期刊文献+

视觉密码方案概述

Overview of visual cryptography scheme
下载PDF
导出
摘要 视觉密码(VC)是一种用于分享秘密图像的加密方案,与传统的密码技术相比具有简单性、安全性、隐蔽性等优点。其加密是将图像编码为分享,将分享打印在透明胶片上或以数字形式存储;其解密过程是对分享进行叠加,然后通过人类的视觉能力来实现。本文介绍了视觉密码的基本概念和各种不同的视觉密码方案,以及每种方案中使用的技术。此外,对视觉密码在不同领域上的应用做出了说明。 Visual cryptography(VC)is an encryption scheme for sharing secret images.Compared with traditional cryptography,it has the advantages of simplicity,security and concealment.The encryption is to encode the image for sharing,and to print the sharing on a transparent film or store it in digital form;the decryption process is to superimpose the sharing,and then realize it through human visual ability.This article introduces the basic concepts of visual cryptography and various different visual cryptography schemes,as well as the technology used in each scheme.In addition,the application of visual cryptography in different fields is explained.
作者 冯琪 王洪君 FENG Qi;WANG Hongjun(College of Computer,Jilin Normal University,Siping Jilin 136000,China)
出处 《智能计算机与应用》 2021年第2期109-112,118,共5页 Intelligent Computer and Applications
关键词 视觉密码 分享图像 秘密图像 visual cryptography shared image secret image
  • 相关文献

参考文献10

二级参考文献47

  • 1乔明秋,朱悦冬,刘焕平.多秘密共享可视密码及在防止欺骗上的应用[J].哈尔滨师范大学自然科学学报,2007,23(2):61-65. 被引量:3
  • 2易枫,王道顺,戴一奇.一般存取结构的多密图彩色可视分存方案[J].自然科学进展,2006,16(1):95-100. 被引量:8
  • 3Naor M, Shamir A. Visual Cryptography[A]. In: Advances in Cryptology-Eurocrypt' 94[C]. Lecture Notes in Computer Science, 1994 : 1-12.
  • 4Eslami Z, Razzaghi S H, Zarepour Ahmadabadi. Secret image sharing with authentication-chaining and dynamic embedding[J]. Journal of Systems & Software, 2011, (84):803-809.
  • 5Naor M, Shamir A. Visual cryptography[M] //Lecture Notes inComputer Science. Heidelberg: Springer, 1995, 950: 1-12.
  • 6Droste S. New results on visual cryptography[M] //LectureNotes in Computer Science. Heidelberg: Springer, 1996, 1109:401-415.
  • 7Yang C N, Wang D S. Property analysis of XOR based visualcryptography[J]. IEEE Transactions on Circuits and Systemsfor Video Technology, 2014, 24(2): 189-197.
  • 8Wu X T, Sun W. Random grid-based visual secret sharing withabilities of OR and XOR decryptions[J]. The Journal of VisualCommunication and Image Representation, 2013, 24(1): 48-62.
  • 9Liu F, Wu C, Lin X. Cheating immune visual cryptographyscheme[J]. IET Information Security, 2011, 5(1): 51-59.
  • 10Ateniese G, Blundo C, Santis A D, et al. Visual cryptographyfor general access structures[J]. Information and Computation,1996, 129(2): 86-106.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部