期刊文献+

多重门限的图像秘密共享方案 被引量:8

Multi-Threshold Image Secret Sharing Scheme
下载PDF
导出
摘要 针对传统的基于视觉密码的图像秘密共享方案存在像素扩张导致其只能共享小尺寸的秘密图像、信息隐藏效率较低的问题,提出一种能够提高信息隐藏容量的(t,k,n)多重门限图像秘密共享方案.该方案利用秘密图像信息控制视觉密码方案中共享矩阵的选取,从而实现秘密图像在视觉密码方案中的隐藏.在秘密图像恢复的第一阶段,任意t个参与者直接叠加其影子图像后可以视觉解密出低质量的秘密图像信息;在第二阶段,任意k个参与者可以从影子图像中提取出隐藏的信息,并通过计算恢复出精确的灰度秘密图像.相对于传统的视觉密码方案,本文方案在不影响视觉密码恢复图像的视觉质量前提下,可以隐藏更多的秘密图像信息,而像素扩张尺寸较小. From the point of view of information hiding,traditional visual cryptography scheme(VCS) is not an efficient method.It can only share a small sized secret image due to the large pixel expansion.A(t,k,n) multi-threshold image secret sharing scheme is proposed to increase the amount of hidden information.A grayscale secret image is hidden in a VCS to guide the choice of share matrices.In the first phase of the reconstruction process,any t participants can stack their shadow images to decode a vague secret image by human visual system.In the second phase,any k participants can extract additional information hidden in their shadow images,and reveal a precise grayscale secret image by computation.Compared with the traditional VCS,the proposed scheme can hide more information of the grayscale secret image,and has smaller size expansion without deteriorating the visual quality of the revealed image of VCS.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第3期518-524,共7页 Acta Electronica Sinica
基金 国家自然科学基金(No.60903210)
关键词 信息隐藏 图像秘密共享 视觉密码 多重门限方案 information hiding image secret sharing visual cryptography multi-threshold scheme
  • 相关文献

参考文献23

  • 1NAOR M,SHAMIR A.Visual cryptography[A].Advances inCryptology-Eurocryp’t94(LNCS 950)[C].Berlin:Springer-Verlag,1995.1-12.
  • 2BLUNDO C,CIMATO S,et al.Visual cryptography schemeswith optimal pixel expansion[J].Theoretical Computer Sc-ience,2006,369(1):169-182.
  • 3DROSTE S.New results on visual cryptography[A].Advancesin Cryptology-Crypto’96(LNCS 1109)[C].Berlin:Springer-Verlag,1996.401-415.
  • 4YANG C N.New visual secret sharing schemes using proba-bilistic method[J].Pattern Recognition Letters,2004,25(4):481-494.
  • 5ITO R,KUWAKADO H,et al.Image size invariant visualcryptography[J].IEICE Transactions on Fundamentals,1999,E82-A(10):2172-2177.
  • 6BLUNDO C,BONIS A D,SANTIS A D.Improved schemesfor visual cryptography[J].Designs,Codes and Cryptography,2001,24(3):255-278.
  • 7BLUNDO C,ARCO P D’,et al.Contrast optimal threshold v-isual cryptography schemes[J].SIAM Journal on DiscreteMathematics,2003,16(2):224-261.
  • 8KRAUSE M,SIMON H U.Determining the optimal contrastfor secret sharing schemes in visual cryptography[J].Combina-torics,Probability and Computing,2003,12(3):285-299.
  • 9CIMATO S,SANTIS A D,et al.Ideal contrast visual cryptog-raphy schemes with reversing[J].Information Processing Let-ters,2005,93(4):199-206.
  • 10黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7

二级参考文献38

  • 1黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 2YI Feng WANG Daoshun LUO Ping HUANG Liansheng DAI Yiqi.Multi secret image color visual cryptography schemes for general access structures[J].Progress in Natural Science:Materials International,2006,16(4):431-436. 被引量:3
  • 3Naor M, Shamir A. Visual cryptography [ A ]. Advances in Cryptology-Eurocrypt' 94 ( LNCS 950) [ C ]. Berlin: SpringerVerlag, 1995.1 - 12.
  • 4Ateniese G,Blundo C,De Santis A,Stinson D R. Extended capabilities for visual cryptography[ J]. Theoretical Computer Science,2001,250(1 - 2) :143 - 161.
  • 5Blundo C,De Santis A, Stinson D R. On the contrast in visual cryptography schemes [ J ]. Journal of Cryptology, 1999,12 (4) : 261 - 289.
  • 6Kuhlmann C, Simon H U. Construction of visual secret sharing schemes with almost optimal contrast[ A ]. Proceedings of the llth Annual ACM-SIAM Symposium on Discrete Algorithms [C]. Philadelphia: Society for Industrial and Applied Mathematics,2000.263- 272.
  • 7Eisen P A, Stinson D R. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[ J ]. Designs, Codes and Cryptography, 2002,25( 1 ) : 15 - 61.
  • 8Viet D Q, Kurosawa K. Almost ideal contrast visual cryptography with reversing [ A ]. Proceeding of Topics in CryptologyCT-RSA2004(LNCS 2964) [ C]. Berlin: Springer-Verlag, 2004. 353 - 365.
  • 9Cimato S,De Santis A, Ferrara A L,Masucci B. Ideal contrast visual cryptography schemes with reversing [ J ]. Informatioll Processing Letters,2005,93(4) : 199 - 206.
  • 10Yang C N,Wang C C, Chen T S. Real perfect contrast visual secret sharing schemes with reversing [ A ]. Lecture Note in Computer Science 3989[ C ]. Berlin: Springer-Verlag, 2006.433 - 447.

共引文献19

同被引文献77

  • 1Naor M, Shamir A. Visual cryptography[M] //Lecture Notes inComputer Science. Heidelberg: Springer, 1995, 950: 1-12.
  • 2Droste S. New results on visual cryptography[M] //LectureNotes in Computer Science. Heidelberg: Springer, 1996, 1109:401-415.
  • 3Yang C N, Wang D S. Property analysis of XOR based visualcryptography[J]. IEEE Transactions on Circuits and Systemsfor Video Technology, 2014, 24(2): 189-197.
  • 4Wu X T, Sun W. Random grid-based visual secret sharing withabilities of OR and XOR decryptions[J]. The Journal of VisualCommunication and Image Representation, 2013, 24(1): 48-62.
  • 5Liu F, Wu C, Lin X. Cheating immune visual cryptographyscheme[J]. IET Information Security, 2011, 5(1): 51-59.
  • 6Ateniese G, Blundo C, Santis A D, et al. Visual cryptographyfor general access structures[J]. Information and Computation,1996, 129(2): 86-106.
  • 7Ito R, Kuwakado H, Tanaka H. Image size invariant visualcryptography[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Science, 1999,E82-A(10): 2172–2177.
  • 8Shyu S J, Chen M C. Optimum pixel expansions for thresholdvisual secret sharing schemes[J]. IEEE Transactions on InformationForensics and Security, 2011, 6(3): 960-969.
  • 9Liu F, Wu C, Lin X J. Step construction of visual cryptographyschemes[J]. IEEE Transactions on Information Forensics andSecurity, 2010, 5(1): 27-38.
  • 10Wu X T, Sun W. Improving the visual quality of randomgrid-based visual secret sharing[J]. Signal Processing, 2013,93(5): 977-995.

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部