CN110278074B - Visual secret sharing method for image encryption - Google Patents
Visual secret sharing method for image encryption Download PDFInfo
- Publication number
- CN110278074B CN110278074B CN201810216046.5A CN201810216046A CN110278074B CN 110278074 B CN110278074 B CN 110278074B CN 201810216046 A CN201810216046 A CN 201810216046A CN 110278074 B CN110278074 B CN 110278074B
- Authority
- CN
- China
- Prior art keywords
- image
- ilbp
- sharing
- satisfy
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Facsimile Transmission Control (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a visual secret sharing scheme for image encryption. The local contrast characteristic of the LBP is fully utilized, the secret image data is hidden in different image shares, and the secret can be easily and accurately recovered. By converting the image into LBP codes and then dividing, the divided parts can be handed over to different holders to achieve the effect of sharing encryption. The original image can be restored by combining the divided portions. The scheme can not only ensure the image data sharing performance in the network, but also ensure the image data security in the network, and has better randomness, lower pixel expansion and lower calculation cost.
Description
Technical Field
The invention relates to the technical field of image processing and information encryption, in particular to a visual secret sharing method for image sharing encryption.
Background
With the rapid development of multimedia technology, multimedia services such as online games, video monitoring, video conferences and the like are emerging. These services are typically highly dynamic, requiring a large amount of resources to host. As a technology for satisfying resource demands and providing cost-effective services, more and more service providers use cloud infrastructure to process multimedia services. The visual secret sharing technique is a method of sharing secret information to avoid potential interruptions and modifications, including malicious attacks and improper management of individuals.
Disclosure of Invention
The invention aims to provide a shared encryption method, which aims at segmenting encrypted patterns to achieve a sharing effect, recovers the original patterns by combining and decrypting the segmented patterns to achieve a secret sharing effect and ensure the safety. To achieve the above effect, 3 schemes are proposed for different image types, a VSS scheme (BVSS) of binary images; VSS scheme of gray image (GVSS); multi-picture VSS scheme (MIVSS), and the following technique is employed.
The method comprises the following steps:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
step two, randomly generating a control factor alpha and a gray value L of a central pixel;
step three, randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP;
and step four, the image is divided, the division modes can be various, a plurality of shadow blocks are generated, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect.
Image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
and step two, calculating the ILBP code for each shadow block of the M multiplied by N through an ILBP algorithm so as to restore the original image.
In one embodiment of the invention, the ILBP algorithm is
Where the parameter P controls the quantization of the angular space and R controls the spatial resolution. L represents the gray level of the center pixel, g p Representing the gray value of the neighboring pixel p, S (x) represents a sign function,is the average value of the neighborhood, and the control factor alpha is in the range of 0,1]The gray level L belongs to [0,255 ]]。
In one embodiment of the present invention, the shadow block gray scale value in the ILBP algorithm must satisfy the following requirements:
in the BVSS scheme: for images
B={B[i,j]|B[i,j]∈[0,1]I is more than or equal to 0 and less than or equal to M-1, j is more than or equal to 0 and less than or equal to N-1, and 2 shared blocks S are assumed 1 [i,j],S 2 [i,j]. When B [ i, j ]]=1,S 1 [i,j]∈(0,L),S 2 [i,j]∈(S 1 [i,j]+1, L) and satisfyWhen B [ i, j ]]When =0, S 1 [i,j]∈(0,S 1 [i,j]) And guarantee S 2 [i,j]∈(0,S 1 [i,j]) And satisfy
In the GVSS protocol: for image G, the center pixel isThe neighborhood pixels areWhen in useGuaranteeAnd satisfyWhen in useGuaranteeAnd satisfy
In the MIVSS scheme: for multiple imagesAssuming that there are n +1 shared blocks,in which the central pixel is randomly generatedWhen the temperature is higher than the set temperatureWhen, S k [i,j]=random(S k-1 [i,j]+1, L), and satisfyWhen in useWhen S is present k [i,j]=random(0,S k-1 [i,j]) And satisfy
Compared with the prior image sharing method, the scheme has the following advantages:
(1) Lossless secret reconstruction;
(2) There is no limitation on the image format;
(3) Easy alignment;
(4) The codebook is not needed;
(5) Sharing of different sizes;
(6) The pixel expansion is computationally efficient.
Drawings
Fig. 1 is a 3 × 3 image encryption scheme, fig. 2 is a 3 × 3 image encryption practical application, fig. 3 is a multiple image encryption sharing method, fig. 4 is a multiple image encryption sharing practical application, fig. 5 is two separate images S1 and S2, fig. 6 is a pixel value range of the separate image S1, fig. 7 is a pixel value range of the separate image S1 when the separate information is 0, fig. 8 is a pixel value range of the separate image S2 when the separate information is 0, and fig. 9 is a value condition that a pixel value corresponding to the kth separate image should satisfy.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a visual secret sharing method for image sharing encryption, which comprises the following steps:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
randomly generating a control factor alpha and a gray value L of a central pixel;
randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP;
and step four, the image is divided, the division modes can be various, a plurality of shadow blocks are generated, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect.
Image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
and step two, calculating the ILBP code for each shadow block of the M multiplied by N through an ILBP algorithm so as to restore the original image.
Further taking the 3 × 3 grayscale image in fig. 1 as an example, the method includes the following steps:
image encryption sharing:
distributing ILBP codes in 3 multiplied by 3 image blocks;
step two, randomly generating a control factor alpha and a gray value L of a central pixel, wherein alpha =
0.24, center pixel value 83;
step three, randomly generating gray values of a central pixel neighborhood by controlling a factor alpha, wherein the gray values are (87, 40,210,68,35,96,71 and 180), and the gray values all meet the requirements of the GVSS scheme in ILBP;
and step four, dividing the image into 3 shared blocks, sharel, share2 and Share3 by horizontal division, but the division mode is not limited to the mode.
Image decryption:
step one, combining 3 shared shadow blocks Sharel, share2 and Share3 into a shadow block of 3 multiplied by 3;
and step two, inversely calculating the ILBP code for each shadow block of 3 multiplied by 3 through the ILBP algorithm to recover the original image.
Further details of image decryption are described in connection with the image 2 example:
in the example shown in image 2, randomly generated a =0.15. Wherein (a) is an original image Barbara; dividing the a image into 3 shared shadow blocks in (e); and (b) the image restored after decryption. (c) is an original image Lena; (f) The c image is divided into 3 shared shadow blocks, and (d) the image is recovered after decryption.
The invention can be applied to images with different formats or different gray levels to realize visual cryptography. The proposed method has many advantages including lossless secret reconstruction, no restriction to image format, easy alignment, etc. Based on different ILBP extensions or variants, multiple VSS schemes are designed to share secret or hidden information. Experimental results show that the method is effective compared to conventional image sharing methods. It provides better sharing flexibility and low computational complexity.
Claims (1)
1. A visual secret sharing method for image sharing encryption, characterized by the steps of:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
randomly generating a control factor alpha and a gray value L of a central pixel;
step three, randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP; the method comprises the following specific steps:
in the BVSS protocol: for images
B={B[i,j]|B[i,j]∈[0,1]I is more than or equal to 0 and less than or equal to M-1, j is more than or equal to 0 and less than or equal to N-1, and 2 shared blocks S are assumed 1 [i,j],S 2 [i,j](ii) a When B [ i, j ]]=1,S 1 [i,j]∈(0,L),S 2 [i,j]∈(S 1 [i,j]+1, L) and satisfyWhen B [ i, j ]]When =0, S 1 [i,j]∈(0,S 1 [i,j]) And guarantee S 2 [i,j]∈(0,S 1 [i,j]) And satisfy
In the GVSS protocol: for image G, the center pixel isThe neighborhood pixels areWhen in useGuaranteeAnd satisfyWhen in useGuaranteeAnd satisfy
In the MIVSS scheme: for multiple imagesAssuming that there are n +1 shared blocks,in which the central pixel is randomly generatedWhen in useWhen S is present k [i,j]=random(S k-1 [i,j]+1, L), and satisfiesWhen in useWhen, S k [i,j]=random(0,S k-1 [i,j]) And satisfy
Step four, the image is divided to generate a plurality of shadow blocks, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect;
image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
calculating ILBP codes for each shadow block of the MxN through an ILBP algorithm to restore an original image;
the ILBP algorithm isWhere the parameter P controls the quantization of the angular space, R controls the spatial resolution, L denotes the grey scale of the central pixel, g p Representing the gray value of the neighboring pixel p, S (x) represents a sign function,is the average of the neighborhood, with the control factor α ∈ [0,1 ]]The gray level L belongs to [0,255 ]]。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216046.5A CN110278074B (en) | 2018-03-16 | 2018-03-16 | Visual secret sharing method for image encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216046.5A CN110278074B (en) | 2018-03-16 | 2018-03-16 | Visual secret sharing method for image encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278074A CN110278074A (en) | 2019-09-24 |
CN110278074B true CN110278074B (en) | 2022-11-11 |
Family
ID=67957712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810216046.5A Active CN110278074B (en) | 2018-03-16 | 2018-03-16 | Visual secret sharing method for image encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278074B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189595A (en) * | 2021-11-19 | 2022-03-15 | 临沂大学 | Image secret sharing method based on alliance chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142129A (en) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | Visual secret sharing-based image content tampering detection method |
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Secret sharing and recovery method for digital image |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
US9514321B2 (en) * | 2013-05-02 | 2016-12-06 | Samsung Electronics Co., Ltd. | Electro device for protecting user's privacy and method for controlling thereof |
CN106203047A (en) * | 2016-07-08 | 2016-12-07 | 钟林超 | A kind of movable storage device with identification verification function |
US9692594B2 (en) * | 2014-10-27 | 2017-06-27 | Panasonic Intellectual Property Corporation Of America | Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data |
-
2018
- 2018-03-16 CN CN201810216046.5A patent/CN110278074B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142129A (en) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | Visual secret sharing-based image content tampering detection method |
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Secret sharing and recovery method for digital image |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
US9514321B2 (en) * | 2013-05-02 | 2016-12-06 | Samsung Electronics Co., Ltd. | Electro device for protecting user's privacy and method for controlling thereof |
US9692594B2 (en) * | 2014-10-27 | 2017-06-27 | Panasonic Intellectual Property Corporation Of America | Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data |
CN106203047A (en) * | 2016-07-08 | 2016-12-07 | 钟林超 | A kind of movable storage device with identification verification function |
Non-Patent Citations (3)
Title |
---|
"Formulation of visual secret sharing schemes encrypting multiple images";Manami Sasaki et al;《2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)》;20140509;全文 * |
"秘密共享技术及其在图像加密中的应用";任方 等;《科学技术与工程》;20150608;第15卷(第16期);全文 * |
"秘密共享理论及相关应用研究";胡春强;《中国博士学位论文全文数据库信息科技辑》;20140215;正文第6章 * |
Also Published As
Publication number | Publication date |
---|---|
CN110278074A (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Chaos-based partial encryption of SPIHT coded color images | |
Bansod et al. | Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity | |
Yi et al. | Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction | |
WO2014075469A1 (en) | Method and device for information hiding | |
Anushiadevi et al. | Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram | |
Das et al. | An image secret sharing technique with block based image coding | |
Hosny et al. | Fast colored video encryption using block scrambling and multi-key generation | |
Ye et al. | Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift | |
CN105975869A (en) | Adaptive selection encryption method based on salient area | |
Mohammed et al. | LSB based image steganography using McEliece cryptosystem | |
Zhang et al. | A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing | |
Roselinkiruba et al. | Secure video steganography using key frame and region selection technique | |
CN110278074B (en) | Visual secret sharing method for image encryption | |
Ahmad et al. | Perceptual encryption-based privacy-preserving deep learning in internet of things applications | |
Srividhya et al. | Implementation of TiOISSS with meaningful shadows and with an additional authentication image | |
CN114782563B (en) | Secret image sharing method and system for JPEG image | |
Banupriya et al. | Video steganography using LSB algorithm for security application | |
Kukreja et al. | A secure reversible data hiding scheme for digital images using random grid visual secret sharing | |
Deshmukh et al. | Multi-share crypt-stego authentication system | |
Zhang et al. | Modular‐based secret image sharing in Internet of Things: A global progressive‐enabled approach | |
CN114189595A (en) | Image secret sharing method based on alliance chain | |
Samee et al. | Adaptive interpolation and segmentation based reversible image watermarking | |
Pan et al. | Novel visual secret sharing scheme for the QR code with meaningful shares | |
Lee et al. | Steganographic access control in data hiding using run‐length encoding and modulo‐operations | |
Zhao | An improved scheme for image scaling, cropping and colour correction in encrypted domain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |