期刊文献+

基于迭代算法的可验证视觉密码 被引量:5

Verifiable Visual Cryptography Based on Iterative Algorithm
下载PDF
导出
摘要 通过改变验证图像的分享和恢复方式,该文提出了一种基于迭代算法的可验证视觉密码方案。该方案设计专用算法分享验证图像,利用算法的迭代优化验证过程,不仅大幅减小了像素扩展度,而且显著提高了验证效率。同时,通过引入异或操作实现了验证图像的完全恢复。 By changing sharing and recovering ways of the verification image,a verifiable Visual Cryptography Scheme(VCS) based on iterative algorithm is proposed in this paper.Since the verification image is shared with special algorithms,and the verification process is optimized through iterative algorithm,the proposed scheme not only makes the pixel expansion much smaller,but also improves the checking efficiency greatly.Furthermore,verification images are perfectly recovered by the XOR operation introduced.
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第1期163-167,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61070086) 河南省科技创新杰出青年基金(094100510002)资助课题
关键词 视觉密码 可验证 防欺骗 像素扩展度 Visual cryptography Verifiable Cheating prevention Pixel expansion
  • 相关文献

参考文献20

  • 1Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 2Blakley G R. Safeguarding cryptographic keys[C]. Proceedings of the National Computer Conference, N J, USA, 1979, 48:242 -268.
  • 3Naor M and Shamir A. Visual cryptography[C]. Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science, 1995, 950: 1-12.
  • 4Ateniese G, Carlo B, and Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
  • 5Steve L, Daniel M, and Rafall O. Visual Cryptography on Graphs[C]. COCOON 2008, LNCS 5092: 225-234.
  • 6Boundo C, Santis A D, and Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptography, 1999, 12(4): 261-289.
  • 7Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]. 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006: 856-860.
  • 8Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. Visual Cryptography (VC) with non-expanded shadow images Hilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.
  • 9Cimato S, De Prisco R, and De Santis A. Optimal colored threshold visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 35(3): 311-335.
  • 10Yang Ching-nung and Chen Tse-shih. Colored visual cryptography scheme based on additive color mixing[J]. Pattern Recognition, 2008, 41(10): 3114-3129.

二级参考文献6

  • 1Naor M, Shamir A. Visual Cryptography. Advances in Cryptology EUROCRYPT94' LNSC 950, 1994: 112.
  • 2Shamir A. How to Share a Secret. Commun.ACM, 1979,22(11):612-613.
  • 3Ateniese G, Blundo C, Santis A D,et al. Visual Cryptography for General Access Structures. Electronic Colloquium on Computational Complexity(ECCC), 1996, 3(012).
  • 4Biehl SWI. Traceable Visual Cryptography. ICICS 1997, 1997:61-71.
  • 5Koga H, Yamamoto H. Proposal of a Lattice-based Visual Secret Sharing Scheme for Color and Gray-scale Image. IEICE Trans.Fundamentals, 1998-06:1262-1269.
  • 6Gennaro R, Micali S.Verifiable Secret Sharing as Secure Computation.Lecture Notes in Computer Science, 1995:168?A?A.

共引文献16

同被引文献54

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2易枫,王道顺,戴一奇.彩色图像的可视分存方案[J].计算机辅助设计与图形学学报,2006,18(11):1770-1775. 被引量:3
  • 3NAOR M, SHAMIR A. Visual cryptography[C]//Preproceeding of Eurocrypt,94, 1994 ; 1 - 12.
  • 4ATENIES G,CARLO B, SANTIS A D, et al. Visual cryptography for general access structures[J]. Inf Comput, 1996,129(2) :86 - 106.
  • 5STEVE L,DANIEL M, RAFAIL O. Visual cryptography on graphs[C]//COCOON, 2008,225 - 234.
  • 6BOUNDO C, SANTIS A D, STINSON D R. On the contrast in visual cryptography schemes[J]. J Crypto, 1999,12 (4) : 261-289.
  • 7FANG Liguo, YU Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]//lst International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006:856 - 860.
  • 8LIN S, LIN J, FANG WenpirL Visual cryptography (VC) with non-expanded shadow images Hilbert-curve approach [C]// ISI2008, Taipei, 2008:271- 272.
  • 9CIMATO S,PRISCO R D, SANTIS A D. Optimal colored threshold visual cryptography schemes[J]. Codes and Cryptography, 2005,35(3) : 311 - 335.
  • 10YANG C,CHEN T. Colored visual cryptography scheme based on additive color mixing[J]. Pattern Recognition, 2008,41(10) :3114 - 3129.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部