期刊文献+

基于异或的(k,n)多秘密视觉密码 被引量:2

( k,n) Multi-secret Visual Cryptography Based on XOR
下载PDF
导出
摘要 在多个参与者之间分享多幅秘密图像时,为了解决像素扩展度和相对差随着秘密图像和参与者数量的增加而分别急剧扩大和减小的问题,本文从代数结构入手,结合异或运算和柱面共享份旋转操作,给出了一种多秘密视觉密码方案的定义,能够支持(k,n)门限结构下多个秘密的分享.以基于异或的单秘密视觉密码方案的基矩阵为加密单元,设计了多秘密分享与恢复流程,给出了一种实现方案.仿真实验结果表明:本方案不仅在多个共享份之间能够分享多幅秘密图像,而且减小了像素扩展度,提高了相对差. To solve the problem that the pixel expansion enlarges and contrast decreases rapidly along with increasing the secret images and participants when multiple participants share multiple secret images, starting with the algebraic structure, this paper gives a defini- tion of the multi-secret visual cryptography scheme with the operation XOR and cylinder share rotation, which supports sharing multi- ple secrets in the { k,n ) threshold structure. Regarding the basis matrices of XOR-based single secret sharing visual cryptography as the encryption unit, the procedures of multi-secret sharing and recovering are designed, furthermore, a scheme is realized. The exper- imental results show that the proposed scheme not only encrypts multiple secrets within multiple shares, but also improves the pixel expansion and the relative difference.
作者 沈刚 郁滨
机构地区 信息工程大学
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第9期2116-2119,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61070086)资助
关键词 视觉密码 多秘密 异或 柱面共享份 visual cryptography multi-secret XOR cylinder shares
  • 相关文献

参考文献1

二级参考文献16

  • 1Blakley G R. Safeguarding cryptographic keys[C]. Proceedings of the National Computer Conference, N J, USA, 1979, 48: 242-268.
  • 2Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 3Naor M and Shamir A. Visual cryptography[C]. Advances in Cryptology-Eurocrypt'94, Berlin, 1995, LNCS 950: 1-12.
  • 4Ateniese G, Blundo C, De Santis A, and Stinson D R. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
  • 5Tuyls P, Hollmann H D L, Lint J H V, and Tolhuizen L. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186.
  • 6Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]. 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006: 856-860.
  • 7Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. Visual Cryptography (VC) with non-expanded shadow images Hitbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.
  • 8Yang Ching-nung, Wang Chung-chun, and Chen Tse-shih. Visual cryptography schemes with reversing[J]. The Computer Journal, 2008, bxm118:1-13.
  • 9Lin Chang-chou and Tai Wen-hsiang. Visual cryptography for gray-level images by dithering techniques[J]. Pattern Recognition Letters, 2003, 24(1-3): 349-358.
  • 10Cimato S, De Prisco R, and De Santis A. Optimal colored threshold visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 35(3): 311-335.

共引文献9

同被引文献17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部