CN110278074B - A Visual Secret Sharing Method for Image Encryption - Google Patents

A Visual Secret Sharing Method for Image Encryption Download PDF

Info

Publication number
CN110278074B
CN110278074B CN201810216046.5A CN201810216046A CN110278074B CN 110278074 B CN110278074 B CN 110278074B CN 201810216046 A CN201810216046 A CN 201810216046A CN 110278074 B CN110278074 B CN 110278074B
Authority
CN
China
Prior art keywords
image
ilbp
sharing
satisfy
blocks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810216046.5A
Other languages
Chinese (zh)
Other versions
CN110278074A (en
Inventor
张问银
赵伟
张亚伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi University
Original Assignee
Linyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linyi University filed Critical Linyi University
Priority to CN201810216046.5A priority Critical patent/CN110278074B/en
Publication of CN110278074A publication Critical patent/CN110278074A/en
Application granted granted Critical
Publication of CN110278074B publication Critical patent/CN110278074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Facsimile Transmission Control (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及一种用于图像加密的可视化秘密共享方案。它充分利用了LBP的局部对比性特征,将秘密图像数据隐藏在不同的图像共享中,可以很容易地、准确地恢复秘密。通过将图像转化为LBP编码,再经过分割,可将分割后的部分交于不同的持有者以达到共享加密的效果。通过将分割后的部分结合可恢复原本图像。本方案不仅能够保证网络中的图像数据共享性,也能保证网络中的图像数据安全性,并具有较好的随机性,较低的像素扩展,较低的计算成本。

Figure 201810216046

The present invention relates to a visual secret sharing scheme for image encryption. It makes full use of the local contrastive features of LBP to hide the secret image data in different image sharing, which can easily and accurately recover the secret. By converting the image into LBP code, and then dividing it, the divided part can be handed over to different holders to achieve the effect of shared encryption. The original image can be restored by combining the divided parts. This scheme can not only ensure the sharing of image data in the network, but also ensure the security of image data in the network, and has better randomness, lower pixel expansion, and lower computational cost.

Figure 201810216046

Description

一种用于图像加密的可视化秘密共享方法A Visual Secret Sharing Method for Image Encryption

技术领域technical field

本发明涉及图像处理和信息加密技术领域,涉及一种用于图像共享加密的可视化秘密共享方法。The invention relates to the technical field of image processing and information encryption, and relates to a visual secret sharing method for image sharing encryption.

背景技术Background technique

随着多媒体技术的飞速发展,网络游戏、视频监控、视频会议等多媒体服务也不断涌现。这些服务通常是高度动态的,需要大量的资源来托管。云基础设施作为一种满足资源需求、提供高性价比服务的技术,越来越多的服务提供商采用云基础设施来处理多媒体服务。可视化秘密共享技术是一种共享秘密信息的方法,以避免潜在的中断和修改,包括恶意攻击和个人不适当的管理。With the rapid development of multimedia technology, multimedia services such as online games, video surveillance, and video conferencing are also emerging. These services are often highly dynamic and require significant resources to host. As a technology that meets resource requirements and provides cost-effective services, cloud infrastructure is used by more and more service providers to process multimedia services. Visual secret sharing technology is a method of sharing secret information to avoid potential disruption and modification, including malicious attacks and inappropriate management of individuals.

发明内容Contents of the invention

本发明的目的是提供一种共享加密的方法,针对加密后的图案进行分割,已达到共享效果,通过将分割后的图案结合解密以恢复原有图案,达到秘密共享的效果,并保证安全性。为达到上述效果,针对不同图像类型提出3种方案,二进制图像的VSS方案(BVSS);灰度图像的VSS方案(GVSS);多图像的VSS方案(MIVSS),并采用如下技术。The purpose of the present invention is to provide a method of shared encryption, which divides the encrypted pattern to achieve the sharing effect, and restores the original pattern by combining the divided pattern with decryption, so as to achieve the effect of secret sharing and ensure security . In order to achieve the above effects, three schemes are proposed for different image types, binary image VSS scheme (BVSS); grayscale image VSS scheme (GVSS); multi-image VSS scheme (MIVSS), and adopt the following techniques.

包括以下步骤:Include the following steps:

图像加密共享:Image encrypted sharing:

步骤一,通过ILBP算法对原图像进行加密,生成ILBP码;Step 1, encrypting the original image by ILBP algorithm to generate ILBP code;

步骤二,随机生成控制因子α和中心像素的灰度值L;Step 2, randomly generating the control factor α and the gray value L of the center pixel;

步骤三,通过控制因子α来随机生成中心像素邻域的灰度值,并使其满足ILBP的要求;Step 3, randomly generate the gray value of the central pixel neighborhood by controlling the factor α, and make it meet the requirements of ILBP;

步骤四,将图像分割,分割方式可以有多种,生成多个阴影块,多个阴影块可分散给不同持有者已达成图像加密共享效果。Step 4: Divide the image. There are many ways to divide the image to generate multiple shadow blocks, and the multiple shadow blocks can be distributed to different holders to achieve the effect of image encryption and sharing.

图像解密:Image decryption:

步骤一,将多个共享的阴影块组合成M×N的阴影块;Step 1, combining multiple shared shadow blocks into M×N shadow blocks;

步骤二,通过ILBP算法对M×N的每个阴影块计算ILBP码,以恢复原图像。Step 2: Calculate the ILBP code for each shadow block of M×N through the ILBP algorithm to restore the original image.

在本发明的一种实施例中,ILBP算法为In one embodiment of the present invention, the ILBP algorithm is

Figure GDA0003785797960000021
Figure GDA0003785797960000021

其中参数P控制角空间的量子化,R控制空间分辨率。L表示中心像素的灰度,gp表示相邻像素p的灰度值,S(x)表示符号函数,

Figure GDA0003785797960000022
是邻域的平均值,控制因子α∈[0,1],灰度L∈[0,255]。where the parameter P controls the quantization of the angular space, and R controls the spatial resolution. L represents the gray level of the central pixel, g p represents the gray value of the adjacent pixel p, S(x) represents the sign function,
Figure GDA0003785797960000022
is the average value of the neighborhood, the control factor α∈[0,1], and the gray level L∈[0,255].

在本发明的一种实施例中,ILBP算法中阴影块灰度值必须满足以下要求:In an embodiment of the present invention, the shadow block gray value must meet the following requirements in the ILBP algorithm:

BVSS方案中:对于图像In the BVSS scheme: for images

B={B[i,j]|B[i,j]∈[0,1],0≤i≤M-1,0≤j≤N-1},假设有2个共享块S1[i,j],S2[i,j]。当B[i,j]=1,S1[i,j]∈(0,L),S2[i,j]∈(S1[i,j]+1,L)且满足

Figure GDA0003785797960000023
当B[i,j]=0时,S1[i,j]∈(0,S1[i,j]),并保证S2[i,j]∈(0,S1[i,j])且满足
Figure GDA0003785797960000024
B={B[i,j]|B[i,j]∈[0,1], 0≤i≤M-1, 0≤j≤N-1}, assuming there are 2 shared blocks S 1 [i ,j], S 2 [i,j]. When B[i,j]=1, S 1 [i,j]∈(0,L), S 2 [i,j]∈(S 1 [i,j]+1,L) and satisfy
Figure GDA0003785797960000023
When B[i,j]=0, S 1 [i,j]∈(0,S 1 [i,j]), and ensure that S 2 [i,j]∈(0,S 1 [i,j] ]) and satisfy
Figure GDA0003785797960000024

GVSS方案中:对于图像G,中心像素为

Figure GDA0003785797960000025
邻域像素为
Figure GDA0003785797960000026
Figure GDA0003785797960000027
保证
Figure GDA0003785797960000028
且满足
Figure GDA0003785797960000029
Figure GDA00037857979600000210
保证
Figure GDA00037857979600000211
且满足
Figure GDA00037857979600000212
In the GVSS scheme: for image G, the central pixel is
Figure GDA0003785797960000025
Neighborhood pixels are
Figure GDA0003785797960000026
when
Figure GDA0003785797960000027
ensure
Figure GDA0003785797960000028
and satisfied
Figure GDA0003785797960000029
when
Figure GDA00037857979600000210
ensure
Figure GDA00037857979600000211
and satisfied
Figure GDA00037857979600000212

