期刊文献+

基于随机栅格的异或区域递增式视觉密码方案 被引量:4

XOR-Based Region Incrementing Visual Cryptography Scheme by Random Grids
下载PDF
导出
摘要 针对现有区域递增式视觉密码方案仅局限于或运算,导致秘密图像中白像素无法被正确恢复的问题,给出了基于异或运算的区域递增式视觉密码的定义.通过迭代基于随机栅格的(k,k)单秘密视觉密码方案,利用0是异或{0,1}群中单位元的特性,设计了适用于异或运算的(k,n)单秘密方案的共享份生成算法,并构造了(k,n)区域递增式方案的秘密分享与恢复流程,分享过程中对于原像素s,依据s所在区域的密级,通过随机选取一个授权子集Q对s重新赋值,并利用(k,n)单秘密方案完成像素加密.恢复过程同一般视觉密码方案相同,最后对方案的有效性进行了理论证明.实验结果表明,该方案不仅实现了像素不扩展,且所有共享份叠加时白像素可以完美恢复. Considering the problem of the white pixels in secret images can not be correctly recovered,which is resulted by the OR operation confined in exiting region incrementing visual cryptography schemes,a novel definition of region incrementing visual cryptography based on XOR operation is proposed for the first time.By iterating random-grid-based(k,k)single-secret visual cryptography scheme and combing the property of 0as the generator of the {0,1}group,the shares generation algorithm of(k,n)single-secret-sharing scheme using XOR operation is designed,and the secret sharing and recovering procedures for region incrementing scheme are proposed further.For any original secret pixel s,according to the security level,s is reassigned associated with a randomly chosen qualified set Qin the sharing procedure,and then encoded by the proposed(k,n)single-secretsharing scheme.The recovering procedure is the same as that of the previous schemes.The effectiveness is theoretically verified at last.Experimental results show that the present scheme not only realizes no pixel expansion,but also can obtain the perfect recovery of white pixels when all the shares are stacked.
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第8期1857-1866,共10页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61070086) 信息保障技术重点实验室开放基金项目(KJ-13-107)~~
关键词 图像秘密共享 视觉密码 密级 区域递增式 随机栅格 异或 image secret sharing visual cryptography security level region increment random grid XOR
  • 相关文献

参考文献2

二级参考文献29

  • 1黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 2NAOR M, SHAMIR A. Visual cryptography[ A]. Advances in Cryptology-Eurocrypt ' 94, LNCS [ C J. Berlin: Springer-Verlag, 1995.950:1 -12.
  • 3ATENIF_,SE G, BLUNDO C, De SANTIS A, STINSON D R. Visual cryptography for general access structures [ J]. Informa-tion and Computation, 1996,129(2) :86-106.
  • 4HSU C S, TU S F, HOU Y C. An optimization model for visual cryptography schemes with unexpanded shares[ A] .Foundations of Intelligent Systems-16th Intemational Symposium, LNAI [ C ]. Berlin: Springer-Verlag, 2006.4203: 58 -67.
  • 5LIN S J, LIN J C, FANG W P. Visual Cryptography (VC) with non-expanded shadow images Hilbert-curve approach [A]. Proceeding on IEEE International Conference on Intelli-gence and Security Informatics[ C]. Taipei: IEEE, 2008. 271 -272.
  • 6YANGCN,CHENT S.Coloredvisual cryptography scheme based onaddifivecolormixing[J].PattemRecognifion,2008, 41(10):3114-3129.
  • 7NG F Y, WONG D S. On the security of a visual cryptography scheme for color images[ J]. Pattern Recognition,2009,42(5) : 929 -940.
  • 8YU B,XU X H,FANG L G.Multi-secret sharing threshold vi-sual cryptography scheme [ A ]. 2007 International Conference on Computational Intelligence and Security[ C]. Harbin: IEEE, 2007.815 -818.
  • 9CHEN L H,WU C C.A Study on Visual Cryptography[D]. Taipei:National Chiao Tung University, 1998.
  • 10HSU H C, CHEN T S, LIN Y H. Thc ring shadow image tcchnology of visual cryptography by applying diverse rotating angles to hide the secret sharing[ A]. Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control[ C]. Taipei: IEEE, 2004.996 -1001.

共引文献14

同被引文献10

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部