期刊文献+

影子不可窜改的图像秘密分享技术研究

Research of secret image sharing scheme with tamper-resistant shadows
下载PDF
导出
摘要 为了使得影子具有更好的伪装性,普遍的方法是选择一定数量的掩盖图像,然后在大体不影响掩盖图像视觉效果的前提下将份额缩小嵌入其中并作为最终的影子图像。这样的做法为攻击者从影子图像中提取原始的份额数据留下了隐患。针对这一问题,提出了一种新的图像秘密分享方案,其最大的特点是掩盖图像不再只简单作为份额数据的嵌入载体,而是参与影子图像生成及秘密图像重构等过程所涉及的所有运算。任意像素点被修改过的影子图像都无法参与秘密图像的有效重构,能在计算安全层面上有效提高图像秘密分享系统的安全性。 In order to make shadows being better camouflage, the usual practice method is to select a certain number of cover images, and embed reduced share data into these cover images under the premise that the visual effect would not be affected observably, and those cover images with embedded share data are final shadows. However, this approach has a defect that attackers can extract the original share data from the shadow image. Aiming at this problem, this paper proposed a new image secret sharing scheme, and the most significant feature of which scheme was that the cover image was not only a simple embedded vector as the share data, but be involved in all operations of the shadow image production and the secret image reconstruction as an integral part of the image secret sharing system. A shadow image with any tamper cannot reconstruct the secret image effectively, so it improves the computational security of the secret image sharing system.
出处 《计算机应用研究》 CSCD 北大核心 2017年第6期1805-1808,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61501064) 四川省青年科技基金资助项目(2017JQ0057) 四川省科技支撑计划资助项目(2016GZ0122)
关键词 图像秘密分享 掩盖图像 计算安全性 secret image sharing scheme cover images computational security
  • 相关文献

参考文献2

二级参考文献88

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 3BLAKLEY G R.Safeguarding cryptographic keys[C] //Proceedings of the National Computer Conference. New York: AFIPS,1979:313-317.
  • 4DAWSON E,DONOVAN D.The breadth of Shamir's secret-sharing scheme[J].Computer and Security,1994,13(1):69-78.
  • 5van DIJK M. On the information rate of perfect secret sharing schemes[J].Designs,Codes and Cryptography,1995,6(2):143-169.
  • 6CHANGCC,HUANGRJ.Sharing secret images using shadow codebooks[J].Information Sciences,1998,111 (1/2/3/4):335-345.
  • 7THIEN C C,LIN J C.Secret image sharing[J].Computers & Graphics,2002,26(5):765-770.
  • 8NAOR M,SHAMIR A.Visual cryptography[C] // Proceedings of Eurocrypt '94.Berlin:Springer-Verlag,1995:1-12.
  • 9ITO R,KUWAKADO H,TANAKA H.Image size invariant visual cryptography[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,1999,E82-A(10):2172-2177.
  • 10HOU Y C,LIN C F,CHANG C Y.Visual cryptography for color images without pixel expansion[J].Journal of Technology,2001,16(4):595-603.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部