期刊文献+

基于快速响应码的灰度视觉密码方案设计 被引量:2

Design of Gray Visual Cryptography Scheme Based on Quick Response Code
下载PDF
导出
摘要 在保证快速响应码识读效率的基础上,为提高其秘密载荷能力,基于快速响应码的模块识别特性,提出一种面向灰度图像且像素不扩展的(n,n)异或视觉密码方案.该方案根据模块识别单元的结构建立灰度值与系列模板之间的映射关系,进而设计不同的视觉密码分享矩阵集合,对秘密进行分享,并利用Matlab和Photoshop对方案性能进行测试分析.实验验证和理论分析表明,该方案秘密信息恢复算法为线性时间算法,可承载的秘密载荷量为载体图像规格的9倍,且能够抵抗压缩、旋转和剪切等一般几何攻击. To improve the secret payload capacity of the quick response code with the basis of ensuring the decoding efficiency,an(n,n)XOR visual cryptography scheme oriented to grayscale image without size expansion has been proposed based on the module identification characteristics of the quick response code.It establishes the mapping relationship between the gray value and the series template according to the structure of the module identification unit,and then designs different sharing matrix sets of visual cryptography scheme to encrypt the secret image.Finally,Matlab and Photoshop are utilized to test and analyze the performance of the scheme.Experimental results and theoretical analysis show that the secret recovery algorithm of the proposed scheme is a linear time algorithm,the secret payload amount is 9 times as the specifications of the carrier image,and it can resist general geometric attacks such as compression,rotation and shear.
作者 郁滨 刘思佳 付正欣 Yu Bin;Liu Sijia;Fu Zhengxin(Information Engineering University,Zhengzhou 450004)
机构地区 信息工程大学
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2020年第4期635-642,共8页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(61602513)。
关键词 快速响应码 异或视觉密码 像素不扩展 灰度值 系列模板 quick response code XOR visual cryptography without size expansion gray value series template
  • 相关文献

参考文献2

二级参考文献15

  • 1Naor M, Shamir A. Visual cryptography[ C ]//Advances in Cryptology- Em'ocrypt. Berlin : Springer-Verlag, 1994 : 1-12.
  • 2Ateniese G,Carlo B,Santis A D,et al. Visual c~ptography for general access structures [ J ]. information and Computation, 1996, 129 (76) :86- 106.
  • 3Liu F,Wu C,Lin X. Step construction of visual cryptography schemes [J]. IEEE Yrans on Information Forensics and Security,2010,5 (1) :27-38.
  • 4Leung B W, Ng F Y, Wong D S. On the security of a visual cryptogra- phy scheme fi*r color images [ J ]. Pattern Recognition, 2009,42 (5) :929-940.
  • 5Shyong J S. Visual cryptograms of random grids for tllreshold access structures [ J ]. Theoretical Computer Science, 2015,565 ( C ) : 30- 49.
  • 6Revenkar P S, Revenkar P S, Gandhare W Z. Secure iris authentica- tion using visual cryptography [ J ]. International ,Journal of Comput- er Science and Information Security,2010,7(3 ) :217-221.
  • 7Rosking J A,Emigh A T. Visual cryptography and voting technology using a pair of enhanced contrast glyphs in overlay: USA, US 7,667, 871 BI [P].2010..
  • 8Chan C W, Lin C H. A new credit card payment scheme using mobile phones based on visual cryptography [ C ]//Proc of ISI Workshops. Berlin : Springer-Verlag,2008:467-476.
  • 9Yamamoto H, Hayasaki Y, Nishida N. Securing display of gray.scale and muhicolored images by use of visual cryptography [ C ]//Proc of SPIE, IS&T Electronic Imaging. 2004 : 714-716.
  • 10Lou D,Tso H,Liu J. A copyrigbt protection scheme for digital images using visual cl.'yptography technique[ J ]. Computer Standards & In- terfaces,2007,29( 1 ) :125-131.

共引文献3

同被引文献12

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部