一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言?xún)?nèi)容
驗(yàn)證碼

一種共享份分塊構(gòu)造的異或區(qū)域遞增式視覺(jué)密碼方案

郁濱 胡浩 陳武平 沈剛

郁濱, 胡浩, 陳武平, 沈剛. 一種共享份分塊構(gòu)造的異或區(qū)域遞增式視覺(jué)密碼方案[J]. 電子與信息學(xué)報(bào), 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
引用本文: 郁濱, 胡浩, 陳武平, 沈剛. 一種共享份分塊構(gòu)造的異或區(qū)域遞增式視覺(jué)密碼方案[J]. 電子與信息學(xué)報(bào), 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
Yu Bin, Hu Hao, Chen Wu-ping, Shen Gang. XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
Citation: Yu Bin, Hu Hao, Chen Wu-ping, Shen Gang. XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385

一種共享份分塊構(gòu)造的異或區(qū)域遞增式視覺(jué)密碼方案

doi: 10.11999/JEIT141385
基金項(xiàng)目: 

國(guó)家自然科學(xué)基金(61070086)和信息保障技術(shù)重點(diǎn)實(shí)驗(yàn)室開(kāi)放基金(KJ-13-107)

XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction

  • 摘要: 該文依據(jù)授權(quán)子集的個(gè)數(shù)將共享份劃分若干塊,按照共享份分塊構(gòu)造的設(shè)計(jì)思路,結(jié)合(n, n)異或單秘密視覺(jué)密碼的加密矩陣,構(gòu)造了異或區(qū)域遞增式視覺(jué)密碼的秘密分享與恢復(fù)流程。與現(xiàn)有方案相比,該方案可以實(shí)現(xiàn)解密區(qū)域圖像的完全恢復(fù),且明顯減小了共享份的大小。
  • 付正欣, 郁濱, 房禮國(guó). 一種新的多秘密分享視覺(jué)密碼[J]. 電子學(xué)報(bào), 2011, 39(3): 712-718.
    Fu Zheng-xin, Yu Bin, and Fang Li-guo. A new multi-secret sharing visual cryptography[J]. Acta Electronica Sinica, 2011, 39(3): 712-718.
    付正欣, 郁濱, 房禮國(guó). 基于壓縮算法的存取式多秘密視覺(jué)密碼[J]. 電子與信息學(xué)報(bào), 2013, 35(5): 1055-1062.
    Fu Zheng-xin, Yu Bin, and Fang Li-guo. The access-based multi-secret visual cryptography with compression algorithm[J]. Journal of Electronics Information Technology, 2013, 35(5): 1055-1062.
    Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72[U3](2): 1867-1886.
    Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J]. IEEE Transactions on Information Forensics Security, 2013, 8(5): 733-743.
    Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662.
    Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777.
    Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329.
    Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810.
    Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463.
    Chen Y C, Tsai D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamirs visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23[U4](8): 1225-1233.
    Naor M, and Shamir A. Visual cryptography[C]. Proceedings of the Advances in Cryptology-Eurocrypt94, Berlin, 1995 (LNCS 950): 1-12.
    Ateniese G, Blundo C, Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
    Tuyls P, Hollmann H D L, Lint J H V, et al.. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186.
    Wang D S, Zhang L, Ma N, et al.. Two secret sharing schemes based on Boolean operations[J]. Pattern Recognition, 2007, 40(10): 2776-2785.
    Liu F, Wu C, and Lin X. Step construction of visual cryptography schemes[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 27-38.
    Wu X and Sun W. Random grid-based visual secret sharing with abilities of OR and XOR decryptions[J]. The Journal of Visual Communication and Image Representation, 2013, 24[U5](1): 48-62.
    Yang C and Wang D S. Property analysis of XOR based visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(2): 189-197.
  • 加載中
計(jì)量
  • 文章訪問(wèn)數(shù):  1242
  • HTML全文瀏覽量:  187
  • PDF下載量:  342
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2014-10-31
  • 修回日期:  2015-02-04
  • 刊出日期:  2015-08-19

目錄

    /

    返回文章
    返回