 6Naor M, Shamir A. Visual Cryptography. Advances in Cryptology EUCRYPT94', LNSC 950,1994:112.
  • 7Chor B , Goldwasser S , Milica S , et al. Verifiable secret sharing and achieving simultaneity in the presence of faults. Proceedings of the 26th. IEEE Symposium on Foundations of Computer Science, Washington: IEEE Computer Society Press , 1985:383-395.
  • 8徐晓辉,郁滨.无重影的可防欺骗视觉密码方案.全国第18届计算机技术与应用会议论文集.合肥:中国科学技术大学出版社,2007:1335-1339.
  • 9NAOR M, SHAMIR A. Visual cryptography [ C ]//Advances in Cryptology-Proe of EUROCYPT' 94, Lecture Notes in Computer Seienee. New York : Springer-Verlag, 1995 : 1-12.
  • 10HORNG G, CHEN T, TSAI D S. Cheating in visual cryptography [ J]. Designs, Codes and Cryptography, 2006,38 (2) : 219-236.

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部