期刊文献+

多分存彩色图像秘密共享(2,n)方案 被引量:1

Secret Color Images Sharing(2,n)-Threshoid Scheme with Multiple Shares
原文传递
导出
摘要 文献[2]中提出了一种基于异或(XOR)操作的彩色图像秘密共享(2,n)方案,简单易于实现,但恢复密图的效果较差。通过分析此方案,文章提出一个多分存的彩色图像秘密共享(2,n)方案,通过给用户增加分存图像的方法改善了恢复密图的质量。实验分析表明所提方案不仅取得了很好的恢复效果,而且保持了安全性和算法的简单性。 A secret color images(2, n)-threshold scheme based on XOR operation is proposed in reference[2]. The algorithm of this scheme is very simple and easy to implement, and however, the quality of the recovered image is not so satisfactory. In this paper, the reason of distortion is discussed first, and then a secret color images sharing(2, n)-threshold scheme with multiple shares is presented. In the scheme, more shares are distributed to participants, thus to improve the quality of secret image recovering. Experiments and analysis indicate that the proposed scheme could improve the quality of recovered image while maintains the security and simplicity of the algorithm.
作者 牛冬梅
出处 《信息安全与通信保密》 2009年第8期72-73,共2页 Information Security and Communications Privacy
关键词 XOR操作 秘密共享方案 分存图像 XOR operation Secret sharing scheme Share image
  • 相关文献

参考文献4

  • 1Naor M,Shamir A.Visual cryptography[J].Lecture Notes in Computer Science,1995,950(01) 01-12.
  • 2WANG Dao-shun,ZHANG Lei,MA Ning,et al.Secret color images sharing schemes based on XOR operation[DB/OL].(2005),http://www.eprint.iacr.org.
  • 3谯伟,梁华庆,钮心忻.可视秘密分享技术的研究现状与发展[J].计算机应用研究,2006,23(5):10-12. 被引量:4
  • 4Nakajima M,Yamaguchi Y.Extended visual cryptography for natural images[J].Journal of WSCG,2002,10(02) 303-310.

二级参考文献15

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2Rijmen V, Preneel B. Efficient Color Visual Encryption for Shared Colors of Benetton. Berlin :Eurocrypto ' 96, Rump Session[ EB/OL].http://www.iacr. org/conferences/ec96/rump/preneel. ps.
  • 3张真诚,蔡垂雄,陈同孝.一种用来分享彩色秘密图像的技术[C].台中:第九届全国信息安全会议,2000.
  • 4Y C Hou. Visual Cryptography for Color Images[ J]. Pattern Recognition, 2003,36 : 1619-1629.
  • 5A Shamir. How to Share a Secret [ J ]. Communications of the ACM,1979,22 ( 11 ) :612-613.
  • 6Moni Naor,Adi Shamir. Visual Cryptography Ⅱ:Improving the Contrast via the Cover Base in Proc. of Security Protocols [ C ]. International Workshop 1996, Lecture Notes in Computer Science, No.1189, Springer-Verlag, 1997.69-74.
  • 7M Naor, A Shamir. Visual Cryptography [ C ]. Proceeding of Eurocrypt, Lecture Notes in Computer Science, LNCS 963, Berlin:Springer, 1994.1-11.
  • 8Ren-Junn Hwang. A Digital Image Copyright Protection Scheme Based on Visual Cryptography [ J ]. Tamkang Journal of Science and Engineering,2000, (3) :97-106.
  • 9Chin-Chen Chang. A New Scheme for Sharing Secret Color Images in Computer Network[ C]. IEEE,2000. 21-25.
  • 10林祝兴 李正隆 简睿成.应用视觉式秘密分享的安全线上交谈软件之制作[J].东海科学,1989,2(3):43-43.

共引文献3

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部