CN105404817A - (k,n) threshold based user-friendly visual secret sharing method - Google Patents

(k,n) threshold based user-friendly visual secret sharing method Download PDF

Info

Publication number
CN105404817A
CN105404817A CN201510704890.9A CN201510704890A CN105404817A CN 105404817 A CN105404817 A CN 105404817A CN 201510704890 A CN201510704890 A CN 201510704890A CN 105404817 A CN105404817 A CN 105404817A
Authority
CN
China
Prior art keywords
image
shared
images
secret
cover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510704890.9A
Other languages
Chinese (zh)
Other versions
CN105404817B (en
Inventor
庞辽军
苗得雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201510704890.9A priority Critical patent/CN105404817B/en
Publication of CN105404817A publication Critical patent/CN105404817A/en
Application granted granted Critical
Publication of CN105404817B publication Critical patent/CN105404817B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Processing (AREA)

Abstract

本发明公开基于(k,n)门限的用户友好的可视秘密共享方法,主要解决现有技术存在的安全性以及对比度的低的问题。其实现步骤是:1、二值秘密图像S进行(k,n)随机网格处理,得到n幅随机网格的基础共享图像;2、输入的灰度封面图像,用直方图均衡化对图像分块处理,求出与图像每小块灰度等效的灰度等级。3、对分块之后的封面图像,再行半色调处理,根据产生抖动矩阵,求出半色调后的共享封面图像;4、将产生的基础共享和封面图像分块处理并按定值δ的堆叠比率结合,再分块结合生成有意义的最终共享图像。本发明能够防止攻击者的攻击,产生有意义的最终共享图像,扩展可视秘密共享的应用范围。

The invention discloses a user-friendly visual secret sharing method based on (k, n) threshold, and mainly solves the problems of low security and low contrast in the prior art. The implementation steps are: 1. Perform (k, n) random grid processing on the binary secret image S to obtain n pieces of basic shared images of random grids; Block processing to find the gray level equivalent to the gray level of each small block of the image. 3. Perform half-tone processing on the divided cover image, and obtain the half-tone shared cover image according to the generated dithering matrix; 4. Divide the generated basic shared and cover image into blocks and press the fixed value δ Stacking ratios are combined, and sub-blocking is combined to generate a meaningful final shared image. The invention can prevent attackers from attacking, generate meaningful final shared images, and expand the application range of visible secret sharing.

Description

基于(k, n)门限的用户友好的可视秘密共享方法A User-Friendly Visual Secret Sharing Method Based on (k, n) Threshold

技术领域 technical field

本发明涉及到信息安全技术领域,是一种信息隐藏的可视秘密共享方法,称为(k,n)门限的用户友好的可视秘密共享方法,可用于图像保护,图像共享,图像实时传输等。 The present invention relates to the technical field of information security, and is a visual secret sharing method for information hiding, a user-friendly visual secret sharing method called (k, n) threshold, which can be used for image protection, image sharing, and real-time transmission of images Wait.

背景技术 Background technique

1979年,Blakley和Shamir分别提出了秘密共享的概念。秘密共享方法是将秘密分成不同的份额,其中任意的大于等于特定数量的份额可以恢复出秘密,反之则不能。由于图像在生活中广泛的使用,1995年,Naor和Shamir把秘密共享方法引入到图像处理领域,并提出了第一个可视秘密图像共享方法。可视秘密共享方法将秘密图像分成不同的份额,其中任意大于等于特定数量的份额可以恢复出秘密图像,反之则不能。秘密图像共享方法为秘密图像在传输或存储过程中的安全性提供了一种有效的方法,尤其是在军事,商业,金融等领域。秘密图像共享方法现在分为两种。第一种是可视秘密共享,即将一定数量的份额叠加在一起便可以通过视觉看出秘密图像。第二种是可计算的秘密图像共享,即通过计算机处理一定数量的份额才可以恢复出秘密图像。由于可计算的秘密图像共享需要很复杂的算法和操作,而且恢复过程很复杂,所以可视秘密共享获得了大量的研究。在前期的可视秘密共享中,将秘密图像转换成的份额是有像素膨胀的,转换之后的图像的尺寸比原图像大得多。由于像素膨胀的存在,使得秘密图像不可能被无失真的恢复。1987年,Kafri和Keren提出基于随机网格的可视秘密共享方法,但是当时没有引起足够的重视,2006年之后,很多方法开始使用基于随机网格的可视秘密共享方法,这种方法既没有像素膨胀也不需要制作复杂的编码本。但是这种方法在产生共享图像的过程中,由于所产生的共享图像均为无意义的随机网格图像,所以容易引起攻击者的注意,进而破坏共享图像或者泄露秘密图像,同时恢复后的秘密图像对比度也不高。同时很多人提出的了基于门限方案的可视秘密共享方法和一般访问结构的可视秘密共享方法,从安全性和适用范围扩展了这一方法,但是由于产生的随机网格的图像无意义,安全性仍然有缺陷。2011年之后,基于用户友好的可视秘密共享方法第一次被正式提出,将秘密图像产生的随机网格图像嵌入封面图像中,从而形成有意义的份额,成为用户友好的方法。与单一的随机网格图像相比,用户友好的共享图像在恢复后的视觉效果上与共享图像一模一样,因此它可以防止引起恶意攻击者的注意和破坏。但是该方法只适用于(n,n)的门限方案,而且叠加之后图像对比度特别低,图像颜色特别黑。在用户友好的可视秘密共享方法中,对比度是一个衡量性能好坏的重要指标,一般有共享图像对比度和恢复后秘密图像的对比度两个系数,一般情况下共享图像越多,恢复后的秘密图像对比度越低,黑色像素也越多。 In 1979, Blakley and Shamir respectively proposed the concept of secret sharing. The secret sharing method is to divide the secret into different shares, and any share greater than or equal to a certain number can recover the secret, and vice versa. Due to the widespread use of images in daily life, in 1995, Naor and Shamir introduced the secret sharing method into the field of image processing, and proposed the first visual secret image sharing method. The visual secret sharing method divides the secret image into different shares, and any share greater than or equal to a certain number can recover the secret image, and vice versa. The secret image sharing method provides an effective method for the security of secret images during transmission or storage, especially in military, commercial, financial and other fields. Secret image sharing methods are now divided into two. The first is visual secret sharing, that is, by superimposing a certain number of shares together, the secret image can be seen visually. The second is computable secret image sharing, that is, the secret image can only be recovered by computer processing a certain number of shares. Since computable secret image sharing requires complex algorithms and operations, and the recovery process is complex, visual secret sharing has received a lot of research. In the early stage of visual secret sharing, the share of converting the secret image is pixel-inflated, and the size of the converted image is much larger than the original image. Due to the existence of pixel expansion, it is impossible to restore the secret image without distortion. In 1987, Kafri and Keren proposed a visual secret sharing method based on a random grid, but it did not attract enough attention at that time. After 2006, many methods began to use a visual secret sharing method based on a random grid. This method has neither Pixel dilation also does not require making complex codebooks. However, in the process of generating shared images in this method, since the generated shared images are meaningless random grid images, it is easy to attract the attention of attackers, and then destroy the shared image or leak the secret image, and the restored secret The image contrast is also not high. At the same time, many people have proposed the visual secret sharing method based on the threshold scheme and the general access structure visual secret sharing method, which expands this method in terms of security and scope of application, but because the generated random grid image is meaningless, Security is still flawed. After 2011, the user-friendly visual secret sharing method was formally proposed for the first time, embedding the random grid image generated from the secret image into the cover image to form a meaningful share, becoming a user-friendly method. Compared to a single random grid image, the user-friendly shared image is restored visually identical to the shared image, so it prevents malicious attackers from attracting attention and damage. However, this method is only applicable to the (n, n) threshold scheme, and the contrast of the image after superposition is extremely low, and the image color is extremely black. In the user-friendly visual secret sharing method, the contrast is an important index to measure the performance. Generally, there are two coefficients: the contrast of the shared image and the contrast of the restored secret image. Generally, the more shared images, the restored secret The lower the image contrast, the more black pixels there will be.

文献“Thresholdvisualsecretsharingbyrandomgrids.TheJournalofSystemsandSoftware,2011,84(2011)1197–1208.”提出了一个(k,n)门限的基于随机网格的可视秘密共享方法,使可视秘密共享方法在传输的安全和防欺骗上得到提升,其中k代表门限值即解密所需最少参与者数,n代表共享图像数即参与者人数,其中k≤n。该方法的主要步骤是:第一,参考传统基于随机网格的可视秘密共享方法,并且对秘密图像的像素进行操作;第二,根据采用的随机网格方法,对秘密图像的像素进行操作,产生k个所要求的像素;第三,剩余的n-k的像素按照掷硬币的方法决定其像素值;第四,将所求出的n位像素随机分配给n幅图像,且每幅图所选择的空间位置必须一致;第五,继续完成上述操作,直到所有秘密图像的像素都被取出,最终得到n幅随机网格图像,且至少k幅图像叠加才能得出秘密图像。但是,该方法存在一些缺陷:第一,该方法的对比度很低。该方法由于使用随机取得n-k像素,导致叠加图像之后的对比度特别低。第二,该方法安全性特别低,随机产生的随机网格都是无意义的,不方便管理,这在传输和存储过程中很容易引起恶意攻击者的注意,从而破坏图像的完整性,导致无法恢复出秘密图像,有时甚至会被盗取共享份额,造成秘密图像泄漏。 The literature "Threshold visual secret sharing by random grids. The Journal of Systems and Software, 2011, 84 (2011) 1197–1208." proposed a (k, n) threshold based random grid visual secret sharing method, so that the visual secret sharing method can be used in transmission security and defense Deception is improved, where k represents the threshold value, which is the minimum number of participants required for decryption, and n represents the number of shared images, that is, the number of participants, where k≤n. The main steps of the method are: first, refer to the traditional random grid-based visual secret sharing method, and operate on the pixels of the secret image; second, operate on the pixels of the secret image according to the adopted random grid method , to generate k required pixels; third, the remaining n-k pixels determine their pixel values according to the method of tossing a coin; fourth, randomly assign the obtained n-bit pixels to n images, and each image The selected spatial positions must be consistent; fifth, continue to complete the above operations until all the pixels of the secret image are taken out, and finally n random grid images are obtained, and at least k images are superimposed to obtain the secret image. However, there are some defects in this method: first, the contrast ratio of this method is very low. Due to the random acquisition of n-k pixels in this method, the contrast after superimposing the image is particularly low. Second, the security of this method is particularly low. Randomly generated random grids are meaningless and inconvenient to manage. This can easily attract the attention of malicious attackers during transmission and storage, thereby destroying the integrity of the image, resulting in The secret image cannot be recovered, and sometimes even the shared share is stolen, resulting in the leakage of the secret image.

发明内容 Contents of the invention

本发明目的在于针对上述现有技术的不足,提出一种基于(k,n)门限方案的用户友好的可视秘密共享方法,将该方法应用于灰度图中,以增强可视秘密图像的应用范围,提高图像的传输和存储的安全性。 The object of the present invention is to address the deficiencies of the above-mentioned prior art, propose a user-friendly visual secret sharing method based on the (k, n) threshold scheme, and apply the method to the grayscale image to enhance the security of the visual secret image. The scope of application improves the security of image transmission and storage.

实现本发明目的的主要技术原理是: The main technical principle that realizes the object of the present invention is:

首先利用直方图均衡化达到提高最终有意义的共享图像以及恢复后秘密图像对比度的目的。具体方法是对图像分块处理,对分块后的图像的每一块的平均灰度等级进行等效相似,求出与图像每小块灰度等效的灰度等级,提高共享之后的封面图像的对比度。采用抖动方式进行灰度图像的半色调处理,产生抖动矩阵,该方法速度快,可以扩展该方法应用到灰度图中。同时与(k,n)门限方法结合,并结合上述两种方式处理封面图像和秘密图像,得到最后的有意义的共享图像,达到共享图像用户友好以及恢复后秘密图像的对比度提高的目的。 First, histogram equalization is used to improve the contrast of the final meaningful shared image and the restored secret image. The specific method is to divide the image into blocks, perform equivalent similarity to the average gray level of each block of the divided image, and obtain the gray level equivalent to the gray level of each small block of the image, and improve the cover image after sharing. contrast. The dithering method is used to process the halftone of the grayscale image to generate a dithering matrix. This method is fast and can be extended to grayscale images. At the same time, combined with the (k, n) threshold method, and combined with the above two methods to process the cover image and the secret image, the final meaningful shared image is obtained, which achieves the purpose of user-friendliness of the shared image and improvement of the contrast of the restored secret image.

根据以上原理,该方法实现步骤包括如下: According to the above principles, the implementation steps of the method include the following:

(1)将要保护的二值秘密图像S进行(k,n)随机网格加密,得到k幅基础共享随机网格图像,然后根据掷硬币的方法生成剩余的n-k幅基础共享随机网格图像,总共得到n幅基础共享随机网格图像,其中k是门限值,n是参与者的数量; (1) Perform (k, n) random grid encryption on the binary secret image S to be protected to obtain k basic shared random grid images, and then generate the remaining n-k basic shared random grid images according to the method of coin tossing, A total of n basic shared random grid images are obtained, where k is the threshold value and n is the number of participants;

(2)输入n幅灰度封面图像,首先将每幅灰度图像分成大小相同的小块,利用直方图均衡化处理图像小块,再对每一图像小块的平均灰度等级进行等效相似,得到与每一图像小块等效的灰度等级; (2) Input n gray-scale cover images, first divide each gray-scale image into small blocks of the same size, use histogram equalization to process the image small blocks, and then perform an equivalent to the average gray level of each image small block Similar to get the gray level equivalent to each image patch;

(3)对经步骤(2)直方图均衡化处理后的封面图像小块进行抖动半色调处理,首先产生抖动矩阵,根据抖动矩阵,求出半色调处理后的封面共享图像; (3) carry out dithering halftone processing to the cover image patch after step (2) histogram equalization process, first produce dither matrix, according to dither matrix, obtain the cover shared image after halftone process;

(4)设置堆叠比率δ,其中0≤δ≤1,将步骤(1)产生的基础共享随机网格图像和步骤(3)产生的封面共享图像先分块处理,将分块处理后的图像进行堆叠处理,生成用户友好的最终共享图像。 (4) Set the stacking ratio δ, where 0≤δ≤1, divide the basic shared random grid image generated in step (1) and the shared cover image generated in step (3) into blocks first, and divide the processed image into blocks Perform stacking to produce a user-friendly final shareable image.

(5)将步骤(4)中生成的n幅最终共享图像取出任意大于等于k幅最终共享图像将他们叠加,得到恢复后的秘密图像。 (5) From the n final shared images generated in step (4), take any k final shared images greater than or equal to them and superimpose them to obtain the restored secret image.

本发明步骤(2)所述的利用直方图均衡化处理封面图像方法,按如下步骤进行: Utilize histogram equalization process cover image method described in step (2) of the present invention, carry out as follows:

2a)将封面图像C1,C2,…,Cn均转换分解为大小为h×w的像素小块,且h×w最小不能小于2; 2a) Transform and decompose the cover images C 1 , C 2 ,...,C n into small pixel blocks with a size of h×w, and the minimum h×w cannot be less than 2;

2b)设Di,j为封面图像Ci的第j个数据块,求取同时满足公式(1)和(2)的β,令Di,j的级数等于β, 2b) Let D i,j be the jth data block of the cover image C i , find the β that satisfies the formulas (1) and (2) at the same time, let the series of D i,j be equal to β,

β≤d≤β+1(1) β≤d≤β+1(1)

rr &times;&times; cc sthe s &times;&times; &beta;&beta; &le;&le; &Sigma;&Sigma; kk == 11 dd nno ii kk << rr &times;&times; cc sthe s &times;&times; (( &beta;&beta; ++ 11 )) -- -- -- (( 22 ))

其中,Di,j代表在原封面图像Ci的第j个数据块,Di,j的平均灰度级为d,公式中代表的是在原始图像Ci中灰度级为k的像素个数,β∈{0,1,...,h×w-1}是所有级数的值,其值由分块的大小决定,其中1≤i≤n,1≤j≤(r×c)/(h×w); Among them, D i, j represents the jth data block in the original cover image C i , and the average gray level of D i, j is d, in the formula Represents the number of pixels with gray level k in the original image C i , β∈{0,1,...,h×w-1} is the value of all series, and its value is determined by the size of the block Decision, where 1≤i≤n, 1≤j≤(r×c)/(h×w);

2c)当所有分块的级数由步骤2b)中公式求出之后,标签矩阵L1,L2,…,Ln分别由对应的封面图像C1,C2,…,Cn获得,Li大小为(r×c)/(h×w),存储所有在封面图像Ci的分块的级数,对图像分块处理,对每一块的平均灰度等级进行等效相似,求出与图像每小块h×w灰度等效的灰度等级,其中i=1,2,…,n。 2c) After the series of all blocks are calculated by the formula in step 2b), the label matrix L 1 , L 2 ,...,L n are respectively obtained from the corresponding cover images C 1 , C 2 ,...,C n , L The size of i is (r×c)/(h×w), store all the block series in the cover image C i , process the image block, perform equivalent similarity on the average gray level of each block, and find The gray scale equivalent to the h×w gray scale of each small block of the image, where i=1,2,…,n.

本发明步骤(3)中利用抖动矩阵进行半色调处理方法按如下步骤获得: In step (3) of the present invention, utilize dithering matrix to carry out halftone processing method to obtain as follows:

3a)利用原始灰度封面图像C1,C2,…,Cn重建n个抖动矩阵M1,M2,…,Mn,尺寸为h×w,抖动矩阵Mt中的像素为Mt i,j,其中t=1,2,…,n,1≤i≤h,1≤j≤w; 3a) Reconstruct n dithering matrices M 1 , M 2 ,…,M n by using the original grayscale cover image C 1 , C 2 ,…,C n , the size is h×w, and the pixel in the dithering matrix M t is M t i,j , where t=1,2,...,n, 1≤i≤h, 1≤j≤w;

3b)如果步骤(2)所求的标签矩阵Lt的像素值Li,j≤Mi,j,在Pi,j的坐标(i,j)位置取黑色像素,否则在Pi,j的(i,j)位置取白色像素,其中t=1,2,…,n,1≤i≤h,1≤j≤w; 3b) If the pixel value L i,j of the label matrix L t obtained in step (2) is ≤M i,j , take a black pixel at the coordinate (i,j) of P i ,j, otherwise at P i,j The (i, j) position of the white pixel is taken, where t=1,2,...,n, 1≤i≤h, 1≤j≤w;

3c)结合所有半色调模式Pi,j产生最终所求的半色调图像,1≤i≤r,1≤j≤c进而求出所有分块封面共享图像Pt,其中t=1,2,…,n; 3c) Combine all halftone patterns P i, j to generate the final halftone image, 1≤i≤r, 1≤j≤c, and then calculate the shared image P t of all block covers, where t=1,2, ...,n;

3d)将分块矩阵转换为原始矩阵Pi,依次转换为最终大小为r×c的n个矩阵作为所求的封面共享图像,其中i=1,2,…,n。 3d) Transform the block matrix into the original matrix P i , and then transform into n matrices with a final size of r×c as the desired shared cover image, where i=1, 2, . . . , n.

本发明与现有方法相比具有如下优点: Compared with existing methods, the present invention has the following advantages:

1.由于本发明使用抖动半色调技术,因此可以将(k,n)方案应用到灰度封面图像中,提高方案的图像应用范围; 1. Since the present invention uses the dithering halftone technique, the (k, n) scheme can be applied to the grayscale cover image to improve the image application range of the scheme;

2.由于本发明使用了直方图均衡化,获取更清晰的灰度图的图像轮廓,提高最终共享图像以及恢复后的秘密图像的对比度,提高封面共享图像的可视效果,从而该方案的使用范围; 2. Since the present invention uses histogram equalization to obtain a clearer image profile of the grayscale image, improve the contrast of the final shared image and the restored secret image, and improve the visual effect of the cover shared image, thus the use of this scheme scope;

3.由于本发明利用将封面图像嵌入到秘密图像的基础共享随机网格图像中,使得共享图像变得有意义,提高了(k,n)方案的安全性,同时有意义的共享图像也便于使用者管理众多共享图像。 3. Since the present invention uses the cover image to be embedded in the basic shared random grid image of the secret image, the shared image becomes meaningful, and the security of the (k, n) scheme is improved, and the meaningful shared image is also convenient User manages many shared images.

附图说明 Description of drawings

图1是本发明的实现总流程图; Fig. 1 is the realization overall flowchart of the present invention;

图2是本发明的使用的四张大小为512×512的灰度封面图像,图中(a)-(d)分别为四张封面图像; Fig. 2 is the greyscale cover image of 512 * 512 that four pieces of size used in the present invention, among the figure (a)-(d) are respectively four cover images;

图3是本发明的使用二值秘密图像S; Fig. 3 is the binary secret image S used in the present invention;

图4是本发明产生的四张最终共享图像分别对应为的(a)-(d); Fig. 4 is (a)-(d) corresponding to four final shared images that the present invention produces respectively;

图5是本发明的四张仿真叠加结果图像分别对应为(a)-(d); Fig. 5 is that four simulation superposition result images of the present invention correspond to (a)-(d) respectively;

图6是传统(k,n)方案产生的四张最终共享图像分别对应为(a)-(d); Figure 6 is the four final shared images generated by the traditional (k, n) scheme, corresponding to (a)-(d);

图7是传统(k,n)方案的四张仿真叠加结果图像分别对应为(a)-(d)。 Fig. 7 is the traditional (k, n) scheme of the four simulation superimposed result images corresponding to (a)-(d) respectively.

具体实施方式 detailed description

下面结合附图对本发明的具体实施方式进行的描述。 The specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.

参照图1,本发明的实现步骤如下: With reference to Fig. 1, the realization steps of the present invention are as follows:

步骤1,输入需要保护的一幅秘密图像S,n幅封面图像C。 Step 1, input a secret image S and n cover images C to be protected.

秘密图像S是需要保护的图像,封面图像C用来隐藏秘密图像S,封面图像与秘密图形尺寸必须相等,这里设为r×c,r代表秘密图像和封面图像的高度,c代表秘密图像和封面图像的宽度。 The secret image S is an image that needs to be protected, and the cover image C is used to hide the secret image S. The size of the cover image and the secret graphic must be equal, here it is set to r×c, r represents the height of the secret image and the cover image, and c represents the secret image and The width of the cover image.

步骤2,利用传统基于随机网格的方法产生共享图像,秘密图像S采用的是二值图像,对于传统的基于随机网格的可视秘密共享方法,首先对秘密图像S的像素Si,j进行编码,下面首先对传统的随机网格进行介绍。 Step 2: Use the traditional random grid-based method to generate a shared image. The secret image S uses a binary image. For the traditional random grid-based visible secret sharing method, firstly, the pixel S i,j of the secret image S For coding, the following first introduces the traditional random grid.

2a)根据掷硬币的方式产生随机网格G12a) Generate a random grid G 1 according to the way of flipping a coin;

2b)当秘密图像S的像素Si,j为白色时,则第二个随机网格G2中的像素G2 i,j与随机网格G1中的像素G1 i,j值相同,反之值相反,其中1≤i≤r,1≤j≤c,其中r和c分别为秘密图像S的宽和高。 2b) When the pixel S i,j of the secret image S is white, then the pixel G 2 i,j in the second random grid G 2 has the same value as the pixel G 1 i,j in the random grid G 1 , On the contrary, the values are opposite, where 1≤i≤r, 1≤j≤c, where r and c are the width and height of the secret image S, respectively.

步骤3,产生(k,n)门限方法的基础共享随机网格图像Bt: Step 3, generate the basic shared random grid image B t of the (k, n) threshold method:

3a)按照上述步骤2对Si,j所有像素依次进行编码,对秘密图像S的中的每一个像素Si,j依次进行编码,得到像素比特值g1i,j和g2’i,j;以相同方式对g2’i,j进行编码,得到比特值g2i,j和g3’i,j,再以相同方式对g3’i,j进行编码,得到比特值g3i,j和g4’i,j,重复该运算,得到g1i,j,g2i,j,…,gki,j,其中gki,j与gk’i,j表示的是同一个比特,其中i,j分别为秘密图像S的像素横坐标和纵坐标,1≤i≤r,1≤j≤c; 3a) According to the above step 2, encode all the pixels of S i , j in sequence, and encode each pixel S i, j of the secret image S in sequence, to obtain the pixel bit values g1 i, j and g2' i, j ; Encode g2' i,j in the same way to obtain bit values g2 i,j and g3' i,j , and then encode g3' i ,j in the same way to obtain bit values g3 i,j and g4' i ,j , repeat this operation to get g1 i,j ,g2 i,j ,…,gk i,j , where gk i,j and gk' i,j represent the same bit, where i,j are secrets The pixel abscissa and ordinate of the image S, 1≤i≤r, 1≤j≤c;

3b)随机选取k个随机网格,将步骤3a)所求出的k个比特值放入这k个随机网格的相同空间位置所在的像素中,构成k个子集合B*1 i,j,B*2 i,j,…,B*k i,j,其中1≤i≤r,1≤j≤c; 3b) Randomly select k random grids, put the k bit values obtained in step 3a) into the pixels at the same spatial position of the k random grids, and form k subsets B *1 i,j , B *2 i,j ,…,B *k i,j , where 1≤i≤r, 1≤j≤c;

3c)将余下的n-k个随机网格图像{B1,B2,...,Bn}-{B*1,B*2,...,B*k}的像素按照掷硬币的方式随机抽取像素值,这些随机取得像素值与B*1 i,j,B*2 i,j,…,B*k i,j所取的空间位置一致,其中1≤i≤r,1≤j≤c; 3c) The pixels of the remaining nk random grid images {B 1 ,B 2 ,...,B n }-{B *1 ,B *2 ,...,B *k } are flipped a coin Randomly extract pixel values, these randomly obtained pixel values are consistent with the spatial positions taken by B *1 i,j , B *2 i,j ,…,B *k i,j , where 1≤i≤r, 1≤j ≤ c;

3d)重复步骤3a)-3b),直到秘密图像S中所有像素编码完成,从而产生所有的基础共享随机网格图像Bi,其中i=1,2,…,n。 3d) Steps 3a)-3b) are repeated until all pixels in the secret image S are encoded, thereby generating all basic shared random grid images B i , where i=1, 2,...,n.

步骤4,对每一张封面图像C进行直方图均衡,将封面图像分解为像素为h×w大小的小块,h代表分块的高度,w代表分块的宽度。 Step 4, perform histogram equalization on each cover image C, and decompose the cover image into small blocks with a pixel size of h×w, where h represents the height of the block, and w represents the width of the block.

封面图像都为灰度图像,对图像分块处理,对每一块的平均灰度等级进行等效相似,求出与图像每小块灰度等效的灰度等级,为了提高共享之后封面图像的对比度,直方图均衡可以获取更清晰的灰度图的图像轮廓,在恢复后的秘密图像的对比度也很高,映射秘密图像的块到其共享图像的块,本方法使用直方图均衡化的具体步骤如下: The cover images are all grayscale images. The image is divided into blocks, and the average gray level of each block is equivalently similar to obtain the gray level equivalent to the gray level of each small block of the image. In order to improve the cover image after sharing Contrast, histogram equalization can obtain a clearer image contour of the grayscale image, and the contrast of the restored secret image is also high. Mapping the blocks of the secret image to the blocks of its shared image, this method uses the specific method of histogram equalization Proceed as follows:

4a)将封面图像C1,C2,…,Cn均转换分解为大小为h×w的像素小块。对于不同尺寸的图像,h×w也不相同,一般情况下h×w越小,h×w最小可以为2,后面封面共享的可视质量越好; 4a) Transform and decompose the cover images C 1 , C 2 ,..., C n into small pixel blocks with a size of h×w. For images of different sizes, h×w is also different. Generally, the smaller h×w is, the minimum h×w can be 2, and the better the visual quality shared by the back cover;

4b)设Di,j为封面图像Ci的第j个数据块,求取同时满足公式(1)和(2)的β,令Di,j的级数等于β, 4b) Let D i,j be the jth data block of the cover image C i , find β that satisfies formulas (1) and (2) at the same time, let the series of D i,j equal to β,

β≤d≤β+1(1) β≤d≤β+1(1)

rr &times;&times; cc sthe s &times;&times; &beta;&beta; &le;&le; &Sigma;&Sigma; kk == 11 dd nno xx kk << rr &times;&times; cc sthe s &times;&times; (( &beta;&beta; ++ 11 )) -- -- -- (( 22 ))

其中,Di,j代表在原封面图像Ci的第j个数据块,Di,j的平均灰度级为d,公式中代表的是在原始图像Ci中灰度级为k的像素个数,β∈{0,1,...,h×w-1}是所有级数的值,其值由分块的大小决定,其中1≤i≤n,1≤j≤(r×c)/(h×w); Among them, D i, j represents the jth data block in the original cover image C i , and the average gray level of D i, j is d, in the formula Represents the number of pixels with gray level k in the original image C i , β∈{0,1,...,h×w-1} is the value of all series, and its value is determined by the size of the block Decision, where 1≤i≤n, 1≤j≤(r×c)/(h×w);

4c)当由所有分块的级数由步骤4b)中公式决定之后,标签矩阵L1,L2,…,Ln分别由对应的C1,C2,…,Cn获得。标签矩阵Li,大小为(r×c)/(h×w),它存储所有在封面图像Ci的分块的级数,对图像分块处理,对每一块的平均灰度等级进行等效相似,求出与图像每小块h×w灰度等效的灰度等级,方便接下来的灰度图的半色调处理,其中i=1,2,…,n。 4c) After the series of all blocks are determined by the formula in step 4b), the label matrices L 1 , L 2 ,...,L n are respectively obtained from the corresponding C 1 , C 2 ,...,C n . Label matrix L i , the size of which is (r×c)/(h×w), which stores the series of blocks in the cover image C i , blocks the image, and performs the average gray level of each block, etc. The effect is similar, and the gray scale equivalent to the gray scale of each small block h×w of the image is obtained to facilitate the halftone processing of the next gray scale image, where i=1,2,...,n.

步骤5,将所有的得到的块进行抖动模式的半色调处理: Step 5, subject all resulting blocks to halftoning in dither mode:

5a)利用原始灰度封面图像C1,C2,…,Cn重建n个抖动矩阵M1,M2,…,Mn,尺寸为h×w,抖动矩阵Mt中的像素为Mt i,j,其中t=1,2,…,n,1≤i≤h,1≤j≤w; 5a) Reconstruct n dithering matrices M 1 , M 2 ,…,M n by using the original grayscale cover image C 1 , C 2 ,…,C n , the size is h×w, and the pixel in the dithering matrix M t is M t i,j , where t=1,2,...,n, 1≤i≤h, 1≤j≤w;

5b)如果如果步骤4所求的标签矩阵Lt的像素值Li,j≤Mi,j,在Pi,j的坐标(i,j)位置取黑色像素,否则在Pi,j的(i,j)位置取白色像素1,其中t=1,2,…,n,1≤i≤h,1≤j≤w; 5b) If the pixel value L i,j of the label matrix L t obtained in step 4 ≤M i,j , take a black pixel at the coordinate (i,j) of P i ,j, otherwise at the position of P i,j (i, j) position takes white pixel 1, where t=1,2,...,n, 1≤i≤h, 1≤j≤w;

5c)结合所有半色调模式Pi,j产生最终所求的半色调图片,进而求出所有分块封面共享图像Pt,其中t=1,2,…,n,1≤i≤h,1≤j≤w; 5c) Combine all halftone patterns P i,j to generate the final halftone image, and then calculate the shared image P t of all block covers, where t=1,2,...,n, 1≤i≤h,1 ≤j≤w;

5d)将分块矩阵转换为原始矩阵Pi,依次转换为最终大小为r×c的n个矩阵作为所求的封面共享图像,其中i=1,2,…,n。 5d) Transform the block matrix into the original matrix P i , and then transform into n matrices with a final size of r×c as the desired shared cover image, where i=1, 2, . . . , n.

步骤6,产生最终的秘密共享: Step 6, generate the final secret share:

上述步骤所述的基础共享随机网格图像和封面共享图像尺寸与原秘密图像S相同,将所有图像的尺寸表示为r×c,对应求出的Pi和Bi,从Pi中随机抽取δ×r×c个像素,其中δ为堆叠比率,并用Bi中同一坐标位置的像素代替,得到最终共享图像Fi,其中i=1,2,…,n,最终产生用户友好的基于随机网格的可视秘密共享方法的安全性是由对应的(k,n)门限方案决定的,所获得的共享图像都是有意义的。 The size of the basic shared random grid image and cover shared image described in the above steps is the same as the original secret image S, and the size of all images is expressed as r×c, corresponding to the obtained P i and B i , randomly selected from P i δ×r×c pixels, where δ is the stacking ratio, and replaced by pixels at the same coordinate position in B i to obtain the final shared image F i , where i=1,2,…,n, and finally generate a user-friendly random-based The security of the grid's visual secret sharing method is determined by the corresponding (k, n) threshold scheme, and the obtained shared images are all meaningful.

步骤7,恢复秘密图像: Step 7, recover the secret image:

经步骤6生成的n幅最终共享图像中从中取出任意大于等于k幅最终共享图像将它们叠加,就可以得到恢复后的秘密图像。 From the n final shared images generated in step 6, take any k final shared images greater than or equal to them and superimpose them to obtain the restored secret image.

本发明的效果可以通过仿真进一步说明: Effect of the present invention can be further illustrated by simulation:

1.仿真条件 1. Simulation conditions

本实例在Intel(R)Core(i5)CPU3.20GHZWindows7系统下,Matlab2014a运行平台上,完成本发明的仿真实验。 This example is under Intel (R) Core (i5) CPU3.20GHZ Windows7 system, on the Matlab2014a operation platform, completes the emulation experiment of the present invention.

2.仿真实验内容 2. Simulation experiment content

选取4张图像大小为512×512的灰度图作为封面图像如图2,选取1张大小为512×512的二值图像作为秘密图像S如图3。 Select four grayscale images with a size of 512×512 as the cover image, as shown in Figure 2, and select a binary image with a size of 512×512 as the secret image S, as shown in Figure 3.

对于基于(k,n)门限的用户友好的可视秘密共享方法,以(2,4)门限方案为例,图4最终共享图像中的(a)-(d)分别为最终所生成的4张用户友好的共享图像与原始封面和秘密图像S是大小相同的,且单独从4张共享图像中也得不到任意秘密的信息,所以秘密图像S是安全的,共享图像不再是无意义的随机网格图像,他们都是有意义的图像,从而方便用户管理众多共享图像。其中任意2张或以上的共享图像叠加可以得到所求的秘密图像,之后这四张图像分别分发给4个参与者作为每个人所拥有的共享份额。 For the user-friendly visual secret sharing method based on (k,n) threshold, taking the (2,4) threshold scheme as an example, (a)-(d) in the final shared image in Figure 4 are the final generated 4 A user-friendly shared image is the same size as the original cover and the secret image S, and no secret information can be obtained from the four shared images alone, so the secret image S is safe, and the shared image is no longer meaningless A random grid of images, they are all meaningful images, making it easy for users to manage many shared images. Any two or more shared images can be superimposed to obtain the desired secret image, and then the four images are distributed to the four participants as the shared share owned by each person.

图5表示图像叠加结果,其中(a)-(d)分别为图4中(a)+(b),(a)+(d),(b)+(c)以及(a)+(b)+(c)+(d)的叠加结果,其中‘+’代表叠加操作,图5的(a)-(d)可以清楚的看出任意两个图像的叠加得到秘密图像,为了证明本方法优越性,还仿真了传统的(k,n)门限可视加密方案进行对比,同样以(2,4)方案为例,图6是传统的4张共享图像,它们都是无意义的随机网格,且无法用肉眼看出4张图像的区别,所以有时候容易引起攻击者注意,对于管理者来说也难以管理,图7则为表示传统的(k,n)门限图像叠加结果,图7的(a)-(d)分别为图6中(a)+(b),(a)+(d),(b)+(c)以及(a)+(b)+(c)+(d)的叠加结果,图7传统(k,n)门限图像叠加结果与本方法图5的叠加结果基本一致。 Figure 5 shows the image superposition results, where (a)-(d) are (a)+(b), (a)+(d), (b)+(c) and (a)+(b) in Figure 4 respectively )+(c)+(d), where '+' represents the superposition operation. It can be clearly seen from (a)-(d) in Figure 5 that the secret image can be obtained by superimposing any two images. In order to prove this method Superiority, also simulated the traditional (k, n) threshold visual encryption scheme for comparison, also take the (2, 4) scheme as an example, Figure 6 is the traditional 4 shared images, they are all meaningless random network grid, and the difference between the four images cannot be seen with the naked eye, so sometimes it is easy to attract the attention of the attacker, and it is difficult for the administrator to manage. Figure 7 shows the result of the traditional (k, n) threshold image superposition. (a)-(d) of 7 are (a)+(b), (a)+(d), (b)+(c) and (a)+(b)+(c)+ The superposition result of (d), the traditional (k, n) threshold image superposition result in Fig. 7 is basically consistent with the superposition result in Fig. 5 of this method.

