TW201126476A - A (2,2) circular sharing techniques for two color secret images - Google Patents

A (2,2) circular sharing techniques for two color secret images Download PDF

Info

Publication number
TW201126476A
TW201126476A TW99101214A TW99101214A TW201126476A TW 201126476 A TW201126476 A TW 201126476A TW 99101214 A TW99101214 A TW 99101214A TW 99101214 A TW99101214 A TW 99101214A TW 201126476 A TW201126476 A TW 201126476A
Authority
TW
Taiwan
Prior art keywords
image
confidential
images
circular
shared
Prior art date
Application number
TW99101214A
Other languages
Chinese (zh)
Other versions
TWI410908B (en
Inventor
Chin-Chen Chang
Hsien-Chu Wu
Chia-Chen Lin
Original Assignee
Chin-Chen Chang
Hsien-Chu Wu
Chia-Chen Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chin-Chen Chang, Hsien-Chu Wu, Chia-Chen Lin filed Critical Chin-Chen Chang
Priority to TW099101214A priority Critical patent/TWI410908B/en
Publication of TW201126476A publication Critical patent/TW201126476A/en
Application granted granted Critical
Publication of TWI410908B publication Critical patent/TWI410908B/en

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Traditional visual cryptography technique has provided sufficient security to fulfill the purpose of protecting confidential messages. In current technology, the same set of shares can be embedded with many sets of secret messages after one of the shares is rotated at different degrees. However, the used share is rectangle so that only four kinds of angle variation exist when stacking shares. Thus, when intending to embed many sets of confidential messages by using these shares, the angle variation of rotating the shares is limited. This invention proposes an improved (2, 2) circular secret sharing scheme that adapts circular shares to deal with the limitation of rotating angles in traditional visual cryptography. After completing color quantization procedure, two index's sets of color confidential images are generated. These index sets are transformed into two binary images, respectively. Then, two share generating algorithms proposed in our invention will be applied to embed two binary images into two shares. Combing stacking and rotating of two shares, the binary images can be successfully reconstructed. The share used in this invention is circular, where confidential data can be embedded in various different angle conditions. Our invention can be applied in gray-level and color confidential images. Compared with traditional visual cryptography, our invention has more flexibility, extensibility, and security.

Description

201126476 四、指定代表圖: (一)本案指定代表圖為:第(1 )圖。 (一)本代表圖之元件符號簡單說明: 1. 也色秘在、影像c〇l〇r jmage 2. 每〉色秘役影像color image M2 3. 量化編石馬 4. 量化編碼 鲁5.彩色秘密影像Η的索引值I, 6.彩色秘密影像Μ2的索引值ι2 7·對應索弓丨值I,的二元影像〇1 8·對應索引值12的二元影像〇2 9·分享影像A 1〇·分享影像β 鲁五、本案若有化學式時,請揭示最能顯示發明特徵的化學式: 六、發明說明: 【發明所屬之技術領域】 近年來,由於網際網路的蓬勃發展,改變了傳統資料傳送及接 ,的方式。因此,許多企#逐漸_網際鱗來傳遞重要文件或 糾’雖_可為企業帶來相當从便利性 但因為 娜網路是-個開放式且不安全的空間,透過__路來傳遞資 201126476 料,網路骇客或不法㈣者皆可巾途触這些:#料。於是也衍生 了卉多安全上的問題,例如:重要資料遭竊取、篡改等,有鑑於 此’如何保婦料的安全性’可說是目前相當值得$視的課題之 0 針對保護資料的安全性,―和Shami41994年提出了一個 新的密碼學領域,蘭稱其為視覺密解(visuai咖吻卿), 這個領域最大的特色技原機密時不需要任何計算,直接以人類 勺視克系,·績此將;息辨識出來,改進了傳統密碼學在解密 過私中須大量複雜計算之缺失。視覺密碼學的原理可以延伸應用 於群體加密系統(group enc_on system)中,達成機密共享的目 的。其中針對㈣視覺機密共享方案((t, η) ν_】s_ siwing201126476 IV. Designated representative map: (1) The representative representative of the case is: (1). (1) A brief description of the symbol of the representative figure: 1. Also color secret, image c〇l〇r jmage 2. Each color secret image color image M2 3. Quantitative stone horse 4. Quantitative code Lu 5. The index value of the color secret image I I, 6. The index value of the color secret image Μ 2 ι2 7 · The binary image corresponding to the 丨 丨 value I, 二元 18 · The binary image corresponding to the index value 〇 2 9 · Share the image A 1〇·Share image β Lu 5, if there is a chemical formula in this case, please reveal the chemical formula that best shows the characteristics of the invention: 6. Invention Description: [Technical field of invention] In recent years, due to the booming development of the Internet, changes The way of traditional data transmission and connection. Therefore, many enterprises # gradually _ cyber scales to pass important documents or correct 'though _ can bring considerable convenience to the enterprise, but because the network is an open and unsafe space, through the __ road to pass the capital 201126476 It is expected that Internet hackers or illegal (four) can touch these: #料. Therefore, it has also derived the problems of Huiduo security, such as: theft of important information, tampering, etc. In view of this, 'how to ensure the safety of women's materials' can be said to be a topic worthy of consideration. Sex, ― and Shami4 proposed a new field of cryptography in 1994. Lan called it a visually confusing (visuai kan kiss). The biggest feature of this field is the original secret without any calculations. The performance of this will be identified; the improvement of the traditional cryptography in the decryption of the private need for a large number of complex calculations. The principle of visual cryptography can be extended to the group enc_on system to achieve the purpose of confidential sharing. Which is for (4) visual secret sharing scheme ((t, η) ν_]s_ siwing

Scheme),利用視覺密碼學的原理,莊家可以由一份機密訊 出"張分享影像(Slwe)來’而令群體巾的每—個成員各自秘密地 % 擁有—張分享影像;當欲還原機密訊息時,僅需至少Μ固成員的分 享影像列印在投影片上並且將這些投影片相疊合,不需任何計 r就月b顯示出機岔δΚ息。Noar和Shamir同時證明,如果投影片 疊合的張數少於卜則不論如何都無法還原出機密訊息。由於視覺 费碼學是雜密訊息隱藏於數鮮具任何意義的分享影像中,所 以網路骇路或不宵人士無法從任一張分享影像中獲知任何與所隱 藏的資料相關的訊息’故視覺密碼學可確保資料通訊時之安全 性,更可進一步地對該機密訊息多一層保護。 為了解決傳統視覺密碼學的技術只能隱藏—份機密訊息的缺 [S.1 4 201126476 ^ ’已經有多位學者提出了各種(A 2)視覺機密共 法’例如透過旋轉任一張分享影像的方法,可她進的方 亦即可在兩種份㈣ 分享影像_,其二: 度、90度、180度及270度,故其在旋轉角产 之變化上將受到限制。 两又Scheme), using the principle of visual cryptography, the bookmaker can use a secret message to "share the image (Slwe) to 'and each member of the group towel secretly owns - share the image; when you want to restore For confidential messages, only the shared images of at least the tamping members are printed on the slides and the slides are superimposed, and the b Κ 显示 is displayed without any calculation. Noar and Shamir also proved that if the number of sheets of the slide is less than the number of sheets, the confidential information cannot be restored anyway. Since visual fee coding is a hidden message hidden in a number of shared images of any meaning, it is impossible for a network or a person to know any information related to the hidden information from any shared image. Visual cryptography ensures the security of data communications and further protects the confidential information. In order to solve the traditional visual cryptography technology can only hide the lack of confidential information [S.1 4 201126476 ^ 'A number of scholars have proposed a variety of (A 2) visual secrets common method' such as sharing images by rotating any one The method that she can enter can also share images in two copies (4), two degrees: 90 degrees, 180 degrees, and 270 degrees, so it will be limited in the change of the rotation angle. Two again

^-财水印技術為不可視型浮水印技術,此項技術主要是使 :像偽裝術(stegan卿phy)將具核觀表性的商標影像或 文子以人触錢上不可察覺的前提之下藏人受賴的影像中, 故經此種浮水印技術處理之影像,任何使用者皆無法輕易地察覺 商W像或文字。由於其藏人之浮水印無法直接察覺,故 此種二水印技術—般包括二個部份:浮水印藏人程序以及浮水印 序在浮水印藏入部份,必須要求已藏有浮水印之影像與 二。像在人類視覺上不能有差異而被察覺;在浮水印取出部 斤要长的疋又保護影像在受到惡意地竄改和破壞後,仍能取 出,類視覺可識別之商標影像或文字做為版權證明之用,此項特 I·生稱之為強祕(nDbust)’它是—则於評估不可視型浮水印技 nk劣的重要指標。目前數位浮水印技術可應關影像主要有灰 ^知色以及半色調影像,而在印刷品上的影像皆以半色調影像 方式王現。保護印刷品上影像版權之不可視型浮水印技術為本發 明的主要研究主題。 t si 201126476 本=峨出的方法主要使關形分享影像的技巧 =疊像旋?某一角度的方法,可將兩份機密訊息藏入 在 &且&合之韻顯示的機密影像大小不會縮小。 像技術的過程中,我們的方法以每二度為-個 像。首先密影像可轉換餘對應的兩張黑白影 密影像進行=:==調色:分別對兩張彩色機 引值轉換成邮黑白機密影像本這兩_ 式產生第—張分享影像 ;方 第一張公古旦7你 丨文歟八的兩伤黑白機密訊息及 引值資訊:二分享影像’曰後要取得所隱藏的索 色機密影像的索;即可取得第一份彩 並和另1八~貝再料—張分享影像旋轉某-角度, 值資訊。再:ί疊合’即可取得第二份彩色機密影像的索引 色盤的對照,兩兩;影像的索引值資訊後,配合調 浪Α色機在衫像便可以被重建出來了。 【先前技術】 「視覺秘心卩及Sh_首先提出視覺秘密分享技術。所謂 密影像的術」主妓利用人類本身的視覺系統來進行秘 統密碼學贿*=卩_料行繁_數學運算以達到傳 密分享機制,二=二二方法並衍生出“)⑽式視覺機 延襲傳統門插式心Γ古 機密分享機制的主要概念呈 ;心予方法的精神。也就是說,—個機密的影 201126476 像可以透過門捏式視覺機密分享機制分解成"張不同的八〜 像。單獨看這《張分享影像,無法獲得 刀予衫 的資訊。但是,觸嫌心^ 上的分旱影像,接收者便可以重建原始的機密影像。 後續,iwam〇to以及Wang等學者並提出有多位 影像旋轉⑽度來達到同時隱藏多張機密資訊的方法曰,分享 限於過去學射_賴齡享雜料 -雙 有四種變化,分別為0度、90度、18〇度及27〇、=^度取Μ 像在旋轉角度之變化上便受到限制。 又 以分旱影 【發明内容】 本發賴卜崎聰崎絲 _。利關形具有度之特性 狀為 將機密訊息藏人_分轉仙。次外,^㈣角度 Γ视將兩份機密訊息分別藏人不同的角度内,在解碼時,亦 月b取得此兩份機密訊息的内容。 :? = Ϊ四個部份,第-部份是彩色影像量化編碼,第二部 賴入’第三部份是索引值資訊的取出以及第四 _重建,如圖—所示。本發明的第一部份會 碼如統r色Γ像德程序各別為兩張彩色秘密影像進行量化編 =過ϋ四部份的彩色機密影像的重建,射以知一般 盤為基礎的彩色影像解碼過程。至於’本發明的第二部份索引 S.1 7 201126476 值資訊^藏人以及以及第三部份索引值的取出則是本發明的主要 特色Μ獻。針對索引值資訊的藏人,本發明制圓古 提出兩個演算法:圓形分享影像Α產生演算‘= 刀子‘ i切算法,分财生用來賴兩_ 引值的_分轉彡像。 【實施方式】 本發明採關形分享綱技巧,可將兩份彩色機密訊息先透 過调色盤進行量化編碼後,把兩組索引值轉成兩組黑白機密資 訊,最後再將兩組黑白機密資訊藏入圓形分享影像的不度 内。本發明的方法包含四個階段:彩色影像量化編碼階段= ,資域”索引值資訊取出階段以及彩色機密影像重建階 又%色衫像置化編碼階段以及彩色機密影像重建階段可以參照 —般以調色盤為基礎的彩色影像編碼以及解碼過程。至於: =訊的藏人階段以及取請段則是本發⑽主要貢獻。 值貝訊的藏入,本發明應用圓形分享影像技術,分別個— :法:圓形分享爾A產生演算法和咖分轉㈣產生演算法秀 刀別產生用來隱藏兩組彩色機密影像索引值的圓形分抑像… 所示’在本發明的處理過財,兩份彩色機密訊息%和 2刀贱相調色盤量化編麵程各自產生對應的 和12。接著,兩組索引值集合各自被轉換成 大小的黑白機密影像〇丨和0再將 、' -' n m 丹將Ο,和〇2透過本發明的分享^-Currency watermarking technology is an invisible watermarking technology. This technology is mainly used to make: under the premise that the steganqing phy will have a nuclear trademark image or a text on the imperceptible of human touch. In the image of people's reliance, the image processed by such watermarking technology cannot be easily perceived by any user. Since the watermark of the Tibetans cannot be directly detected, the two watermarking technology generally includes two parts: the watermark Tibetan program and the watermarking sequence are hidden in the watermark, and the image must be required to have a watermark. With two. It can be detected as if there is no difference in human vision; in the case where the watermark is taken out, the image is protected and the image can be removed after being maliciously altered and destroyed. The visually identifiable trademark image or text is used as copyright. For the purpose of proof, this special I. life called strong secret (nDbust) 'it is--is an important indicator to evaluate the invisible watermarking technique. At present, the digital watermarking technology can mainly detect gray images and halftone images, and the images on the printed matter are all in halftone images. The invisible watermarking technique for protecting image copyright on printed matter is the main research subject of the present invention. t si 201126476 This = method of output is mainly used to close the image sharing technique = stack image rotation method at a certain angle, you can hide two confidential messages in the image size of & and & Will not shrink. In the process of technology, our method takes every second degree as an image. First, the two black and white shadow images corresponding to the remaining image can be converted to ====Toning: respectively, the two color machine values are converted into a black and white confidential image, and the two images are generated to generate the first shared image; A public old Dandan 7, you have two black and white secret messages and quotes information: two share the image 'after you get the hidden confidential image of the cable; you can get the first color and another 1 八~贝再料 - Zhang share image rotation a-angle, value information. Then: 叠 叠 ’ 即可 即可 即可 即可 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二[Prior Art] "Visual Secrets and Sh_ first proposed visual secret sharing technology. The so-called secret image technique" uses the human visual system to conduct secret cryptography bribes *=卩_行行繁_Mathematical operations In order to achieve the secret sharing mechanism, the two = two methods and derived the ") (10) type of visual machine to attack the traditional concept of the door-to-door heart-shaped secret sharing mechanism; the spirit of the method of the heart. That is, one The secret shadow 201126476 can be broken down into a different image by the door-pinch visual secret sharing mechanism. Look at this "Zhang shared image, can not get the information of the knife to the shirt. However, the score on the heart ^ In the drought image, the receiver can reconstruct the original confidential image. Later, iwam〇to and Wang and other scholars proposed that there are multiple images rotated (10) degrees to achieve the method of hiding multiple confidential information at the same time, sharing is limited to the past learning _ _ Age-occupied miscellaneous materials - there are four variations of the two, which are 0 degrees, 90 degrees, 18 degrees, and 27 degrees, and = ^ degrees are taken. The image is limited in the change of the rotation angle. 】 Ben Lai Saki Cong Saki _. Li Guan shape has the characteristic of the state of the secret message Tibetan _ to the cent. In addition, ^ (four) angle contempt to separate the two secret information in different angles, in decoding At the same time, the content of the two confidential messages was obtained by the month b. :? = Ϊ four parts, the first part is the color image quantization code, the second part is the third part is the extraction of the index value information and The fourth _reconstruction, as shown in the figure, shows that the first part of the invention will be coded as two color secret images for each of the two color secret images. Reconstruction, shooting a color image decoding process based on the general disk. As for the second part of the present invention index S.1 7 201126476 value information ^ Tibetan and the third part of the index value is taken out of the present invention The main features are 。. For the Tibetans with index value information, the present invention has two algorithms: circular shared image Α calculus '= knives' i-cut algorithm, divided into two _ quotation _ 分 分 。 。 。 【 【 本 本 本 本 本 本 本 本 本 本 本 本After the two color confidential messages are first quantized and encoded by the color palette, the two sets of index values are converted into two sets of black and white confidential information, and finally the two sets of black and white confidential information are hidden in the circular shared image. The method consists of four stages: color image quantization and coding phase =, the domain "index value information extraction phase" and the color confidential image reconstruction stage and the % color image image registration stage and the color confidential image reconstruction stage can be referred to Disc-based color image encoding and decoding process. As for: = Tibetan's Tibetan stage and the pick-up section are the main contributions of this issue (10). The value of Beixun is hidden, and the invention applies the circular sharing image technology, respectively: - Method: Circular sharing A generation algorithm and coffee branch conversion (4) Generation algorithm show knife is generated to hide two sets of color confidential images The circular depreciation of the index value is as shown in the 'Processing of the present invention. The two color confidential message % and the two-knife phase palette quantization face each generate a corresponding sum 12. Then, the two sets of index value sets are each converted into a size black and white confidential image 〇丨 and 0 and then, '-' n m 丹 Ο, and 〇 2 are shared by the present invention.

ί S.J 8 201126476 分別為― 取得第if引值隼人二^’錯由完全疊合兩張分享影像,可 (旋轉後之分享影分ΓΓΓ齡享影像旋轉某-角度 全疊合在-起,即可取彳^句像A,),並和第二張分享影像完 值資1 于弟二份索則直資訊。將取得的兩財引 一色盤進行解碼過程,就可以重建兩組彩:S SJ 8 201126476 respectively ― Get the first if quoted 隼人二^' wrong by completely overlapping two shared images, can be (after the rotation of the shared shadows, the age of the image is rotated, the angle is fully superimposed at the beginning, ie It is possible to take a sentence like A, and share the value with the second one. The two chips can be reconstructed by decoding the two chips.

對像產生嶋,機晴崎—個像素被 擴展巴塊之—個2x2擴展區塊,其中分享影像Α之2x2 =塊疋由二個白色子像素和二個黑色子像素所組成,分享影 1:2x2=區塊f由一個白色子像素和三_ 擴展在—起時’在疊合結果之影像内之2x2 ’、'…右丨#一個白色子像素和三個黑色子像素,則該 X2擴展區塊代表機密影像内的一個白色像素;若存在著四個黑色 象素貝上玄初擴充像素代表機密影像内的一個黑色像素。接 ^,我們將詳細的描述我們所發明的兩個產生圓形分享影像的 次算法。 ―、圓形分享影像A產生的演算法 首先假叹〇為圓形分旱影像的半徑,$為圓形分享影像令每 相鄰兩圈圓圈的半徑差,並產生巧,其是由分享影像A内以半徑 ,♦㈣的圓與半妓(~如)的圓之間的空間所組成。當㈣ 時,h為分享影像A内由半徑是η的最外_圓與半徑是㈣的For the image generation, the machine is divided into two 2x2 expansion blocks, where the shared image is 2x2 = the block is composed of two white sub-pixels and two black sub-pixels. : 2x2 = block f consists of a white sub-pixel and a three-_ extension at the time of '2x2' in the image of the superimposed result, '...right 丨# one white sub-pixel and three black sub-pixels, then the X2 The extended block represents a white pixel in the confidential image; if there are four black pixels, the first expanded pixel represents a black pixel in the confidential image. Next, we will describe in detail the two sub-algorithms we have invented to produce circular shared images. ―, the algorithm of circular sharing image A first sighs the radius of the circular fractal image, and $ is the circular sharing image so that the radius difference of each adjacent two circles is coincident, which is shared by the image. A consists of a space between the circle of radius, ♦ (four) and the circle of half a circle (~). When (4), h is the outermost_circle with the radius η and the radius is (4) in the shared image A.

Q 201126476 最外圍第二圓之間的空間所組成;亦即此時^是由分享影像p 轴個_中_空間所構成。同樣地,Μ分享影像A内由^ 控是㈣的最外圍第二圓與半徑是的最外圍第三圓之 空間所紙成。令Puk = PkUPk+i。 ' 以母-度(degree)為一個單位來切割叫,如此會使叫令便八 有360個弧形區域。每相連兩度的弧形區域為—區塊,即1 =像素為-區塊,而此_區塊代表原始影像的相對應位置的— ^素。仙以三點鐘方向代表卿分享影像的q度,順 =角綱增,的㈣和第丨度代表第—個M弧形區 塊’第2度和第3度代表第二個/ * 值得、、主立的3 / 士 — 弧形區塊’以下依此類推。 = 本發明所提㈣方法巾,欲將分轉像A雜 Χ=1"Γ分旱影_疊合咖影像叫賴度^須Q 201126476 The space between the outermost second circle; that is, ^ is composed of the shared image p-axis _ medium_space. Similarly, the Μ shared image A is controlled by (4) the outermost second circle and the radius of the outermost third circle. Let Puk = PkUPk+i. ' Cutting the call with a mother-degree (degree) as a unit, so that there will be 360 arc-shaped areas. Each arcuate area connected to two degrees is a block, that is, 1 = pixel is a block, and this_block represents the corresponding position of the original image. In the three o'clock direction, the representative represents the q degree of the image, and the singularity increases the (four) and the third degree represents the first M-shaped block. The second and third degrees represent the second / * , the main 3 / 士 - arc block 'below and so on. = (4) method towel according to the present invention, which is intended to be converted like A miscellaneous Χ = 1 " Γ 旱 影 _ _ _ _ _ _ _ _ _

树數,因為我們是以2度為,定單位,亦即JThe number of trees, because we are 2 degrees, the unit, that is, J

Si:角度為2度;且Χ亦必須為_的公因數,如此,才 月匕凡玉地將勿旱影像劃分為整數個區域。 針對旋轉的角度X,本發明所提 個不重疊的區域,使得每一個區域/將puk劃分成(騷) 〇度至㈣度)的每-細弧形區塊xf°在第—個區域中(即 選擇任一個2x2弧形區塊來代表_獨遺機的方式由圖二中 度)内的每-2x2弧形區塊則収—個區域(即X度至㈤) 相對應的2x2弧形區塊内的黑白固區域(即第一個區域)内 之型態蚊義;其祕域以此,乂销鐘方向_90度後 、,換句話說,我們只需以亂 10 201126476 數的方式來決定铱 内…弟—個區域内的%弧形區塊之型態,其餘區域 Γ 旋轉90度之型態來決定。如此一來,叹中便合產生 由360個2χ2弧形區塊。 Β ^A V細像Α’,辦繼>分享影像 俊去 j可取*第二賴密影像。第三份機密影像中第/個 _ ϋ取㈣式’—、享影像A,_第/個Μ弧形 2旱影像^的第,2X2弧形區塊而取得的,而分享影 Ζ! 2X2 A 2x2 的:有蚊 ,是’當旋轉圓形分享影像時,真正在旋轉 的^、有整個2x2弧形區玢, 對應實際上並沒有改變在Γ2弧形區塊内的黑#子區塊 區塊必須由分享影像 /57子影像Α内的第,·個2x2弧形 去、 的第(卜χ)個2x2弧形區塊内的里白色像 素以逆時針方向旋轉9〇庐% 仫,、白色像 /· X, 又後之型恶來定義;而分享影像Α内的第 Μ個2x2弧形區塊必須 ,弟 塊内的黑純像素以、、,H1 4影像Α _第㈣個2x2弧形區 & ”圯τ針方向旋轉9〇度後之型態來定義,以下 依此類推。如此,才能 密影像能夠_於分神’使得第—份與第二份機 份機密影财㈣w目料分稍像β巾。_ :假設第一 ,素值為黑色,旋糊‘度,且綱心内的第㈣固 ,弧形區塊為fcl,則分享影像Α内的第.2χ2弧形 ®,且分享影像Β内的第⑽2χ2_區塊必須,如此,= 201126476 張刀了〜像豐合在—起時,疊合後的U固%弧雜塊為和 代表第士—份機密影像中的第y個像素值為白色,再將分享影像 以购針方向旋轉x度’旋轉後的分享影像為分享影像A,,則八 ::像:的第靡2弧形區娜,並和分享影像B叠合—二 後第7個2x2弧純塊為_’即代表第二份機密影像中的 個像素值為黑色。 7Si: The angle is 2 degrees; and the Χ must also be the common factor of _, so that the 勿 匕 玉 地 将 将 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿 勿For the angle X of rotation, the present invention proposes a non-overlapping region such that each region/divided puk into (four) degrees per fine arc block xf° in the first region (Either select any 2x2 arc block to represent the _exclusive machine from the middle of Figure 2). Each -2x2 arc block receives a 2x2 arc corresponding to the area (ie X degrees to (five)). The type of mosquito in the black and white solid area (ie the first area) within the shaped block; its secret domain, after the 钟90 direction, _90 degrees, in other words, we only need to mess 10 201126476 The way to determine the shape of the % arc block in the area, the other area is determined by rotating the 90 degree pattern. In this way, the sigh will be produced by 360 2χ2 curved blocks. Β ^A V fine image Α’, continue to > share images Jun go j can be the second second image. In the third confidential image, the first / _ ( (4) type -, enjoy the image A, _ the first / Μ arc 2 dry image ^, the 2X2 curved block and get, and share the impact! 2X2 A 2x2: There are mosquitoes, which are 'when the image is rotated and the image is actually rotated, there is a whole 2x2 arc area, corresponding to the black #子 block in the Γ2 arc block. The block must be rotated by 9〇庐% 逆 in the counterclockwise direction by the white pixels in the 2x2 arc block of the (2) 2x2 arcs of the shared image/57 sub-image. , white like /· X, and then the type of evil to define; and share the second 2x2 arc block in the image 必须, black pure pixels in the block, ,, H1 4 image _ _ (four) 2x2 arc area & 圯 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针 针Finance (4) w material is slightly like the β towel. _ : Assume first, the prime value is black, the paste is 'degree, and the fourth (4) solid in the heart, the curved block is fcl, then share the image inside No.2χ2 Curved®, and the (10)2χ2_ block in the shared image must be, so, = 201126476 The knife is ~ When the like is in the beginning, the U solid % arc block after the overlap is the representative The yth pixel value in the secret image is white, and then the shared image is rotated by x degrees 'rotation of the shared image as the shared image A, and then the eighth:: Zone Na, and overlap with the shared image B—the seventh 7x2 arc pure block after the second is _', which means that the pixel value in the second confidential image is black.

針對每—個叫重複上述的步驟,在每—個叫中產生36〇個 Μ弧職塊所組成_弧。如此—來,即可產生第-張分享影像 由於4接近圓〜的弧形區塊會愈小,則該弧形區塊内的分佈亦 ^密集广她、_編分亦输_,如此,將兩張 子iv像且口 %愈接近圓心部份所顯示之機密影像,可能會愈 不清楚。因此’我們限定當半則、到某一範圍時,便不再產生⑽ 故使用本㈣方法職生的_分享影料空心的圓。 一、圓形分旱影像B產生的演算法 首先,如同圓形分享影像A產生的演算法的作法-樣,設定〇 為相形分旱影像的半徑,0_分享影像中每相鄰兩圈圓圈的 +役差。亚產生Q ’其是由分享影❹_半徑為(㈣-㈣的 圓與半徑是(〇如)的圓之間的空間所組成。當h時,⑽分享 影像半徑是~_卜_®與半徑咏·_最賴第二圓 之間的空間所組成;亦即此時C/ Μ分享影像a最外兩個關 中間的娜轉成。隨地,Q為分轉像β 是㈣)的 最外圍第二圓與半徑是(^)的最相第三圓之_空間所組 12 201126476 氣。今 CUk=ckUCk+丨。 以每一度為單位來湘04,如此,ΟΛ便財個弧形區 塊。每相連兩度的弧形區域為一區塊,即2χ2個弧形,;灿為 一區塊’城—區塊代表原始影像_對應位置的-個像素。我 們以三點鐘方向代表_分享影像的Q度,順時針方向代表角度 的遞增。04的第〇度和第i度代表第—個如弧形區塊,第=For each of the above-mentioned steps, the above-mentioned steps are repeated, and 36 〇 arc blocks are formed in each of the calls. In this way, the first shared image can be generated. Since the arc of the arc near the circle ~ is smaller, the distribution in the curved block is also densely distributed, and the _ is also divided into _, so It may be less clear that the two sub-iv images and the port % are closer to the confidential image displayed in the center of the circle. Therefore, we limit the half-time to a certain range, and then no longer produce (10), so use the method of the (4) method to share the hollow circle of the shadow. First, the algorithm generated by the circular drought image B first, like the algorithm of the algorithm generated by the circular sharing image A, sets the radius of the fractal image, and the circle of each adjacent two circles in the shared image + servitude difference. Sub-generating Q' is composed of the space between the circle with the radius of ((4)-(iv) and the circle with the radius (for example). When h, (10) the shared image radius is ~_卜_® and The radius 咏·_ is composed of the space between the second circle; that is, at this time, the C/ Μ shared image a is converted to the middle of the outermost two. In addition, Q is the most sub-transfer image β is (four)) The second circle of the periphery and the radius of the (^) are the third circle of the space. Today CUk=ckUCk+丨. In each degree, Xiang Xiang 04, so, you can make a curved block. Each arcuate area connected by two degrees is a block, that is, 2χ2 arcs; and a block is a block. The city-block represents the pixels of the original image_corresponding position. We represent the Q degree of the image at three o'clock, and the clockwise direction represents the increment of the angle. The fourth degree and the i-th degree of 04 represent the first one, such as an arc block, the first =

度和第3度代表第二個2x2弧職塊,以下依此類推。在本發明 的方法中是根據分轉像A、第—錢密影像〇ι和第二份齡影 像02共同決定〇4 _ 2χ2 _區塊之分佈情形,而其對應方= 則如表-所示。如此一來,Ci4中便會產生一圈由360個弧羽;區 塊所組成的區域。例如:當分享影像A之—個2χ2弧形區塊雜寺 (如表-中第3列的第1Q行),且第—份機密影像相對應位置之 騎為白色’而第二份機密影像相對應位置之像素為白色,則根 據定義便產生了叫巾對應的2χ2弧·塊為^ (如表 列的第10行)。 重複執行上述步驟在每一個中產生360個2χ2 成的圓狐。最後’便可產生第二張分享影像Β。 、,且 【圖式簡單說明】 表一 :2x2弧形區塊實作本發明之視覺機密分享機制。 圖一:本發明的處理示意圖。 圖二:本發明之四種不同組合方式的2x2弧形區塊。 圖三:隱藏第二份機密於第_張分享影像旋轉]8度中之實驗結 201126476 果,(a)第一份機密影像,(b)第二份機密影像,(c)分享 影像A,(d)分享影像B,(e)分享影像A及分享影像B 疊合之結果,(f)分享影像A轉18度後與分享影像B疊合 之結果。Degree and 3rd degree represent the second 2x2 arc job block, and so on. In the method of the present invention, the distribution of the 〇4 _ 2 χ 2 _ block is determined according to the split image A, the first-think image 〇ι, and the second-age image 02, and the corresponding side is as shown in the table- Show. In this way, a circle of 360 arc feathers; a block is created in Ci4. For example, when sharing the image A, a 2χ2 arc-shaped block temple (such as the 1st row in the third column of the table), and the corresponding position of the first confidential image is white' and the second confidential image The pixel corresponding to the position is white, and according to the definition, the 2χ2 arc corresponding to the towel is generated as ^ (as in the 10th row of the table). Repeat the above steps to produce 360 2 χ 2 round foxes in each one. Finally, you can create a second shared image. And, [Simplified description of the schema] Table 1: The 2x2 curved block implements the visual secret sharing mechanism of the present invention. Figure 1: Schematic diagram of the process of the present invention. Figure 2: 2x2 curved blocks of the four different combinations of the present invention. Figure 3: Hide the second secret in the first _ shared image rotation] 8 degrees in the experimental knot 201126476, (a) the first confidential image, (b) the second confidential image, (c) share the image A, (d) sharing image B, (e) sharing the result of image A and sharing image B, and (f) sharing the result of overlapping image A with image sharing B after 18 degrees.

圖四:隱藏第二份機密於第一張分享影像旋轉40度中之實驗結 果,(a)第一份機密影像,(b)第二份機密影像,(c)分享 影像A,(d)分享影像B,(e)分享影像A及分享影像B • 疊合之結果,(0分享影像A轉40度後與分享影像B疊合 之結果。 圖五:隱藏第二份機密於第一張分享影像旋轉72度中之實驗結 果,(a)第一份機密影像,(b)第二份機密影像,(c)分享 影像A,(d)分享影像B,(e)分享影像A及分享影像B 疊合之結果,(f)分享影像A轉72度後與分享影像B疊合 之結果。 • 圖六:分割區域的個數不為4整除之實驗結果,(a)第一份機密影 像,(b)第二份機密影像,(c)分享影像A,(d)分享影像 B,(e)分享影像A及分享影像B疊合之結果,(f)分享影 像A轉7 2度後與分享影像B疊合之結果顯示第二份機密影 像之第一區域内顯示出的資訊是錯誤的。 【主要元件符號說明】 si 1.彩色秘密影像color image Mi 201126476 2. 彩色秘密影像color image M2 3. 量化編碼 4. 量化編碼 5. 彩色秘密影像ΜΊ的索引值I, 6. 彩色秘密影像叫的索引值12 7. 對應索引值I,的二元影像0, 8. 對應索引值12的二元影像02Figure 4: Hide the results of the second secret in the first shared image rotated 40 degrees, (a) the first confidential image, (b) the second confidential image, (c) share the image A, (d) Share Image B, (e) Share Image A and Share Image B • The result of the overlay, (0 share the result of the image A after 40 degrees and overlap with the shared image B. Figure 5: Hide the second secret on the first Share the experimental results of the image rotation at 72 degrees, (a) the first confidential image, (b) the second confidential image, (c) share the image A, (d) share the image B, (e) share the image A and share As a result of superimposing the image B, (f) sharing the result of superimposing the image A after 72 degrees with the shared image B. • Figure 6: The number of divided regions is not the result of the 4 divisible experiment, (a) the first secret Image, (b) second confidential image, (c) share image A, (d) share image B, (e) share image A and share image B overlap result, (f) share image A to 7 2 degrees The result of superimposing with the shared image B shows that the information displayed in the first area of the second confidential image is wrong. [Main component symbol says Ming] si 1. Color secret image color image Mi 201126476 2. Color secret image color image M2 3. Quantization code 4. Quantization code 5. Index value of color secret image I I, 6. Index value of color secret image called 12 7 . Binary image 0 corresponding to index value I, 8. Binary image corresponding to index value 12 02

9. 分享影像A9. Share Image A

分享影像BShare image B

Claims (1)

201126476 七201126476 seven 申請專利範圍·· ^ ill 軸形分梅 部份;細徵在^ 的產生和_分旱影像⑽產生兩大 =%分旱影像A的產生方法主要包含下列步驟: 二驟一·針對兩個機密訊息分別轉換成機密影像; 步驟二.執行圓形分享影像A的產生以產生第—張分享影像。 圓形分旱影像B的產生方法主要包含下列步驟: ^躲一.載入兩張機密影像與圓形分享影像A ; 0一’執仃圓形分享影像_鼓演算法以取得第二張分享影 g又據申5青專利範圍第1項所述一種分韋機穷1自从4^- Λ 學的顧來隱賴密訊 ίΪ如Ϊ中圓形分享影私的產生及圓形分享影像Β的產ΪΐίThe scope of application for patents·· ^ ill is divided into parts of the plum; the generation of fine marks in ^ and the image of _ divided droughts (10) produce two major =% of the drought image A production method mainly includes the following steps: The confidential information is converted into a confidential image respectively; Step 2. Perform the generation of the circular shared image A to generate the first shared image. The method for generating the circular drought image B mainly includes the following steps: ^ Hide one. Load two confidential images and a circular shared image A; 0 one's stubborn round sharing image _ drum algorithm to obtain a second share According to the first item of the 5th patent scope of the application, the image is a poor one. Since the 4^- Λ 的 隐 隐 隐 Ϊ Ϊ Ϊ Ϊ Ϊ Ϊ Ϊ 分享 分享 分享 分享 分享 分享 分享 分享 分享 分享 分享 分享 分享 分享 分享Produce Ϊΐ f形分享影像Α的產生之演算法] ^入:兩張機密影像(^與仏; 輸出:圓形分享影像A; v耗1 .產生/V絶卜其是由分享影像A内以半徑為 的圓與半徑是(rrA:xs)的圓之間的空間所組成並且令 PUk = PkUPk+i ' 步驟2 :以每一度(degree)為一個單位來切割戶%,使尸认中含 有360個弧形區域; 步驟3 :針對尸认的第一個區域中(即〇度至度)的每一個 [S.1 201126476 2x2弧形區塊,以隨機的方式由圖四中選擇任一個2x2 弧形區塊來表示; 步驟4 :/¾的第二個區域(即X度至(2W)度)内的每一 2x2 弧形區塊則以其前一個區域(即第〆個區域)内相對 應的2x2弧形區塊内的黑白色像素之逆時鐘方向旋轉 9〇度後之型態來定義;其餘區域皆以此類推; 步驟5 :針對每一個尸ίΛ重複步驟2至4,在每一個/5¼中產生 360個2x2弧形區塊所組成的圓弧;最後,便產生第一 張分享影像A; [圓形分享影像B的產生之演算法] ^令:兩張機密影像〇,、〇2與圓形分享影像A; 輸出·圓形分享影像B; 步驟1 :產生泛卜其是由分享影像b内以半徑為卜㈣» ,圓與半徑是(〇 jxs)的圓之間的空間所組成並且令CW CkLJCk+i ·, 步驟2 :以每一度(degree)為一個單位來切割CR,使CX4中含 有360個弧形區域; 步驟3 :根據分享影像A、第一份機密影像〇1和第二份機密影 像〇2共同決定Ci4内每一個的2x2弧形區塊之分佈情 形’而其對應方式則如表一所示。 根據申請專利範圍第丨以及2項所述’本發明可以將兩個黑白機 密影像^藏於兩張圓形分享影像之中。除此之外,配合彩色調色 盤以及量化編碼技術,本發明亦可以將兩個彩色賴密影像隱藏 201126476 於兩張圓形分享影像之中。F-sharing algorithm for generating imagesΑ] ^In: two confidential images (^ and 仏; output: circular shared image A; v consumption 1. generating /V absolute is by sharing image A with radius The circle and the radius are the space between the circles of (rrA:xs) and let PUk = PkUPk+i ' Step 2: Cut the household % in units of degree, so that the body contains 360 Curved area; Step 3: For each [S.1 201126476 2x2 curved block in the first area of the corpse (ie, degree to degree), select any 2x2 arc from Figure 4 in a random manner. The block is used to represent; Step 2: Each 2x2 arc in the second area of /3⁄4 (ie X degrees to (2W) degrees) is the phase of the previous area (ie the third area) The corresponding black and white pixels in the 2x2 arc block are defined by the inverse clockwise rotation of 9 degrees; the rest of the regions are deduced by analogy; Step 5: Repeat steps 2 to 4 for each corpse, at each An arc of 2 2x2 arc blocks is generated in /51⁄4; finally, the first shared image A is generated; [Circular shared image B Generated algorithm] ^ Order: two confidential images 〇, 〇 2 and circle share image A; output · circle share image B; Step 1: generate ubiquitous is shared by image b with radius as ab (4) » , the circle and the radius are the space between the circles of (〇jxs) and let CW CkLJCk+i ·, Step 2: Cut the CR in units of degrees, so that the CX4 contains 360 arcs Area; Step 3: According to the shared image A, the first confidential image 〇1 and the second confidential image 〇2, the distribution of each 2x2 arc block in Ci4 is determined together, and the corresponding manner is as shown in Table 1. According to the scope of the patent application No. 2 and Item 2, the present invention can hide two black and white confidential images in two circular shared images. In addition, with color palette and quantization coding technology, The present invention can also hide two color images from 201126476 in two circular shared images.
TW099101214A 2010-01-18 2010-01-18 A (2,2) circular sharing method for two color secret images TWI410908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW099101214A TWI410908B (en) 2010-01-18 2010-01-18 A (2,2) circular sharing method for two color secret images

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW099101214A TWI410908B (en) 2010-01-18 2010-01-18 A (2,2) circular sharing method for two color secret images

Publications (2)

Publication Number Publication Date
TW201126476A true TW201126476A (en) 2011-08-01
TWI410908B TWI410908B (en) 2013-10-01

Family

ID=45024570

Family Applications (1)

Application Number Title Priority Date Filing Date
TW099101214A TWI410908B (en) 2010-01-18 2010-01-18 A (2,2) circular sharing method for two color secret images

Country Status (1)

Country Link
TW (1) TWI410908B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104574262A (en) * 2015-01-16 2015-04-29 山东科技大学 Extension visual encryption and decryption method
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI692743B (en) * 2018-01-08 2020-05-01 國立高雄科技大學 A color image authentication method and computer program product based on palette compression technique

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW364957B (en) * 1998-02-24 1999-07-21 Shi-Sung Lai Visual secret sharing scheme
TW436748B (en) * 1999-05-24 2001-05-28 Chunghwa Telecom Lab Dynamic password system of visual secret sharing
US7879111B2 (en) * 2006-11-02 2011-02-01 Sony Corporation System and method for RFID transfer of MAC, keys
US7519999B2 (en) * 2004-02-27 2009-04-14 Scientific-Atlanta, Inc. Secure negotiation and encryption module
EP1830310A1 (en) * 2004-10-19 2007-09-05 Intellectual Property Bank Corp. Device for storing secret information using posture or motion of object as secret key
WO2007045937A1 (en) * 2005-10-18 2007-04-26 Nokia Corporation Security in wireless environments using out-of-band channel communication
TW200825968A (en) * 2006-12-04 2008-06-16 Chunghwa Telecom Co Ltd Mobile electronic ticket system using visual secret sharing scheme
US8768853B2 (en) * 2007-10-05 2014-07-01 Ebay Inc. Secondary identification for remittance delivery

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104574262A (en) * 2015-01-16 2015-04-29 山东科技大学 Extension visual encryption and decryption method
CN104574262B (en) * 2015-01-16 2018-05-11 山东科技大学 One kind extension visual cryptography and decryption method
CN112529974A (en) * 2020-12-03 2021-03-19 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image
CN112529974B (en) * 2020-12-03 2023-07-25 中国科学院深圳先进技术研究院 Color visual password sharing method and device for binary image

Also Published As

Publication number Publication date
TWI410908B (en) 2013-10-01

Similar Documents

Publication Publication Date Title
Wu et al. Sharing visual multi-secrets using circle shares
Yi et al. Binary-block embedding for reversible data hiding in encrypted images
Qin et al. Effective reversible data hiding in encrypted image with privacy protection for image content
Chen et al. A secure Boolean-based multi-secret image sharing scheme
Yang et al. Enhanced Boolean-based multi secret image sharing scheme
Wu et al. A high quality image sharing with steganography and adaptive authentication scheme
Feng et al. Visual secret sharing for multiple secrets
Yang et al. Steganography and authentication in image sharing without parity bits
Chen et al. A new authentication based cheating prevention scheme in Naor–Shamir’s visual cryptography
Chang et al. Meaningful secret sharing technique with authentication and remedy abilities
Guo et al. A multi-threshold secret image sharing scheme based on MSP
Ulutas et al. Secret image sharing scheme with adaptive authentication strength
CN105404817B (en) It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding
Wu et al. Development of a data hiding scheme based on combination theory for lowering the visual noise in binary images
Wei et al. A technique for sharing a digital image
Kandar et al. Visual cryptography scheme for color image using random number with enveloping by digital watermarking
Yu et al. Reversible data hiding in encrypted images without additional information transmission
Blesswin et al. Enhanced semantic visual secret sharing scheme for the secure image communication
CN107124616B (en) Method for realizing exchange of cipher watermarks in same operation domain based on homomorphic characteristics
Wang et al. Multiuser-based shadow watermark extraction system
TW201126476A (en) A (2,2) circular sharing techniques for two color secret images
CN104702814B (en) (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods
Padhmavati et al. A novel scheme for mutual authentication and cheating prevention in visual cryptography using image processing
Hu et al. Reversible secret image sharing with steganography and dynamic embedding
Wang et al. A novel (n, n) secret image sharing scheme based on Sudoku

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees