期刊文献+

高效免置乱的图像秘密共享方案 被引量:4

High-efficiency and Non-permutated Image Secret Sharing Scheme
在线阅读 下载PDF
导出
摘要 针对图像秘密共享前需要像素置乱的问题,基于(t,n)门限多重秘密共享思想,提出一种免置乱的图像秘密共享方案,以第n+1人的秘密份额作为因子参与秘密分割与重构,加大相邻像素之间的差距。该方案无需进行额外的密钥传输,运算简单高效、易于扩展,生成的影子图像也仅为原图像的1/t,有效压缩了尺寸。实验结果证明了该方案的可行性。 Aiming at the problem that the image should be permutated before it is shared,based on(t,n) threshold multi-secret sharing theory,a non-permutated image secret sharing scheme is proposed.It makes use of the n+1 participator’s secret shadow as a gene to participate in sharing and recovering.The gap between the adjacent pixels is increased effectively.This scheme doesn’t need added secret key transmission.It is easy to be extended and the size of each shadow image is reduced to 1/t of the secret image.Experimental result proves this scheme is feasible.
作者 周清雷 郭锐
出处 《计算机工程》 CAS CSCD 北大核心 2010年第9期126-128,共3页 Computer Engineering
关键词 秘密共享 免置乱 影子图像 secret sharing non-permutated shadow image
  • 相关文献

参考文献11

  • 1Shamir A.How to Share a Secret[J].Communications of ACM,1979,24(11):612-613.
  • 2Blakley G R.Safeguarding Cryptographic Keys[C]//Proc.of AFIPS National Computer Conference.New York,USA:[s.n.],1979.
  • 3Naor M,Shamir A.Visual Cryptography[C]//Proc.of EURO-CRYPYT'94.Berlin,Germany:Springer-Verlag,1995.
  • 4Thien C,Lin J.Secret Image Sharing[J].Computer Graphics,2002,26(1):765-770.
  • 5Fang Wen-Pinn.Secret Image Sharing Safety[C]//Proc.of the 14th Asia-Pacific Conference on Communications.Tokyo,Japan:[s.n.],2008.
  • 6侯整风,高汉军.一个新的基于多重秘密共享的图像隐藏方案[J].计算机应用,2008,28(4):902-905. 被引量:4
  • 7Li Bai.A Reliable (k,n) Image Sharing Scheme[C]//Proc.of DASC'06.Indianapolis,USA:[s.n.],2006.
  • 8侯整风,高汉军,韩江洪,胡东辉.基于矩阵乘法的可压缩门限图像共享方案[J].武汉大学学报(信息科学版),2008,33(10):1003-1006. 被引量:4
  • 9赵荣,戴芳,赵凤群.一种安全的图像秘密共享方案[J].计算机工程,2008,34(16):171-172. 被引量:5
  • 10Karnin E D,Greene J W,Hellman M E.On Sharing Secret Systems[J].IEEE Trans.on Information Theory,1983,29(1):35-41.

二级参考文献29

  • 1庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 2SHAMIR A. How to share a secret[ J]. Communications of ACM, 1979 24(11) : 612 -613.
  • 3BLAKLEY G R. Safeguarding cryptographic keys[ C]//Proceedings of AFIPS 1979 National Computer Conference. NewYork: AFIPS Press, 1979:313-317.
  • 4NAOR M, SHAMIR A. Visual cryptography[ C]// Eurocrypt'94, LNCS 950. Berlin: Springer-Verlag , 1994:1 - 12.
  • 5NAOR M, SHAMIR A. Visual cryptography Ⅱ: Improving the contrast via the cover base[ C]// LNCS 1189. Berlin: Springer-Verlag, 1997:197-202.
  • 6BLUNDO C, de SANTIS A, NAOR M. Visual cryptography for gray level images[ J]. Information Processing Letters, 2000, 7(5) : 255 - 259.
  • 7CHANG C C, HWANG M S, CHEN T S. A new encryption algorithm for image cryptosystems[ J]. Journal of Systems and Software, 2001, 58(2):83 -91.
  • 8THIEN C C , LIN J C . Secret image sharing [ J ] . Computer & Graphic, 2002, 26(5) : 765 - 770.
  • 9LI BAI. A reliable (k, n) image secret sharing scheme[C]//Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on. Indianapolis, Indiana, USA: IEEE Press, 2006:31-36.
  • 10LI BAI. A strong ramp secret sharing scheme using matrix projection [ C]// Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks. Washington, DC, USA: IEEE Computer Society, 2006:652-656.

共引文献9

同被引文献27

  • 1镇方雄,沈振武.基于MPI的并行程序设计研究[J].咸宁学院学报,2006,26(6):63-65. 被引量:1
  • 2SHAMIR A. How to Share a Secret[ J]. Communications of ACM, 1979,24( 11 ) :612-613.
  • 3NAOR M,SHAMIR A. Visual Cryptography[ C]//Proc. Of Advances in Ctyptology-EUROCRYFl'94. Berlin,Germany:Springer, 1995 : 1-12.
  • 4THIEN C, LIN J. Secret Image Sharing [ J ]. Computer Graphics,2002,26 ( 1 ) : 765-770.
  • 5WANG R Z, SU C H. Secret Image sharing with smaller shadow images [ J ]. Pattern Recognition letters, 2006,27 (6) :551-555.
  • 6LIB. A reliable ( k, n) image sharing scheme [ C ] //Proc. Of DASC06. Indianapolis, USA :2006 : 31-36.
  • 7CHANG C C ,WU M N. An algorithm for color image compression based on common bit map block truncation coding[ C ]//Joint Conference on Information Sciences,2002:964-967.
  • 8侯整风,韩江洪.防欺骗(t,n)秘密共享模式研究[J].浙江大学学报(理学版),2007,34(6):633-635. 被引量:3
  • 9Shamir A. How to Share a Secret [ J ]. Communication of ACM, 1979,24( 11 ) :612 - 613.
  • 10Naor M, Shamir A. Visual Cryptography [ C ]. Proc. of EU- ROCRYPYT' 94, Berlin, Germany: Springer - Verlag, 1995.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部