期刊文献+

一种共享份分块构造的异或区域递增式视觉密码方案 被引量:3

XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction
下载PDF
导出
摘要 该文依据授权子集的个数将共享份划分若干块,按照共享份分块构造的设计思路,结合(n,n)异或单秘密视觉密码的加密矩阵,构造了异或区域递增式视觉密码的秘密分享与恢复流程。与现有方案相比,该方案可以实现解密区域图像的完全恢复,且明显减小了共享份的大小。 By designing the block construction for each share, which is divided into several blocks according to the number of qualified sets, the secret sharing and recovering algorithms of the XOR-based region incrementing visual cryptography are designed with the encoding matrices of the (n, n) XOR-based single secret sharing visual cryptography. Comparing with the existing schemes, the proposed scheme realizes the perfect recovery of decoded regions in secret image, and the sizes of shares are also decreased efficiently.
出处 《电子与信息学报》 EI CSCD 北大核心 2015年第8期1978-1983,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61070086) 信息保障技术重点实验室开放基金(KJ-13-107)资助课题
关键词 视觉密码 区域递增 密级 分块构造 异或运算 完全恢复 Visual cryptography Region incrementing Security level Block construction XOR operation Perfect recovery
  • 相关文献

参考文献17

  • 1付正欣,郁滨,房礼国.一种新的多秘密分享视觉密码[J].电子学报,2011,39(3):714-718. 被引量:13
  • 2付正欣,郁滨,房礼国.基于压缩算法的存取式多秘密视觉密码[J].电子与信息学报,2013,35(5):1055-1062. 被引量:4
  • 3Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72(2): 1867-1886. 被引量:1
  • 4Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J] Transactions on Information Forensics Security, 2013 733-743. 被引量:1
  • 5IEEE 8(5): Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662. 被引量:1
  • 6Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777. 被引量:1
  • 7Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329. 被引量:1
  • 8Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810. 被引量:1
  • 9Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463. 被引量:1
  • 10Chen Y C, Tsal D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23(8): 1225-1233. 被引量:1

二级参考文献13

  • 1黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 2NAOR M, SHAMIR A. Visual cryptography[ A]. Advances in Cryptology-Eurocrypt ' 94, LNCS [ C J. Berlin: Springer-Verlag, 1995.950:1 -12. 被引量:1
  • 3ATENIF_,SE G, BLUNDO C, De SANTIS A, STINSON D R. Visual cryptography for general access structures [ J]. Informa-tion and Computation, 1996,129(2) :86-106. 被引量:1
  • 4HSU C S, TU S F, HOU Y C. An optimization model for visual cryptography schemes with unexpanded shares[ A] .Foundations of Intelligent Systems-16th Intemational Symposium, LNAI [ C ]. Berlin: Springer-Verlag, 2006.4203: 58 -67. 被引量:1
  • 5LIN S J, LIN J C, FANG W P. Visual Cryptography (VC) with non-expanded shadow images Hilbert-curve approach [A]. Proceeding on IEEE International Conference on Intelli-gence and Security Informatics[ C]. Taipei: IEEE, 2008. 271 -272. 被引量:1
  • 6YANGCN,CHENT S.Coloredvisual cryptography scheme based onaddifivecolormixing[J].PattemRecognifion,2008, 41(10):3114-3129. 被引量:1
  • 7NG F Y, WONG D S. On the security of a visual cryptography scheme for color images[ J]. Pattern Recognition,2009,42(5) : 929 -940. 被引量:1
  • 8YU B,XU X H,FANG L G.Multi-secret sharing threshold vi-sual cryptography scheme [ A ]. 2007 International Conference on Computational Intelligence and Security[ C]. Harbin: IEEE, 2007.815 -818. 被引量:1
  • 9CHEN L H,WU C C.A Study on Visual Cryptography[D]. Taipei:National Chiao Tung University, 1998. 被引量:1
  • 10HSU H C, CHEN T S, LIN Y H. Thc ring shadow image tcchnology of visual cryptography by applying diverse rotating angles to hide the secret sharing[ A]. Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control[ C]. Taipei: IEEE, 2004.996 -1001. 被引量:1

共引文献15

同被引文献35

  • 1Huang Y H,Chang C C,Wu C Y. A DNA-based data hiding technique with low modification rates, Multimedia Tools and Applications,2014,70(3) : 1439-1451. 被引量:1
  • 2Lukac R, Plataniotis, K N, Bit-level based secret sharing for image encryption [J]. Pattern Recognition, 2005,38 (5) :767-772. 被引量:1
  • 3Fang W P,Lin J C. Visual cryptography with extra ability of hiding confidential data[J]. J. Electron. Imag., 2006,15 (2) :023020. 被引量:1
  • 4Chert T H, Tsai D S. Owner-customer right protection mechanism using a watermarking scheme and a water- marking protocolF[ J]. Pattern Recognition, 2006,39 ( 8 ) :1530-1541. 被引量:1
  • 5Kafri O, Keren E. Encryption of pictures and shapes by random grids[J]. Opt. Lett. , 1987,12(6) :377-379. 被引量:1
  • 6Naor M, Shamir A. Visual cryptography[A]. Proc. of Ad- vances in cryptology[C]. 1995,950 : 1-12. 被引量:1
  • 7Wu H C,Wang H C, Yu R W, Color visual cryptography scheme using meaningful shares[A]. Proc. of Intelligent System Design and Applications[C] 2008,3:173-178. 被引量:1
  • 8Shyu S J. Image encryption by multiple random grids[J]. Pattern Recognition, 2009,42: 1582-1596. 被引量:1
  • 9Zhou Z,Arce G R,Crescenzo G D, Halftone visual cryp- tography[J]. IEEE Trans. Image Process, 2006,15 (8) : 2441-2453. 被引量:1
  • 10Tsai D S,Chen T H, Horng G. On generating meaningful shares in visual secret sharing scheme[J]. Image Science Journal, 2008,56 : 49-55. 被引量:1

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部