期刊文献+
共找到96篇文章
< 1 2 5 >
每页显示 20 50 100
Cheater identifiable visual secret sharing scheme 被引量:1
1
作者 GanZhi ChenKefei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第1期233-236,共4页
The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptog... The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced. 展开更多
关键词 visual cryptography secret sharing vss.
下载PDF
A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code 被引量:1
2
作者 Xinwei Zhong Lizhi Xiong Zhihua Xia 《Journal on Big Data》 2021年第2期85-95,共11页
With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response... With the rise of the Internet of Things(IoT),various devices in life and industry are closely linked.Because of its high payload,stable error correction capability,and convenience in reading and writing,Quick Response(QR)code has been widely researched in IoT.However,the security of privacy data in IoT is also a very important issue.At the same time,because IoT is developing towards low-power devices in order to be applied to more fields,the technology protecting the security of private needs to have the characteristics of low computational complexity.Visual Secret Sharing(VSS),with its features of safety and low computational cost,can fully meet the requirements of communication security in IoT.Therefore,a VSS scheme with QR code(VSS-QR)was proposed and has been applied to some extent.In VSS-QR,the secret is shared into a series of shares.These shares are usually common QR codes,which cannot cause the attention of the attacker.However,if there is dishonesty among participants,the secret cannot be recovered,which will lead to VSS-QR cannot be widely used due to its inadequate security.In this paper,we propose a visual secret sharing scheme with authentication based on QR code(VSSA-QR).Both the reconstructed secret QR code and shares can be verified whether they are forged by attackers.The above-mentioned operations conveniently are performed on low-power QR scanning devices.Not only does the proposed scheme prevent some dishonest participants or attackers from cheating,but also prevent all participants from conspiring.In addition,the payload is the QR code itself,which is higher than other schemes.Theoretical analysis and experiments prove that the proposed scheme is effective. 展开更多
关键词 QR code visual secret sharing low computational complexity AUTHENTICATION
下载PDF
A Visual Secret Sharing Scheme for Progressively Restoring Secrets
3
作者 Chin-Chen Chang Yi-Pei Hsieh Chi-Cheng Liao 《Journal of Electronic Science and Technology》 CAS 2011年第4期325-331,共7页
Visual secret sharing has received more and more attention over the past years due to the fact that neither complex computation nor cryptographic knowledge is required to decrypt the secret image directly according to... Visual secret sharing has received more and more attention over the past years due to the fact that neither complex computation nor cryptographic knowledge is required to decrypt the secret image directly according to the characteristics of the human vision system. Considering the issue of sharing the secret image at multiple image resolutions with the meaningful shadows, in this paper, we present a friendly progressive visual secret sharing scheme without expanding the image size in the shadows and the reconstructed secret image based on applying a 2x2-sized block-wise operation to generate the shadows block by block. The proposed method can achieve these benefits: 1) the generated shadows are meaningful, and their sizes are not expanded, and 2) the secret image can be recovered at different resolutions by stacking different quantities of shadows together. The experimental results also show that the proposed method is superior to other compared schemes. 展开更多
关键词 Friendly management multiple image resolutions progressive restoring secrets visual secret sharing.
下载PDF
A Study on Information Reservation for Visual Secret Sharing Method with Reversible Style
4
作者 Wen-Pinn Fang 《通讯和计算机(中英文版)》 2013年第5期643-648,共6页
关键词 信息泄漏 可逆式 秘密分享 秘密共享方案 视觉 可视 传统 轮廓
下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
5
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(vss) scheme secret sharing(SS) scheme linear code finite field(Galois field).
下载PDF
Authentication Mechanism for Secret Sharing Using Boolean Operation
6
作者 Yi-Hui Chen Pei-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2012年第3期195-198,共4页
A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the re... A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether the shadows are authentic before reconstructing the secret image. The proposed scheme delivers much more effective performance than Chen and Wu's scheme. 展开更多
关键词 Authentication mechanism visualcryptography visual secret sharing.
下载PDF
Secret Image Communication Scheme Based on Visual Cryptography and Tetrolet Tiling Patterns
7
作者 N.RajeshKumar DYuvaraj +3 位作者 G.Manikandan R.BalaKrishnan B.Karthikeyan D.Narasimhanand N.R.Raajan 《Computers, Materials & Continua》 SCIE EI 2020年第11期1283-1301,共19页
Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images.The basic idea of visual cryptography is to construct two or more secret shares from the original image in the fo... Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images.The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image.In this paper,a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed.The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns.The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image.The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board.Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography.Finally,the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end. 展开更多
关键词 Tetrominoes tile visual secret share image transmission security visual cryptography
下载PDF
Enhanced Contrast of Reconstructed Image for Image Secret Sharing Scheme Using Mathematical Morphology
8
作者 Yogesh K. Meghrajani Himanshu S. Mazumdar 《Journal of Information Security》 2015年第4期273-279,共7页
Visual secret sharing (VSS) is one of the cryptographic techniques of Image secret sharing scheme (ISSS) that performs encoding of secret message image (text or picture) into noise like black and white images, which a... Visual secret sharing (VSS) is one of the cryptographic techniques of Image secret sharing scheme (ISSS) that performs encoding of secret message image (text or picture) into noise like black and white images, which are called as shares. Shares are stacked together and secret message image is decoded using human visual system. One of the major drawbacks of this scheme is its poor contrast of the recovered image, which improves if computational device is available while decoding. In this paper, we propose to improve poor contrast of classical VSS schemes for text or alphanumeric secret messages and low entropy images. Initially, stacked image is binarized using dynamic threshold value. A mathematical morphological operation is applied on the stacked image to enhance contrast of the reconstructed image. Moreover, a method is proposed that allows the size of the structuring element to change according to the contrast and the size of a stacked image. We perform experiments for different types of VSS schemes, different share patterns, different share types (rectangle and circle), and low entropy images. Experimental results demonstrate the efficacy of the proposed scheme. 展开更多
关键词 CONTRAST Mathematical MORPHOLOGICAL OPERATOR IMAGE secret sharing visual secret sharing
下载PDF
Security Analysis of Secret Image Sharing
9
作者 Xuehu Yan Yuliang Lu +3 位作者 Lintao Liu Song Wan Wanmeng Ding Hanlin Liu 《国际计算机前沿大会会议论文集》 2017年第1期75-78,共4页
Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image... Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image can be reconstructed by collecting sufficient shadow images.In recent years,many SIS schemes are proposed,among which Shamir’s polynomial-based SIS scheme and visual secret sharing(VSS)also called visual cryptography scheme(VCS)are the primary branches.However,as the basic research issues,the security analysis and security level classification of SIS are rarely discussed.In this paper,based on the study of image feature and typical SIS schemes,four security levels are classified as well as the security of typical SIS schemes are analyzed.Furthermore,experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics. 展开更多
关键词 secret IMAGE sharing Shamir’s polynomial-based secret IMAGE sharing visual CRYPTOGRAPHY Security analysis Linear CONGRUENCE
下载PDF
Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes
10
作者 Song Wan Yuliang Lu +2 位作者 Xuehu Yan Hanlin Liu Longdan Tan 《国际计算机前沿大会会议论文集》 2017年第1期56-57,共2页
In this paper,a novel secret data-driven carrier-free(semi structural formula)visual secret sharing(VSS)scheme with(2,2)threshold based on the error correction blocks of QR codes is investigated.The proposed scheme is... In this paper,a novel secret data-driven carrier-free(semi structural formula)visual secret sharing(VSS)scheme with(2,2)threshold based on the error correction blocks of QR codes is investigated.The proposed scheme is to search two QR codes that altered to satisfy the secret sharing modules in the error correction mechanism from the large datasets of QR codes according to the secret image,which is to embed the secret image into QR codes based on carrier-free secret sharing.The size of secret image is the same or closest with the region from the coordinate of(7,7)to the lower right corner of QR codes.In this way,we can find the QR codes combination of embedding secret information maximization with secret data-driven based on Big data search.Each output share is a valid QR code which can be decoded correctly utilizing a QR code reader and it may reduce the likelihood of attracting the attention of potential attackers.The proposed scheme can reveal secret image visually with the abilities of stacking and XOR decryptions.The secret image can be recovered by human visual system(HVS)without any computation based on stacking.On the other hand,if the light-weight computation device is available,the secret image can be lossless revealed based on XOR operation.In addition,QR codes could assist alignment for VSS recovery.The experimental results show the effectiveness of our scheme. 展开更多
关键词 visual secret sharing QR code Error correction BLOCKS Carrier-free Big data DATA-DRIVEN Multiple decryptions
下载PDF
基于DWT-DCT灰度图像小阴影尺寸的VSS加密技术
11
作者 李伟 孙云娟 刘玉芳 《河南师范大学学报(自然科学版)》 CAS 北大核心 2016年第2期157-162,共6页
提出了灰度图像的最新的(2,n)可视加密共享技术方案(VSS).它是基于频域的分析方法,该方法利用DWT以及DWT-DCT高性能的压缩比,计算效率高,恢复图像误差小,并且避免了较大的传统阴影尺寸.实验结果证实了该方法的有效性,即重构了高质量的... 提出了灰度图像的最新的(2,n)可视加密共享技术方案(VSS).它是基于频域的分析方法,该方法利用DWT以及DWT-DCT高性能的压缩比,计算效率高,恢复图像误差小,并且避免了较大的传统阴影尺寸.实验结果证实了该方法的有效性,即重构了高质量的原始图像,且产生了小尺寸的灰度阴影. 展开更多
关键词 DWT DCT Shamir方案 可视加密共享方案
下载PDF
Construction of General (k, n) Probabilistic Visual Cryptography Scheme 被引量:1
12
作者 Ching-Nung Yang Chih-Cheng Wu Feng Liu 《Journal of Electronic Science and Technology》 CAS 2011年第4期317-324,共8页
Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistie VCS (PVCS). For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel. The PVCS uses only one subpixel to represent a secret pixel, while the quality of reconstructed image is degraded. A well-known construction of (k, n)-PVCS is obtained from the (k, n)-DVCS. In this paper, we show another construction of (k, n)-PVCS by extending the (k, k)-PVCS. 展开更多
关键词 Probabilistic visual cryptography visual cryptography visual secret sharing.
下载PDF
基于隐写和VSS的二维码安全认证技术研究 被引量:1
13
作者 燕雨薇 余粟 《智能计算机与应用》 2020年第8期14-18,共5页
快速响应码(QR码)以存储信息量大、编解码速度快、安全性高等特点,广泛应用于各个领域。但QR码本身并不具备安全保护能力,通过分析其编解码原理,本文提出一种结合信息隐藏和可视秘密共享的QR码安全认证技术,可应用于用户信息传递及身份... 快速响应码(QR码)以存储信息量大、编解码速度快、安全性高等特点,广泛应用于各个领域。但QR码本身并不具备安全保护能力,通过分析其编解码原理,本文提出一种结合信息隐藏和可视秘密共享的QR码安全认证技术,可应用于用户信息传递及身份认证。实验证明本方法具备可行性,且具有透明性高、计算成本低、效率快等优点,提高了信息传递的安全性。 展开更多
关键词 QR码 信息隐藏 消息认证 LSB 可视秘密共享
下载PDF
Visual Multi-Secret Sharing with Friendliness 被引量:1
14
作者 郑富国 林恺翔 +1 位作者 林志鸿 陈宗和 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期455-465,共11页
Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in ... Visual secret sharing(VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing(VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in VMSS; however, only one secret image can be done in VSS. In VMSS, secrets are encoded into noise-like shares which have finally been stacked altogether so as to disclose each of the secrets by specific operations, such as rotating, flipping and sliding. Though the noise-like shares can be decoded by those operations, it is just like a fly in the ointment since they are hard to manage, to recognize and even to stack orderly. Based on some researches about user-friendly VSS for generating meaningful shares, a new friendly VMSS scheme is presented in this paper for achieving two main goals. One is trying to encode multiple secrets at a time and the other is making the decoding process easy to manage. The experimental results prove that our proposed scheme does work. 展开更多
关键词 visual cryptography random grids visual secret sharing(vss) image encryption
原文传递
数字图像变换及信息隐藏与伪装技术 被引量:327
15
作者 丁玮 齐东旭 《计算机学报》 EI CSCD 北大核心 1998年第9期838-843,共6页
本文讨论的是数字图像变换及其在信息安全中的应用.首先介绍置乱变换,并提出按空间填充曲线、Arnold变换、幻方的图像置乱算法;其次介绍图像分存并提出了将灰度和彩色图像在计算机上进行分存和恢复的方法.
关键词 图像变换 信息隐藏 信息伪装 图像处理 计算机
下载PDF
一种可防止欺骗的可视密码分享方案 被引量:16
16
作者 郭洁 颜浩 +1 位作者 刘妍 陈克非 《计算机工程》 CAS CSCD 北大核心 2005年第6期126-128,共3页
Naor和Shamir[1]提出的可视密码方案(VCS)是一种将秘密黑白图像加密到不同分享中的秘密分享方案,并且无须计算即可进行解密。但是如果在解密过程中欺骗者提供了伪造的分享,秘密图像的解密将失败。该文给出了一种新的构造方法,可找出解... Naor和Shamir[1]提出的可视密码方案(VCS)是一种将秘密黑白图像加密到不同分享中的秘密分享方案,并且无须计算即可进行解密。但是如果在解密过程中欺骗者提供了伪造的分享,秘密图像的解密将失败。该文给出了一种新的构造方法,可找出解密过程中的欺骗者。 展开更多
关键词 可视密码 秘密分享 欺骗者
下载PDF
可防止欺骗的可视密码分享方案 被引量:16
17
作者 颜浩 甘志 陈克非 《上海交通大学学报》 EI CAS CSCD 北大核心 2004年第1期107-110,共4页
提出了一种可以检测出一个欺骗者的(k,n)门限的可视密码的定义和构造方法,并证明了其安全性.当存在一个欺骗者出示了假的分享时将导致秘密恢复失败,这种构造方法可以检测出谁是欺骗者,其特点如一般的可视密码分享方案.参与者手中只要保... 提出了一种可以检测出一个欺骗者的(k,n)门限的可视密码的定义和构造方法,并证明了其安全性.当存在一个欺骗者出示了假的分享时将导致秘密恢复失败,这种构造方法可以检测出谁是欺骗者,其特点如一般的可视密码分享方案.参与者手中只要保存一份分享图像,不需要额外的信息,并且检测欺骗者的过程只需要k次胶片叠加,体现了可视密码使用方便性的原则. 展开更多
关键词 可视密码 秘密分享 欺骗者
下载PDF
利用反转实现理想对比度的密图分存 被引量:3
18
作者 张海波 王小非 +1 位作者 徐海樵 黄友澎 《电子学报》 EI CAS CSCD 北大核心 2010年第2期465-468,共4页
可视秘密共享的一个主要不足是重构后图像的对比度损失严重.提出了利用反转实现理想对比度的密图分存方案.编码轮数为m/h(上取整)(m和h分别是白像素加密所用基阵全部列和全白列的数量),采取像素块编码方式,每步都将m个连续相同的像素进... 可视秘密共享的一个主要不足是重构后图像的对比度损失严重.提出了利用反转实现理想对比度的密图分存方案.编码轮数为m/h(上取整)(m和h分别是白像素加密所用基阵全部列和全白列的数量),采取像素块编码方式,每步都将m个连续相同的像素进行一次性加密编码,不产生像素扩展.对方案的正确性和安全性进行了证明,并与类似方案进行了对比分析和实验.该方案编码效率较高,系统容量较小. 展开更多
关键词 可视秘密共享 反转 理想对比度 黑像素完善的可视秘密共享
下载PDF
图视秘密的任意分存 被引量:26
19
作者 苏中民 林行良 《计算机学报》 EI CSCD 北大核心 1996年第4期293-299,共7页
在图视秘密分散存储(简称分存)中,任意分存方案可比一般的分存方案更有效地隐蔽秘密信息,因而有着重要的实用意义.本文在Shamir提出的图机密码的基础上,明确给出了任意分存的概念,并提出了根据(k,n)分存方案构造任意... 在图视秘密分散存储(简称分存)中,任意分存方案可比一般的分存方案更有效地隐蔽秘密信息,因而有着重要的实用意义.本文在Shamir提出的图机密码的基础上,明确给出了任意分存的概念,并提出了根据(k,n)分存方案构造任意(k,n)分存方案的方法,此外,还给出了由(k,k)分存方案构造任意(k,k)分存方案的简便方法,并证明了其有效性. 展开更多
关键词 图视秘密 任意分存 密码学 密钥 组合数学
下载PDF
基于加法共享的可验证秘密再分发协议 被引量:6
20
作者 于佳 李大兴 范玉玲 《计算机研究与发展》 EI CSCD 北大核心 2006年第1期23-27,共5页
提出了一种基于加法共享的非交互的可验证秘密再分发协议,协议同时具有门限的性质,能应用于可改变访问结构的成员集合,新旧成员集合之间不需要保持任何关系·协议采用加法共享和份额备份的技术,不但可以验证秘密影子和子影子的正确... 提出了一种基于加法共享的非交互的可验证秘密再分发协议,协议同时具有门限的性质,能应用于可改变访问结构的成员集合,新旧成员集合之间不需要保持任何关系·协议采用加法共享和份额备份的技术,不但可以验证秘密影子和子影子的正确性,而且能够恢复错误的影子,同时可以鉴别错误成员的集合,能够解决错误成员定位困难的问题·由于采用的是加法共享的方式,所以可以方便地转化为动态RSA再分发体制·协议是正确的、鲁棒的和安全的,并且各方面性能都比较高· 展开更多
关键词 可验证秘密共享 可验证秘密再分发 动态秘密共享 门限方案
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部