期刊文献+

异或视觉密码方案目标优化研究 被引量:3

XOR visual cryptography based on optimization model
下载PDF
导出
摘要 通过建立群结构的视觉密码目标优化模型,设计了一种基于异或的(k,n)门限方案。该方案将基础矩阵构造问题转换为共享份中出现黑白像素概率的求解问题,通过概率矩阵对加密规则进行选择得到共享份。实验结果表明,该方案在像素不扩展的同时,使相对差大幅改善。 By constructing the optimization model for visual cryptography based on group structure,designed a XOR-based threshold scheme.In this scheme,translated the problem of basic matrix construction to evaluation of probability,and generated the shares by choosing encryption rule with probability-matrix.The scheme not only improves the contrast greatly,but also has no pixel expansion.
出处 《计算机应用研究》 CSCD 北大核心 2011年第8期3043-3045,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61070086) 河南省杰出青年科学基金资助项目(094100510002)
关键词 视觉密码 目标优化 异或运算 不扩展 visual cryptography optimization XOR no pixel expansion
  • 相关文献

参考文献15

  • 1NAOR M, SHAMIR A. Visual cryptography [ C ]// Advances in Cryptology-Eurocrypt' 94, LNCS, vo1950. Berlin: Springer-Verlag, 1994: 1-12.
  • 2BLUNDO C,De SANTIS A, STINSON R D. On the contrast in visual cryptography schemes [ J ]. Journal of Cryptology, 1996, 12:261- 289.
  • 3DROSTE S. New results on visual cryptography [ C ]// Advances in Cryptography-CRYPTO' 96,Lecture Notes in Computer Science. Berlin : Springer-Verlag, 1996 : 401-415.
  • 4房礼国,郁滨.一种基于排列的(2,n)可视门限方案[J].计算机工程,2007,33(9):157-159. 被引量:5
  • 5HSU C S, TU S F, HOU Y C. An optimization model for visual cryptography schemes with unexpanded shares [ C ]//Lecture Notes in Conputer Science,vol 4203. Berlin: Springer-Verlag, 2006: 58-67.
  • 6TUYLS P, HOLLMANN H D L, LINTJ H V, et al. XOR-based visual cryptography schemes [ J ]. Designs, Codes and Cryptography, 2005, 37: 169-186.
  • 7FANG L G, YU B. Research on pixel expansion of (2, rt) visual threshold scheme [ C ]//Prot of the 1st Intemational Symposium on Pervasive Computing and Applications. 2006 : 856- 860.
  • 8LIN S J, LIN J, FANG W P. Visual cryptography (VC) with non-expanded shadow images Hilbert-curve approach [ C ] Proc of IEEE International Conference on Intelligence and Security Informatics. 2008 : 271 - 272.
  • 9ATENIESE G, CARLO B, SANTIS A D, et al. Visual cryptography for general access structures[ J]. information and Computation, 1996, 129(76): 86-106.
  • 10黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7

二级参考文献35

  • 1[1]Naor M, Shamir A. Visual cryptography[J]. Lecture Notes in Computer Science, 1995, 950(1):1-12.
  • 2[2]Shamir A. How to share a secret[J].Communications of the ACM, 1979, 22(11):612-613.
  • 3[3]Ateniese G, Blundo G, Santis A D, et al. Visual cryptography for general access structures[J]. Electronic Colloquium on Computational Complexity,1996, 129(2):86-106.
  • 4[4]Koga H, Yamamoto H. Proposal of a lattice-based visual secret sharing scheme for color and gray-scale image[J]. IEICE Transaction on Fundamentals, 1998,E81-A(6): 1262- 1269.
  • 5[5]Santis A D, Blundo C, Arco P D, et al. Contrast optimal threshold visual cryptography schemes [J].SIAM Journal on Discrete Mathematics, 1998, 16(2) :224-261.
  • 6[6]Blundo C, Santis A D, Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptology, 1999, 12(4):261-289.
  • 7[7]Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography[J]. IEICE Transactions on Funcamentals of Electronics, 1999, E82-A (10): 2172 -2177.
  • 8[8]Biehl I, Wetzel S. Traceable visual cryptography[J].Proceedings of the First International Conference on Information and Communication Security, 1997,LNCS1334 (3): 61 - 71.
  • 9[9]Ateniese G, Blundo C, Santis A D, et al. Extended capabilities for visual cryptography [J]. Theoretical Computer Science, 2001, 250(1- 2): 143- 161.
  • 10Blakley G R.Safeguarding cryptographic keys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,1979,48.313-317.

共引文献25

同被引文献30

  • 1Naor M, Shamir A. Visual cryptography [ C ]//Advances in Cryptology-Eurocrypt' 94. Berlin : Springer-Verlag, 1995, 950 : 1- 12.
  • 2Fang Li-guo, Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[ C ]//1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06). 2006: 856-860.
  • 3Hsu C, Tu S, Hou Y. An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares [ C ]//ISMIS 2006. 2006 : 58-67.
  • 4Viet D Q, Kurosawa K. Almost ideal contrast visual cryptography with reversing[ C ]//Lecture Notes in Computer Science 2004, 2964:353-365.
  • 5Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, et al. Ideal contrast visual cryptography schemes with reversing[ J ] Information Processing Letters, 2005, 93 : 199-206.
  • 6Tuyls P, Hollmann H D L, Lint J H V, et al. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptogra- phy, 2005, 37(1): 169-186.
  • 7Chi Ming Hu, Wen-Guey Tzeng. Compatible Ideal Contrast Visual Cryptography Schemes with Reversing [ C ]//ISC2005. 2005 : 300-313.
  • 8Ng F Y, Wong D S. On the security of a visual cryptography scheme for color images [ J ]. Pattern Recognition, 2009, 42 (5) : 929-940.
  • 9Hossein Hajiabolhassan A C. Bounds for visual cryptography schemes [ J]. Discrete Applied Mathematics, 2010, 158 (6) 659-665.
  • 10Priseo R D, Santis A D. Using eolors to improve visual cryptography for black and white images[ C ]//ICITS 2011. 2011 182-201.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部