期刊文献+

一种无损多秘密分享视觉密码方案 被引量:6

A Lossless Multi-secret Sharing Visual Cryptography Scheme
下载PDF
导出
摘要 针对分享多幅秘密图像存在信息损失的问题,该文给出(n,n)无损多秘密分享视觉密码的定义,在此基础上基于环状共享份设计了一种(n,n)多秘密视觉密码方案,使秘密图像的信息损失为零。实验结果表明,该方案不仅实现了在多个参与者之间分享多幅秘密图像,而且秘密图像能够完全恢复。 Considering the information loss during sharing multiple secrets, a definition of (n, n) lossless multi- secret sharing visual cryptography is proposed. In addition, based on ring shares, an (n, n) multi-secret visual cryptography scheme, which shares secret images with no information loss, is designed. The experimental results show that in this scheme, not only multiple participants can share multiple secret images, but also secret images can be reconstructed perfectly.
机构地区 信息工程大学
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第12期2885-2890,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61070086)资助课题
关键词 视觉密码 多秘密 无损 完全恢复 Visual cryptography Multi-secret Lossless Perfect reconstruction
  • 相关文献

参考文献14

  • 1Naor M and Shamir A. Visual cryptography[C]. Advances in Cryptology-Eurocrypt'94, Berlin, 1995, LNCS 950: 1-12.
  • 2Ateniese G, Blundo C, De Santis A, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
  • 3Fang Li-guo and Yu Bin. Research on pixel expansion of (2, visual threshold scheme[C]. 1st International Symposium o~ Pervasive Computing and Applications Proceeding1 (SPCA06), Ningbo, 2006: 856-860. |.
  • 4Lin S J, Chen S K, and Lin J C. Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion[J]. Journal of Visual Communication Image Representation, 2010, 21(8): 900-916.
  • 5Lee K H and Chin P L. A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images[J]. Optics Communications, 2011, 284(12): 2730-2741.
  • 6Yang C N and Chung T H. A general multi-secret visual cryptography scheme[J]. Optics Communications, 2010,283(24): 4949-4962.
  • 7付正欣,郁滨,房礼国.一种新的多秘密分享视觉密码[J].电子学报,2011,39(3):714-718. 被引量:13
  • 8Wu C C and Chen L H. A study on visual cryptography[D]. [Master dissertation], National Chiao Tung University, Taipei, 1998.
  • 9Shyu S J and Chen K. Visual multiple secret sharing based upon turning and flipping[J]. Information Sciences, 2011, 181(15): 3246-3266.
  • 10Wu H C and Chang C C. Sharing visual multi-secrets using circle shares[J]. Computer Standards ~z Interfaces, 2005, 134(28): 123-135.

二级参考文献27

  • 1黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 2Blakley G R. Safeguarding cryptographic keys[C]. Proceedings of the National Computer Conference, N J, USA, 1979, 48: 242-268.
  • 3Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4Naor M and Shamir A. Visual cryptography[C]. Advances in Cryptology-Eurocrypt'94, Berlin, 1995, LNCS 950: 1-12.
  • 5Ateniese G, Blundo C, De Santis A, and Stinson D R. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
  • 6Tuyls P, Hollmann H D L, Lint J H V, and Tolhuizen L. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186.
  • 7Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]. 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006: 856-860.
  • 8Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. Visual Cryptography (VC) with non-expanded shadow images Hitbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.
  • 9Yang Ching-nung, Wang Chung-chun, and Chen Tse-shih. Visual cryptography schemes with reversing[J]. The Computer Journal, 2008, bxm118:1-13.
  • 10Lin Chang-chou and Tai Wen-hsiang. Visual cryptography for gray-level images by dithering techniques[J]. Pattern Recognition Letters, 2003, 24(1-3): 349-358.

共引文献18

同被引文献61

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部