期刊文献+

一种无损恢复的多级别的可视密码方案 被引量:4

Multi-level visual cryptography scheme with lossless recovery
下载PDF
导出
摘要 针对传统可视密码方案存在像素扩展且只能恢复一幅秘密图像的问题,提出无像素扩展的多秘密可视密码方案。基于随机栅格理论和异或运算对多个级别的秘密图像进行分存,对各个级别的分存图像进行异或即可依次恢复所有级别的秘密图像。可以实现二值秘密图像的无损恢复,并可扩展到灰度图像和彩色图像。图像传输引入纠错编码机制,提高方案的可靠性。实验结果表明分存图像没有像素扩展,恢复图像与原秘密图像相比无失真且能满足安全性要求。 Traditional visual cryptography schemes presented pixel expansion and could only share one secret image. This paper proposed a multi-level visual cryptography scheme without pixel expansion. The scheme processed multiple secret images based on random grids and XOR operation. Using XOR operation on each level could recovery all secrets respectively. It could realize lossless recovery of binary secret image,and could be extended to the gray image and color image. Image transfer process introduced error correction encoding mechanism to improve the reliability of the program. Simulation experiments demonstrate that the share images have no pixel expansion and the recovery images are the same as the original images. The analysis shows the scheme meets the security requirement.
出处 《计算机应用研究》 CSCD 北大核心 2017年第5期1540-1543,共4页 Application Research of Computers
基金 北京自然科学基金资助项目(4144084)
关键词 可视密码 多级别 无损恢复 随机栅格 异或运算 糾错编码 visual cryptography multi-level lossless recovery random grid XOR operation error correction coding
  • 相关文献

参考文献4

二级参考文献40

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2易枫,王道顺,罗平,戴一奇.两种新的彩色图像(n,n)分存方案[J].通信学报,2007,28(5):30-35. 被引量:6
  • 3NAOR M, SHAMIR A. Visual cryptography [ C]// Advances in Cryptology - Proceedings of Eurocypto'94, Lecture Notes in Computer Science, New York: Springer-Verlag, 1995, 950:1 - 12.
  • 4ATENIESE G, BLUNDO C, DE SANTS A, et al. Constructions and bounds for visual cryptography [ C ]//Proceedings of the 23^rd International Colloquium on Automata, Languages and Programming (ICALP'96). Berlin: Springer, 1996, 1099:416-428.
  • 5ATENIESE G, BLUNDO C, DE SANTS A, et al. Visual cryptography for general access structures [ J ]. Information and Computation, 1996, 129(2) : 86 - 106.
  • 6ATENIESE G, BLUNDO C, DE SANTS A, et al. Extended capabilities for visual cryptography [ J ]. Theoretical Computer Science, 2001, 250( 1 -2) : 143 -161.
  • 7FENG-HSING W, KANG K Y, LAKHMI C J, et al. Muhiuser-based shadow watermark extraction system [ J]. Information Science, 2007, 177 (12) : 2522 - 2532.
  • 8VIET D Q, KUROSAWA K. Almost ideal contrast visual cryptography with reversing [ C ]//In Proceeding of Topic in Cryptology-CT-RSA2004Lecture note in Computer Science. [ s.l.]. 2004, 2964 : 353 - 365.
  • 9NAOR M, SHAMIR A. Visual cryptography[C]//Advances in Cryptology-Eurocrypt’94. Berlin: Springer-Verlag, 1994:1-12.
  • 10ATENIESE G, CARLO B, SANTIS A D, et al. Visual cryptography for general access structures[J].Information and Computation, 1996,129(76):86-106.

共引文献15

同被引文献23

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部