期刊文献+

单对基础矩阵的延拓型视觉密码构造方法

The Model of Extended Visual Eryptography Echemes That Use Only a pair of Basic Matrixes
原文传递
导出
摘要 本文概括总结了Atenies-Blundo-Santis-Stinson延拓型视觉密码模型,讨论了使用单对基础矩阵的门限模型及一般访问结构模型,研究了使用单对基础矩阵的延拓型视觉密码模型及构造方法,提出了基于并置矩阵的延拓性门限及一般访问结构视觉密码的构造方法。 It summarized Atenies-Blundo-Santis-Stinson Continuation type visual cryptography model,discussed the threshold model basic matrix and the general visit structure model,the model of extended visual cryptography schemes that use only a pair of basic matrixes is researched and the constructing method is presented.put forward basing on the matrix and buy the continuation of threshold and general visit structure the constructive method of visual cryptography,
作者 武莉 武文斌
出处 《网络安全技术与应用》 2012年第6期57-59,28,共4页 Network Security Technology & Application
关键词 视觉密码 构造模型 基础矩阵 访问结构 Visual Cryptography Constructing Model Basic Matrix Access Structure
  • 相关文献

参考文献8

  • 1颜浩,甘志,陈克非.可防止欺骗的可视密码分享方案[J].上海交通大学学报,2004,38(1):107-110. 被引量:16
  • 2王道顺,杨路.图像的单幅可视隐藏方案[J].计算机学报,2000,23(9):943-948. 被引量:16
  • 3Y.Suga,K.lwamura,K.Sakurai,H.lmai.Extended Graph-type Visual Secret Sharing Schemes with Embedded Plural Images.lnfo.Process.Soc.J pn.J.2001.
  • 4M.lwamoto,H.Yamamoto.The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-scale Images.IEICE Transaction on Fundamentals.2002.
  • 5W.G.Tzeng, C.M.Hu.A New Approach for Visual Cryptography. Designs.Codes and Cryptography.2002.
  • 6D.Q.Viet,K.Kurosawa.Almost Ideal Contrast Visual Cryptography with Reversing.LNCS 2964.2004.
  • 7D.Jin,W.Q.Yan,M.S.Kankanhalli.Progressive Color Visual Cryptography.SPIE Journal of Electronic Imaging.2005.
  • 8马洁,张元清.一种基于分段线性映射的分组密码算法[J].计算机科学,2009,36(9):103-105. 被引量:2

二级参考文献33

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2顾恒 常宝珠 等.CO2激光与疣复消联合应用治疗尖锐湿疣[J].江苏医药,1997,23:82-84.
  • 3崔勇志,张玲华,陆景明.中药鸦胆子油乳剂对人卵巢癌细胞株CAOV_3的毒性作用[J].中国医科大学学报,1997,26(1):82-84. 被引量:34
  • 4Yang H,et al.A new block cipher based on chaotic map and group theory[J].Chaos,Solitons & Fractals,2005(10):10-16.
  • 5Tang G,Liao X F.A method for designing dynamical S-boxes based on discretized chaotic map[J].Chaos,Solitons & Fratals,2005,23:1901-1909.
  • 6Xun Yi,Chik How Tan,Chee Kheong Siew.A New Block Cipher Based on Chaotic Tent Maps[J].IEEE Trans.Circuits and Systems,2002,49 (12):1826-1829.
  • 7Jakimoski G,Kocarev L.Chaos and cryptography:Block encryption ciphers based on chaotic maps[J].IEEE Trans.Circuits Syst,2001,48(2):163-169.
  • 8Stojanovski T,Kocarev L.Chaos-based random number generators-Part Ⅰ:Analysis[J].IEEE Trans.Circuits Syst,2001,48(3):281-288.
  • 9Stojanovski T,Kocarev L.Chaos-based random number generators-Part Ⅱ:Practical realization[J].IEEE Trans.Circuits Syst,2001,48(3):382-385.
  • 10Wong W K,Lee L P,Wong K W.A modified chaotic cryptographic method[J].Comput Phys Commun,2000,138:234-236.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部