CN111177746A - Efficient visual secret sharing method with core participants - Google Patents

Efficient visual secret sharing method with core participants Download PDF

Info

Publication number
CN111177746A
CN111177746A CN201911276693.6A CN201911276693A CN111177746A CN 111177746 A CN111177746 A CN 111177746A CN 201911276693 A CN201911276693 A CN 201911276693A CN 111177746 A CN111177746 A CN 111177746A
Authority
CN
China
Prior art keywords
matrix
vcs
shares
access
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911276693.6A
Other languages
Chinese (zh)
Inventor
刘祖权
朱国普
常杰
杨建权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Institute of Advanced Technology of CAS
Original Assignee
Shenzhen Institute of Advanced Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Institute of Advanced Technology of CAS filed Critical Shenzhen Institute of Advanced Technology of CAS
Priority to CN201911276693.6A priority Critical patent/CN111177746A/en
Publication of CN111177746A publication Critical patent/CN111177746A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Processing (AREA)

Abstract

The invention belongs to the technical field of multimedia information security, and relates to an efficient visual secret sharing method with core participants. When the access structure of the (t, s, k, n) -VCS is decomposed into a plurality of optimal (k, k) -VCS access structures, the performance of the (t, s, k, n) -VCS is further improved, the size expansion of the shared part is reduced, and the visual quality of a reconstructed image is improved.

Description

Efficient visual secret sharing method with core participants
Technical Field
The invention belongs to the technical field of multimedia information security, and relates to an efficient visual secret sharing method with core participants.
Background
The visual secret sharing technology is that secret images are coded into a plurality of images called sharing shares according to pixel points, and black and white pixel points in the sharing shares are randomly distributed, so that no information related to the secret images can be obtained. The secret recovery algorithm is very simple, and people can directly recognize secret information through a visual system only by printing a certain number of shared shares on a transparent film and overlapping the shared shares. Due to the theoretical security of visual secret sharing and the simplicity of secret recovery, the application prospect is very wide. Size expansion and contrast are two main indexes for evaluating the visual secret sharing method, wherein size expansion refers to the size ratio of a reconstructed image to a secret image, and contrast refers to the visual quality of the reconstructed image relative to the secret image. Larger size expansion increases the storage and transmission burden of shares, and lower contrast affects the discrimination of reconstructed images by the human visual system.
With the development of the visual secret sharing technology, various visual secret sharing schemes have been proposed. In order to solve the problem of different importance of shares, visual secret sharing with core participants, abbreviated as (t, s, k, n) -VCS, has been proposed; (t, s, k, n) -VCS is a process for producing n shares of a secret image, wherein the first s shares are referred to as core shares and the remaining n-s shares are referred to as non-core shares. When we reconstruct the secret image, at least k shares need to be collected, including at least t core shares. Many scholars have intensively studied visual secret sharing techniques with core participants, and various construction methods have been proposed. But these methods have poor performance, i.e., large size expansion and small contrast. Therefore, it is of great interest to study and design an efficient visual secret sharing method with core participants.
The visual secret sharing is that image pixels are used as units to operate to obtain a plurality of shares, each share is disordered like random noise, and an attacker cannot directly solve secret information from a ciphertext. The following describes the visual secret sharing process, taking (k, n) -VCS as an example.
Visual secret sharing first constructs two n × M basis matrices M0And M1Wherein the matrix M0Called white basis matrix (white basis matrix for short), matrix M1Referred to as black matrix (black matrix for short). Then, the two basic matrixes are used for sharing the black-white (binary) secret image, and the method comprises the following specific steps:
inputting: secret image S and basis matrix M0And M1
And (3) outputting: n shares S1,S1,…,Sn
(1) Repeating steps 2-4 for each pixel s of the secret image;
(2) if the pixel s is a white pixel, the matrix M is selected0As a shared matrix M; otherwise, the matrix M is selected1As a shared matrix M;
(3) performing column permutation operation on the shared matrix M;
(4) assigning the ith row of the shared matrix M to the ith share SiWherein i is 1,2, …, n;
(5) n shares S are obtained1,S1,…,Sn
In the secret image recovery stage, the original secret image can be decrypted by only randomly selecting k shares from n shares, printing the k shares on a transparent film, and finally physically superposing the k shares. In the encryption and decryption stages of the image, information loss and size expansion exist, and the visual quality of the decrypted image is low. It is therefore desirable to devise a method to reduce the size expansion of shares and improve the visual quality of the decrypted image.
A method of constructing a (t, s, k, n) -VCS fundamental matrix (p.li and z.liu, "a novel cryptography scheme with a differential architecture of shadrows," international work on Digital watermark in springer,2017, pp.365-377.), which decomposes a (t, s, k, n) -VCS into a plurality of (t, k, n) -VCSs for processing by utilizing the decomposability of an access structure. First, the basic matrix of each (t, k, n) -VCS is constructed separately, and then these basic matrices are matrix-connected, and the obtained matrix is the basic matrix of the (t, s, k, n) -VCS. And finally sharing the secret image by using the constructed (t, s, k, n) -VCS basic matrix. The disadvantages are:
(1) it is difficult to determine whether the base matrix of (t, k, n) -VCS is optimal;
(2) since (t, k, n) -VCS is not the most basic access structure, the performance of (t, s, k, n) -VCS has room for improvement.
Disclosure of Invention
To solve the above problems in the background art, the present invention provides an efficient method for sharing visual secrets by a core participant, which can generate shares with a smaller size and improve the visual quality of reconstructed images.
The technical scheme for solving the problems is as follows: an efficient method of sharing visual secrets with a core participant, characterised by the steps of:
1) minimum grant set Γ for input (t, s, k, n) -VCS0Dividing the access structure to obtain d sub-access structures
Figure BDA0002315748690000031
2) Using the definition of equivalent access structure to d sub-access structures
Figure BDA0002315748690000032
The equivalent access structures in (1) are merged to obtain g merged sub-access structures
Figure BDA0002315748690000033
Wherein g is less than or equal to d;
3) for each sub-access structure gammaiBuilding a base matrix
Figure BDA0002315748690000034
And
Figure BDA0002315748690000035
wherein i is more than or equal to 1 and less than or equal to g;
4) for any participant j, if participant j is not included in the sub-access structure ΓiIn, matrix
Figure BDA0002315748690000036
(or
Figure BDA0002315748690000037
) The number of jth row of (a) is all equal to 0; otherwise, the matrix
Figure BDA0002315748690000038
(or
Figure BDA0002315748690000039
) Is equal to the j-th row number of the matrix
Figure BDA00023157486900000310
(or
Figure BDA00023157486900000311
) The row of values corresponding to participant j, where 1. ltoreq. i.ltoreq.g, 1. ltoreq. j.ltoreq.n;
5) will matrix
Figure BDA00023157486900000312
Are connected in series to obtain a matrix S0The matrix is formed by
Figure BDA00023157486900000313
Are connected in series to obtain a matrix S1
6) Will matrix S0And S1Deletion of the same column;
7) finally, obtaining a basic matrix S of (t, S, k, n) -VCS0And S1
The invention has the advantages that:
1) when the access structure of the (t, s, k, n) -VCS is decomposed, the access structure is decomposed into a plurality of optimal (k, k) -VCS access structures, so that the performance of the (t, s, k, n) -VCS is further improved;
2) the invention reduces the size expansion of the share;
3) the invention improves the visual quality of the reconstructed image.
Drawings
FIG. 1 illustrates a flow diagram of an efficient method of visual secret sharing with core participants;
FIG. 2 shows the experimental results of (2,3,3,5) -VCS;
wherein: (a) secret images, (b) - (f) share images, (g) reconstructed images of shares 1,2, 3, (h) reconstructed images of shares 1,2, 4, (i) reconstructed images of shares 1,2, 3, 4, (j) reconstructed images of all shares, (k) reconstructed images of shares 1,2, and (l) reconstructed images of shares 1, 4, 5;
FIG. 3 shows the experimental results of (2,4,3,6) -VCS;
wherein: (a) the secret image, (b) - (g) are shares, (h) are reconstructed images of shares 1,2, 3, (i) are reconstructed images of shares 1,2, 3, 4, (j) are reconstructed images of all shares, (k) are reconstructed images of shares 1,2, and (l) are reconstructed images of shares 1, 5, 6.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention.
The present invention contemplates a method of visual secret sharing with core participants. The basic principle is as follows: an algorithm is designed for decomposing the (t, s, k, n) -VCS access structure into a plurality of optimal (k, k) -VCS access structures. The algorithm reduces the size expansion of shares and improves the contrast of the reconstructed image.
The following describes specific steps, and a flow chart of an efficient method for sharing visual secrets with a core participant is shown in fig. 1.
1) Minimum grant set Γ for input (t, s, k, n) -VCS0Dividing the access structure to obtain d sub-access structures
Figure BDA0002315748690000041
2) Using the definition of equivalent access structure to d sub-access structures
Figure BDA0002315748690000051
The equivalent access structures in (1) are merged to obtain g merged sub-access structures
Figure BDA0002315748690000052
Wherein g is less than or equal to d.
3) For each sub-access structure gammaiBuilding a base matrix
Figure BDA0002315748690000053
And
Figure BDA0002315748690000054
wherein i is more than or equal to 1 and less than or equal to g.
4) For any participant j, if participant j is not included in the sub-access structure ΓiIn, matrix
Figure BDA0002315748690000055
(or
Figure BDA0002315748690000056
) The number of jth row of (a) is all equal to 0; otherwise, the matrix
Figure BDA0002315748690000057
(or
Figure BDA0002315748690000058
) Is equal to the j-th row number of the matrix
Figure BDA0002315748690000059
(or
Figure BDA00023157486900000510
) The row of values corresponding to participant j, where 1. ltoreq. i.ltoreq.g, 1. ltoreq. j.ltoreq.n.
5) Will matrix
Figure BDA00023157486900000511
Are connected in series to obtain a matrix S0The matrix is formed by
Figure BDA00023157486900000512
Are connected in series to obtain a matrix S1
6) Will matrix S0And S1The same column in (c) is deleted.
7) Finally, obtaining a basic matrix S of (t, S, k, n) -VCS0And S1
The present invention uses the image containing the letter "CAS" as the subject of (2,3,3,5) -VCS, and the image containing the letter "SIAT" as the subject of (2,4,3,6) -VCS, and the experimental results are shown in fig. 2 and 3, respectively. The results of the comparison of the present invention with the prior art are shown in table 1.
Table 1 comparison of the present invention with the prior art
Figure BDA00023157486900000513
[1]G.Ateniese,C.Blundo,A.De Santis,and D.R.Stinson,“Visualcryptography for general access structures,”Information and Computation,vol.129,no.2,pp.86–106,1996.
[2]P.Li and Z.Liu,“A novel visual cryptography scheme withdifferentimportance of shadows,”in International Workshop on DigitalWatermarking.Springer,2017,pp.365–377.
Discussion of the results: from the experimental simulation results of fig. 1 and 2, it is understood that the present invention is feasible, and from table 1, it is understood that the present invention is effective in that the size expansion is reduced and the contrast is increased.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures or equivalent flow transformations made by using the contents of the specification and the drawings, or applied directly or indirectly to other related systems, are included in the scope of the present invention.

Claims (1)

1. An efficient method of sharing visual secrets with a core participant comprising the steps of:
1) minimum grant set Γ for input (t, s, k, n) -VCS0Dividing the access structure to obtain d sub-access structures gamma0 10 2,…,Γ0 d
2) Using the definition of equivalent access structure to d sub-access structure gamma0 10 2,…,Γ0 dThe equivalent access structures in (1) are merged to obtain g merged sub-access structures gamma12,…,ΓgWherein g is less than or equal to d;
3) for each sub-access structure gammaiBuilding a base matrix
Figure FDA0002315748680000011
And
Figure FDA0002315748680000012
wherein i is more than or equal to 1 and less than or equal to g;
4) for any participant j, if participant j is not included in the sub-access structure ΓiIn, matrix
Figure FDA0002315748680000013
(or
Figure FDA0002315748680000014
) The number of jth row of (a) is all equal to 0; otherwise, the matrix
Figure FDA0002315748680000015
(or
Figure FDA0002315748680000016
) Is equal to the j-th row number of the matrix
Figure FDA0002315748680000017
(or
Figure FDA0002315748680000018
) The row of values corresponding to participant j, where 1. ltoreq. i.ltoreq.g, 1. ltoreq. j.ltoreq.n;
5)will matrix
Figure FDA0002315748680000019
Are connected in series to obtain a matrix S0The matrix is formed by
Figure FDA00023157486800000110
Are connected in series to obtain a matrix S1
6) Will matrix S0And S1Deletion of the same column;
7) finally, obtaining a basic matrix S of (t, S, k, n) -VCS0And S1
CN201911276693.6A 2019-12-12 2019-12-12 Efficient visual secret sharing method with core participants Pending CN111177746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911276693.6A CN111177746A (en) 2019-12-12 2019-12-12 Efficient visual secret sharing method with core participants

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911276693.6A CN111177746A (en) 2019-12-12 2019-12-12 Efficient visual secret sharing method with core participants

Publications (1)

Publication Number Publication Date
CN111177746A true CN111177746A (en) 2020-05-19

Family

ID=70653874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911276693.6A Pending CN111177746A (en) 2019-12-12 2019-12-12 Efficient visual secret sharing method with core participants

Country Status (1)

Country Link
CN (1) CN111177746A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
CN115033918A (en) * 2022-06-09 2022-09-09 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system
WO2023109710A1 (en) * 2021-12-15 2023-06-22 深圳先进技术研究院 Permission hierarchy-based method and system for sharing and reconstructing secret image

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020032866A1 (en) * 2000-09-13 2002-03-14 Yuji Suga Shared image generation apparatus and method, computer program, and computer readable storage medium
CN105404817A (en) * 2015-10-27 2016-03-16 西安电子科技大学 (k,n) threshold based user-friendly visual secret sharing method
CN107070638A (en) * 2017-04-20 2017-08-18 上海海洋大学 A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding
CN109003218A (en) * 2018-06-13 2018-12-14 成都信息工程大学 A method of construction thresholding visual cryptography matrix

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020032866A1 (en) * 2000-09-13 2002-03-14 Yuji Suga Shared image generation apparatus and method, computer program, and computer readable storage medium
CN105404817A (en) * 2015-10-27 2016-03-16 西安电子科技大学 (k,n) threshold based user-friendly visual secret sharing method
CN107070638A (en) * 2017-04-20 2017-08-18 上海海洋大学 A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding
CN109003218A (en) * 2018-06-13 2018-12-14 成都信息工程大学 A method of construction thresholding visual cryptography matrix

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘祖权: "具有核心参与者的图像秘密共享方法研究", 《信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
CN112529974B (en) * 2020-12-03 2023-07-25 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
WO2023109710A1 (en) * 2021-12-15 2023-06-22 深圳先进技术研究院 Permission hierarchy-based method and system for sharing and reconstructing secret image
CN115033918A (en) * 2022-06-09 2022-09-09 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system
CN115033918B (en) * 2022-06-09 2023-05-05 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system

Similar Documents

Publication Publication Date Title
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
Broumandnia The 3D modular chaotic map to digital color image encryption
Zhou et al. A new 1D chaotic system for image encryption
Song et al. A parallel image encryption algorithm using intra bitplane scrambling
Gao et al. Color-gray multi-image hybrid compression–encryption scheme based on BP neural network and knight tour
Wang et al. Probabilistic visual secret sharing schemes for grey-scale images and color images
CN108921764B (en) Image steganography method and system based on generation countermeasure network
CN108898025A (en) New chaotic image encryption method based on dual scramble and DNA encoding
Kaur et al. Color image encryption approach based on memetic differential evolution
CN111177746A (en) Efficient visual secret sharing method with core participants
Li et al. Color image encryption based on joint permutation and diffusion
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
Dhiman et al. Extended visual cryptography techniques for true color images
CN105404817B (en) It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding
Telem et al. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network
CN110784619A (en) Novel parallel image encryption method based on chaos
CN107590394A (en) A kind of image encryption method based on chaotic maps and bit recombination
Sajitha et al. Review on various image encryption schemes
Monoth Contrast-enhanced visual cryptography schemes based on additional pixel patterns
Kumar et al. A GRU and chaos-based novel image encryption approach for transport images
Chong et al. Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations
Halagowda et al. Image encryption method based on hybrid fractal-chaos algorithm
Liu et al. Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security
Adhikari et al. A new black and white visual cryptographic scheme for general access structures
Ye et al. Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519