MIVSS方案中:对于多个图像

Figure GDA00037857979600000213
假设有n+1个共享块,
Figure GDA00037857979600000214
其中随机生成的中心像素
Figure GDA00037857979600000215
Figure GDA00037857979600000216
时,Sk[i,j]=random(Sk-1[i,j]+1,L),且满足
Figure GDA00037857979600000217
Figure GDA00037857979600000218
时,Sk[i,j]=random(0,Sk-1[i,j]),且满足
Figure GDA00037857979600000219
MIVSS scheme: for multiple images
Figure GDA00037857979600000213
Suppose there are n+1 shared blocks,
Figure GDA00037857979600000214
where the randomly generated central pixel
Figure GDA00037857979600000215
when
Figure GDA00037857979600000216
When , S k [i,j]=random(S k-1 [i,j]+1,L), and satisfy
Figure GDA00037857979600000217
when
Figure GDA00037857979600000218
, S k [i,j]=random(0, S k-1 [i,j]), and satisfy
Figure GDA00037857979600000219

和现有的图像共享方法相比,本方案有以下优点:Compared with existing image sharing methods, this scheme has the following advantages:

(1)无损的秘密重建;(1) Lossless secret reconstruction;

(2)对图像格式没有限制;(2) There is no restriction on the image format;

(3)易于对齐;(3) Easy to align;

(4)不需要codebook;(4) No codebook is required;

(5)不同大小的共享;(5) Sharing of different sizes;

(6)像素的扩展计算效率高。(6) The expansion calculation efficiency of pixels is high.

附图说明Description of drawings

图1为3×3的图像加密方案,图2为3×3的图像加密实际应用,图3为多重图像加密共享方法,图4为多重图像加密共享实际应用,图5为两幅分存图像S1,S2,图6为分存图像S1的像素值范围,图7为分存信息为0时分存图像S1的像素值范围,图8为分存信息为0时分存图像S2的像素值范围,图9为第k个分存图像对应的像素值应满足的取值条件。Figure 1 is the 3×3 image encryption scheme, Figure 2 is the practical application of 3×3 image encryption, Figure 3 is the multiple image encryption and sharing method, Figure 4 is the practical application of multiple image encryption and sharing, and Figure 5 is two shared images S1, S2, Fig. 6 is the pixel value range of the shared image S1, Fig. 7 is the pixel value range of the shared image S1 when the shared information is 0, and Fig. 8 is the pixel value range of the shared image S2 when the shared information is 0, FIG. 9 shows the value conditions that the pixel values corresponding to the kth shared image should satisfy.

具体实施方式Detailed ways

下面将对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

本发明提供一种用于图像共享加密的可视化秘密共享方法包括以下步骤:The present invention provides a visual secret sharing method for image sharing encryption comprising the following steps:

图像加密共享:Image encryption sharing:

步骤一,通过ILBP算法对原图像进行加密,生成ILBP码;Step 1, encrypting the original image by ILBP algorithm to generate ILBP code;

步骤二,随机生成控制因子α和中心像素的灰度值L;Step 2, randomly generating the control factor α and the gray value L of the center pixel;

步骤三,通过控制因子α来随机生成中心像素邻域的灰度值,并使其满足ILBP的要求;Step 3, randomly generate the gray value of the central pixel neighborhood by controlling the factor α, and make it meet the requirements of ILBP;

步骤四,将图像分割,分割方式可以有多种,生成多个阴影块,多个阴影块可分散给不同持有者已达成图像加密共享效果。Step 4: Divide the image. There are many ways to divide the image to generate multiple shadow blocks, and the multiple shadow blocks can be distributed to different holders to achieve the effect of image encryption and sharing.

图像解密:Image decryption:

步骤一,将多个共享的阴影块组合成M×N的阴影块;Step 1, combining multiple shared shadow blocks into M×N shadow blocks;

步骤二,通过ILBP算法对M×N的每个阴影块计算ILBP码,以恢复原图像。Step 2: Calculate the ILBP code for each shadow block of M×N through the ILBP algorithm to restore the original image.

进一步的以图1中3×3的灰度图像为例,包括以下步骤:Taking the grayscale image of 3×3 in Fig. 1 further as an example, the following steps are included:

图像加密共享:Image encryption sharing:

步骤一,将ILBP码分布在3×3的图像块中;Step 1, distributing the ILBP codes in 3×3 image blocks;

步骤二,随机生成控制因子α和中心像素的灰度值L,这里α=Step 2, randomly generate the control factor α and the gray value L of the central pixel, where α=

0.24,中心像素值为83;0.24, the center pixel value is 83;

步骤三,通过控制因子α来随机生成中心像素邻域的灰度值,这里为(87,40,210,68,35,96,71,180),这些值都满足ILBP中GVSS方案的要求;Step 3, by controlling the factor α to randomly generate the gray value of the central pixel neighborhood, here (87, 40, 210, 68, 35, 96, 71, 180), these values meet the requirements of the GVSS scheme in ILBP;

步骤四,将图像分割,这里以横向分割,分成3的共享块,Sharel,Share2,Share3,但分割方式不限于这一种。In step 4, the image is divided into three shared blocks, Sharel, Share2 and Share3, but the division method is not limited to this one.

图像解密:Image decryption:

步骤一,将3个共享的阴影块Sharel,Share2,Share3组合成3×3的阴影块;Step 1: Combine the three shared shadow blocks Sharel, Share2 and Share3 into a 3×3 shadow block;

步骤二,通过ILBP算法对3×3的每个阴影块逆运算ILBP码,以恢复原图像。Step 2: Inversely calculate the ILBP code for each shadow block of 3×3 through the ILBP algorithm to restore the original image.

进一步的结合图像2实例对图像解密进行详细说明:Further, the image decryption is described in detail in combination with the example of image 2:

在图像2所示实例中,随机生成的a=0.15。其中(a)为原图像Barbara;(e)中将a图像分成3个共享阴影块;(b)为解密后恢复的图像。(c)为原图像Lena;(f)中将c图像分成3个共享阴影块,(d)为解密后恢复的图像。In the example shown in image 2, a=0.15 is randomly generated. Among them, (a) is the original image Barbara; (e) divides image a into three shared shadow blocks; (b) is the restored image after decryption. (c) is the original image Lena; in (f) the c image is divided into 3 shared shadow blocks, and (d) is the restored image after decryption.

本发明可以应用于不同格式或不同灰度的图像,以实现视觉密码学。所提出的方法具有很多优点,包括无损的秘密重构,不局限于图像格式,易于对齐等。基于不同的ILBP扩展或变体,设计了多种VSS方案来共享秘密或隐藏信息。实验结果表明,该方法与传统的图像共享方法相比是有效的。它提供了更好的共享灵活性和低计算复杂度。The present invention can be applied to images of different formats or different gray scales to realize visual cryptography. The proposed method has many advantages, including lossless secret reconstruction, not limited to image format, easy alignment, etc. Based on different ILBP extensions or variants, various VSS schemes are designed to share secret or hidden information. Experimental results show that the method is effective compared to traditional image sharing methods. It provides better sharing flexibility and low computational complexity.

Claims (1)

1. A visual secret sharing method for image sharing encryption, characterized by the steps of:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
randomly generating a control factor alpha and a gray value L of a central pixel;
step three, randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP; the method comprises the following specific steps:
in the BVSS protocol: for images
B={B[i,j]|B[i,j]∈[0,1]I is more than or equal to 0 and less than or equal to M-1, j is more than or equal to 0 and less than or equal to N-1, and 2 shared blocks S are assumed 1 [i,j],S 2 [i,j](ii) a When B [ i, j ]]=1,S 1 [i,j]∈(0,L),S 2 [i,j]∈(S 1 [i,j]+1, L) and satisfy
Figure FDA0003886616860000011
When B [ i, j ]]When =0, S 1 [i,j]∈(0,S 1 [i,j]) And guarantee S 2 [i,j]∈(0,S 1 [i,j]) And satisfy
Figure FDA0003886616860000012
In the GVSS protocol: for image G, the center pixel is
Figure FDA0003886616860000013
The neighborhood pixels are
Figure FDA0003886616860000014
When in use
Figure FDA0003886616860000015
Guarantee
Figure FDA0003886616860000016
And satisfy
Figure FDA0003886616860000017
When in use
Figure FDA0003886616860000018
Guarantee
Figure FDA0003886616860000019
And satisfy
Figure FDA00038866168600000110
In the MIVSS scheme: for multiple images
Figure FDA00038866168600000111
Assuming that there are n +1 shared blocks,
Figure FDA00038866168600000112
in which the central pixel is randomly generated
Figure FDA00038866168600000113
When in use
Figure FDA00038866168600000114
When S is present k [i,j]=random(S k-1 [i,j]+1, L), and satisfies
Figure FDA00038866168600000115
When in use
Figure FDA00038866168600000116
When, S k [i,j]=random(0,S k-1 [i,j]) And satisfy
Figure FDA00038866168600000117
Step four, the image is divided to generate a plurality of shadow blocks, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect;
image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
calculating ILBP codes for each shadow block of the MxN through an ILBP algorithm to restore an original image;
the ILBP algorithm is
Figure FDA00038866168600000118
Where the parameter P controls the quantization of the angular space, R controls the spatial resolution, L denotes the grey scale of the central pixel, g p Representing the gray value of the neighboring pixel p, S (x) represents a sign function,
Figure FDA0003886616860000021
is the average of the neighborhood, with the control factor α ∈ [0,1 ]]The gray level L belongs to [0,255 ]]。
CN201810216046.5A 2018-03-16 2018-03-16 A Visual Secret Sharing Method for Image Encryption Active CN110278074B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810216046.5A CN110278074B (en) 2018-03-16 2018-03-16 A Visual Secret Sharing Method for Image Encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810216046.5A CN110278074B (en) 2018-03-16 2018-03-16 A Visual Secret Sharing Method for Image Encryption

Publications (2)

Publication Number Publication Date
CN110278074A CN110278074A (en) 2019-09-24
CN110278074B true CN110278074B (en) 2022-11-11

Family

ID=67957712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810216046.5A Active CN110278074B (en) 2018-03-16 2018-03-16 A Visual Secret Sharing Method for Image Encryption

Country Status (1)

Country Link
CN (1) CN110278074B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189595A (en) * 2021-11-19 2022-03-15 临沂大学 An Image Secret Sharing Method Based on Consortium Chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Secret sharing and recovery method for digital image
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
US9514321B2 (en) * 2013-05-02 2016-12-06 Samsung Electronics Co., Ltd. Electro device for protecting user's privacy and method for controlling thereof
CN106203047A (en) * 2016-07-08 2016-12-07 钟林超 A kind of movable storage device with identification verification function
US9692594B2 (en) * 2014-10-27 2017-06-27 Panasonic Intellectual Property Corporation Of America Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Secret sharing and recovery method for digital image
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
US9514321B2 (en) * 2013-05-02 2016-12-06 Samsung Electronics Co., Ltd. Electro device for protecting user's privacy and method for controlling thereof
US9692594B2 (en) * 2014-10-27 2017-06-27 Panasonic Intellectual Property Corporation Of America Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data
CN106203047A (en) * 2016-07-08 2016-12-07 钟林超 A kind of movable storage device with identification verification function

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Formulation of visual secret sharing schemes encrypting multiple images";Manami Sasaki et al;《2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)》;20140509;全文 *
"秘密共享技术及其在图像加密中的应用";任方 等;《科学技术与工程》;20150608;第15卷(第16期);全文 *
"秘密共享理论及相关应用研究";胡春强;《中国博士学位论文全文数据库信息科技辑》;20140215;正文第6章 *

Also Published As

Publication number Publication date
CN110278074A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
Sharif et al. A novel method for digital image steganography based on a new three-dimensional chaotic map
Li et al. Distortion less secret image sharing scheme for Internet of Things system
Shanthakumari et al. RETRACTED ARTICLE: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
CN104751400B (en) Secret image share method based on the insertion of pixel-map matrix
Lee et al. An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection
Ye et al. Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
Yu et al. Adaptive and separable multiary reversible data hiding in encryption domain
Roselinkiruba et al. Secure video steganography using key frame and region selection technique
CN113298687A (en) Watermark image adding method and device
Liu et al. A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction
CN110278074B (en) A Visual Secret Sharing Method for Image Encryption
Van Rensburg et al. 3D object watermarking from data hiding in the homomorphic encrypted domain
Ahmad et al. Perceptual encryption-based privacy-preserving deep learning in internet of things applications
Biswas et al. Digital image steganography using dithering technique
Manikandan et al. Steganographic approach to enhancing secure data communication using contours and clustering
Karthik et al. Image security based on rotational visual cryptography
CN110417551A (en) A generative camouflage and restoration method for character paintings combined with error diffusion
Yadav et al. Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization
Gulia et al. An extensive literature survey on medical image steganography
CN114189595A (en) An Image Secret Sharing Method Based on Consortium Chain
Bhattacherjee et al. A review of Steganography techniques suitable for ECG signal
Shamsi et al. Securing Secret Information
Ghaemi et al. Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system
Perumal et al. Robust multitier spatial domain secured color image steganography in server environment
Rao et al. A Novel Image Encryption Using Parity Based Visual Cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant