期刊文献+

基于通用存取结构的异或区域递增式视觉密码方案 被引量:1

General Access Structure Based Region Incrementing Visual Cryptography Scheme by XOR Operation
下载PDF
导出
摘要 为了优化区域递增式视觉密码的性能参数,提出一种基于异或运算的区域递增式视觉密码方案.首先设计自适应区域分配算法,然后构造单秘密分享视觉密码的加密矩阵,最后设计秘密图像的分享与恢复流程,并给出一种实现方案.实验结果表明,该方案适用于通用存取结构,能提供更加丰富的应用场景,且像素不扩展,可有效地减少共享份的存储和传输开销;同时,恢复图像不存在颜色反转失真,白像素可以实现完全恢复,提高了相对差,能够显著地改善秘密图像的视觉效果. In order to optimize the performance parameters of region incrementing visual cryptography. A novel XOR-based region incrementing visual cryptography scheme is proposed. At first, an adaptive region assignment algorithm is designed. Then, the encode matrices of single secret sharing visual cryptography are constructed. Furthermore, the procedures of secret image sharing and recovering are designed. Finally, a scheme is realized. Experimental results show that the proposed scheme is suitable for general access structure, and further enriches the application scenarios. Moreover, it has no pixel expansion, and the storage and transmission cost of shares can be decreased efficiently. Meanwhile, the reverse color distortion problem is solved, the white pixels of secret im-age can be recovered perfectly and the relative difference is also enhanced. Therefore, the visual performance of secret image can be improved effectively.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2015年第11期2116-2125,共10页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(61070086) 信息保障技术重点实验室开放基金(KJ-13-107)
关键词 视觉密码 区域递增式 异或运算 像素不扩展 完全恢复 visual cryptography region increment XOR operation no pixel expansion perfect recovery
  • 相关文献

参考文献19

  • 1Naor M, Shamir A. Visual cryptography[M] //Lecture Notes inComputer Science. Heidelberg: Springer, 1995, 950: 1-12. 被引量:1
  • 2Droste S. New results on visual cryptography[M] //LectureNotes in Computer Science. Heidelberg: Springer, 1996, 1109:401-415. 被引量:1
  • 3Yang C N, Wang D S. Property analysis of XOR based visualcryptography[J]. IEEE Transactions on Circuits and Systemsfor Video Technology, 2014, 24(2): 189-197. 被引量:1
  • 4郁滨,付正欣.无损分享视觉密码研究[J].通信学报,2013,34(3):165-170. 被引量:3
  • 5Wu X T, Sun W. Random grid-based visual secret sharing withabilities of OR and XOR decryptions[J]. The Journal of VisualCommunication and Image Representation, 2013, 24(1): 48-62. 被引量:1
  • 6Liu F, Wu C, Lin X. Cheating immune visual cryptographyscheme[J]. IET Information Security, 2011, 5(1): 51-59. 被引量:1
  • 7李鹏,马培军,苏小红,刘峰.多重门限的图像秘密共享方案[J].电子学报,2012,40(3):518-524. 被引量:8
  • 8Ateniese G, Blundo C, Santis A D, et al. Visual cryptographyfor general access structures[J]. Information and Computation,1996, 129(2): 86-106. 被引量:1
  • 9Ito R, Kuwakado H, Tanaka H. Image size invariant visualcryptography[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Science, 1999,E82-A(10): 2172–2177. 被引量:1
  • 10Shyu S J, Chen M C. Optimum pixel expansions for thresholdvisual secret sharing schemes[J]. IEEE Transactions on InformationForensics and Security, 2011, 6(3): 960-969. 被引量:1

二级参考文献50

  • 1黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 2NAOR M,SHAMIR A.Visual cryptography[A].Advances inCryptology-Eurocryp’t94(LNCS 950)[C].Berlin:Springer-Verlag,1995.1-12. 被引量:1
  • 3BLUNDO C,CIMATO S,et al.Visual cryptography schemeswith optimal pixel expansion[J].Theoretical Computer Sc-ience,2006,369(1):169-182. 被引量:1
  • 4DROSTE S.New results on visual cryptography[A].Advancesin Cryptology-Crypto’96(LNCS 1109)[C].Berlin:Springer-Verlag,1996.401-415. 被引量:1
  • 5YANG C N.New visual secret sharing schemes using proba-bilistic method[J].Pattern Recognition Letters,2004,25(4):481-494. 被引量:1
  • 6ITO R,KUWAKADO H,et al.Image size invariant visualcryptography[J].IEICE Transactions on Fundamentals,1999,E82-A(10):2172-2177. 被引量:1
  • 7BLUNDO C,BONIS A D,SANTIS A D.Improved schemesfor visual cryptography[J].Designs,Codes and Cryptography,2001,24(3):255-278. 被引量:1
  • 8BLUNDO C,ARCO P D’,et al.Contrast optimal threshold v-isual cryptography schemes[J].SIAM Journal on DiscreteMathematics,2003,16(2):224-261. 被引量:1
  • 9KRAUSE M,SIMON H U.Determining the optimal contrastfor secret sharing schemes in visual cryptography[J].Combina-torics,Probability and Computing,2003,12(3):285-299. 被引量:1
  • 10CIMATO S,SANTIS A D,et al.Ideal contrast visual cryptog-raphy schemes with reversing[J].Information Processing Let-ters,2005,93(4):199-206. 被引量:1

共引文献11

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部