CN110278074B - A Visual Secret Sharing Method for Image Encryption - Google Patents
A Visual Secret Sharing Method for Image Encryption Download PDFInfo
- Publication number
- CN110278074B CN110278074B CN201810216046.5A CN201810216046A CN110278074B CN 110278074 B CN110278074 B CN 110278074B CN 201810216046 A CN201810216046 A CN 201810216046A CN 110278074 B CN110278074 B CN 110278074B
- Authority
- CN
- China
- Prior art keywords
- image
- ilbp
- sharing
- satisfy
- blocks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000000007 visual effect Effects 0.000 title claims abstract description 7
- 238000000034 method Methods 0.000 title claims description 16
- 230000000694 effects Effects 0.000 claims abstract description 7
- 102100030426 Gastrotropin Human genes 0.000 claims description 23
- 108010003524 sodium-bile acid cotransporter Proteins 0.000 claims description 23
- 238000013139 quantization Methods 0.000 claims description 2
- 241001270131 Agaricus moelleri Species 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Facsimile Transmission Control (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
本发明涉及一种用于图像加密的可视化秘密共享方案。它充分利用了LBP的局部对比性特征,将秘密图像数据隐藏在不同的图像共享中,可以很容易地、准确地恢复秘密。通过将图像转化为LBP编码,再经过分割,可将分割后的部分交于不同的持有者以达到共享加密的效果。通过将分割后的部分结合可恢复原本图像。本方案不仅能够保证网络中的图像数据共享性,也能保证网络中的图像数据安全性,并具有较好的随机性,较低的像素扩展,较低的计算成本。
The present invention relates to a visual secret sharing scheme for image encryption. It makes full use of the local contrastive features of LBP to hide the secret image data in different image sharing, which can easily and accurately recover the secret. By converting the image into LBP code, and then dividing it, the divided part can be handed over to different holders to achieve the effect of shared encryption. The original image can be restored by combining the divided parts. This scheme can not only ensure the sharing of image data in the network, but also ensure the security of image data in the network, and has better randomness, lower pixel expansion, and lower computational cost.
Description
技术领域technical field
本发明涉及图像处理和信息加密技术领域,涉及一种用于图像共享加密的可视化秘密共享方法。The invention relates to the technical field of image processing and information encryption, and relates to a visual secret sharing method for image sharing encryption.
背景技术Background technique
随着多媒体技术的飞速发展,网络游戏、视频监控、视频会议等多媒体服务也不断涌现。这些服务通常是高度动态的,需要大量的资源来托管。云基础设施作为一种满足资源需求、提供高性价比服务的技术,越来越多的服务提供商采用云基础设施来处理多媒体服务。可视化秘密共享技术是一种共享秘密信息的方法,以避免潜在的中断和修改,包括恶意攻击和个人不适当的管理。With the rapid development of multimedia technology, multimedia services such as online games, video surveillance, and video conferencing are also emerging. These services are often highly dynamic and require significant resources to host. As a technology that meets resource requirements and provides cost-effective services, cloud infrastructure is used by more and more service providers to process multimedia services. Visual secret sharing technology is a method of sharing secret information to avoid potential disruption and modification, including malicious attacks and inappropriate management of individuals.
发明内容Contents of the invention
本发明的目的是提供一种共享加密的方法,针对加密后的图案进行分割,已达到共享效果,通过将分割后的图案结合解密以恢复原有图案,达到秘密共享的效果,并保证安全性。为达到上述效果,针对不同图像类型提出3种方案,二进制图像的VSS方案(BVSS);灰度图像的VSS方案(GVSS);多图像的VSS方案(MIVSS),并采用如下技术。The purpose of the present invention is to provide a method of shared encryption, which divides the encrypted pattern to achieve the sharing effect, and restores the original pattern by combining the divided pattern with decryption, so as to achieve the effect of secret sharing and ensure security . In order to achieve the above effects, three schemes are proposed for different image types, binary image VSS scheme (BVSS); grayscale image VSS scheme (GVSS); multi-image VSS scheme (MIVSS), and adopt the following techniques.
包括以下步骤:Include the following steps:
图像加密共享:Image encrypted sharing:
步骤一,通过ILBP算法对原图像进行加密,生成ILBP码;
步骤二,随机生成控制因子α和中心像素的灰度值L;
步骤三,通过控制因子α来随机生成中心像素邻域的灰度值,并使其满足ILBP的要求;Step 3, randomly generate the gray value of the central pixel neighborhood by controlling the factor α, and make it meet the requirements of ILBP;
步骤四,将图像分割,分割方式可以有多种,生成多个阴影块,多个阴影块可分散给不同持有者已达成图像加密共享效果。Step 4: Divide the image. There are many ways to divide the image to generate multiple shadow blocks, and the multiple shadow blocks can be distributed to different holders to achieve the effect of image encryption and sharing.
图像解密:Image decryption:
步骤一,将多个共享的阴影块组合成M×N的阴影块;
步骤二,通过ILBP算法对M×N的每个阴影块计算ILBP码,以恢复原图像。Step 2: Calculate the ILBP code for each shadow block of M×N through the ILBP algorithm to restore the original image.
在本发明的一种实施例中,ILBP算法为In one embodiment of the present invention, the ILBP algorithm is
其中参数P控制角空间的量子化,R控制空间分辨率。L表示中心像素的灰度,gp表示相邻像素p的灰度值,S(x)表示符号函数,是邻域的平均值,控制因子α∈[0,1],灰度L∈[0,255]。where the parameter P controls the quantization of the angular space, and R controls the spatial resolution. L represents the gray level of the central pixel, g p represents the gray value of the adjacent pixel p, S(x) represents the sign function, is the average value of the neighborhood, the control factor α∈[0,1], and the gray level L∈[0,255].
在本发明的一种实施例中,ILBP算法中阴影块灰度值必须满足以下要求:In an embodiment of the present invention, the shadow block gray value must meet the following requirements in the ILBP algorithm:
BVSS方案中:对于图像In the BVSS scheme: for images
B={B[i,j]|B[i,j]∈[0,1],0≤i≤M-1,0≤j≤N-1},假设有2个共享块S1[i,j],S2[i,j]。当B[i,j]=1,S1[i,j]∈(0,L),S2[i,j]∈(S1[i,j]+1,L)且满足当B[i,j]=0时,S1[i,j]∈(0,S1[i,j]),并保证S2[i,j]∈(0,S1[i,j])且满足 B={B[i,j]|B[i,j]∈[0,1], 0≤i≤M-1, 0≤j≤N-1}, assuming there are 2 shared blocks S 1 [i ,j], S 2 [i,j]. When B[i,j]=1, S 1 [i,j]∈(0,L), S 2 [i,j]∈(S 1 [i,j]+1,L) and satisfy When B[i,j]=0, S 1 [i,j]∈(0,S 1 [i,j]), and ensure that S 2 [i,j]∈(0,S 1 [i,j] ]) and satisfy
GVSS方案中:对于图像G,中心像素为邻域像素为当保证且满足当保证且满足 In the GVSS scheme: for image G, the central pixel is Neighborhood pixels are when ensure and satisfied when ensure and satisfied
MIVSS方案中:对于多个图像假设有n+1个共享块,其中随机生成的中心像素当时,Sk[i,j]=random(Sk-1[i,j]+1,L),且满足当时,Sk[i,j]=random(0,Sk-1[i,j]),且满足 MIVSS scheme: for multiple images Suppose there are n+1 shared blocks, where the randomly generated central pixel when When , S k [i,j]=random(S k-1 [i,j]+1,L), and satisfy when , S k [i,j]=random(0, S k-1 [i,j]), and satisfy
和现有的图像共享方法相比,本方案有以下优点:Compared with existing image sharing methods, this scheme has the following advantages:
(1)无损的秘密重建;(1) Lossless secret reconstruction;
(2)对图像格式没有限制;(2) There is no restriction on the image format;
(3)易于对齐;(3) Easy to align;
(4)不需要codebook;(4) No codebook is required;
(5)不同大小的共享;(5) Sharing of different sizes;
(6)像素的扩展计算效率高。(6) The expansion calculation efficiency of pixels is high.
附图说明Description of drawings
图1为3×3的图像加密方案,图2为3×3的图像加密实际应用,图3为多重图像加密共享方法,图4为多重图像加密共享实际应用,图5为两幅分存图像S1,S2,图6为分存图像S1的像素值范围,图7为分存信息为0时分存图像S1的像素值范围,图8为分存信息为0时分存图像S2的像素值范围,图9为第k个分存图像对应的像素值应满足的取值条件。Figure 1 is the 3×3 image encryption scheme, Figure 2 is the practical application of 3×3 image encryption, Figure 3 is the multiple image encryption and sharing method, Figure 4 is the practical application of multiple image encryption and sharing, and Figure 5 is two shared images S1, S2, Fig. 6 is the pixel value range of the shared image S1, Fig. 7 is the pixel value range of the shared image S1 when the shared information is 0, and Fig. 8 is the pixel value range of the shared image S2 when the shared information is 0, FIG. 9 shows the value conditions that the pixel values corresponding to the kth shared image should satisfy.
具体实施方式Detailed ways
下面将对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
本发明提供一种用于图像共享加密的可视化秘密共享方法包括以下步骤:The present invention provides a visual secret sharing method for image sharing encryption comprising the following steps:
图像加密共享:Image encryption sharing:
步骤一,通过ILBP算法对原图像进行加密,生成ILBP码;
步骤二,随机生成控制因子α和中心像素的灰度值L;
步骤三,通过控制因子α来随机生成中心像素邻域的灰度值,并使其满足ILBP的要求;Step 3, randomly generate the gray value of the central pixel neighborhood by controlling the factor α, and make it meet the requirements of ILBP;
步骤四,将图像分割,分割方式可以有多种,生成多个阴影块,多个阴影块可分散给不同持有者已达成图像加密共享效果。Step 4: Divide the image. There are many ways to divide the image to generate multiple shadow blocks, and the multiple shadow blocks can be distributed to different holders to achieve the effect of image encryption and sharing.
图像解密:Image decryption:
步骤一,将多个共享的阴影块组合成M×N的阴影块;
步骤二,通过ILBP算法对M×N的每个阴影块计算ILBP码,以恢复原图像。Step 2: Calculate the ILBP code for each shadow block of M×N through the ILBP algorithm to restore the original image.
进一步的以图1中3×3的灰度图像为例,包括以下步骤:Taking the grayscale image of 3×3 in Fig. 1 further as an example, the following steps are included:
图像加密共享:Image encryption sharing:
步骤一,将ILBP码分布在3×3的图像块中;
步骤二,随机生成控制因子α和中心像素的灰度值L,这里α=
0.24,中心像素值为83;0.24, the center pixel value is 83;
步骤三,通过控制因子α来随机生成中心像素邻域的灰度值,这里为(87,40,210,68,35,96,71,180),这些值都满足ILBP中GVSS方案的要求;Step 3, by controlling the factor α to randomly generate the gray value of the central pixel neighborhood, here (87, 40, 210, 68, 35, 96, 71, 180), these values meet the requirements of the GVSS scheme in ILBP;
步骤四,将图像分割,这里以横向分割,分成3的共享块,Sharel,Share2,Share3,但分割方式不限于这一种。In
图像解密:Image decryption:
步骤一,将3个共享的阴影块Sharel,Share2,Share3组合成3×3的阴影块;Step 1: Combine the three shared shadow blocks Sharel, Share2 and Share3 into a 3×3 shadow block;
步骤二,通过ILBP算法对3×3的每个阴影块逆运算ILBP码,以恢复原图像。Step 2: Inversely calculate the ILBP code for each shadow block of 3×3 through the ILBP algorithm to restore the original image.
进一步的结合图像2实例对图像解密进行详细说明:Further, the image decryption is described in detail in combination with the example of image 2:
在图像2所示实例中,随机生成的a=0.15。其中(a)为原图像Barbara;(e)中将a图像分成3个共享阴影块;(b)为解密后恢复的图像。(c)为原图像Lena;(f)中将c图像分成3个共享阴影块,(d)为解密后恢复的图像。In the example shown in
本发明可以应用于不同格式或不同灰度的图像,以实现视觉密码学。所提出的方法具有很多优点,包括无损的秘密重构,不局限于图像格式,易于对齐等。基于不同的ILBP扩展或变体,设计了多种VSS方案来共享秘密或隐藏信息。实验结果表明,该方法与传统的图像共享方法相比是有效的。它提供了更好的共享灵活性和低计算复杂度。The present invention can be applied to images of different formats or different gray scales to realize visual cryptography. The proposed method has many advantages, including lossless secret reconstruction, not limited to image format, easy alignment, etc. Based on different ILBP extensions or variants, various VSS schemes are designed to share secret or hidden information. Experimental results show that the method is effective compared to traditional image sharing methods. It provides better sharing flexibility and low computational complexity.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216046.5A CN110278074B (en) | 2018-03-16 | 2018-03-16 | A Visual Secret Sharing Method for Image Encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810216046.5A CN110278074B (en) | 2018-03-16 | 2018-03-16 | A Visual Secret Sharing Method for Image Encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278074A CN110278074A (en) | 2019-09-24 |
CN110278074B true CN110278074B (en) | 2022-11-11 |
Family
ID=67957712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810216046.5A Active CN110278074B (en) | 2018-03-16 | 2018-03-16 | A Visual Secret Sharing Method for Image Encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278074B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114189595A (en) * | 2021-11-19 | 2022-03-15 | 临沂大学 | An Image Secret Sharing Method Based on Consortium Chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142129A (en) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | Visual secret sharing-based image content tampering detection method |
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Secret sharing and recovery method for digital image |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
US9514321B2 (en) * | 2013-05-02 | 2016-12-06 | Samsung Electronics Co., Ltd. | Electro device for protecting user's privacy and method for controlling thereof |
CN106203047A (en) * | 2016-07-08 | 2016-12-07 | 钟林超 | A kind of movable storage device with identification verification function |
US9692594B2 (en) * | 2014-10-27 | 2017-06-27 | Panasonic Intellectual Property Corporation Of America | Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data |
-
2018
- 2018-03-16 CN CN201810216046.5A patent/CN110278074B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142129A (en) * | 2011-03-09 | 2011-08-03 | 西安理工大学 | Visual secret sharing-based image content tampering detection method |
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Secret sharing and recovery method for digital image |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN103226802A (en) * | 2013-03-26 | 2013-07-31 | 中南大学 | Chaotic-encryption-based medical image share method |
US9514321B2 (en) * | 2013-05-02 | 2016-12-06 | Samsung Electronics Co., Ltd. | Electro device for protecting user's privacy and method for controlling thereof |
US9692594B2 (en) * | 2014-10-27 | 2017-06-27 | Panasonic Intellectual Property Corporation Of America | Encryption method, encryptor, and encryption system for encrypting electronic data by splitting electronic data |
CN106203047A (en) * | 2016-07-08 | 2016-12-07 | 钟林超 | A kind of movable storage device with identification verification function |
Non-Patent Citations (3)
Title |
---|
"Formulation of visual secret sharing schemes encrypting multiple images";Manami Sasaki et al;《2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)》;20140509;全文 * |
"秘密共享技术及其在图像加密中的应用";任方 等;《科学技术与工程》;20150608;第15卷(第16期);全文 * |
"秘密共享理论及相关应用研究";胡春强;《中国博士学位论文全文数据库信息科技辑》;20140215;正文第6章 * |
Also Published As
Publication number | Publication date |
---|---|
CN110278074A (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharif et al. | A novel method for digital image steganography based on a new three-dimensional chaotic map | |
Li et al. | Distortion less secret image sharing scheme for Internet of Things system | |
Shanthakumari et al. | RETRACTED ARTICLE: Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm | |
CN104751400B (en) | Secret image share method based on the insertion of pixel-map matrix | |
Lee et al. | An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection | |
Ye et al. | Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift | |
Yu et al. | Adaptive and separable multiary reversible data hiding in encryption domain | |
Roselinkiruba et al. | Secure video steganography using key frame and region selection technique | |
CN113298687A (en) | Watermark image adding method and device | |
Liu et al. | A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction | |
CN110278074B (en) | A Visual Secret Sharing Method for Image Encryption | |
Van Rensburg et al. | 3D object watermarking from data hiding in the homomorphic encrypted domain | |
Ahmad et al. | Perceptual encryption-based privacy-preserving deep learning in internet of things applications | |
Biswas et al. | Digital image steganography using dithering technique | |
Manikandan et al. | Steganographic approach to enhancing secure data communication using contours and clustering | |
Karthik et al. | Image security based on rotational visual cryptography | |
CN110417551A (en) | A generative camouflage and restoration method for character paintings combined with error diffusion | |
Yadav et al. | Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization | |
Gulia et al. | An extensive literature survey on medical image steganography | |
CN114189595A (en) | An Image Secret Sharing Method Based on Consortium Chain | |
Bhattacherjee et al. | A review of Steganography techniques suitable for ECG signal | |
Shamsi et al. | Securing Secret Information | |
Ghaemi et al. | Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system | |
Perumal et al. | Robust multitier spatial domain secured color image steganography in server environment | |
Rao et al. | A Novel Image Encryption Using Parity Based Visual Cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |