期刊文献+

基于视觉密码和QR码的两级信息管理方案 被引量:2

Two-level information management scheme based on visual cryptography and QR code
下载PDF
导出
摘要 设计了一种新的扩展多秘密视觉密码,能够分享n个公开信息和n-1个隐私信息,其像素扩展度为4且相对差为1/4。在此基础上,结合QR码提出了一种两级信息管理方案,其中一般参与者的共享份可以呈现参与者公开信息的QR码,而且管理者的共享份与一般共享份叠加后,可以呈现参与者隐私信息的QR码。实验结果表明,公开信息和隐私信息的QR码尽管存在失真,仍可以被正确识别。 This paper designed a new extended multi-secret visual cryptography scheme (EMVCS), which could share n pub- lic information and n -1 private information. The pixel expansion of EMVCS was 4, and the relative difference was 1/4. Fur- thermore, it proposed a new two-level information management scheme based on EMVCS and QR code, in which the common participants' shares could display public information QR code. Meanwhile,the private information QR code of common partici- pants would be shown by stacking the share of manager and common participant. The experimental results demonstrate that the distorted QR codes of public and private information can be recognized correctly.
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3460-3463,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61070086 61602513) 信息保障技术重点实验室开放基金资助项目(KJ-13-107)
关键词 视觉密码 QR码 信息管理 扩展多秘密 visual cryptography QR code information management extended multi-secret
  • 相关文献

参考文献14

  • 1Naor M, Shamir A. Visual cryptography[ C ]//Advances in Cryptology- Em'ocrypt. Berlin : Springer-Verlag, 1994 : 1-12.
  • 2Ateniese G,Carlo B,Santis A D,et al. Visual c~ptography for general access structures [ J ]. information and Computation, 1996, 129 (76) :86- 106.
  • 3Liu F,Wu C,Lin X. Step construction of visual cryptography schemes [J]. IEEE Yrans on Information Forensics and Security,2010,5 (1) :27-38.
  • 4Leung B W, Ng F Y, Wong D S. On the security of a visual cryptogra- phy scheme fi*r color images [ J ]. Pattern Recognition, 2009,42 (5) :929-940.
  • 5Shyong J S. Visual cryptograms of random grids for tllreshold access structures [ J ]. Theoretical Computer Science, 2015,565 ( C ) : 30- 49.
  • 6Revenkar P S, Revenkar P S, Gandhare W Z. Secure iris authentica- tion using visual cryptography [ J ]. International ,Journal of Comput- er Science and Information Security,2010,7(3 ) :217-221.
  • 7Rosking J A,Emigh A T. Visual cryptography and voting technology using a pair of enhanced contrast glyphs in overlay: USA, US 7,667, 871 BI [P].2010..
  • 8Chan C W, Lin C H. A new credit card payment scheme using mobile phones based on visual cryptography [ C ]//Proc of ISI Workshops. Berlin : Springer-Verlag,2008:467-476.
  • 9Yamamoto H, Hayasaki Y, Nishida N. Securing display of gray.scale and muhicolored images by use of visual cryptography [ C ]//Proc of SPIE, IS&T Electronic Imaging. 2004 : 714-716.
  • 10Lou D,Tso H,Liu J. A copyrigbt protection scheme for digital images using visual cl.'yptography technique[ J ]. Computer Standards & In- terfaces,2007,29( 1 ) :125-131.

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部