CN109003218A - A method of construction thresholding visual cryptography matrix - Google Patents

A method of construction thresholding visual cryptography matrix Download PDF

Info

Publication number
CN109003218A
CN109003218A CN201810605892.6A CN201810605892A CN109003218A CN 109003218 A CN109003218 A CN 109003218A CN 201810605892 A CN201810605892 A CN 201810605892A CN 109003218 A CN109003218 A CN 109003218A
Authority
CN
China
Prior art keywords
matrix
forb
qual
access structure
basic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810605892.6A
Other languages
Chinese (zh)
Inventor
唐聃
于瀛
何晋
岳希
郎志宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu University of Information Technology
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN201810605892.6A priority Critical patent/CN109003218A/en
Publication of CN109003218A publication Critical patent/CN109003218A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a kind of methods for constructing thresholding visual cryptography matrix.The present invention enables R0And R1For access structure (Γ 'Qual, Γ 'Forb) basic matrix, T0And T1For access structure (Γ "Qual, Γ "Forb) basic matrix;Enable (Γ 'Qual, Γ 'Forb) and (Γ "Qual, Γ "Forb) it is two access structures for having n participant;Make general access structure (ΓQual, ΓForb) meet (ΓQual, ΓForb)=(Γ 'Qual∪Γ″Qual, Γ 'Forb∩Γ″Forb);Known participant's set P, Minimal authorized subset Γ0, set Γ '0With Γ "0And matrix R0、R1、T0、T1;Determine matrix R0′Line number be participant's set P in element number;According to R0Structural matrix R0′, set Γ '0The numerical value of middle element is matrix R0′The required row value filled in;And so on, matrix R0′And T0′According to Γ '0Construction, matrix R1′And T1′According to Γ "0Construction, obtains matrix R0′、T0′、R1′、T1′;Join-matrixBasic matrix S can be obtained0And S1.The building of the basis matrix of arbitrary structures visual cryptography may be implemented in the present invention.

Description

A method of construction thresholding visual cryptography matrix
Technical field
The present invention relates to secret sharing and visual cryptography field, specifically a kind of construction thresholding visual cryptography The method of matrix.
Background technique
With the fast development of internet, digital picture is widely used, and the safety problem of image is increasingly worth closing Note.To protect image, the technologies such as image encryption, Information hiding and digital watermarking propose in succession, however when the decryption of these methods all It needs to calculate.
Visual cryptography (Visual Cryptograghy) is by Naor and Shamir in European cryptography annual meeting in 1994 It is proposed, it is combined privacy sharing and digital picture based on threshold secret sharing thought, form one it is new Research hotspot.The principle of visual cryptography is that original image resolves into the random visual cryptography subgraph of two width, from single view Feel that it is impossible for wanting to obtain original image information in password subgraph.It is former only when two width visual cryptography subgraphs are completely coincident Beginning image can be just reproduced.
Secret-sharing algorithm in visual cryptography is that Secret Image is encoded to several by pixel to be known as shared part (Shares) in image, black, the white pixel point random distribution in part are shared, therefrom cannot get any about Secret Image Information.The algorithm of Restore Secret in visual cryptography is very simple, need to only print shared part of certain amount to transparent film And be overlapped, the vision system of people can directly recognize information.
It is that effect is generated and the comparison with ambient enviroment when the decryption principle of visual cryptography is eye-observation object Fruit, and the vision system of the mankind is there is no the color that method clearly identifies each pixel in image, out one can only be experienced The average effect that block region all pixels color shows.Therefore, when shared part is superimposed, as long as the gray scale difference of monochrome pixels Sufficiently large, human visual system can interpret Secret Image.
Briefly, (k, n) visual cryptography scheme that Naor and Shamir in 1994 is put forward for the first time, by Secret Image with Pixel is that unit is encrypted, and obtains n and shares part.Each sharing part is disorderly and unsystematic all as random noise, attacker Part directly can not be shared by individual and get secret information.It, can be by eye recognition when sharing part superposition when k or more than k Secret information out is not necessarily to any calculating;And when sharing part superposition less than k, then it is unable to Restore Secret information.
Summary of the invention
Aiming at the defects existing in the prior art, the technical problem to be solved in the present invention is to provide a kind of structures The method for making thresholding visual cryptography matrix proposes that is, premised on the general access structure of the Naor and Shamir model of extension Two kinds of technologies are configured to the visual cryptography scheme of general access structure.
Present invention technical solution used for the above purpose is: a kind of side constructing thresholding visual cryptography matrix Method, comprising the following steps:
Step 1: enabling R0And R1For access structure (Γ 'Qual, Γ 'Forb) basic matrix, T0And T1For access structure (Γ″Oual, Γ "Forb) basic matrix;Enable (Γ 'Oual, Γ 'Forb) and (Γ "Oual, Γ "Forb) it is to there are two of n participant to deposit Take structure;Make general access structure (ΓQual, ΓForb) meet (ΓQual, ΓForb)=(Γ 'Qual∪Γ″Qual, Γ 'Forb∩ Γ″Forb);
Step 2: known participant's set P, Minimal authorized subset Γ0And its subset Γ '0With Γ "0And access structure (Γ′Qual, Γ 'Forb) basic matrix R0、R1With access structure (Γ "Qual, Γ "Forb) basic matrix T0、T1
Step 3: determining matrix R0′Line number be participant's set P in element number;
Step 4: according to R0Structural matrix R0′, set Γ '0The numerical value of middle element is matrix R0′The required row filled in Value;
Step 5: and so on, matrix R0′And R1′According to Γ '0Construction, matrix T0′And T1′According to Γ "0Construction, obtains Matrix R0′、T0′、R1′、T1′
Step 6: join-matrix S0=R0′oT0′, S1=R1′oT1′, basic matrix S can be obtained0And S1, o expression join-matrix.
The n participant indicates the number for being divided into Secret Image.
The present invention has the following advantages and beneficial effects:
1, the building of the basis matrix of arbitrary structures visual cryptography may be implemented in the present invention.
2, the columns for the basic matrix that the present invention obtains is less, this can largely guarantee the quality of image.
3, building method proposed by the invention, can also be with even if the people for not grasping visual cryptography and related mathematical knowledge Thresholding visual cryptography scheme is constructed by simple algebraic expression evaluation, construction process is simple and efficient.
Specific embodiment
The present invention will be further described in detail below with reference to the embodiments.
The characteristics of visual cryptography is a kind of application of the Secret sharing techniques in digital image arts, inherits privacy sharing, There is recovery simplicity simultaneously, application prospect is boundless.But in practical applications, 2 basic matrix S are often used0With S1Share scheme, i.e. set of matrices C to construct (k, n) visual secret0And C1It is to S respectively0And S1All column all over taking various rows What column were constituted.
Basic conception
General access structure is that P={ 1 ..., n } is enabled to indicate that participant gathers, 2pIndicate the power set of set P, then generally Access structure can use (ΓQual, ΓForb) indicate, ΓQualAnd ΓForbIt is known respectively as authorized subset and forbids subset.They Meet the following conditions:
(1)
(2)ΓQual∩ΓForb=φ, if this access structure is healthy and strong structure, ΓQual∪ΓForb=2p.It enables Γ0=A | A ∈ ΓQual, it is not presentSo that A ' ∈ ΓQual, then Γ0Referred to as Minimal authorized subset.Enable Γ=B | B ∈ΓForb, B ∪ { i } ∈ ΓQualTo all i ∈ P B, then ΓReferred to as maximum forbids subset.
General access structure model is instruction (ΓQual, ΓForb) it is an access structure, then the Boolean matrix of two n × m C0And C1, define a general access structure visual cryptography (ΓOual, ΓForb, m)-VCS, and if only if existence value α (m) and SetMeet the following conditions:
(1) (comparative condition) any authorized subset X={ i1, i2, K, ip}∈ΓQualBy being superimposed their transparent adhesive tape Piece can restore the picture shared.It is, to arbitrary M ∈ C0, the i-th of M1, i2, K, ipWhat row vector or operation obtained Vector V meets w (V)≤tX- α (m) m, and for arbitrary M ∈ C1, the i-th of M1, i2, K, ipRow vector or operation obtain to Amount V meets w (V) >=tX
(2) (safety conditions) arbitrarily forbid subset X={ i1, i2, K, ip}∈ΓForbIt is unable to obtain about secret Image file, it is, taking C0In each matrix i-th1, i2, K, ipRow constitutes new p × m matrix, is made of these matrixes P × m set of matrices D0, take C1In each matrix i-th1, i2, K, ipRow constitutes new p × m matrix, constitutes p by these matrixes × m set of matrices D1, D0And D1It include identical matrix (D with identical probability0And D1It is undistinguishable).
Enable (Γ 'Oual, Γ 'Forb) and (Γ "Qual, Γ "Forb) it is to have two access structures of n participant (in matrix structure During making, what n referred to is exactly the line number of matrix;During sharing Secret Image, what n referred to is exactly by Secret Image point At number), it is assumed that (Γ 'Qual, Γ 'Forb) and (Γ "Oual, Γ "Forb) basic matrix be respectively R0, R1And T0, T1, then just (Γ can be constructedOual, ΓForb) access structure, wherein (ΓQual, ΓForb)=(Γ 'Qual∪Γ″Qual, Γ 'Forb ∩Γ″Forb).From R0, R1And T0, T1In can obtain two couples of matrix (R0′, R1′) and (T0′, T1′), S at this time0=R0′oT0′, S1 =R1′oT1′, wherein o indicates series connection.
Step 1: enabling R0And R1For access structure (Γ 'Qual, Γ 'Forb) basic matrix, T0And T1For access structure (Γ″Oual, Γ "Forb) basic matrix;
Step 2: (ΓQual, ΓForb) meet (ΓQual, ΓForb)=(Γ 'Qual∪Γ″Qual, Γ 'Forb∩Γ″Forb);
Step 3: known participant's set P, Minimal authorized subset Γ0And its subset Γ '0With Γ "0And matrix R0、 R1、T0、T1;Minimal authorized subset Γ0It is arbitrarily designated, set Γ '0With Γ "0It is Γ0Subset, i.e. Γ0By Γ '0Γ″0Group At.
Step 4: determining matrix R0′Line number be participant's set P in element number;
Step 5: according to R0Structural matrix R0′, set Γ '0The numerical value of middle element is structural matrix R0′It is required to fill in Row value, such as matrix R0Three behaviors 101010, Γ '0={ { 1,2 }, { 1,5 } }, then R0′The 1st, 2 rows and the 1st, 5 rows be respectively 101010,0 filling of remaining the 3rd, 4 row;
Step 6: and so on, matrix R0′And R1′According to Γ '0Construction, matrix T0′And T1′According to Γ "0Construction, obtains Matrix R0′、T0′、R1′、T1′
Step 7: join-matrix S0=R0′oT0′, S1=R1′oT1′, basic matrix finally can be obtained.
Example: participant's set P={ 1,2,3,4,5 }, Γ are enabled0={ 1,2 }, { 2,3 }, { 3,4 }, { 4,5 }, { 1,5 }, 2, 5 } }, Γ '0={ { 1,2 }, { 1,5 } }, Γ "0={ { 2,3 }, { 3,4 }, { 4,5 }, { 2,5 } }, in which:
Then (R is constructed0′, R1′) and (T0′, T1′), if i is not (Γ 'Qual, Γ 'Forb) indispensable element, then R0′In The full zero row of i behavior.
(1) according to R0Structural matrix R0′, set Γ '0The numerical value of middle element is structural matrix R0′The required row filled in Value, in this way, Γ '0={ { 1,2 }, { 1,5 } }, so 3,4 be not basic indispensable element, so R0′In 3,4 behavior full 0 rows, such as Under:
(2) according to R1Structural matrix R1′, set Γ '0The numerical value of middle element is structural matrix R0′The required row filled in Value, in this way, Γ '0={ { 1,2 }, { 1,5 } }, so 3 and 4 be not basic indispensable element, so R0′In the 3rd, 4 behavior full 0s Row, as follows:
(3) according to T0Structural matrix T0′, set Γ0The numerical value of middle element is structural matrix T0′The required row value filled in, In this way, Γ "0={ { 2,3 }, { 3,4 }, { 4,5 }, { 2,5 } }, so 1 is not basic indispensable element, so R0′In the 1st behavior Full 0 row, as follows:
(4) according to T1Structural matrix T1′, set Γ "0The numerical value of middle element is structural matrix T1′The required row filled in Value, in this way, Γ "0={ { 2,3 }, { 3,4 }, { 4,5 }, { 2,5 } }, so 1 is not basic indispensable element, so R0′In 1 behavior Full 0 row, as follows:
Last join-matrix S0=R0′oT0′, S1=R1′oT1′, basic matrix finally can be obtained:
As one have hide with for the visual cryptography for sharing stealth technology, the judge mark of scheme quality itself Extremely important one in standard, as whether the pixel expansion of the program is sufficiently small and whether relative mistake is sufficiently large.Pixel expands The latitude of emulsion and the relationship of relative mistake are inversely proportional, and pixel expansion is smaller, and relative mistake is bigger, the effect that the program is implemented Better.Pixel expansion most intuitively shows, and the columns of the basic matrix exactly constituted is less as far as possible, otherwise extensive Image excessively stretches when multiple secret, will affect decryption effect.This advantage embodies in the present invention, as the columns of basic matrix Less, this can largely guarantee the quality of image.
Visual cryptography has the outstanding advantages of simplicity, is almost not required to the application of the visual cryptography scheme constructed Password is wanted to gain knowledge, but constructing visual cryptography scheme using the typical construction methods of existing document is not a simple mistake Journey.The building method that this patent is proposed, can also be by simple even if the people for not grasping visual cryptography and related mathematical knowledge Algebraic expression evaluation construct thresholding visual cryptography scheme, construction process is simple and efficiently.

Claims (2)

1. a kind of method for constructing thresholding visual cryptography matrix, which comprises the following steps:
Step 1: enabling R0And R1For access structure (Γ 'Qual, Γ 'Forb) basic matrix, T0And T1For access structure (Γ "Qual, Γ″Forb) basic matrix;Enable (Γ 'Qual, Γ 'Forb) and (Γ "Qual, Γ "Forb) it is two access structures for having n participant; Make general access structure (ΓQual, ΓForb) meet (ΓQual, ΓForb)=(Γ 'Qual∪Γ″Qual, Γ 'Forb∩Γ″Forb);
Step 2: known participant's set P, Minimal authorized subset Γ0And its subset Γ '0With Γ "0And access structure (Γ′Qual, Γ 'Forb) basic matrix R0、R1With access structure (Γ "Qual, Γ "Forb) basic matrix T0、T1
Step 3: determining matrix R0′Line number be participant's set P in element number;
Step 4: according to R0Structural matrix R0′, set Γ '0The numerical value of middle element is matrix R0′The required row value filled in;
Step 5: and so on, matrix R0′And R1′According to Γ '0Construction, matrix T0′And T1′According to Γ "0Construction, obtains matrix R0′、T0′、R1′、T1′
Step 6: join-matrixBasic matrix S can be obtained0And S1,Indicate join-matrix.
2. a kind of method for constructing thresholding visual cryptography matrix according to claim 1, which is characterized in that the n ginseng The number for being divided into Secret Image is indicated with person.
CN201810605892.6A 2018-06-13 2018-06-13 A method of construction thresholding visual cryptography matrix Pending CN109003218A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810605892.6A CN109003218A (en) 2018-06-13 2018-06-13 A method of construction thresholding visual cryptography matrix

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810605892.6A CN109003218A (en) 2018-06-13 2018-06-13 A method of construction thresholding visual cryptography matrix

Publications (1)

Publication Number Publication Date
CN109003218A true CN109003218A (en) 2018-12-14

Family

ID=64601904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810605892.6A Pending CN109003218A (en) 2018-06-13 2018-06-13 A method of construction thresholding visual cryptography matrix

Country Status (1)

Country Link
CN (1) CN109003218A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177746A (en) * 2019-12-12 2020-05-19 中国科学院深圳先进技术研究院 Efficient visual secret sharing method with core participants
CN112118094A (en) * 2019-12-25 2020-12-22 兰州大学 Implementation technology of general access policy in cloud storage
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
CN113141254A (en) * 2021-06-22 2021-07-20 成都信息工程大学 High-adaptability secret image sharing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719263A (en) * 2009-12-08 2010-06-02 清华大学 Image visual dividing storing method with least dividing storage and optimal comparison
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Method for secretly sharing and restoring digital image
CN105404817A (en) * 2015-10-27 2016-03-16 西安电子科技大学 (k,n) threshold based user-friendly visual secret sharing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719263A (en) * 2009-12-08 2010-06-02 清华大学 Image visual dividing storing method with least dividing storage and optimal comparison
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Method for secretly sharing and restoring digital image
CN105404817A (en) * 2015-10-27 2016-03-16 西安电子科技大学 (k,n) threshold based user-friendly visual secret sharing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ATENIESE, G等: "Visual cryptography for general access structures", 《INFORMATION AND COMPUTATION》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177746A (en) * 2019-12-12 2020-05-19 中国科学院深圳先进技术研究院 Efficient visual secret sharing method with core participants
CN112118094A (en) * 2019-12-25 2020-12-22 兰州大学 Implementation technology of general access policy in cloud storage
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
CN112529974B (en) * 2020-12-03 2023-07-25 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
CN113141254A (en) * 2021-06-22 2021-07-20 成都信息工程大学 High-adaptability secret image sharing method
CN113141254B (en) * 2021-06-22 2021-09-24 成都信息工程大学 High-adaptability secret image sharing method

Similar Documents

Publication Publication Date Title
CN109003218A (en) A method of construction thresholding visual cryptography matrix
US9740884B2 (en) Method and device for generating a code
US11140138B2 (en) Method for encrypting an image, method for transmitting an image, electronic device and computer readable storage medium
CN108650434B (en) A kind of method of image encryption
CN105404817B (en) It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding
US20220215104A1 (en) Methods of providing data privacy for neural network based inference
CN109727294A (en) A kind of thresholding visual cryptography Matrix Construction Method
CN105975869B (en) Adaptively selected encryption method based on salient region
CN110634096B (en) Self-adaptive multi-mode information hiding method and device
Yang et al. New privilege-based visual cryptography with arbitrary privilege levels
Zhao et al. Private‐encoder: Enforcing privacy in latent space for human face images
Lee et al. Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique
WO2017133154A1 (en) Anti-counterfeit image generation method and device
Chow et al. Enhancing the perceived visual quality of a size invariant visual cryptography scheme
CN108734748A (en) A kind of building method of basis matrix
Su et al. A robust color image watermarking scheme in the fusion domain based on LU factorization
CN114723984A (en) Full-automatic portrait data anonymization method
WO2019126389A1 (en) Automatic obfuscation engine for computer-generated digital images
Wu et al. Extended Visual Cryptography Scheme for color images with no pixel expansion
Soman et al. XOR-BASEDVISUAL CRYPTOGRAPHY
Hsiao et al. Enhancing image quality in Visual Cryptography with colors
CN115134473B (en) Image encryption method and device
CN109920015B (en) Image visual meaningful encryption method based on fractal graph generation
Anghelescu et al. Design and implementation of a visual cryptography application
CN116978134A (en) Image processing method, apparatus, device, storage medium, and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181214