CN111177746A - Efficient visual secret sharing method with core participants - Google Patents
Efficient visual secret sharing method with core participants Download PDFInfo
- Publication number
- CN111177746A CN111177746A CN201911276693.6A CN201911276693A CN111177746A CN 111177746 A CN111177746 A CN 111177746A CN 201911276693 A CN201911276693 A CN 201911276693A CN 111177746 A CN111177746 A CN 111177746A
- Authority
- CN
- China
- Prior art keywords
- matrix
- vcs
- shares
- access
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Image Processing (AREA)
Abstract
The invention belongs to the technical field of multimedia information security, and relates to an efficient visual secret sharing method with core participants. When the access structure of the (t, s, k, n) -VCS is decomposed into a plurality of optimal (k, k) -VCS access structures, the performance of the (t, s, k, n) -VCS is further improved, the size expansion of the shared part is reduced, and the visual quality of a reconstructed image is improved.
Description
Technical Field
The invention belongs to the technical field of multimedia information security, and relates to an efficient visual secret sharing method with core participants.
Background
The visual secret sharing technology is that secret images are coded into a plurality of images called sharing shares according to pixel points, and black and white pixel points in the sharing shares are randomly distributed, so that no information related to the secret images can be obtained. The secret recovery algorithm is very simple, and people can directly recognize secret information through a visual system only by printing a certain number of shared shares on a transparent film and overlapping the shared shares. Due to the theoretical security of visual secret sharing and the simplicity of secret recovery, the application prospect is very wide. Size expansion and contrast are two main indexes for evaluating the visual secret sharing method, wherein size expansion refers to the size ratio of a reconstructed image to a secret image, and contrast refers to the visual quality of the reconstructed image relative to the secret image. Larger size expansion increases the storage and transmission burden of shares, and lower contrast affects the discrimination of reconstructed images by the human visual system.
With the development of the visual secret sharing technology, various visual secret sharing schemes have been proposed. In order to solve the problem of different importance of shares, visual secret sharing with core participants, abbreviated as (t, s, k, n) -VCS, has been proposed; (t, s, k, n) -VCS is a process for producing n shares of a secret image, wherein the first s shares are referred to as core shares and the remaining n-s shares are referred to as non-core shares. When we reconstruct the secret image, at least k shares need to be collected, including at least t core shares. Many scholars have intensively studied visual secret sharing techniques with core participants, and various construction methods have been proposed. But these methods have poor performance, i.e., large size expansion and small contrast. Therefore, it is of great interest to study and design an efficient visual secret sharing method with core participants.
The visual secret sharing is that image pixels are used as units to operate to obtain a plurality of shares, each share is disordered like random noise, and an attacker cannot directly solve secret information from a ciphertext. The following describes the visual secret sharing process, taking (k, n) -VCS as an example.
Visual secret sharing first constructs two n × M basis matrices M0And M1Wherein the matrix M0Called white basis matrix (white basis matrix for short), matrix M1Referred to as black matrix (black matrix for short). Then, the two basic matrixes are used for sharing the black-white (binary) secret image, and the method comprises the following specific steps:
inputting: secret image S and basis matrix M0And M1。
And (3) outputting: n shares S1,S1,…,Sn。
(1) Repeating steps 2-4 for each pixel s of the secret image;
(2) if the pixel s is a white pixel, the matrix M is selected0As a shared matrix M; otherwise, the matrix M is selected1As a shared matrix M;
(3) performing column permutation operation on the shared matrix M;
(4) assigning the ith row of the shared matrix M to the ith share SiWherein i is 1,2, …, n;
(5) n shares S are obtained1,S1,…,Sn。
In the secret image recovery stage, the original secret image can be decrypted by only randomly selecting k shares from n shares, printing the k shares on a transparent film, and finally physically superposing the k shares. In the encryption and decryption stages of the image, information loss and size expansion exist, and the visual quality of the decrypted image is low. It is therefore desirable to devise a method to reduce the size expansion of shares and improve the visual quality of the decrypted image.
A method of constructing a (t, s, k, n) -VCS fundamental matrix (p.li and z.liu, "a novel cryptography scheme with a differential architecture of shadrows," international work on Digital watermark in springer,2017, pp.365-377.), which decomposes a (t, s, k, n) -VCS into a plurality of (t, k, n) -VCSs for processing by utilizing the decomposability of an access structure. First, the basic matrix of each (t, k, n) -VCS is constructed separately, and then these basic matrices are matrix-connected, and the obtained matrix is the basic matrix of the (t, s, k, n) -VCS. And finally sharing the secret image by using the constructed (t, s, k, n) -VCS basic matrix. The disadvantages are:
(1) it is difficult to determine whether the base matrix of (t, k, n) -VCS is optimal;
(2) since (t, k, n) -VCS is not the most basic access structure, the performance of (t, s, k, n) -VCS has room for improvement.
Disclosure of Invention
To solve the above problems in the background art, the present invention provides an efficient method for sharing visual secrets by a core participant, which can generate shares with a smaller size and improve the visual quality of reconstructed images.
The technical scheme for solving the problems is as follows: an efficient method of sharing visual secrets with a core participant, characterised by the steps of:
1) minimum grant set Γ for input (t, s, k, n) -VCS0Dividing the access structure to obtain d sub-access structures
2) Using the definition of equivalent access structure to d sub-access structuresThe equivalent access structures in (1) are merged to obtain g merged sub-access structuresWherein g is less than or equal to d;
3) for each sub-access structure gammaiBuilding a base matrixAndwherein i is more than or equal to 1 and less than or equal to g;
4) for any participant j, if participant j is not included in the sub-access structure ΓiIn, matrix(or) The number of jth row of (a) is all equal to 0; otherwise, the matrix(or) Is equal to the j-th row number of the matrix(or) The row of values corresponding to participant j, where 1. ltoreq. i.ltoreq.g, 1. ltoreq. j.ltoreq.n;
5) will matrixAre connected in series to obtain a matrix S0The matrix is formed byAre connected in series to obtain a matrix S1;
6) Will matrix S0And S1Deletion of the same column;
7) finally, obtaining a basic matrix S of (t, S, k, n) -VCS0And S1。
The invention has the advantages that:
1) when the access structure of the (t, s, k, n) -VCS is decomposed, the access structure is decomposed into a plurality of optimal (k, k) -VCS access structures, so that the performance of the (t, s, k, n) -VCS is further improved;
2) the invention reduces the size expansion of the share;
3) the invention improves the visual quality of the reconstructed image.
Drawings
FIG. 1 illustrates a flow diagram of an efficient method of visual secret sharing with core participants;
FIG. 2 shows the experimental results of (2,3,3,5) -VCS;
wherein: (a) secret images, (b) - (f) share images, (g) reconstructed images of shares 1,2, 3, (h) reconstructed images of shares 1,2, 4, (i) reconstructed images of shares 1,2, 3, 4, (j) reconstructed images of all shares, (k) reconstructed images of shares 1,2, and (l) reconstructed images of shares 1, 4, 5;
FIG. 3 shows the experimental results of (2,4,3,6) -VCS;
wherein: (a) the secret image, (b) - (g) are shares, (h) are reconstructed images of shares 1,2, 3, (i) are reconstructed images of shares 1,2, 3, 4, (j) are reconstructed images of all shares, (k) are reconstructed images of shares 1,2, and (l) are reconstructed images of shares 1, 5, 6.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention.
The present invention contemplates a method of visual secret sharing with core participants. The basic principle is as follows: an algorithm is designed for decomposing the (t, s, k, n) -VCS access structure into a plurality of optimal (k, k) -VCS access structures. The algorithm reduces the size expansion of shares and improves the contrast of the reconstructed image.
The following describes specific steps, and a flow chart of an efficient method for sharing visual secrets with a core participant is shown in fig. 1.
1) Minimum grant set Γ for input (t, s, k, n) -VCS0Dividing the access structure to obtain d sub-access structures
2) Using the definition of equivalent access structure to d sub-access structuresThe equivalent access structures in (1) are merged to obtain g merged sub-access structuresWherein g is less than or equal to d.
3) For each sub-access structure gammaiBuilding a base matrixAndwherein i is more than or equal to 1 and less than or equal to g.
4) For any participant j, if participant j is not included in the sub-access structure ΓiIn, matrix(or) The number of jth row of (a) is all equal to 0; otherwise, the matrix(or) Is equal to the j-th row number of the matrix(or) The row of values corresponding to participant j, where 1. ltoreq. i.ltoreq.g, 1. ltoreq. j.ltoreq.n.
5) Will matrixAre connected in series to obtain a matrix S0The matrix is formed byAre connected in series to obtain a matrix S1。
6) Will matrix S0And S1The same column in (c) is deleted.
7) Finally, obtaining a basic matrix S of (t, S, k, n) -VCS0And S1。
The present invention uses the image containing the letter "CAS" as the subject of (2,3,3,5) -VCS, and the image containing the letter "SIAT" as the subject of (2,4,3,6) -VCS, and the experimental results are shown in fig. 2 and 3, respectively. The results of the comparison of the present invention with the prior art are shown in table 1.
Table 1 comparison of the present invention with the prior art
[1]G.Ateniese,C.Blundo,A.De Santis,and D.R.Stinson,“Visualcryptography for general access structures,”Information and Computation,vol.129,no.2,pp.86–106,1996.
[2]P.Li and Z.Liu,“A novel visual cryptography scheme withdifferentimportance of shadows,”in International Workshop on DigitalWatermarking.Springer,2017,pp.365–377.
Discussion of the results: from the experimental simulation results of fig. 1 and 2, it is understood that the present invention is feasible, and from table 1, it is understood that the present invention is effective in that the size expansion is reduced and the contrast is increased.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures or equivalent flow transformations made by using the contents of the specification and the drawings, or applied directly or indirectly to other related systems, are included in the scope of the present invention.
Claims (1)
1. An efficient method of sharing visual secrets with a core participant comprising the steps of:
1) minimum grant set Γ for input (t, s, k, n) -VCS0Dividing the access structure to obtain d sub-access structures gamma0 1,Γ0 2,…,Γ0 d;
2) Using the definition of equivalent access structure to d sub-access structure gamma0 1,Γ0 2,…,Γ0 dThe equivalent access structures in (1) are merged to obtain g merged sub-access structures gamma1,Γ2,…,ΓgWherein g is less than or equal to d;
3) for each sub-access structure gammaiBuilding a base matrixAndwherein i is more than or equal to 1 and less than or equal to g;
4) for any participant j, if participant j is not included in the sub-access structure ΓiIn, matrix(or) The number of jth row of (a) is all equal to 0; otherwise, the matrix(or) Is equal to the j-th row number of the matrix(or) The row of values corresponding to participant j, where 1. ltoreq. i.ltoreq.g, 1. ltoreq. j.ltoreq.n;
5)will matrixAre connected in series to obtain a matrix S0The matrix is formed byAre connected in series to obtain a matrix S1;
6) Will matrix S0And S1Deletion of the same column;
7) finally, obtaining a basic matrix S of (t, S, k, n) -VCS0And S1。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911276693.6A CN111177746A (en) | 2019-12-12 | 2019-12-12 | Efficient visual secret sharing method with core participants |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911276693.6A CN111177746A (en) | 2019-12-12 | 2019-12-12 | Efficient visual secret sharing method with core participants |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111177746A true CN111177746A (en) | 2020-05-19 |
Family
ID=70653874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911276693.6A Pending CN111177746A (en) | 2019-12-12 | 2019-12-12 | Efficient visual secret sharing method with core participants |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111177746A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112529974A (en) * | 2020-12-03 | 2021-03-19 | 中国科学院深圳先进技术研究院 | Color visual password sharing method and device for binary image |
CN115033918A (en) * | 2022-06-09 | 2022-09-09 | 易顺云(深圳)科技有限公司 | Enterprise integrated information management method and system |
WO2023109710A1 (en) * | 2021-12-15 | 2023-06-22 | 深圳先进技术研究院 | Permission hierarchy-based method and system for sharing and reconstructing secret image |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020032866A1 (en) * | 2000-09-13 | 2002-03-14 | Yuji Suga | Shared image generation apparatus and method, computer program, and computer readable storage medium |
CN105404817A (en) * | 2015-10-27 | 2016-03-16 | 西安电子科技大学 | (k,n) threshold based user-friendly visual secret sharing method |
CN107070638A (en) * | 2017-04-20 | 2017-08-18 | 上海海洋大学 | A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding |
CN109003218A (en) * | 2018-06-13 | 2018-12-14 | 成都信息工程大学 | A method of construction thresholding visual cryptography matrix |
-
2019
- 2019-12-12 CN CN201911276693.6A patent/CN111177746A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020032866A1 (en) * | 2000-09-13 | 2002-03-14 | Yuji Suga | Shared image generation apparatus and method, computer program, and computer readable storage medium |
CN105404817A (en) * | 2015-10-27 | 2016-03-16 | 西安电子科技大学 | (k,n) threshold based user-friendly visual secret sharing method |
CN107070638A (en) * | 2017-04-20 | 2017-08-18 | 上海海洋大学 | A kind of ocean remote sensing image privacy sharing method of dynamic weighting thresholding |
CN109003218A (en) * | 2018-06-13 | 2018-12-14 | 成都信息工程大学 | A method of construction thresholding visual cryptography matrix |
Non-Patent Citations (1)
Title |
---|
刘祖权: "具有核心参与者的图像秘密共享方法研究", 《信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112529974A (en) * | 2020-12-03 | 2021-03-19 | 中国科学院深圳先进技术研究院 | Color visual password sharing method and device for binary image |
CN112529974B (en) * | 2020-12-03 | 2023-07-25 | 中国科学院深圳先进技术研究院 | Color visual password sharing method and device for binary image |
WO2023109710A1 (en) * | 2021-12-15 | 2023-06-22 | 深圳先进技术研究院 | Permission hierarchy-based method and system for sharing and reconstructing secret image |
CN115033918A (en) * | 2022-06-09 | 2022-09-09 | 易顺云(深圳)科技有限公司 | Enterprise integrated information management method and system |
CN115033918B (en) * | 2022-06-09 | 2023-05-05 | 易顺云(深圳)科技有限公司 | Enterprise integrated information management method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | A chaos-based symmetric image encryption scheme using a bit-level permutation | |
Broumandnia | The 3D modular chaotic map to digital color image encryption | |
Zhou et al. | A new 1D chaotic system for image encryption | |
Song et al. | A parallel image encryption algorithm using intra bitplane scrambling | |
Gao et al. | Color-gray multi-image hybrid compression–encryption scheme based on BP neural network and knight tour | |
Wang et al. | Probabilistic visual secret sharing schemes for grey-scale images and color images | |
CN108921764B (en) | Image steganography method and system based on generation countermeasure network | |
CN108898025A (en) | New chaotic image encryption method based on dual scramble and DNA encoding | |
Kaur et al. | Color image encryption approach based on memetic differential evolution | |
CN111177746A (en) | Efficient visual secret sharing method with core participants | |
Li et al. | Color image encryption based on joint permutation and diffusion | |
CN107239708A (en) | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos | |
Dhiman et al. | Extended visual cryptography techniques for true color images | |
CN105404817B (en) | It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding | |
Telem et al. | A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network | |
CN110784619A (en) | Novel parallel image encryption method based on chaos | |
CN107590394A (en) | A kind of image encryption method based on chaotic maps and bit recombination | |
Sajitha et al. | Review on various image encryption schemes | |
Monoth | Contrast-enhanced visual cryptography schemes based on additional pixel patterns | |
Kumar et al. | A GRU and chaos-based novel image encryption approach for transport images | |
Chong et al. | Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations | |
Halagowda et al. | Image encryption method based on hybrid fractal-chaos algorithm | |
Liu et al. | Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security | |
Adhikari et al. | A new black and white visual cryptographic scheme for general access structures | |
Ye et al. | Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200519 |