CN110278074A - A kind of visualization secret sharing scheme for Image Sharing encryption - Google Patents

A kind of visualization secret sharing scheme for Image Sharing encryption Download PDF

Info

Publication number
CN110278074A
CN110278074A CN201810216046.5A CN201810216046A CN110278074A CN 110278074 A CN110278074 A CN 110278074A CN 201810216046 A CN201810216046 A CN 201810216046A CN 110278074 A CN110278074 A CN 110278074A
Authority
CN
China
Prior art keywords
image
encryption
shared
visualization
ilbp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810216046.5A
Other languages
Chinese (zh)
Other versions
CN110278074B (en
Inventor
张问银
赵伟
张亚伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi University
Original Assignee
Linyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linyi University filed Critical Linyi University
Priority to CN201810216046.5A priority Critical patent/CN110278074B/en
Publication of CN110278074A publication Critical patent/CN110278074A/en
Application granted granted Critical
Publication of CN110278074B publication Critical patent/CN110278074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The present invention relates to a kind of visualization secret sharing schemes for image encryption.It takes full advantage of the local contrast feature of LBP, by Secret Image image watermarking in different Image Sharings, can easily, accurately Restore Secret.By converting LBP coding for image, using segmentation, the part after segmentation can be met to different holders to achieve the effect that shared encryption.By the way that the part combination after segmentation can be restored script image.This programme can not only guarantee the image data sharing in network, also can guarantee the image data safety in network, and have preferable randomness, lower pixel-expansion, lower calculating cost.

