期刊文献+

基于半色调技术的(2,2)可视密码方案 被引量:1

(2,2)Visual Cryptography Schemes based Halftoning
下载PDF
导出
摘要 为解决传统可视密码像素膨胀及分存图像无意义等问题,提出一个基于半色调技术的(2,2)可视密码方案。方案中密图为黑白反色图像,利用半色调技术将一幅灰度图像处理后的半色调图像作为掩盖图像一,然后对其进行反色运算得到掩盖图像二,根据密图修改掩盖图像生成分存图像,叠加分存图像恢复密图。该方案符合可视密码解密简单的特性且分存图像有意义、没有引入任何像素膨胀。 Conventional Visual Cryptography Scheme suffers from complicated construction method,pixel expansion and meaningless share images.To resolve these problems,a(2,2) VCS with covert image based halftoning is introduced.In this scheme,the concealed secret image must be the special black-white image.Halftoning is used to convert a grey covert images to the first halftone covert images,then reversed it to get the second.Two share images will be attained by modifying the halftone covert images referring to the secret image. Stacking the two share images will reveal the secret image. Experiments have shown the proposed scheme absolutely accords with the merit of VCS that decoding is very easy. Furthermore, the construction method of the proposed scheme is simpler and the achieved shares are meaningful without any pixel expansion.
作者 牛冬梅
出处 《计算机安全》 2009年第9期53-54,共2页 Network & Computer Security
关键词 可视密码 可视密码方案 半色调技术 Visual cryptography Visual cryptography scheme Halftoning
  • 相关文献

参考文献4

二级参考文献26

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2M·Naor and A.Shamir.Visual cryptography.Advances in Cryptology EUROCRYPT'94,LNCS 950,P.112,1994.
  • 3A.Shamir.How to share a secret.Commun.ACN,22(11):612~613.1979.
  • 4H.Koga and H.Yamamoto.Proposal of a lattice.based visual secret sharing scheme for color and gray—scale image.IEICE Trans.Fundamentals,E81-A(6):1262~1269.June 1998.
  • 5Ryo ITO,Hidenofi KUWAKADO,and Hatsukazu.Image size invariant visual cryptography.IEICE Trans.Fundamentals,E82-A(10):2172~2177,Octobcr 1998.
  • 6Rijmen V, Preneel B. Efficient Color Visual Encryption for Shared Colors of Benetton. Berlin :Eurocrypto ' 96, Rump Session[ EB/OL].http://www.iacr. org/conferences/ec96/rump/preneel. ps.
  • 7张真诚,蔡垂雄,陈同孝.一种用来分享彩色秘密图像的技术[C].台中:第九届全国信息安全会议,2000.
  • 8Y C Hou. Visual Cryptography for Color Images[ J]. Pattern Recognition, 2003,36 : 1619-1629.
  • 9A Shamir. How to Share a Secret [ J ]. Communications of the ACM,1979,22 ( 11 ) :612-613.
  • 10Moni Naor,Adi Shamir. Visual Cryptography Ⅱ:Improving the Contrast via the Cover Base in Proc. of Security Protocols [ C ]. International Workshop 1996, Lecture Notes in Computer Science, No.1189, Springer-Verlag, 1997.69-74.

共引文献36

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部