期刊文献+

利用反转实现理想对比度的密图分存 被引量:3

Ideal Contrast Secret Image Sharing Using Reversing
下载PDF
导出
摘要 可视秘密共享的一个主要不足是重构后图像的对比度损失严重.提出了利用反转实现理想对比度的密图分存方案.编码轮数为m/h(上取整)(m和h分别是白像素加密所用基阵全部列和全白列的数量),采取像素块编码方式,每步都将m个连续相同的像素进行一次性加密编码,不产生像素扩展.对方案的正确性和安全性进行了证明,并与类似方案进行了对比分析和实验.该方案编码效率较高,系统容量较小. In visual secret sharing (VSS) schemes,the contrast of reconstructed image is much lost. A novel VSS scheme with reversing is presented. It can achieve really ideal contrast within (the ceiling integer of) m/h encoding runs, where m and h are respectively the number of all columns and the number of whole-white columns in the basis matrix for white pixels encoding. It encodes a secret image block by block and no pixel expansion occurs. A block consists of consecutive m pixels with same type, which means that m pixels together join into each encoding step. The proof of its correctness and security, the experimental results, analyses and comparisons are also shown. High encoding efficiency and low system capacity are its main advantages.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第2期465-468,共4页 Acta Electronica Sinica
基金 国防"十一五"重点预研项目(No.51306020201)
关键词 可视秘密共享 反转 理想对比度 黑像素完善的可视秘密共享 visual secret sharing (VSS) reversing ideal contrast perfect black visual secret sharing (PBVSS)
  • 相关文献

参考文献11

  • 1Naor M, Shamir A. Visual cryptography [ A ]. Advances in Cryptology-Eurocrypt' 94 ( LNCS 950) [ C ]. Berlin: SpringerVerlag, 1995.1 - 12. 被引量:1
  • 2Ateniese G,Blundo C,De Santis A,Stinson D R. Extended capabilities for visual cryptography[ J]. Theoretical Computer Science,2001,250(1 - 2) :143 - 161. 被引量:1
  • 3Blundo C,De Santis A, Stinson D R. On the contrast in visual cryptography schemes [ J ]. Journal of Cryptology, 1999,12 (4) : 261 - 289. 被引量:1
  • 4Kuhlmann C, Simon H U. Construction of visual secret sharing schemes with almost optimal contrast[ A ]. Proceedings of the llth Annual ACM-SIAM Symposium on Discrete Algorithms [C]. Philadelphia: Society for Industrial and Applied Mathematics,2000.263- 272. 被引量:1
  • 5Eisen P A, Stinson D R. Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels[ J ]. Designs, Codes and Cryptography, 2002,25( 1 ) : 15 - 61. 被引量:1
  • 6Viet D Q, Kurosawa K. Almost ideal contrast visual cryptography with reversing [ A ]. Proceeding of Topics in CryptologyCT-RSA2004(LNCS 2964) [ C]. Berlin: Springer-Verlag, 2004. 353 - 365. 被引量:1
  • 7Cimato S,De Santis A, Ferrara A L,Masucci B. Ideal contrast visual cryptography schemes with reversing [ J ]. Informatioll Processing Letters,2005,93(4) : 199 - 206. 被引量:1
  • 8Yang C N,Wang C C, Chen T S. Real perfect contrast visual secret sharing schemes with reversing [ A ]. Lecture Note in Computer Science 3989[ C ]. Berlin: Springer-Verlag, 2006.433 - 447. 被引量:1
  • 9YI Feng WANG Daoshun LUO Ping HUANG Liansheng DAI Yiqi.Multi secret image color visual cryptography schemes for general access structures[J].Progress in Natural Science:Materials International,2006,16(4):431-436. 被引量:3
  • 10张海波,王小非,黄友澎,罗威.基于自适应多像素编码的可视密图分存[J].西南交通大学学报,2009,44(3):448-454. 被引量:3

