期刊文献+

可视加密在图书版权保护与增值服务方面的应用研究 被引量:1

Visual Cryptography in Books and Application Research on Copyright Protection and Value-added Services
下载PDF
导出
摘要 可视加密的基本思想是把密文信息分解成为多个部分,这些部分被称为可视密码的共享信息。自从可视加密算法出现,就被运用到各种领域,从而使可视加密的方法得到完善。给出一种基于网点位置的二进制相位调制(2PSK)和光栅的光学特性相结合的信息植入方法,来实现可视加密。其利用一个和载体图像相同频率的光栅片叠加产生莫尔条纹,该方法能够通过莫尔现象的性质和印刷加网技术的特性来实现信息的解码。由于利用可视加密的信息隐藏和显现,可减少对设备的依赖性并降低防伪成本。在图书版权保护方面,采用这种方法能有效的解决盗版侵权问题,同时也给图书提供了增值性服务,获得相应的图书增值效果。 The basic idea of Visual Cryptography( VC) is to divide a secret image into several partitions which are called VC share. Various categories of VC schemes have been developed to enhance the maturity of VC since its emergence. In this paper,we present a method of information embedding based on the position of the binary phase modulation( 2PSK)and the optical characteristics of the grating to achieve visual encryption. This method is based on the superposition of a grating with the same frequency as the carrier image to generate moire fringe which can be used to realize the decoding of information by the nature of moire phenomenon and the characteristics of the printing and halfton technique. Due to the use of visual encryption of information hiding and display,we can reduce the dependence on the device and reduce the cost of security. This method can effectively solve the problem of piracy,but also provide value-added services to books,access to the corresponding value-added effect of the book.
出处 《北京印刷学院学报》 2017年第2期26-29,共4页 Journal of Beijing Institute of Graphic Communication
基金 国家自然科学基金面上项目(61370140) 北京市科技专项(Z161100005016007)
关键词 可视加密 二进制相位调制 信息隐藏 光栅 visual cryptography 2PSK information hiding grating
  • 相关文献

参考文献4

二级参考文献32

  • 1刘真,任乐义.基于加网复制的光栅防伪技术研究[J].中国印刷与包装研究,2010,2(S1):153-156. 被引量:13
  • 2刘昕,马金涛.基于嵌入式小波编码的印刷图文防伪算法研究[J].西安理工大学学报,2004,20(3):268-271. 被引量:1
  • 3徐海英,缪长宗,陈慧琴.莫尔条纹应用的初探[J].南京工程学院学报(自然科学版),2006,4(1):60-65. 被引量:19
  • 4Adi S.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 5Steven R.Coding and Information Theory[M].Berlin:Springer-Verlag,1998.
  • 6Moni N,Adi S.Visual Cryptography[C]//Proc.of Advances in Cryptology Eurocrypt.1995.
  • 7Ateniese G,Blundo C,De Santis A.Visual Cryptography for General Access Structures[J].Information and Computation,1996,129(2):86-106.
  • 8Ateniese G,Blundo C,De Santis A.Constructions and Bounds for Visual Cryptography[C]//Proc.of the 23rd International Colloquium on Automata,Languages and Programming.1996.
  • 9Blundo C,De Santis A,Stinson D R.On the Contrast in Visual Cryptography Schemes[J].Journal of Cryptology,1999,12(4):261-289.
  • 10Hou Y C,Tu S F.Visual Cryptography Techniques for Color Images without Pixel Expansion[J].Journal of Information Technology and Society,2004,4(1):95-110.

共引文献12

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部