期刊文献+

基于异或的外形比例不失真(k,n)视觉密码方案

ASPECT RATIO INVARIANT(K,N)VISUAL CRYPTOGRAPHY SCHEME BASED ON XOR
下载PDF
导出
摘要 通过设计基于奇偶列的加密矩阵构造方法,结合多行扫描和多点加密的像素不扩展技术,提出一种基于“异或”运算的(k,n)视觉密码方案,并证明方案的安全性和有效性。实验结果表明,该方案能够实现秘密图像的外形比例不失真恢复,同时提高相对差,有效改善图像的恢复效果。 By designing the construction method for encryption matrix based on odd-even columns,and combining the pixel unexpanded technology with multi-lines scanning and multi-pixel encryption,this paper proposes a(k,n)visual cryptography scheme based on"XOR"operation.Meanwhile,the security and effectiveness of our scheme is proved.The experimental results indicate that our scheme can achieve the undistorted restoration of the aspect ratio of the secret image.The relative difference is increased,and the restoration effect of the image is effectively improved.
作者 董晨 张皓宇 季姝廷 李磊 Dong Chen;Zhang Haoyu;Ji Shuting;Li Lei(Tianjin Key Laboratory of Intelligence Computer and Novel Software Technology,School of Computer Science and Engineering,Tianjin University of Technology,Tianjin 300384,China;Big Data Management Center,Tianjin 300221,China)
出处 《计算机应用与软件》 北大核心 2020年第9期272-276,281,共6页 Computer Applications and Software
基金 国家级大学生创新创业训练计划项目(201810060008)。
关键词 视觉密码 异或 门限结构 外形比例不失真 Visual cryptography XOR Threshold structure Aspect ratio invariant
  • 相关文献

参考文献2

二级参考文献18

  • 1Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72(2): 1867-1886.
  • 2Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J] Transactions on Information Forensics Security, 2013 733-743.
  • 3IEEE 8(5): Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662.
  • 4Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777.
  • 5Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329.
  • 6Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810.
  • 7Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463.
  • 8Chen Y C, Tsal D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23(8): 1225-1233.
  • 9Naor M, and Shamir A. Visual cryptography[C]. Proceedings of the Advances in Cryptology-Eurocrypt'94~ Berlin, 1995 (LNCS 950): 1-12.
  • 10Ateniese G, Blundo C, Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部