二级参考文献25

  • 1GanZhi ChenKefei.Cheater identifiable visual secret sharing scheme[J].Journal of Systems Engineering and Electronics,2005,16(1):233-236. 被引量:1
  • 2YI Feng WANG Daoshun LUO Ping HUANG Liansheng DAI Yiqi.Multi secret image color visual cryptography schemes for general access structures[J].Progress in Natural Science:Materials International,2006,16(4):431-436. 被引量:3
  • 3NAOR M, SHAMIR A. Visual cryptography [ C ] //Proceedings of Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science 950. Berlin: Springer-Verlag, 1995: 1-12. 被引量:1
  • 4LUKAC R, PLATANIOTIS K N, SMOLKA B, et al. A new approach to color image secret sharing[ C]//Proceedilags of the 12th European Signal Processing Conference. Vienna: [ s. n], 2004:1493-1496. 被引量:1
  • 5CIMATO S, PRISCO R D, SANTIS A D. Colored visual cryptography without color darkening [ J ]. Theoretical Computer Science, 2007, 374(1-3): 261-276. 被引量:1
  • 6MacPHERSON L A. Grey level visual cryptography for general access structures [ D ]. Waterloo: University of Waterloo, 2003. 被引量:1
  • 7HU C M, TZENG W G. Cheating prevention in visual cryptography[ J]. IEEE Trans. on Image Processing, 2007, 16( 1 ) : 36-45. 被引量:1
  • 8DENG Y P, GUO L F, LIU M L. Constructions for anonymous secret sharing schemes using combinatorial designs[ J ]. Acta Mathematicae Applicatae Sinica, English Series, 2007, 23 ( 1 ) : 67-78. 被引量:1
  • 9TSAI P F, WANG M S. An (3,3)-visual secret sharing scheme for hiding three secret data[ C/OL]. http: //www, atlantis- press, com/php/download_paper, php? id = 35. 被引量:1
  • 10SHYU S J, HUANG S Y, LEE Y K, et al. Sharing multiple secrets in visual cryptography[ J ]. Pattern Recognition, 2007, 40 : 3633-3651. 被引量:1

共引文献4

同被引文献46

  • 1黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 2易枫,王道顺,戴一奇.彩色图像的可视分存方案[J].计算机辅助设计与图形学学报,2006,18(11):1770-1775. 被引量:3
  • 3NAOR M,SHAMIR A.Visual cryptography[A].Advances inCryptology-Eurocryp’t94(LNCS 950)[C].Berlin:Springer-Verlag,1995.1-12. 被引量:1
  • 4BLUNDO C,CIMATO S,et al.Visual cryptography schemeswith optimal pixel expansion[J].Theoretical Computer Sc-ience,2006,369(1):169-182. 被引量:1
  • 5DROSTE S.New results on visual cryptography[A].Advancesin Cryptology-Crypto’96(LNCS 1109)[C].Berlin:Springer-Verlag,1996.401-415. 被引量:1
  • 6YANG C N.New visual secret sharing schemes using proba-bilistic method[J].Pattern Recognition Letters,2004,25(4):481-494. 被引量:1
  • 7ITO R,KUWAKADO H,et al.Image size invariant visualcryptography[J].IEICE Transactions on Fundamentals,1999,E82-A(10):2172-2177. 被引量:1
  • 8BLUNDO C,BONIS A D,SANTIS A D.Improved schemesfor visual cryptography[J].Designs,Codes and Cryptography,2001,24(3):255-278. 被引量:1
  • 9BLUNDO C,ARCO P D’,et al.Contrast optimal threshold v-isual cryptography schemes[J].SIAM Journal on DiscreteMathematics,2003,16(2):224-261. 被引量:1
  • 10KRAUSE M,SIMON H U.Determining the optimal contrastfor secret sharing schemes in visual cryptography[J].Combina-torics,Probability and Computing,2003,12(3):285-299. 被引量:1

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部