期刊文献+

一种防共谋欺骗的可视密码方案 被引量:1

AN ANTI-COLLUSION DECEPTION VISUAL CRYPTOGRAPHY SCHEME
下载PDF
导出
摘要 针对防共谋欺骗可视密码存在像素扩展度大的问题,通过对秘密图像的不同像素列,随机选取不同像素扩展度的加密矩阵进行分享,构造出一种防共谋欺骗可视密码方案。理论与实验结果表明,该方案能够实现防共谋欺骗功能,且参与者不需要持有额外的验证共享份,同时优化了像素扩展度,减小了共享份的存储和传输开销。 To solve the problem of large pixel expansion for anti-collusion deception visual cipher,by randomly selecting the encryption matrix with different pixel expansion for different pixel columns of secret image to share,a scheme of anti-collusion deception visual cryptography is constructed.The theoretical and experimental results show that this scheme can achieve the function of anti-collusion deception,and participants do not need to hold additional verification shares.It optimizes the pixel expansion and reduces the storage and transmission costs of shared shares.
作者 齐向东 姜博 尹乃潇 Qi Xiangdong;Jiang Bo;Yin Naixiao(Netshen Information Technology(Beijing)Incorporated Company,Beijing 100015,China;China Academy of Information and Communications Technology,Beijing 100191,China)
出处 《计算机应用与软件》 北大核心 2021年第6期329-332,349,共5页 Computer Applications and Software
关键词 可视密码 共谋欺骗 加密矩阵 像素扩展度 Visual cryptography Anti-collusion deception Encryption matrix Pixel expansion
  • 相关文献

参考文献4

二级参考文献32

  • 1郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J].计算机工程,2005,31(6):126-128. 被引量:16
  • 2郁滨,王翠.像素不扩展的MSM视觉密码方案[J].信息工程大学学报,2007,8(2):156-160. 被引量:7
  • 3徐晓辉,郁滨.无重影的可防欺骗视觉密码方案[C].计算机技术与应用进展(CACIS.2007),2007:1335-1339.
  • 4[1]Naor M, Shamir A. Visual cryptography[J]. Lecture Notes in Computer Science, 1995, 950(1):1-12.
  • 5[2]Shamir A. How to share a secret[J].Communications of the ACM, 1979, 22(11):612-613.
  • 6[3]Ateniese G, Blundo G, Santis A D, et al. Visual cryptography for general access structures[J]. Electronic Colloquium on Computational Complexity,1996, 129(2):86-106.
  • 7[4]Koga H, Yamamoto H. Proposal of a lattice-based visual secret sharing scheme for color and gray-scale image[J]. IEICE Transaction on Fundamentals, 1998,E81-A(6): 1262- 1269.
  • 8[5]Santis A D, Blundo C, Arco P D, et al. Contrast optimal threshold visual cryptography schemes [J].SIAM Journal on Discrete Mathematics, 1998, 16(2) :224-261.
  • 9[6]Blundo C, Santis A D, Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptology, 1999, 12(4):261-289.
  • 10[7]Ito R, Kuwakado H, Tanaka H. Image size invariant visual cryptography[J]. IEICE Transactions on Funcamentals of Electronics, 1999, E82-A (10): 2172 -2177.

共引文献24

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部