经过仿真实验证明,该方法提供的共享图像不再是无意义的随机网格,而是有意义的共享图像,也就是用户友好,容易区分出图像,而且该方法生成的有意义的共享叠加之后对比度较之前的方案也没有变化很大,所以该方法是可行的也是优于之前方案的。 Simulation experiments have proved that the shared images provided by this method are no longer meaningless random grids, but meaningful shared images, that is, user-friendly, easy to distinguish images, and the meaningful shared images generated by this method are superimposed Compared with the previous scheme, the contrast has not changed much, so this method is feasible and better than the previous scheme.

名词解释 Glossary

S:秘密图像; S: secret image;

Ci:封面图像,其中i=1,2,…,n; C i : cover image, where i=1,2,...,n;

Gi:随机网格矩阵,其中i=1,2,…,k; G i : random grid matrix, where i=1,2,…,k;

k:门限值,解密所需最少参与者数; k: Threshold value, the minimum number of participants required for decryption;

n:共享图像数即参与者人数; n: The number of shared images is the number of participants;

Bi:有秘密图像产生的基础共享随机网格图像,其中i=1,2,…,n; B i : base shared random grid image generated by secret image, where i=1,2,…,n;

Di,j:封面图像分解之后的小块,其中1≤i≤n,1≤j≤(r×c)/(h×w); D i, j : Small blocks after cover image decomposition, where 1≤i≤n, 1≤j≤(r×c)/(h×w);

d:D的平均灰度级; d: average gray level of D;

β:图像每小块灰度等效的灰度等级; β: the equivalent gray level of each small gray block of the image;

Li:标签矩阵,其中i=1,2,…,n; L i : label matrix, where i=1,2,…,n;

Mi:抖动矩阵,其中i=1,2,…,n; M i : dithering matrix, where i=1,2,...,n;

r:秘密图像和封面图像的行数; r: number of rows for secret image and cover image;

c:秘密图像和封面图像的列数; c: number of columns for secret image and cover image;

h:所产生的小块的行数; h: the number of rows of the generated small block;

w:所产生的小块的列数; w: the number of columns of the generated small block;

g1,g2,…,gk:经过随机网格变换产生的k个比特数; g 1 ,g 2 ,…,g k : K bits generated by random grid transformation;

δ:调整基础共享随机网格图像与封面共享像素比例的系数,0≤δ≤1; δ: The coefficient to adjust the ratio of base shared random grid image to cover shared pixels, 0≤δ≤1;

Pi:经过半色调运算之后的封面共享图像,其中i=1,2,…,n; P i : shared cover image after halftone operation, where i=1,2,…,n;

Fi:最终共享图像,其中i=1,2,…,n。 F i : the final shared image, where i=1, 2, . . . , n.

Claims (6)

1.一种基于(k,n)门限的用户友好的可视秘密共享方法,包括如下步骤:1. A user-friendly visual secret sharing method based on (k, n) threshold, comprising the following steps: (1)将要保护的秘密图像S进行(k,n)门限的基于随机网格加密,得到k幅基础共享随机网格图像,然后根据掷硬币的方式生成剩余的n-k幅随机网格图像,总共得到n幅基础共享随机网格图像,其中k是门限值,n是参与者的数量;(1) Encrypt the secret image S to be protected based on a (k, n) threshold random grid to obtain k basic shared random grid images, and then generate the remaining n-k random grid images by flipping a coin. Obtain n basic shared random grid images, where k is the threshold value and n is the number of participants; (2)输入n幅灰度封面图像,首先将每幅灰度图像分成大小相同的小块,利用直方图均衡化处理图像小块,再对每一图像小块的平均灰度等级进行等效相似,得到每一图像小块等效的灰度等级;(2) Input n gray-scale cover images, first divide each gray-scale image into small blocks of the same size, use histogram equalization to process the image small blocks, and then perform an equivalent to the average gray level of each image small block Similar to get the equivalent gray level of each small image block; (3)对经步骤(2)直方图均衡化处理后的封面图像小块进行抖动半色调处理,首先产生抖动矩阵,利用抖动矩阵半色调处理后,求出封面共享图像;(3) carry out dithering halftone processing to the cover image patch after step (2) histogram equalization process, first produce dithering matrix, after utilizing dithering matrix halftone processing, obtain cover shared image; (4)设置堆叠比率δ,其中0≤δ≤1,将步骤(1)产生的n幅基础共享随机网格图像和步骤(3)产生的封面共享图像先分块处理,将分块处理后的图像进行堆叠处理,生成用户友好的最终共享图像;(4) Set the stacking ratio δ, where 0≤δ≤1, the n basic shared random grid images generated in step (1) and the shared cover image generated in step (3) are first divided into blocks, and after the block processing The images are stacked to generate a user-friendly final shared image; (5)将步骤(4)中生成的n幅最终共享图像取出任意大于等于k幅最终共享图像将它们叠加,得到恢复后的秘密图像。(5) From the n final shared images generated in step (4), take any k final shared images greater than or equal to them and superimpose them to obtain the restored secret image. 2.根据权利要求1所述的基于(k,n)门限的用户友好的可视秘密共享方法,其特征在于:步骤(1)所述的对秘密图像S进行随机网格加密处理,生成(k,n)门限的共享随机网格的步骤如下:2. The user-friendly visual secret sharing method based on (k, n) threshold according to claim 1, characterized in that: in step (1), the secret image S is encrypted with a random grid to generate ( k, n) threshold shared random grid steps are as follows: 2a)根据掷硬币的方式产生随机网格G12a) Generate a random grid G 1 according to the way of flipping a coin; 2b)当秘密图像S的像素Si,j为白色时,则第二个随机网格G2中的像素G2 i,j与随机网格G1中的像素G1 i,j值相同,反之则与像素G1 i,j值相反,其中1≤i≤r,1≤j≤c,r和c分别为秘密图像S的宽和高;2b) When the pixel S i,j of the secret image S is white, then the pixel G 2 i,j in the second random grid G 2 has the same value as the pixel G 1 i,j in the random grid G 1 , On the contrary, it is opposite to the pixel G 1 i,j value, where 1≤i≤r, 1≤j≤c, r and c are the width and height of the secret image S respectively; 2c)按照上述步骤2a)和2b)对秘密图像S的中的每一个像素Si,j依次进行编码,得到像素比特值g1i,j和g2’i,j;以相同方式对g2’i,j进行编码,得到比特值g2i,j和g3’i,j,再以相同方式对g3’i,j进行编码,得到比特值g3i,j和g4’i,j,重复该编码运算,得到g1i,j,g2i,j,…,gki,j,其中gki,j与gk’i,j表示的是同一个比特,其中i,j分别为秘密图像S的像素横坐标和纵坐标,1≤i≤r,1≤j≤c;2c) According to the above steps 2a) and 2b), each pixel S i, j in the secret image S is sequentially encoded to obtain pixel bit values g1 i, j and g2' i, j ; in the same way, g2' i , j is encoded to obtain bit values g2 i,j and g3' i,j , and then encode g3' i ,j in the same way to obtain bit values g3 i,j and g4' i,j , and repeat the encoding operation , get g1 i,j ,g2 i,j ,…,gk i,j , where gk i,j and gk' i,j represent the same bit, where i,j are the pixel abscissas of the secret image S and ordinate, 1≤i≤r, 1≤j≤c; 2d)随机选取k个随机网格,将步骤2c)所求出的k个比特值放入所选取的k个随机网格的相同空间位置所在的像素中,构成k个子集合B*1 i,j,B*2 i,j,…,B*k i,j,其中1≤i≤r,1≤j≤c;2d) Randomly select k random grids, put the k bit values obtained in step 2c) into the pixels at the same spatial position of the selected k random grids, and form k subsets B *1 i, j ,B *2 i,j ,…,B *k i,j , where 1≤i≤r, 1≤j≤c; 2e)将余下的n-k个随机网格图像{B1,B2,...,Bn}-{B*1,B*2,...,B*k}的像素按照掷硬币的方式随机抽取像素值,这些随机取得像素值与B*1 i,j,B*2 i,j,…,B*k i,j所取的空间位置一致,其中1≤i≤r,1≤j≤c;2e) The pixels of the remaining nk random grid images {B 1 ,B 2 ,...,B n }-{B *1 ,B *2 ,...,B *k } are flipped a coin Randomly extract pixel values, these randomly obtained pixel values are consistent with the spatial positions taken by B *1 i,j , B *2 i,j ,…,B *k i,j , where 1≤i≤r, 1≤j ≤ c; 2f)重复步骤2c)–2e),直到秘密图像S中所有像素编码完成,从而产生所有的基础共享随机网格图像Bi,其中i=1,2,…,n。2f) Steps 2c)-2e) are repeated until all pixels in the secret image S are encoded, thereby generating all basic shared random grid images B i , where i=1, 2,...,n. 3.根据权利要求1所述的基于(k,n)门限的用户友好的可视秘密共享方法,其特征在于:步骤(2)所述的利用直方图均衡化处理封面图像方法,按如下步骤进行:3. The user-friendly visual secret sharing method based on (k, n) threshold according to claim 1, characterized in that: the method for utilizing histogram equalization to process the cover image described in step (2) is as follows conduct: 3a)将封面图像C1,C2,…,Cn均转换分解为大小为h×w的像素小块,且h×w最小不能小于2;3a) Transform and decompose the cover images C 1 , C 2 ,...,C n into small pixel blocks with a size of h×w, and the minimum h×w cannot be less than 2; 3b)设Di,j为封面图像Ci的第j个数据块,求取同时满足公式(1)和(2)的β,令Di,j的级数等于β,3b) Let D i,j be the jth data block of the cover image C i , find β that satisfies formulas (1) and (2) at the same time, let the series of D i,j be equal to β, β≤d≤β+1(1)β≤d≤β+1(1) rr &times;&times; cc sthe s &times;&times; &beta;&beta; &le;&le; &Sigma;&Sigma; kk == 11 dd nno ii kk << rr &times;&times; cc sthe s &times;&times; (( &beta;&beta; ++ 11 )) -- -- -- (( 22 )) 其中,Di,j代表在原封面图像Ci的第j个数据块,Di,j的平均灰度级为d,公式中ni k代表的是在原始图像Ci中灰度级为k的像素个数,β∈{0,1,...,h×w-1}是所有级数的值,其值由分块的大小决定,其中1≤i≤n,1≤j≤(r×c)/(h×w);Among them, D i, j represents the jth data block in the original cover image C i , the average gray level of D i, j is d, and n i k in the formula represents the gray level k in the original image C i The number of pixels, β∈{0,1,...,h×w-1} is the value of all series, and its value is determined by the size of the block, where 1≤i≤n, 1≤j≤( r×c)/(h×w); 3c)当所有分块的级数由步骤3b)中公式求出之后,标签矩阵L1,L2,…,Ln分别由对应的封面图像C1,C2,…,Cn获得,Li大小为(r×c)/(h×w),存储所有在封面图像Ci的分块的级数,对图像分块处理,对每一块的平均灰度等级进行等效相似,求出与图像每小块h×w灰度等效的灰度等级,其中i=1,2,…,n。3c) After the series of all blocks are calculated by the formula in step 3b), the label matrix L 1 , L 2 ,...,L n are respectively obtained from the corresponding cover image C 1 , C 2 ,...,C n , L The size of i is (r×c)/(h×w), store all the block series in the cover image C i , process the image block, perform equivalent similarity on the average gray level of each block, and find The gray scale equivalent to the h×w gray scale of each small block of the image, where i=1,2,…,n. 4.根据权利要求1所述的基于(k,n)门限的用户友好的可视秘密共享方法,其特征在于:步骤(3)中利用抖动矩阵进行半色调处理方法按如下步骤获得:4. the user-friendly visual secret sharing method based on (k, n) threshold according to claim 1, is characterized in that: in step (3), utilize dithering matrix to carry out halftone processing method and obtain as follows: 4a)利用原始灰度封面图像C1,C2,…,Cn重建n个抖动矩阵M1,M2,…,Mn,尺寸为h×w,抖动矩阵Mt中的像素为Mt i,j,其中t=1,2,…,n,1≤i≤h,1≤j≤w;4a) Reconstruct n dithering matrices M 1 , M 2 ,…,M n by using the original grayscale cover images C 1 , C 2 ,…,C n , the size is h×w, and the pixels in the dithering matrix M t are M t i,j , where t=1,2,...,n, 1≤i≤h, 1≤j≤w; 4b)如果步骤(2)所求的标签矩阵Lt的像素值Li,j≤Mi,j,在Pi,j的坐标(i,j)位置取黑色像素,否则在Pi,j的(i,j)位置取白色像素,其中t=1,2,…,n,1≤i≤h,1≤j≤w;4b) If the pixel value L i,j of the label matrix L t obtained in step (2) is ≤M i,j , take a black pixel at the coordinate (i,j) of P i ,j, otherwise at P i,j The (i, j) position of the white pixel is taken, where t=1,2,...,n, 1≤i≤h, 1≤j≤w; 4c)结合所有半色调模式Pi,j产生最终所求的半色调图像,1≤i≤r,1≤j≤c进而求出所有分块封面共享图像Pt,其中t=1,2,…,n;4c) Combine all halftone patterns P i, j to generate the final halftone image, 1≤i≤r, 1≤j≤c, and then calculate the shared image P t of all block covers, where t=1,2, ...,n; 4d)将分块矩阵转换为原始矩阵Pi,依次转换为最终大小为r×c的n个矩阵作为所求的封面共享图像,其中i=1,2,…,n。4d) Transform the block matrix into the original matrix P i , and then transform into n matrices with a final size of r×c as the required shared cover image, where i=1, 2, . . . , n. 5.根据权利要求1所述的基于(k,n)门限的用户友好的可视秘密共享方法,其特征在于:步骤(2)和步骤(4)所述的基础共享随机网格图像和封面共享图像尺寸与原秘密图像S相同,将所有图像的尺寸表示为r×c,对应求出的Pi和Bi,从Pi中随机抽取δ×r×c个像素,其中δ为堆叠比率,并用Bi中同一坐标位置的像素代替,得到最终共享图像Fi,其中i=1,2,…,n。5. The user-friendly visual secret sharing method based on (k, n) threshold according to claim 1, characterized in that: the basic shared random grid image and cover in step (2) and step (4) The size of the shared image is the same as the original secret image S, and the size of all images is expressed as r×c, corresponding to the obtained P i and B i , and δ×r×c pixels are randomly selected from P i , where δ is the stacking ratio , and replace them with pixels at the same coordinate position in Bi to obtain the final shared image F i , where i =1, 2,...,n. 6.根据权利要求1所述的基于(k,n)门限的用户友好的可视秘密共享方法,其特征在于:步骤(5)利用生成的最终共享图像恢复秘密图像的过程,只要从生成的n幅最终共享图像取出任意大于等于k幅最终共享图像将它们叠加,就能得到恢复后的秘密图像。6. The user-friendly visual secret sharing method based on (k, n) threshold according to claim 1, characterized in that: step (5) uses the generated final shared image to recover the secret image, as long as the generated Take n final shared images and take out any final shared images greater than or equal to k and superimpose them to obtain the restored secret image.
CN201510704890.9A 2015-10-27 2015-10-27 It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding Active CN105404817B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510704890.9A CN105404817B (en) 2015-10-27 2015-10-27 It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510704890.9A CN105404817B (en) 2015-10-27 2015-10-27 It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding

Publications (2)

Publication Number Publication Date
CN105404817A true CN105404817A (en) 2016-03-16
CN105404817B CN105404817B (en) 2018-05-15

Family

ID=55470302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510704890.9A Active CN105404817B (en) 2015-10-27 2015-10-27 It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding

Country Status (1)

Country Link
CN (1) CN105404817B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108335108A (en) * 2018-02-27 2018-07-27 中国科学院软件研究所 A kind of two-dimension code safe method of mobile payment and system
CN109003218A (en) * 2018-06-13 2018-12-14 成都信息工程大学 A method of construction thresholding visual cryptography matrix
CN109214971A (en) * 2018-08-08 2019-01-15 山东科技大学 A kind of gray level image visual encryption method
CN109274855A (en) * 2018-07-31 2019-01-25 北京印刷学院 (k,n) halftone visual encryption method based on feature region
CN111177746A (en) * 2019-12-12 2020-05-19 中国科学院深圳先进技术研究院 An Efficient Visual Secret Sharing Method with Core Participants
CN111416915A (en) * 2020-02-21 2020-07-14 成都信息工程大学 An Image Secret Sharing Method and Application Based on Threshold Reduction
CN112422767A (en) * 2020-10-30 2021-02-26 国家电网有限公司大数据中心 Secret sharing method and system based on visual effect
CN113032807A (en) * 2021-03-25 2021-06-25 绍兴图信物联科技有限公司 Authenticatable (2,3) confidential image sharing method and device based on mixed fractal matrix
CN114826583A (en) * 2022-04-29 2022-07-29 西安理工大学 Image secret sharing method based on random grid and polynomial

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946310A (en) * 2012-09-03 2013-02-27 杭州电子科技大学 Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
CN104168114A (en) * 2014-08-07 2014-11-26 河海大学 Distributed type (k, n) threshold certificate-based encrypting method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102946310A (en) * 2012-09-03 2013-02-27 杭州电子科技大学 Fingerprint fuzzy vault method based on (k, w) threshold secret sharing scheme
CN104168114A (en) * 2014-08-07 2014-11-26 河海大学 Distributed type (k, n) threshold certificate-based encrypting method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
TZUNG-HER CHEN ETC: "Threshold Visual secret sharing by random grids", 《THE JOURNAL OF SYSTEMS AND SOFTWARE》 *
TZUNG-HER CHEN ETC: "User-Friendly Random-Grid-Based Visual Secret Sharing", 《IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY》 *
孙达: "用户友好的可视秘密分享技术研究", 《万方学位论文数据库》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108335108A (en) * 2018-02-27 2018-07-27 中国科学院软件研究所 A kind of two-dimension code safe method of mobile payment and system
CN108335108B (en) * 2018-02-27 2021-05-11 中国科学院软件研究所 A two-dimensional code secure mobile payment method and system
CN109003218A (en) * 2018-06-13 2018-12-14 成都信息工程大学 A method of construction thresholding visual cryptography matrix
CN109274855A (en) * 2018-07-31 2019-01-25 北京印刷学院 (k,n) halftone visual encryption method based on feature region
CN109214971B (en) * 2018-08-08 2019-05-28 山东科技大学 A kind of gray level image visual encryption method
WO2020029334A1 (en) * 2018-08-08 2020-02-13 山东科技大学 Visual encryption method for grayscale image
CN109214971A (en) * 2018-08-08 2019-01-15 山东科技大学 A kind of gray level image visual encryption method
CN111177746A (en) * 2019-12-12 2020-05-19 中国科学院深圳先进技术研究院 An Efficient Visual Secret Sharing Method with Core Participants
CN111416915A (en) * 2020-02-21 2020-07-14 成都信息工程大学 An Image Secret Sharing Method and Application Based on Threshold Reduction
CN112422767A (en) * 2020-10-30 2021-02-26 国家电网有限公司大数据中心 Secret sharing method and system based on visual effect
CN112422767B (en) * 2020-10-30 2022-07-22 国家电网有限公司大数据中心 Secret sharing method and system based on visual effect
CN113032807A (en) * 2021-03-25 2021-06-25 绍兴图信物联科技有限公司 Authenticatable (2,3) confidential image sharing method and device based on mixed fractal matrix
CN114826583A (en) * 2022-04-29 2022-07-29 西安理工大学 Image secret sharing method based on random grid and polynomial
CN114826583B (en) * 2022-04-29 2025-02-07 西安理工大学 Image secret sharing method based on random grid and polynomial

Also Published As

Publication number Publication date
CN105404817B (en) 2018-05-15

Similar Documents

Publication Publication Date Title
CN105404817B (en) It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding
Lin et al. Invertible secret image sharing with steganography
Ahmad et al. A new algorithm of encryption and decryption of images using chaotic mapping
Pareek et al. Image encryption using chaotic logistic map
CN103226802B (en) Based on the medical image share method of chaos encryption
Dhiman et al. Extended visual cryptography techniques for true color images
CN107590394B (en) An Image Encryption Method Based on Chaotic Map and Bit Reorganization
Chang et al. A sudoku-based secret image sharing scheme with reversibility
CN107592198A (en) The four-dimensional Hopfield neural network images encryption method of quantum Fourier conversion
Ou et al. Reversible AMBTC-based secret sharing scheme with abilities of two decryptions
Hazra et al. Image encryption by blockwise pixel shuffling using Modified Fisher Yates shuffle and pseudorandom permutations
Ye et al. Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
CN104574262A (en) Extension visual encryption and decryption method
Jithi et al. Progressive visual cryptography with watermarking for meaningful shares
CN105118017A (en) Gray image encryption method based on two-dimension Henon mapping
CN111177746A (en) An Efficient Visual Secret Sharing Method with Core Participants
Gupta et al. An effective approach of secured medical image transmission using encryption method
CN109064381B (en) Multi-dimensional digital watermark encryption method based on secret key
Baranwal et al. Using chaos to encrypt images with reconstruction through deep learning model for smart healthcare
Wang et al. A novel (n, n) secret image sharing scheme based on Sudoku
Abed A proposed encoding and hiding text in an image by using fractal image compression
Chiu et al. An XOR-based progressive visual cryptography with meaningful shares
CN107133994A (en) A kind of new image encryption method
Blesswin et al. An improved grayscale visual secret sharing scheme for visual information security
CN109920015B (en) Image visual meaningful encryption method based on fractal graph generation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant