期刊文献+

基于自适应多像素编码的可视密图分存 被引量:3

Secret Image Sharing Based on Self-adaptive Multi-pixel Encoding
下载PDF
导出
摘要 为提高可视密图分存方案的编码效率,提出了基于自适应多像素编码的可视密图分存算法.该算法以行或列优先的方式顺序扫描秘密图像,直至遇到不同类型的像素或遇空结束为止,并以本轮扫描步长在各份额图像中填入相同长度的加密后像素,生成的所有份额与原始密图尺寸相同.分析和实验结果表明,该算法能够适应各种访问结构,对各种类型输入图像的还原效果较好,具有编码效率较高和算法复杂性较低的特点. To improve the encoding efficiency of the current visual secret sharing schemes, a novel encoding algorithm, self-adaptive muhi-pixel encoding (SME), was proposed. SME scans a secret image row by row or column by column till meeting a different type pixel or reaching the end, and then fills the encrypted pixels with the length of the scanning span into each share. All the shares have the same dimension as the original image. The analysis and experiment results show that the proposed algorithm is well suitable for all kinds of access structures such as threshold structures and general access structures and can achieve a good quality of decrypted images for all kinds of input images such as black-white, gray-scale and chromatic images, and high encoding efficiency and low complexity are its main advantages.
出处 《西南交通大学学报》 EI CSCD 北大核心 2009年第3期448-454,共7页 Journal of Southwest Jiaotong University
基金 国防“十一五”重点预研项目(51306020201) 船舶工业国防科技预研基金资助项目(06J3.9.4)
关键词 自适应多像素编码 通用访问结构 可视秘密共享 份额 self-adaptive multi-pixel encoding (SME) general access structure visual secretsharing (VSS) share
  • 相关文献

参考文献21

  • 1NAOR M, SHAMIR A. Visual cryptography [ C ] //Proceedings of Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science 950. Berlin: Springer-Verlag, 1995: 1-12. 被引量:1
  • 2LUKAC R, PLATANIOTIS K N, SMOLKA B, et al. A new approach to color image secret sharing[ C]//Proceedilags of the 12th European Signal Processing Conference. Vienna: [ s. n], 2004:1493-1496. 被引量:1
  • 3CIMATO S, PRISCO R D, SANTIS A D. Colored visual cryptography without color darkening [ J ]. Theoretical Computer Science, 2007, 374(1-3): 261-276. 被引量:1
  • 4MacPHERSON L A. Grey level visual cryptography for general access structures [ D ]. Waterloo: University of Waterloo, 2003. 被引量:1
  • 5YI Feng WANG Daoshun LUO Ping HUANG Liansheng DAI Yiqi.Multi secret image color visual cryptography schemes for general access structures[J].Progress in Natural Science:Materials International,2006,16(4):431-436. 被引量:3
  • 6GanZhi ChenKefei.Cheater identifiable visual secret sharing scheme[J].Journal of Systems Engineering and Electronics,2005,16(1):233-236. 被引量:1
  • 7HU C M, TZENG W G. Cheating prevention in visual cryptography[ J]. IEEE Trans. on Image Processing, 2007, 16( 1 ) : 36-45. 被引量:1
  • 8DENG Y P, GUO L F, LIU M L. Constructions for anonymous secret sharing schemes using combinatorial designs[ J ]. Acta Mathematicae Applicatae Sinica, English Series, 2007, 23 ( 1 ) : 67-78. 被引量:1
  • 9TSAI P F, WANG M S. An (3,3)-visual secret sharing scheme for hiding three secret data[ C/OL]. http: //www, atlantis- press, com/php/download_paper, php? id = 35. 被引量:1
  • 10SHYU S J, HUANG S Y, LEE Y K, et al. Sharing multiple secrets in visual cryptography[ J ]. Pattern Recognition, 2007, 40 : 3633-3651. 被引量:1

二级参考文献16

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2Shamir A. How to share a secret, commun. ACM, 1979,22(11). 612-613. 被引量:1
  • 3Naor M, Shamir A. Visual cryptography. Advances in Cryptology-EUROCRYPT'94, LNCS 950, 1994, 112. 被引量:1
  • 4Koga H, Yamarmto H. Propzsal d a lattice-based visual secret sharing scheme for color and gray-scale image. IEICE Trans. Fundamentals, 1998, E81-A(6): 1262-1269. 被引量:1
  • 5Giueppe Ateniese, Carlo Blundo, Alfredo De Santis, et al.Visual cryptography for general access structures. Electronic Colloquium on computational Complexitly (ECCC),1996,3(012). 被引量:1
  • 6Carlo Blundo, De Santis Alfredo, Stinson Douglas R. On the contrast in visual cryptography schemes. Journal of Cryptology: The Journal of the International Association for Cryptologic Resenrch, 1999, 12(4):261-289. 被引量:1
  • 7Giuseppe Ateniese, Carlo Blundo, De Santis Alfredo, et al. Extended capabilities for visual cryptography. Theoretical Computer Science, 250(1-2): 143-161, 2001. 被引量:1
  • 8Capocelli R M, Santis Gargano L, et al. On the size of shares for secret sharing schemes. Journal of Cryptology:The Journal of The International Association for Cryptologic Research, 1993, 6(3): 157-167. 被引量:1
  • 9Ryo Ito, Hidenori Kuwakdo, Hatsukazu. Image size invariant visual cryptography. IEICE Trans. Fundamentals,1998, E81-A(10) :2172-2177. 被引量:1
  • 10Blundo, Stinson. Anonymous secret sharing schemes.DMATH: Discrete Applied Mathematics and Combinatorial Operations Research and Computer Science, 77, 1997. 被引量:1

共引文献5

同被引文献25

  • 1YI Feng WANG Daoshun LUO Ping HUANG Liansheng DAI Yiqi.Multi secret image color visual cryptography schemes for general access structures[J].Progress in Natural Science:Materials International,2006,16(4):431-436. 被引量:3
  • 2Naor M, Shamir A. Visual cryptography [ A ]. Advances in Cryptology-Eurocrypt' 94 ( LNCS 950) [ C ]. Berlin: SpringerVerlag, 1995.1 - 12. 被引量:1
  • 3Ateniese G,Blundo C,De Santis A,Stinson D R. Extended capabilities for visual cryptography[ J]. Theoretical Computer Science,2001,250(1 - 2) :143 - 161. 被引量:1
  • 4Blundo C,De Santis A, Stinson D R. On the contrast in visual cryptography schemes [ J ]. Journal of Cryptology, 1999,12 (4) : 261 - 289. 被引量:1
  • 5Kuhlmann C, Simon H U. Construction of visual secret sharing schemes with almost optimal contrast[ A ]. Proceedings of the llth Annual ACM-SIAM Symposium on Discrete Algorithms [C]. Philadelphia: Society for Industrial and Applied Mathematics,2000.263- 272. 被引量:1
  • 6Eisen P A, Stinson D R. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[ J ]. Designs, Codes and Cryptography, 2002,25( 1 ) : 15 - 61. 被引量:1
  • 7Viet D Q, Kurosawa K. Almost ideal contrast visual cryptography with reversing [ A ]. Proceeding of Topics in CryptologyCT-RSA2004(LNCS 2964) [ C]. Berlin: Springer-Verlag, 2004. 353 - 365. 被引量:1
  • 8Cimato S,De Santis A, Ferrara A L,Masucci B. Ideal contrast visual cryptography schemes with reversing [ J ]. Informatioll Processing Letters,2005,93(4) : 199 - 206. 被引量:1
  • 9Yang C N,Wang C C, Chen T S. Real perfect contrast visual secret sharing schemes with reversing [ A ]. Lecture Note in Computer Science 3989[ C ]. Berlin: Springer-Verlag, 2006.433 - 447. 被引量:1
  • 10Mese M, Vaidyanathan P P. Recent advances in digital half-toning and inverse halftoning methods[ J]. IEEE Transactions on Circuits and Systems Ⅰ: Fundamental Theory and Applications, 2002,49(6) : 790 - 805. 被引量:1

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部