期刊文献+

基于DCT的多门限渐进秘密图像分存方案 被引量:4

Multiple Thresholds Progressive Secret Image Sharing Scheme Based on DCT
下载PDF
导出
摘要 图像分存是将密图拆分为影子图像,利用分发的部分或全部影子图像对密图进行完整重构,是目前图像信息安全的研究热点。但传统数字图像分存通常是由满足门限数量的影子图像对密图进行完整重构的,而在频域随着分发份额数量增加,实现对密图由模糊到清晰的整体渐进恢复的研究工作相对较少。基于此,文章提出一种基于DCT的多门限渐进秘密图像分存方案,在该方案中,首先结合随机参与值将密钥分存,将分发子密钥和参与值对应的MD5值公布防止参与者作弊;然后对秘密图像进行8×8DCT变换,对分块DCT系数进行随机量化和指定码长分配表的2进制表示,按之字形扫描顺序和频带重组形成多个划分频带;最后在GF(2~8)有限域下对频带进行多门限分存并重构分发影子图像。实验结果表明,当参与者的数量大于最低门限,则随着参与者数量的增加,文中方法可充分利用影子图像对秘密图像进行由模糊到清晰的渐进恢复且具备较好的视觉恢复质量,且得不到秘密图像的任何信息。文中策略严格依赖于密钥,并且恢复的结果趋于稳定。 Image sharing usually splits the secret image into a series ofshadow images and the secret image can be completely recovered by partial or all distributed shadow images. It is the research hotspot in image security. But traditional image sharing usually used to construct the secret imagecompletely and the research providingthe whole progressive recovery of secret image from fuzzy to clear is relatively small.Based on this, a multiple thresholds progressive secret image sharing scheme based on DCT was proposed.First the key is shared in combination with the random participation value,the MD5 values corresponding to the sub-keys and participating values are published to prevent participants from cheating,then the secret image is transformed by 8 x8 DCT where the DCT coefficients are randomly quantified and the binary representation of the assigned code length distribution table is presented to form multiple partition bands by zigzag scanning order and band reorganization.Finally, use multiple thresholds to sharing the band and reconstruct distribution shadow image in GF(2~8) Galois field.The experimental results show that when the number of participants is greater than the minimum threshold, withthe number ofparticipant'sincreases, the proposed method can make use of the shadow image to make the whole progressive recovery of secret image from fuzzy to clearand the more participantsand the better visual recovery quality. Otherwise, there will not be any information on the secret image, and the strategy is strictly dependent on the key and the recovery results tend to be stable.
作者 邵利平 乐志芳 SHAO Liping;LE Zhifang(School of Computer Science, Shaanxi Normal University, Xi'anShannxi 710119, China)
出处 《信息网络安全》 CSCD 北大核心 2018年第3期54-62,共9页 Netinfo Security
基金 国家自然科学基金[61100239] 陕西省自然科学基金[2011JQ8009 2016JM6065] 中央高校基本科研业务费[GK201402036 GK201703057]
关键词 图像分存 多门限 渐进分存 有限域 DCT image sharing multiple thresholds progressive sharing Galois field DCT
  • 相关文献

参考文献3

二级参考文献29

  • 1林崧,刘晓芬,姚志强.一种基于汉明码的数字水印算法[J].福建师范大学学报(自然科学版),2004,20(4):24-27. 被引量:5
  • 2张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 3CELIKM U, SHARMA G, TEKALP A M. Lossless Watermarkingfor Image Authentication: A New Framework and an Implementation[J].IEEE Transactions on Image Processing, 2006,15(4): 1042-1049.
  • 4TIANJun. Reversible Data Embedding Using a DifferenceExpansion[J].IEEE Transactions on Circuits and System for VideoTechnology, 2003,13(8): 890-896.
  • 5NIZhicheng, SHI Yunqing, NIRWAN A, et al. ReversibleData Hiding[J].IEEE Transactions on Circuits and System for VideoTechnology,2006, 16(3): 354-362.
  • 6TSAP, HU Yuchen, YEH H L. Reversible Data Hiding Scheme UsingPredictive Coding and Histogram ShiftingjJ]. Signal Processing, 2009,89(6): 1129-1143.
  • 7ZHANGXinpeng. Reversible Data Hiding in Encrypted Images [J].IEEE Signal Process Letters, 2011, 18(4): 255-258.
  • 8HONGW, CHEN T S, Wu Hanyan. An Improved Reversible DataHiding in Encrypted Images Using Side Match[J].IEEE Signal ProcessLetters, 2012, 19(4): 199-202.
  • 9LIAO Xin, SHU Changwen. Reversible Data Hiding in EncryptedImages Based on Absolute Mean Difference of Multiple NeighboringPixels [J]. Journal of Visual Communication and Image Representation,2015’ 28(1): 21-27.
  • 10QIAN Zhenxing, ZHANG Xinpeng, REN Yanlin, et al. Block CipherBased Separablereversible Data Hiding in Encrypted Images [EB/OL]. http://xueshu.baidu.com/s?wd=paperuri%3A%28d83dl39adlcfD77132e25f2b68b35cc4%29&filter=sc__long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3 A%2F%2Flink.springer. com%2F10.1007%2Fsl 1042-015 -2760-9&ie=utf-8, 2015-7-7.

共引文献18

同被引文献14

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部