期刊文献+

基于马赛克技术的秘密图像共享

Secret Image Sharing Based on the Mosaic Technique
下载PDF
导出
摘要 在传统的秘密图像共享算法中,通常产生类似噪声的影子图像,极易引起攻击者的注意。针对这一问题,文中根据马赛克技术提出了一种产生有意义的影子图像算法。通过图像相似度的比较,可将秘密图像共享到载体图像中,得到含有秘密图像信息的马赛克图像。然后采用可逆信息隐藏的技术将图像块的位置序列隐藏到马赛克图像中,得到完整的影子图像。通过文中所提算法产生的影子图像,既可避免攻击者的注意又能恢复出无损的秘密图像。 The traditional method of the secret image sharing generates the noise-like image, which can attract the hacker's attention easily. To solve this problem, a method of creating the meaningful share image is proposed in this paper. Comparing similarity of the images, we obtain the mosaic images sharing the secret image into the target images. Then, the complete shadow images can be generated after hiding the posit'ion sequence of the image blocks into the mosaic images by the reversible information hiding technology. The shadow images obtained by the proposed scheme can avoid the attention of the attacker as well as restore the lossless secret image.
出处 《电子科技》 2015年第11期166-169,共4页 Electronic Science and Technology
关键词 秘密图像共享 马赛克技术 直方图平移 可逆信息隐藏 secret image sharing mosaic technology histogram moving reversible intformation hiding
  • 相关文献

参考文献13

  • 1Ma K,Zhang W,Zhao X,et al. Reversible data hiding in en- crypted images by reserving room before encryption [ J]. IEEE Transactions on Information Forensics and Security, 2013,8(3) :553 -562.
  • 2Qian Z X,Zhang X P,Wang S Z. Reversible data hiding in encrypted JPEG bitstream [J]. IEEE Transactions on Multi- media,2014,16(5 ) : 1486 - 1491.
  • 3Wu H T,Dugelay J L,Shi Y Q. Reversible image data hiding with contrast enhancement [ J]. IEEE Signal Processing Let- ters,2015,22( 1 ) :81 - 85.
  • 4Li X L, Zhang W M, Gui X L, et al. A novel reversible data hiding scheme based on two - dimensional difference - histo- gram modification [ J ]. IEEE Transactions on Information Fo- rensics and Security ,2013,8 ( 7 ) : 1091 - 1100.
  • 5Lai I J,Tsai W H. Secret -fragment -visible mosaic image - a new computer art and its application to information hiding [ J ]. IEEE Transactions on Information Forensics and Securi- ty, 2011,6 ( 3 ) : 936 - 945.
  • 6Lee Y L,Tsai W H. A new (k,n) secure image transmission technique via secret - fragment - visible mosaic images by nearly reversible color transformations [J]. IEEE Transac- tions on Circuits and Systems for Video Technology,2014,24 (4) :695 -703.
  • 7Bhattacharjee T, Singh J P, Bhattacharya S. 2012, A ( n, n) secret image sharing scheme based on array scrambling [ C ]. Kolkata: 2012 Third International Conference on Emerging Applications of Information Technology,2012.
  • 8Yang C N,Chang W J,Cai S,et al. 2014,Secret image sha- ring without keeping permutation key [ C]. Nanjing, China: International Conference on Information and Communications Technologies,2014.
  • 9Nag A,Biswas S,Sarkar D,et al. A new verifiable secret im- age sharing scheme [ J]. Egyptian Informatics Journal,2014, 15(3) :201 -209.
  • 10Li P,Yang C N, Wu C C,et al. Essential secret image sharing scheme with different importance of shadows [ J]. Journal of Visual Communication and Image Representation, 2013,24 (7) :1106 -1114.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部