Description

A kind of visualization secret sharing scheme for Image Sharing encryption
Technical field
The present invention relates to image procossings and technical field of information encryption, are related to a kind of visualization for Image Sharing encryption Secret sharing scheme.
Background technique
With the rapid development of multimedia technology, the multimedia services such as online game, video monitoring, video conference are also continuous It emerges in large numbers.These services are usually highly dynamic, and a large amount of resource is needed to carry out trustship.Cloud infrastructure meets resource as a kind of Demand provides the technology of high performance-price ratio service, and more and more service providers handle multimedia clothes using cloud infrastructure Business.Visualization Secret sharing techniques are a kind of methods of shared secret information, interrupt and modify to avoid potential, including malice Attack and personal unsuitable management.
Summary of the invention
The object of the present invention is to provide a kind of schemes of shared encryption, are split, arrived for encrypted pattern Impact-share achievees the effect that privacy sharing, and guarantee to pacify by decrypting the combination of patterns after segmentation to restore original pattern Quan Xing.To reach said effect, 3 kinds of schemes, the VSS scheme (BVSS) of binary picture are proposed for different images type;Ash Spend the VSS scheme (GVSS) of image;The VSS scheme (MIVSS) of more images, and use following technology.
The following steps are included:
Image encryption is shared:
Step 1 encrypts original image by LBP algorithm, generates LBP code;
Step 2, the random gray value L for generating controlling elements α and center pixel;
Step 3 generates the gray value of center pixel neighborhood at random by controlling elements α, and it is made to meet the requirement of ILBP;
Step 4 divides the image into, partitioning scheme can there are many, generate multiple shaded blocks, multiple shaded blocks can be dispersed to not Image encryption impact-share is reached with holder.
Image decryption:
Multiple shared shaded blocks are combined into the shaded block of M × N by step 1;
Step 2 calculates ILBP code by each shaded block of the ILBP algorithm to M × N, to restore original image.
In an embodiment of the present invention, ILBP algorithm is in the step 1
The wherein quantization in parameter P pilot angle space, R control spatial resolution.gcIndicate the gray scale of center pixel, gpIndicate phase The gray value of adjacent pixel p, S (x) indicate sign function,It is the average value of neighborhood, controlling elements α ∈ [0,1], gray scale L ∈ [0, 255]。
In an embodiment of the present invention, shaded block gray value must meet the following requirement in the step 3:
In BVSS scheme: for image, it is assumed that there are 2 to be total to Enjoy block Fig. 5.When B [i, j]=1, Fig. 6 and satisfaction;As B [i, j]=0, Fig. 7, and guarantee Fig. 8 And meet
In GVSS scheme: for image G, center pixel is, neighborhood territory pixel is.When=1, guaranteeAnd meet;When=0, guaranteeAnd meet
In MIVSS scheme: for multiple images, it is assumed that there are n+1 shared blocks,。 The center pixel wherein generated at random, whenWhen=1,, and meet Fig. 9;WhenWhen=0,, and it is full Foot
It is compared with existing Image Sharing Scheme, this programme has the advantage that
(1) lossless secret reconstruction;
(2) to picture format, there is no limit;
(3) it is easy to be aligned;
(4) codebook is not needed;
(5) different size of shared;
(6) the extension computational efficiency of pixel is high.
Detailed description of the invention
The Image Encryption Scheme that Fig. 1 is 3 × 3, the image encryption practical application that Fig. 2 is 3 × 3, Fig. 3 are multiple image encryption Secret sharing, Fig. 4 are the shared practical application of multiple image encryption, and Fig. 5 is that two width point deposit image S1, and S2, Fig. 6 are to divide to deposit image S1 Pixel value range, Fig. 7 is that point to deposit information be the pixel value range for 0 time-division depositing image S1, and Fig. 8 is that point to deposit information be 0 time-division The pixel value range of image S2 is deposited, Fig. 9 is k-th point and deposits the value condition that the corresponding pixel value of image should meet.
Specific embodiment
The technical scheme in the embodiments of the invention will be clearly and completely described below, it is clear that described implementation Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common Technical staff's every other embodiment obtained without making creative work belongs to the model that the present invention protects It encloses.
The present invention provide it is a kind of for Image Sharing encryption visualization secret sharing scheme the following steps are included:
Image encryption is shared:
Step 1 encrypts original image by ILBP algorithm, generates LBP code;
Step 2, the random gray value L for generating controlling elements α and center pixel;
Step 3 generates the gray value of center pixel neighborhood at random by controlling elements α, and it is made to meet the requirement of ILBP;
Step 4 divides the image into, partitioning scheme can there are many, generate multiple shaded blocks, multiple shaded blocks can be dispersed to not Image encryption impact-share is reached with holder.
Image decryption:
Multiple shared shaded blocks are combined into the shaded block of M × N by step 1;
Step 2 calculates ILBP code by each shaded block of the ILBP algorithm to M × N, to restore original image.
Further by taking in Fig. 13 × 3 gray level image as an example, comprising the following steps:
Image encryption is shared:
LBP code is distributed in 3 × 3 image block by step 1;
Step 2 generates the gray value L of controlling elements α and center pixel, here α=0.24, center pixel value 83 at random;
Step 3 generates the gray value of center pixel neighborhood by controlling elements α at random, here for (87,40,210,68, 35,96,71,180), these values all meet the requirement of GVSS scheme in ILBP;
Step 4 divides the image into, and here with horizontal partition, is divided into 3 shared block, Share1, Share2, Share3, but divide The mode of cutting is not limited to this one kind.
Image decryption:
3 shared shaded block Share1, Share2, Share3 are combined into 3 × 3 shaded block by step 1;
Step 2, by ILBP algorithm to 3 × 3 each shaded block inverse operation ILBP code, to restore original image.
Further combine 2 example of image that image decryption is described in detail:
In the example shown in image 2, α=0.15 that generates at random.Wherein (a) is original image Barbara;(e) by a image point in At 3 shared shaded blocks;(b) image to restore after decryption.It (c) is original image Lena;(f) c image is divided into 3 in share Shaded block, (d) image to restore after decryption.
Present invention could apply to different-format or the images of different gray scales, to realize visual cryptography.The side proposed Method has lot of advantages, including lossless secret reconstruct, is not limited to picture format, be easy to be aligned etc..Expanded based on different LBP Exhibition or variant, devise a variety of VSS schemes and come shared secret or hiding information.The experimental results showed that this method and traditional figure It is effective for comparing as secret sharing.It provides preferably shared flexibility and low computation complexity.

Claims (4)

1. a kind of visualization secret sharing scheme for Image Sharing encryption, it is characterised in that following steps:
Image encryption is shared:
Step 1 encrypts original image by ILBP algorithm, generates LBP code;
Step 2, the random gray value L for generating controlling elements α and center pixel;
Step 3 generates the gray value of center pixel neighborhood at random by controlling elements α, and it is made to meet the requirement of ILBP;
Step 4 divides the image into, partitioning scheme can there are many, generate multiple shaded blocks, multiple shaded blocks can be dispersed to not Image encryption impact-share is reached with holder;
Image decryption:
Multiple shared shaded blocks are combined into the shaded block of M × N by step 1;
Step 2 calculates ILBP code by each shaded block of the ILBP algorithm to M × N, to restore original image.
2. requiring a kind of visualization secret sharing scheme for Image Sharing encryption based on right 1, it is characterised in that The controlling elements of step 2 during image encryption is sharedWith the gray value of center pixelIt is randomly generated.
3. requiring a kind of visualization secret sharing scheme for Image Sharing encryption based on right 1, it is characterised in that The gray value of the center pixel neighborhood of step 3 is to be controlled by controlling elements α and generated at random during image encryption is shared.
4. requiring a kind of visualization secret sharing scheme for Image Sharing encryption based on right 1, it is characterised in that Shared shaded block combination inverse operation ILBP is carried out decrypted image in image decryption.
CN201810216046.5A 2018-03-16 2018-03-16 Visual secret sharing method for image encryption Active CN110278074B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810216046.5A CN110278074B (en) 2018-03-16 2018-03-16 Visual secret sharing method for image encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810216046.5A CN110278074B (en) 2018-03-16 2018-03-16 Visual secret sharing method for image encryption

Publications (2)

Publication Number Publication Date
CN110278074A true CN110278074A (en) 2019-09-24
CN110278074B CN110278074B (en) 2022-11-11

Family

ID=67957712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810216046.5A Active CN110278074B (en) 2018-03-16 2018-03-16 Visual secret sharing method for image encryption

Country Status (1)

Country Link
CN (1) CN110278074B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189595A (en) * 2021-11-19 2022-03-15 临沂大学 Image secret sharing method based on alliance chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Method for secretly sharing and restoring digital image
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
US9514321B2 (en) * 2013-05-02 2016-12-06 Samsung Electronics Co., Ltd. Electro device for protecting user's privacy and method for controlling thereof
CN106203047A (en) * 2016-07-08 2016-12-07 钟林超 A kind of movable storage device with identification verification function
US9692594B2 (en) * 2014-10-27 2017-06-27 Panasonic Intellectual Property Corporation Of America Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Method for secretly sharing and restoring digital image
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
US9514321B2 (en) * 2013-05-02 2016-12-06 Samsung Electronics Co., Ltd. Electro device for protecting user's privacy and method for controlling thereof
US9692594B2 (en) * 2014-10-27 2017-06-27 Panasonic Intellectual Property Corporation Of America Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data
CN106203047A (en) * 2016-07-08 2016-12-07 钟林超 A kind of movable storage device with identification verification function

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MANAMI SASAKI ET AL: ""Formulation of visual secret sharing schemes encrypting multiple images"", 《2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP)》 *
任方 等: ""秘密共享技术及其在图像加密中的应用"", 《科学技术与工程》 *
胡春强: ""秘密共享理论及相关应用研究"", 《中国博士学位论文全文数据库信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189595A (en) * 2021-11-19 2022-03-15 临沂大学 Image secret sharing method based on alliance chain

Also Published As

Publication number Publication date
CN110278074B (en) 2022-11-11

Similar Documents

Publication Publication Date Title
Wang et al. Scalable secret image sharing
Liu et al. Scalable secret image sharing scheme with essential shadows
Lin et al. Invertible secret image sharing with steganography
Chen et al. Efficient multi-secret image sharing based on Boolean operations
Bansod et al. Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity
Dhiman et al. Extended visual cryptography techniques for true color images
Mostafa et al. A robust high capacity gray code-based double layer security scheme for secure data embedding in 3d objects
Hou et al. A privilege-based visual secret sharing model
Kandar et al. Visual cryptography scheme for color image using random number with enveloping by digital watermarking
Anbarasi et al. Secured secret color image sharing with steganography
Wu et al. Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images
Das et al. An image secret sharing technique with block based image coding
Li et al. High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques
CN110298363A (en) A kind of secret protection LBP feature extracting method on encrypted image
Ren A novel raster map exchange scheme based on visual cryptography
CN110232284A (en) A kind of image encryption method and device
CN110278074A (en) A kind of visualization secret sharing scheme for Image Sharing encryption
Srividhya et al. Implementation of TiOISSS with meaningful shadows and with an additional authentication image
Shiny et al. An efficient tagged visual cryptography for color images
Manikandan et al. Steganographic approach to enhancing secure data communication using contours and clustering
Anbarasi et al. Verifiable Multi Secret Sharing Scheme for 3D Models.
Malipatil et al. An efficient 3D watermarking algorithm for 3D mesh models
Kanakkath et al. Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations
Guo et al. A novel (n, t, n) secret image sharing scheme without a trusted third party
CN113312604A (en) Block chain authentication-based public reconstruction-based distributed secret image sharing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant