期刊文献+

解密区域完美恢复的区域递增式视觉密码方案构造 被引量:1

Region Incrementing Visual Cryptography Scheme with Decrypt Regions Perfectly Recovered
下载PDF
导出
摘要 为了优化区域递增式视觉密码的恢复效果,该文通过为共享份添加身份标识,并结合随机数,构造了单个参与者持有多个共享份的异或单秘密视觉密码方案,在此基础上,设计了异或区域递增式视觉密码的秘密分享与恢复算法。对于解密区域利用异或单秘密方案进行分享,对于未解密区域,通过填充随机数实现秘密遮盖。实验结果表明,该方案可以实现解密区域图像的完美恢复,且有效减小了共享份的存储与传输开销。 In order to optimize the recovery quality of Region Incrementing Visual Cryptography Scheme (RIVCS), by adding identities for shares and combing the random numbers, an XOR-based single-secret sharing Visual Cryptography Scheme (XVCS) with individual participant holding multi-share is designed. On basis of this, the secret sharing and recovering algorithms for XOR-based RIVCS (XRIVCS) are designed. For the decrypt regions, XVCS is used to share, and for the not decrypt regions, the random numbers are filled to keep the secret. The experimental results show that, the proposed scheme can realize the perfect recovery of decrypt regions, and decrease the storage and transmission cost effectively.
机构地区 信息工程大学
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第10期2647-2653,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61070086) 信息保障技术重点实验室开放基金(KJ-13-107)~~
关键词 视觉密码 图像秘密分享 区域递增 密级 异或运算 完美恢复 Visual cryptography Image secret sharing Region incrementing Security levels XOR operation Perfect recovery
  • 相关文献

参考文献19

  • 1李鹏,马培军,苏小红,刘峰.多重门限的图像秘密共享方案[J].电子学报,2012,40(3):518-524. 被引量:8
  • 2付正欣,沈刚,李斌,郁滨.一种可完全恢复的门限多秘密视觉密码方案[J].软件学报,2015,26(7):1757-1771. 被引量:6
  • 3BIN Y and GANG S. Multi-secret visual cryptography with deterministic contrast [J]. Multimedia Tools and Applications, 2014, 72(2): 1867-1886. 被引量:1
  • 4SHYU S J and JIANG H W. General constructions for threshold multiple-secret visual cryptography schemes[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(5): 733-743. 被引量:1
  • 5WANG R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662. 被引量:1
  • 6SHYU S J and JIANG H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777. 被引量:1
  • 7YANG C N, SHIH H W, CHU Y Y, et al. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, Las Vegas, USA, 2011: 323-329. 被引量:1
  • 8YANG C N, SHIH H W, WU C C, et al. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810. 被引量:1
  • 9YANG C N, LIN Y C, and WU C C. Region-in-region incrementing visual cryptography scheme[C]. Proceedings of12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013: 449-463. 被引量:1
  • 10李吉亮,李顺东,王道顺.区域递增视觉密码的构造[OL].http://wenku.itl68.com/huiyi/2349,2014. 被引量:1

二级参考文献25

  • 1乔明秋,朱悦冬,刘焕平.多秘密共享可视密码及在防止欺骗上的应用[J].哈尔滨师范大学自然科学学报,2007,23(2):61-65. 被引量:3
  • 2黄东平,王道顺,黄连生,戴一奇.一种新的(k,n)阈值可视密钥分存方案[J].电子学报,2006,34(3):503-507. 被引量:7
  • 3NAOR M,SHAMIR A.Visual cryptography[A].Advances inCryptology-Eurocryp’t94(LNCS 950)[C].Berlin:Springer-Verlag,1995.1-12. 被引量:1
  • 4BLUNDO C,CIMATO S,et al.Visual cryptography schemeswith optimal pixel expansion[J].Theoretical Computer Sc-ience,2006,369(1):169-182. 被引量:1
  • 5DROSTE S.New results on visual cryptography[A].Advancesin Cryptology-Crypto’96(LNCS 1109)[C].Berlin:Springer-Verlag,1996.401-415. 被引量:1
  • 6YANG C N.New visual secret sharing schemes using proba-bilistic method[J].Pattern Recognition Letters,2004,25(4):481-494. 被引量:1
  • 7ITO R,KUWAKADO H,et al.Image size invariant visualcryptography[J].IEICE Transactions on Fundamentals,1999,E82-A(10):2172-2177. 被引量:1
  • 8BLUNDO C,BONIS A D,SANTIS A D.Improved schemesfor visual cryptography[J].Designs,Codes and Cryptography,2001,24(3):255-278. 被引量:1
  • 9BLUNDO C,ARCO P D’,et al.Contrast optimal threshold v-isual cryptography schemes[J].SIAM Journal on DiscreteMathematics,2003,16(2):224-261. 被引量:1
  • 10KRAUSE M,SIMON H U.Determining the optimal contrastfor secret sharing schemes in visual cryptography[J].Combina-torics,Probability and Computing,2003,12(3):285-299. 被引量:1

共引文献12

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部