CN110278074A - A kind of visualization secret sharing scheme for Image Sharing encryption - Google Patents
A kind of visualization secret sharing scheme for Image Sharing encryption Download PDFInfo
- Publication number
- CN110278074A CN110278074A CN201810216046.5A CN201810216046A CN110278074A CN 110278074 A CN110278074 A CN 110278074A CN 201810216046 A CN201810216046 A CN 201810216046A CN 110278074 A CN110278074 A CN 110278074A
- Authority
- CN
- China
- Prior art keywords
- image
- encryption
- shared
- visualization
- ilbp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
The present invention relates to a kind of visualization secret sharing schemes for image encryption.It takes full advantage of the local contrast feature of LBP, by Secret Image image watermarking in different Image Sharings, can easily, accurately Restore Secret.By converting LBP coding for image, using segmentation, the part after segmentation can be met to different holders to achieve the effect that shared encryption.By the way that the part combination after segmentation can be restored script image.This programme can not only guarantee the image data sharing in network, also can guarantee the image data safety in network, and have preferable randomness, lower pixel-expansion, lower calculating cost.
Description
Technical field
The present invention relates to image procossings and technical field of information encryption, are related to a kind of visualization for Image Sharing encryption
Secret sharing scheme.
Background technique
With the rapid development of multimedia technology, the multimedia services such as online game, video monitoring, video conference are also continuous
It emerges in large numbers.These services are usually highly dynamic, and a large amount of resource is needed to carry out trustship.Cloud infrastructure meets resource as a kind of
Demand provides the technology of high performance-price ratio service, and more and more service providers handle multimedia clothes using cloud infrastructure
Business.Visualization Secret sharing techniques are a kind of methods of shared secret information, interrupt and modify to avoid potential, including malice
Attack and personal unsuitable management.
Summary of the invention
The object of the present invention is to provide a kind of schemes of shared encryption, are split, arrived for encrypted pattern
Impact-share achievees the effect that privacy sharing, and guarantee to pacify by decrypting the combination of patterns after segmentation to restore original pattern
Quan Xing.To reach said effect, 3 kinds of schemes, the VSS scheme (BVSS) of binary picture are proposed for different images type;Ash
Spend the VSS scheme (GVSS) of image;The VSS scheme (MIVSS) of more images, and use following technology.
The following steps are included:
Image encryption is shared:
Step 1 encrypts original image by LBP algorithm, generates LBP code;
Step 2, the random gray value L for generating controlling elements α and center pixel;
Step 3 generates the gray value of center pixel neighborhood at random by controlling elements α, and it is made to meet the requirement of ILBP;
Step 4 divides the image into, partitioning scheme can there are many, generate multiple shaded blocks, multiple shaded blocks can be dispersed to not
Image encryption impact-share is reached with holder.
Image decryption:
Multiple shared shaded blocks are combined into the shaded block of M × N by step 1;
Step 2 calculates ILBP code by each shaded block of the ILBP algorithm to M × N, to restore original image.
In an embodiment of the present invention, ILBP algorithm is in the step 1
The wherein quantization in parameter P pilot angle space, R control spatial resolution.gcIndicate the gray scale of center pixel, gpIndicate phase
The gray value of adjacent pixel p, S (x) indicate sign function,It is the average value of neighborhood, controlling elements α ∈ [0,1], gray scale L ∈ [0,
255]。
In an embodiment of the present invention, shaded block gray value must meet the following requirement in the step 3:
In BVSS scheme: for image, it is assumed that there are 2 to be total to
Enjoy block Fig. 5.When B [i, j]=1, Fig. 6 and satisfaction;As B [i, j]=0, Fig. 7, and guarantee Fig. 8
And meet。
In GVSS scheme: for image G, center pixel is, neighborhood territory pixel is.When=1, guaranteeAnd meet;When=0, guaranteeAnd meet。
In MIVSS scheme: for multiple images, it is assumed that there are n+1 shared blocks,。
The center pixel wherein generated at random, whenWhen=1,, and meet Fig. 9;WhenWhen=0,, and it is full
Foot。
It is compared with existing Image Sharing Scheme, this programme has the advantage that
(1) lossless secret reconstruction;
(2) to picture format, there is no limit;
(3) it is easy to be aligned;
(4) codebook is not needed;
(5) different size of shared;
(6) the extension computational efficiency of pixel is high.
Detailed description of the invention
The Image Encryption Scheme that Fig. 1 is 3 × 3, the image encryption practical application that Fig. 2 is 3 × 3, Fig. 3 are multiple image encryption
Secret sharing, Fig. 4 are the shared practical application of multiple image encryption, and Fig. 5 is that two width point deposit image S1, and S2, Fig. 6 are to divide to deposit image S1
Pixel value range, Fig. 7 is that point to deposit information be the pixel value range for 0 time-division depositing image S1, and Fig. 8 is that point to deposit information be 0 time-division
The pixel value range of image S2 is deposited, Fig. 9 is k-th point and deposits the value condition that the corresponding pixel value of image should meet.
Specific embodiment
The technical scheme in the embodiments of the invention will be clearly and completely described below, it is clear that described implementation
Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without making creative work belongs to the model that the present invention protects
It encloses.
The present invention provide it is a kind of for Image Sharing encryption visualization secret sharing scheme the following steps are included:
Image encryption is shared:
Step 1 encrypts original image by ILBP algorithm, generates LBP code;
Step 2, the random gray value L for generating controlling elements α and center pixel;
Step 3 generates the gray value of center pixel neighborhood at random by controlling elements α, and it is made to meet the requirement of ILBP;
Step 4 divides the image into, partitioning scheme can there are many, generate multiple shaded blocks, multiple shaded blocks can be dispersed to not
Image encryption impact-share is reached with holder.
Image decryption:
Multiple shared shaded blocks are combined into the shaded block of M × N by step 1;
Step 2 calculates ILBP code by each shaded block of the ILBP algorithm to M × N, to restore original image.
Further by taking in Fig. 13 × 3 gray level image as an example, comprising the following steps:
Image encryption is shared:
LBP code is distributed in 3 × 3 image block by step 1;
Step 2 generates the gray value L of controlling elements α and center pixel, here α=0.24, center pixel value 83 at random;
Step 3 generates the gray value of center pixel neighborhood by controlling elements α at random, here for (87,40,210,68,
35,96,71,180), these values all meet the requirement of GVSS scheme in ILBP;
Step 4 divides the image into, and here with horizontal partition, is divided into 3 shared block, Share1, Share2, Share3, but divide
The mode of cutting is not limited to this one kind.
Image decryption:
3 shared shaded block Share1, Share2, Share3 are combined into 3 × 3 shaded block by step 1;
Step 2, by ILBP algorithm to 3 × 3 each shaded block inverse operation ILBP code, to restore original image.
Further combine 2 example of image that image decryption is described in detail:
In the example shown in image 2, α=0.15 that generates at random.Wherein (a) is original image Barbara;(e) by a image point in
At 3 shared shaded blocks;(b) image to restore after decryption.It (c) is original image Lena;(f) c image is divided into 3 in share
Shaded block, (d) image to restore after decryption.
Present invention could apply to different-format or the images of different gray scales, to realize visual cryptography.The side proposed
Method has lot of advantages, including lossless secret reconstruct, is not limited to picture format, be easy to be aligned etc..Expanded based on different LBP
Exhibition or variant, devise a variety of VSS schemes and come shared secret or hiding information.The experimental results showed that this method and traditional figure
It is effective for comparing as secret sharing.It provides preferably shared flexibility and low computation complexity.
Claims (4)
1. a kind of visualization secret sharing scheme for Image Sharing encryption, it is characterised in that following steps:
Image encryption is shared:
Step 1 encrypts original image by ILBP algorithm, generates LBP code;
Step 2, the random gray value L for generating controlling elements α and center pixel;
Step 3 generates the gray value of center pixel neighborhood at random by controlling elements α, and it is made to meet the requirement of ILBP;
Step 4 divides the image into, partitioning scheme can there are many, generate multiple shaded blocks, multiple shaded blocks can be dispersed to not
Image encryption impact-share is reached with holder;
Image decryption:
Multiple shared shaded blocks are combined into the shaded block of M × N by step 1;
Step 2 calculates ILBP code by each shaded block of the ILBP algorithm to M × N, to restore original image.
2. requiring a kind of visualization secret sharing scheme for Image Sharing encryption based on right 1, it is characterised in that
The controlling elements of step 2 during image encryption is sharedWith the gray value of center pixelIt is randomly generated.
3. requiring a kind of visualization secret sharing scheme for Image Sharing encryption based on right 1, it is characterised in that
The gray value of the center pixel neighborhood of step 3 is to be controlled by controlling elements α and generated at random during image encryption is shared.
4. requiring a kind of visualization secret sharing scheme for Image Sharing encryption based on right 1, it is characterised in that
Shared shaded block combination inverse operation ILBP is carried out decrypted image in image decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216046.5A CN110278074B (en) | 2018-03-16 | 2018-03-16 | Visual secret sharing method for image encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216046.5A CN110278074B (en) | 2018-03-16 | 2018-03-16 | Visual secret sharing method for image encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278074A true CN110278074A (en) | 2019-09-24 |
CN110278074B CN110278074B (en) | 2022-11-11 |
Family
ID=67957712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810216046.5A Active CN110278074B (en) | 2018-03-16 | 2018-03-16 | Visual secret sharing method for image encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278074B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189595A (en) * | 2021-11-19 | 2022-03-15 | 临沂大学 | Image secret sharing method based on alliance chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142129A (en) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | Visual secret sharing-based image content tampering detection method |
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Method for secretly sharing and restoring digital image |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
US9514321B2 (en) * | 2013-05-02 | 2016-12-06 | Samsung Electronics Co., Ltd. | Electro device for protecting user's privacy and method for controlling thereof |
CN106203047A (en) * | 2016-07-08 | 2016-12-07 | 钟林超 | A kind of movable storage device with identification verification function |
US9692594B2 (en) * | 2014-10-27 | 2017-06-27 | Panasonic Intellectual Property Corporation Of America | Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data |
-
2018
- 2018-03-16 CN CN201810216046.5A patent/CN110278074B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142129A (en) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | Visual secret sharing-based image content tampering detection method |
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Method for secretly sharing and restoring digital image |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
US9514321B2 (en) * | 2013-05-02 | 2016-12-06 | Samsung Electronics Co., Ltd. | Electro device for protecting user's privacy and method for controlling thereof |
US9692594B2 (en) * | 2014-10-27 | 2017-06-27 | Panasonic Intellectual Property Corporation Of America | Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data |
CN106203047A (en) * | 2016-07-08 | 2016-12-07 | 钟林超 | A kind of movable storage device with identification verification function |
Non-Patent Citations (3)
Title |
---|
MANAMI SASAKI ET AL: ""Formulation of visual secret sharing schemes encrypting multiple images"", 《2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP)》 * |
任方 等: ""秘密共享技术及其在图像加密中的应用"", 《科学技术与工程》 * |
胡春强: ""秘密共享理论及相关应用研究"", 《中国博士学位论文全文数据库信息科技辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189595A (en) * | 2021-11-19 | 2022-03-15 | 临沂大学 | Image secret sharing method based on alliance chain |
Also Published As
Publication number | Publication date |
---|---|
CN110278074B (en) | 2022-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Scalable secret image sharing | |
Liu et al. | Scalable secret image sharing scheme with essential shadows | |
Lin et al. | Invertible secret image sharing with steganography | |
Chen et al. | Efficient multi-secret image sharing based on Boolean operations | |
Bansod et al. | Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity | |
Dhiman et al. | Extended visual cryptography techniques for true color images | |
Mostafa et al. | A robust high capacity gray code-based double layer security scheme for secure data embedding in 3d objects | |
Hou et al. | A privilege-based visual secret sharing model | |
Kandar et al. | Visual cryptography scheme for color image using random number with enveloping by digital watermarking | |
Anbarasi et al. | Secured secret color image sharing with steganography | |
Wu et al. | Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images | |
Das et al. | An image secret sharing technique with block based image coding | |
Li et al. | High security and robust optical image encryption approach based on computer-generated integral imaging pickup and iterative back-projection techniques | |
CN110298363A (en) | A kind of secret protection LBP feature extracting method on encrypted image | |
Ren | A novel raster map exchange scheme based on visual cryptography | |
CN110232284A (en) | A kind of image encryption method and device | |
CN110278074A (en) | A kind of visualization secret sharing scheme for Image Sharing encryption | |
Srividhya et al. | Implementation of TiOISSS with meaningful shadows and with an additional authentication image | |
Shiny et al. | An efficient tagged visual cryptography for color images | |
Manikandan et al. | Steganographic approach to enhancing secure data communication using contours and clustering | |
Anbarasi et al. | Verifiable Multi Secret Sharing Scheme for 3D Models. | |
Malipatil et al. | An efficient 3D watermarking algorithm for 3D mesh models | |
Kanakkath et al. | Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations | |
Guo et al. | A novel (n, t, n) secret image sharing scheme without a trusted third party | |
CN113312604A (en) | Block chain authentication-based public reconstruction-based distributed secret image sharing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |