期刊文献+

基于排列的(2,n)门限彩色视觉密码方案 被引量:1

(2,N) THRESHOLD COLOUR VISUAL CRYPTOGRAPHY SCHEME BASED ON PERMUTATION
下载PDF
导出
摘要 采用半色调技术与三基色原理,将半色调的彩色秘密图像的每个像素加密扩展为只有红、绿、蓝、黑四种像素组成的方块。每个方块中各个像素的比例值相同,但排列方式不同,依照此特点就可构造出关于(2,n)门限的彩色视觉密码方案。该方案保持了黑白视觉密码方案的优点,即加密与解密时无需复杂的运算,且在参与者较多的情况下,能较好地折衷像素扩展度和对比度,并保持外形比例不失真。 Based on halftone technology and trichromatic principle,every pixel of halftone colour secret image is encrypted and extended into a block composing of only four kinds of pixels: red,green,blue and black.Every block generated has the same pixel ratio but in different arrangement.In accordance with this characteristic,the(2,n) threshold colour visual cryptography scheme can be constructed.The new scheme keeps the advantage of the black-white visual cryptography,that is,no complex calculation is needed for encoding and decoding.And it can better settle the conflict between pixel extension and contrast and remain the configuration ratio undistorted,especially in the circumstances of more participants.
出处 《计算机应用与软件》 CSCD 2011年第8期289-292,共4页 Computer Applications and Software
关键词 半色调 三基色原理 视觉密码 Halftone Trichromatic principle Visual cryptography
  • 相关文献

参考文献6

  • 1郁滨,徐晓辉,房礼国.基于累积矩阵的可防欺骗视觉密码方案[J].电子与信息学报,2009,31(4):950-953. 被引量:7
  • 2郁滨,房礼国.外形比例不失真的可视门限方案的研究[J].计算机工程与设计,2006,27(11):1998-1999. 被引量:6
  • 3Carlo Blundo,Alfredo De Santis,Douglas R. Stinson.On the Contrast in Visual Cryptography Schemes[J]. Journal of Cryptology . 1999 (4)
  • 4Eric R. Verheul,Henk C. A. van Tilborg.Constructions and Properties of k out of n Visual Secret Sharing Schemes[J]. Designs, Codes and Cryptography . 1997 (2)
  • 5B Surekha,Dr GN Swamy,Dr K Srinivasa Rao,et al.A WatermarkingTechnique based on Visual Cryptography. Journal of InformationAssurance and Security . 2009
  • 6Y Hou.V isual C ryptography for Color Images. Pattern Recogn i-tion . 2003

二级参考文献20

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2郁滨,房礼国.外形比例不失真的可视门限方案的研究[J].计算机工程与设计,2006,27(11):1998-1999. 被引量:6
  • 3Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Blakley G R. Safeguarding cryptographic keys [C]. Proceedings of the National Computer Conference, 1979, 48: 242-268.
  • 5Naor M and Shamir A. Visual cryptography. Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science, 1995, Vol.950: 1-12.
  • 6徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.
  • 7Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharing threshold visual cryptography [C]. CIS Workshops 2007, Harbin, 2007: 815-818.
  • 8Ateniese G, Blundo C, De Santis A, and Stinson D R. Visual cryptography for general access structures. Information and Computation, 1996, 129: 86-106.
  • 9Ateniese G, Blundo C, De Santis A, and Stinson D R. Extended capabilities for visual cryptography. Theoretical Computer Science, 2001, 250: 143-161.
  • 10Moni Naor,Adi Shamir.Visual cryptography[C].Berlin:Springer Verlag,1995.1-12.

共引文献10

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部