一種共享份分塊構(gòu)造的異或區(qū)域遞增式視覺(jué)密碼方案
doi: 10.11999/JEIT141385
-
1.
(信息工程大學(xué) 鄭州 450001) ②(信息保障技術(shù)重點(diǎn)實(shí)驗(yàn)室 北京 100072)
國(guó)家自然科學(xué)基金(61070086)和信息保障技術(shù)重點(diǎn)實(shí)驗(yàn)室開(kāi)放基金(KJ-13-107)
XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction
-
1.
(Information Engineering University, Zhengzhou 450001, China)
-
2.
(Science and Technology on Information Assurance Laboratory, Beijing 100072, China)
-
摘要: 該文依據(jù)授權(quán)子集的個(gè)數(shù)將共享份劃分若干塊,按照共享份分塊構(gòu)造的設(shè)計(jì)思路,結(jié)合(n, n)異或單秘密視覺(jué)密碼的加密矩陣,構(gòu)造了異或區(qū)域遞增式視覺(jué)密碼的秘密分享與恢復(fù)流程。與現(xiàn)有方案相比,該方案可以實(shí)現(xiàn)解密區(qū)域圖像的完全恢復(fù),且明顯減小了共享份的大小。Abstract: By designing the block construction for each share, which is divided into several blocks according to the number of qualified sets, the secret sharing and recovering algorithms of the XOR-based region incrementing visual cryptography are designed with the encoding matrices of the (n, n) XOR-based single secret sharing visual cryptography. Comparing with the existing schemes, the proposed scheme realizes the perfect recovery of decoded regions in secret image, and the sizes of shares are also decreased efficiently.
-
Key words:
- Visual cryptography /
- Region incrementing /
- Security level /
- Block construction /
- XOR operation /
- Perfect recovery
-
付正欣, 郁濱, 房禮國(guó). 一種新的多秘密分享視覺(jué)密碼[J]. 電子學(xué)報(bào), 2011, 39(3): 712-718. Fu Zheng-xin, Yu Bin, and Fang Li-guo. A new multi-secret sharing visual cryptography[J]. Acta Electronica Sinica, 2011, 39(3): 712-718. 付正欣, 郁濱, 房禮國(guó). 基于壓縮算法的存取式多秘密視覺(jué)密碼[J]. 電子與信息學(xué)報(bào), 2013, 35(5): 1055-1062. Fu Zheng-xin, Yu Bin, and Fang Li-guo. The access-based multi-secret visual cryptography with compression algorithm[J]. Journal of Electronics Information Technology, 2013, 35(5): 1055-1062. Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72[U3](2): 1867-1886. Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J]. IEEE Transactions on Information Forensics Security, 2013, 8(5): 733-743. Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662. Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777. Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329. Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810. Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463. Chen Y C, Tsai D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamirs visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23[U4](8): 1225-1233. Naor M, and Shamir A. Visual cryptography[C]. Proceedings of the Advances in Cryptology-Eurocrypt94, Berlin, 1995 (LNCS 950): 1-12. Ateniese G, Blundo C, Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106. Tuyls P, Hollmann H D L, Lint J H V, et al.. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186. Wang D S, Zhang L, Ma N, et al.. Two secret sharing schemes based on Boolean operations[J]. Pattern Recognition, 2007, 40(10): 2776-2785. Liu F, Wu C, and Lin X. Step construction of visual cryptography schemes[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 27-38. Wu X and Sun W. Random grid-based visual secret sharing with abilities of OR and XOR decryptions[J]. The Journal of Visual Communication and Image Representation, 2013, 24[U5](1): 48-62. Yang C and Wang D S. Property analysis of XOR based visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(2): 189-197. -
計(jì)量
- 文章訪問(wèn)數(shù): 1242
- HTML全文瀏覽量: 187
- PDF下載量: 342
- 被引次數(shù): 0