CN110278074B - Visual secret sharing method for image encryption - Google Patents

Visual secret sharing method for image encryption Download PDF

Info

Publication number
CN110278074B
CN110278074B CN201810216046.5A CN201810216046A CN110278074B CN 110278074 B CN110278074 B CN 110278074B CN 201810216046 A CN201810216046 A CN 201810216046A CN 110278074 B CN110278074 B CN 110278074B
Authority
CN
China
Prior art keywords
image
ilbp
sharing
satisfy
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810216046.5A
Other languages
Chinese (zh)
Other versions
CN110278074A (en
Inventor
张问银
赵伟
张亚伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linyi University
Original Assignee
Linyi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linyi University filed Critical Linyi University
Priority to CN201810216046.5A priority Critical patent/CN110278074B/en
Publication of CN110278074A publication Critical patent/CN110278074A/en
Application granted granted Critical
Publication of CN110278074B publication Critical patent/CN110278074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Facsimile Transmission Control (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a visual secret sharing scheme for image encryption. The local contrast characteristic of the LBP is fully utilized, the secret image data is hidden in different image shares, and the secret can be easily and accurately recovered. By converting the image into LBP codes and then dividing, the divided parts can be handed over to different holders to achieve the effect of sharing encryption. The original image can be restored by combining the divided portions. The scheme can not only ensure the image data sharing performance in the network, but also ensure the image data security in the network, and has better randomness, lower pixel expansion and lower calculation cost.

Description

Visual secret sharing method for image encryption
Technical Field
The invention relates to the technical field of image processing and information encryption, in particular to a visual secret sharing method for image sharing encryption.
Background
With the rapid development of multimedia technology, multimedia services such as online games, video monitoring, video conferences and the like are emerging. These services are typically highly dynamic, requiring a large amount of resources to host. As a technology for satisfying resource demands and providing cost-effective services, more and more service providers use cloud infrastructure to process multimedia services. The visual secret sharing technique is a method of sharing secret information to avoid potential interruptions and modifications, including malicious attacks and improper management of individuals.
Disclosure of Invention
The invention aims to provide a shared encryption method, which aims at segmenting encrypted patterns to achieve a sharing effect, recovers the original patterns by combining and decrypting the segmented patterns to achieve a secret sharing effect and ensure the safety. To achieve the above effect, 3 schemes are proposed for different image types, a VSS scheme (BVSS) of binary images; VSS scheme of gray image (GVSS); multi-picture VSS scheme (MIVSS), and the following technique is employed.
The method comprises the following steps:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
step two, randomly generating a control factor alpha and a gray value L of a central pixel;
step three, randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP;
and step four, the image is divided, the division modes can be various, a plurality of shadow blocks are generated, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect.
Image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
and step two, calculating the ILBP code for each shadow block of the M multiplied by N through an ILBP algorithm so as to restore the original image.
In one embodiment of the invention, the ILBP algorithm is
Figure GDA0003785797960000021
Where the parameter P controls the quantization of the angular space and R controls the spatial resolution. L represents the gray level of the center pixel, g p Representing the gray value of the neighboring pixel p, S (x) represents a sign function,
Figure GDA0003785797960000022
is the average value of the neighborhood, and the control factor alpha is in the range of 0,1]The gray level L belongs to [0,255 ]]。
In one embodiment of the present invention, the shadow block gray scale value in the ILBP algorithm must satisfy the following requirements:
in the BVSS scheme: for images
B={B[i,j]|B[i,j]∈[0,1]I is more than or equal to 0 and less than or equal to M-1, j is more than or equal to 0 and less than or equal to N-1, and 2 shared blocks S are assumed 1 [i,j],S 2 [i,j]. When B [ i, j ]]=1,S 1 [i,j]∈(0,L),S 2 [i,j]∈(S 1 [i,j]+1, L) and satisfy
Figure GDA0003785797960000023
When B [ i, j ]]When =0, S 1 [i,j]∈(0,S 1 [i,j]) And guarantee S 2 [i,j]∈(0,S 1 [i,j]) And satisfy
Figure GDA0003785797960000024
In the GVSS protocol: for image G, the center pixel is
Figure GDA0003785797960000025
The neighborhood pixels are
Figure GDA0003785797960000026
When in use
Figure GDA0003785797960000027
Guarantee
Figure GDA0003785797960000028
And satisfy
Figure GDA0003785797960000029
When in use
Figure GDA00037857979600000210
Guarantee
Figure GDA00037857979600000211
And satisfy
Figure GDA00037857979600000212
In the MIVSS scheme: for multiple images
Figure GDA00037857979600000213
Assuming that there are n +1 shared blocks,
Figure GDA00037857979600000214
in which the central pixel is randomly generated
Figure GDA00037857979600000215
When the temperature is higher than the set temperature
Figure GDA00037857979600000216
When, S k [i,j]=random(S k-1 [i,j]+1, L), and satisfy
Figure GDA00037857979600000217
When in use
Figure GDA00037857979600000218
When S is present k [i,j]=random(0,S k-1 [i,j]) And satisfy
Figure GDA00037857979600000219
Compared with the prior image sharing method, the scheme has the following advantages:
(1) Lossless secret reconstruction;
(2) There is no limitation on the image format;
(3) Easy alignment;
(4) The codebook is not needed;
(5) Sharing of different sizes;
(6) The pixel expansion is computationally efficient.
Drawings
Fig. 1 is a 3 × 3 image encryption scheme, fig. 2 is a 3 × 3 image encryption practical application, fig. 3 is a multiple image encryption sharing method, fig. 4 is a multiple image encryption sharing practical application, fig. 5 is two separate images S1 and S2, fig. 6 is a pixel value range of the separate image S1, fig. 7 is a pixel value range of the separate image S1 when the separate information is 0, fig. 8 is a pixel value range of the separate image S2 when the separate information is 0, and fig. 9 is a value condition that a pixel value corresponding to the kth separate image should satisfy.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a visual secret sharing method for image sharing encryption, which comprises the following steps:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
randomly generating a control factor alpha and a gray value L of a central pixel;
randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP;
and step four, the image is divided, the division modes can be various, a plurality of shadow blocks are generated, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect.
Image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
and step two, calculating the ILBP code for each shadow block of the M multiplied by N through an ILBP algorithm so as to restore the original image.
Further taking the 3 × 3 grayscale image in fig. 1 as an example, the method includes the following steps:
image encryption sharing:
distributing ILBP codes in 3 multiplied by 3 image blocks;
step two, randomly generating a control factor alpha and a gray value L of a central pixel, wherein alpha =
0.24, center pixel value 83;
step three, randomly generating gray values of a central pixel neighborhood by controlling a factor alpha, wherein the gray values are (87, 40,210,68,35,96,71 and 180), and the gray values all meet the requirements of the GVSS scheme in ILBP;
and step four, dividing the image into 3 shared blocks, sharel, share2 and Share3 by horizontal division, but the division mode is not limited to the mode.
Image decryption:
step one, combining 3 shared shadow blocks Sharel, share2 and Share3 into a shadow block of 3 multiplied by 3;
and step two, inversely calculating the ILBP code for each shadow block of 3 multiplied by 3 through the ILBP algorithm to recover the original image.
Further details of image decryption are described in connection with the image 2 example:
in the example shown in image 2, randomly generated a =0.15. Wherein (a) is an original image Barbara; dividing the a image into 3 shared shadow blocks in (e); and (b) the image restored after decryption. (c) is an original image Lena; (f) The c image is divided into 3 shared shadow blocks, and (d) the image is recovered after decryption.
The invention can be applied to images with different formats or different gray levels to realize visual cryptography. The proposed method has many advantages including lossless secret reconstruction, no restriction to image format, easy alignment, etc. Based on different ILBP extensions or variants, multiple VSS schemes are designed to share secret or hidden information. Experimental results show that the method is effective compared to conventional image sharing methods. It provides better sharing flexibility and low computational complexity.

Claims (1)

1. A visual secret sharing method for image sharing encryption, characterized by the steps of:
image encryption sharing:
encrypting an original image through an ILBP algorithm to generate an ILBP code;
randomly generating a control factor alpha and a gray value L of a central pixel;
step three, randomly generating a gray value of a central pixel neighborhood by controlling a factor alpha, and enabling the gray value to meet the requirements of ILBP; the method comprises the following specific steps:
in the BVSS protocol: for images
B={B[i,j]|B[i,j]∈[0,1]I is more than or equal to 0 and less than or equal to M-1, j is more than or equal to 0 and less than or equal to N-1, and 2 shared blocks S are assumed 1 [i,j],S 2 [i,j](ii) a When B [ i, j ]]=1,S 1 [i,j]∈(0,L),S 2 [i,j]∈(S 1 [i,j]+1, L) and satisfy
Figure FDA0003886616860000011
When B [ i, j ]]When =0, S 1 [i,j]∈(0,S 1 [i,j]) And guarantee S 2 [i,j]∈(0,S 1 [i,j]) And satisfy
Figure FDA0003886616860000012
In the GVSS protocol: for image G, the center pixel is
Figure FDA0003886616860000013
The neighborhood pixels are
Figure FDA0003886616860000014
When in use
Figure FDA0003886616860000015
Guarantee
Figure FDA0003886616860000016
And satisfy
Figure FDA0003886616860000017
When in use
Figure FDA0003886616860000018
Guarantee
Figure FDA0003886616860000019
And satisfy
Figure FDA00038866168600000110
In the MIVSS scheme: for multiple images
Figure FDA00038866168600000111
Assuming that there are n +1 shared blocks,
Figure FDA00038866168600000112
in which the central pixel is randomly generated
Figure FDA00038866168600000113
When in use
Figure FDA00038866168600000114
When S is present k [i,j]=random(S k-1 [i,j]+1, L), and satisfies
Figure FDA00038866168600000115
When in use
Figure FDA00038866168600000116
When, S k [i,j]=random(0,S k-1 [i,j]) And satisfy
Figure FDA00038866168600000117
Step four, the image is divided to generate a plurality of shadow blocks, and the shadow blocks can be distributed to different holders to achieve the image encryption sharing effect;
image decryption:
combining a plurality of shared shadow blocks into an MxN shadow block;
calculating ILBP codes for each shadow block of the MxN through an ILBP algorithm to restore an original image;
the ILBP algorithm is
Figure FDA00038866168600000118
Where the parameter P controls the quantization of the angular space, R controls the spatial resolution, L denotes the grey scale of the central pixel, g p Representing the gray value of the neighboring pixel p, S (x) represents a sign function,
Figure FDA0003886616860000021
is the average of the neighborhood, with the control factor α ∈ [0,1 ]]The gray level L belongs to [0,255 ]]。
CN201810216046.5A 2018-03-16 2018-03-16 Visual secret sharing method for image encryption Active CN110278074B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810216046.5A CN110278074B (en) 2018-03-16 2018-03-16 Visual secret sharing method for image encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810216046.5A CN110278074B (en) 2018-03-16 2018-03-16 Visual secret sharing method for image encryption

Publications (2)

Publication Number Publication Date
CN110278074A CN110278074A (en) 2019-09-24
CN110278074B true CN110278074B (en) 2022-11-11

Family

ID=67957712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810216046.5A Active CN110278074B (en) 2018-03-16 2018-03-16 Visual secret sharing method for image encryption

Country Status (1)

Country Link
CN (1) CN110278074B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189595A (en) * 2021-11-19 2022-03-15 临沂大学 Image secret sharing method based on alliance chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Secret sharing and recovery method for digital image
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
US9514321B2 (en) * 2013-05-02 2016-12-06 Samsung Electronics Co., Ltd. Electro device for protecting user's privacy and method for controlling thereof
CN106203047A (en) * 2016-07-08 2016-12-07 钟林超 A kind of movable storage device with identification verification function
US9692594B2 (en) * 2014-10-27 2017-06-27 Panasonic Intellectual Property Corporation Of America Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142129A (en) * 2011-03-09 2011-08-03 西安理工大学 Visual secret sharing-based image content tampering detection method
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Secret sharing and recovery method for digital image
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
US9514321B2 (en) * 2013-05-02 2016-12-06 Samsung Electronics Co., Ltd. Electro device for protecting user's privacy and method for controlling thereof
US9692594B2 (en) * 2014-10-27 2017-06-27 Panasonic Intellectual Property Corporation Of America Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data
CN106203047A (en) * 2016-07-08 2016-12-07 钟林超 A kind of movable storage device with identification verification function

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Formulation of visual secret sharing schemes encrypting multiple images";Manami Sasaki et al;《2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)》;20140509;全文 *
"秘密共享技术及其在图像加密中的应用";任方 等;《科学技术与工程》;20150608;第15卷(第16期);全文 *
"秘密共享理论及相关应用研究";胡春强;《中国博士学位论文全文数据库信息科技辑》;20140215;正文第6章 *

Also Published As

Publication number Publication date
CN110278074A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
Zhang et al. Chaos-based partial encryption of SPIHT coded color images
Bansod et al. Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity
Yi et al. Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction
WO2014075469A1 (en) Method and device for information hiding
Anushiadevi et al. Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram
Das et al. An image secret sharing technique with block based image coding
Hosny et al. Fast colored video encryption using block scrambling and multi-key generation
Ye et al. Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
CN105975869A (en) Adaptive selection encryption method based on salient area
Mohammed et al. LSB based image steganography using McEliece cryptosystem
Zhang et al. A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing
Roselinkiruba et al. Secure video steganography using key frame and region selection technique
CN110278074B (en) Visual secret sharing method for image encryption
Ahmad et al. Perceptual encryption-based privacy-preserving deep learning in internet of things applications
Srividhya et al. Implementation of TiOISSS with meaningful shadows and with an additional authentication image
CN114782563B (en) Secret image sharing method and system for JPEG image
Banupriya et al. Video steganography using LSB algorithm for security application
Kukreja et al. A secure reversible data hiding scheme for digital images using random grid visual secret sharing
Deshmukh et al. Multi-share crypt-stego authentication system
Zhang et al. Modular‐based secret image sharing in Internet of Things: A global progressive‐enabled approach
CN114189595A (en) Image secret sharing method based on alliance chain
Samee et al. Adaptive interpolation and segmentation based reversible image watermarking
Pan et al. Novel visual secret sharing scheme for the QR code with meaningful shares
Lee et al. Steganographic access control in data hiding using run‐length encoding and modulo‐operations
Zhao An improved scheme for image scaling, cropping and colour correction in encrypted domain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant