期刊文献+

一个新的基于多重秘密共享的图像隐藏方案 被引量:4

A new image hiding scheme based on multi-secret sharing
在线阅读 下载PDF
导出
摘要 提出了一种新的图像隐藏方案,该方案糅合了多重秘密共享思想与LSB算法,生成的影子图像约为秘密图像的1/t,从而减小了载体图像的容量。本方案允许任意选取(t-1)次多项式的模数p,并根据该模数p将秘密图像的若干个像素点拼接成一个数据单元,有效克服了Thien方案中秘密图像需进行置乱处理的缺陷。此外,本方案构造的多项式明显少于Thien方案和LiBai方案。 Combining multi-secret sharing with Least Significant Bit (LSB) algorithm, a new image hiding scheme was proposed. This scheme reduced the size of each shadow image to become nearly 1/t of the secret image's, consequently reduced the size of cover images. According to (t - 1) polynomial modulus p which was arbitrary, this scheme spliced some pixels of the secret image into a data unit so that the drawback was overcome that the image should be permutated before it was shared. Besides, the amount of polynomials in this scheme is smaller than that of Thien's and Li Bai's.
出处 《计算机应用》 CSCD 北大核心 2008年第4期902-905,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(10271040) 安徽省自然科学基金资助项目(00043115)
关键词 多重秘密共享 最不重要位算法 影子图像 图像隐藏 multi-secret sharing LSB algorithm shadow image image hiding
  • 相关文献

参考文献13

  • 1SHAMIR A. How to share a secret[ J]. Communications of ACM, 1979 24(11) : 612 -613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys[ C]//Proceedings of AFIPS 1979 National Computer Conference. NewYork: AFIPS Press, 1979:313-317.
  • 3NAOR M, SHAMIR A. Visual cryptography[ C]// Eurocrypt'94, LNCS 950. Berlin: Springer-Verlag , 1994:1 - 12.
  • 4NAOR M, SHAMIR A. Visual cryptography Ⅱ: Improving the contrast via the cover base[ C]// LNCS 1189. Berlin: Springer-Verlag, 1997:197-202.
  • 5BLUNDO C, de SANTIS A, NAOR M. Visual cryptography for gray level images[ J]. Information Processing Letters, 2000, 7(5) : 255 - 259.
  • 6CHANG C C, HWANG M S, CHEN T S. A new encryption algorithm for image cryptosystems[ J]. Journal of Systems and Software, 2001, 58(2):83 -91.
  • 7THIEN C C , LIN J C . Secret image sharing [ J ] . Computer & Graphic, 2002, 26(5) : 765 - 770.
  • 8LI BAI. A reliable (k, n) image secret sharing scheme[C]//Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on. Indianapolis, Indiana, USA: IEEE Press, 2006:31-36.
  • 9LI BAI. A strong ramp secret sharing scheme using matrix projection [ C]// Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks. Washington, DC, USA: IEEE Computer Society, 2006:652-656.
  • 10庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26

二级参考文献1

共引文献25

同被引文献27

  • 1张军.用遗传算法优化二值图像信息隐藏技术的方法[J].计算机工程,2006,32(9):38-40. 被引量:4
  • 2Shamir A.How to Share a Secret[J].Communications of ACM,1979,24(11):612-613.
  • 3Blakley G R.Safeguarding Cryptographic Keys[C]//Proc.of AFIPS National Computer Conference.New York,USA:[s.n.],1979.
  • 4Naor M,Shamir A.Visual Cryptography[C]//Proc.of EURO-CRYPYT'94.Berlin,Germany:Springer-Verlag,1995.
  • 5Thien C,Lin J.Secret Image Sharing[J].Computer Graphics,2002,26(1):765-770.
  • 6Fang Wen-Pinn.Secret Image Sharing Safety[C]//Proc.of the 14th Asia-Pacific Conference on Communications.Tokyo,Japan:[s.n.],2008.
  • 7Li Bai.A Reliable (k,n) Image Sharing Scheme[C]//Proc.of DASC'06.Indianapolis,USA:[s.n.],2006.
  • 8Karnin E D,Greene J W,Hellman M E.On Sharing Secret Systems[J].IEEE Trans.on Information Theory,1983,29(1):35-41.
  • 9Li Bai.Strong Ramp Secret Sharing Scheme Using Matrix Projection[J].IEEE Computer Society,2006,17(1):652-656.
  • 10Zhong Hua, Zhang Xiao-hua, Jiao Li-cheng. Digital watermarking and image authentication: algorithm and applications[M]. Xi' an: Xidian University Press, 2006.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部