全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

结合调整差值变换的(K,N)有意义图像分存方案

DOI: 10.11834/jig.20150506

Keywords: 有意义图像分存,MD5,(K,N)门限方案,调整差值变换

Full-Text   Cite this paper   Add to My Lib

Abstract:

目的针对传统有意义分存方法存在的像素扩张和分发掩体图像视觉质量不高等问题,提出一种结合调整差值变换的(K,N)有意义图像分存方案,该方案可用于与掩体等大且同为自然图像的密图分存.方法在分存阶段,首先用调整差值变换将密图转换为差值图和位置图;其次将差值图和位置图进行(K,N)分存,分别嵌入到掩体图像中,并使用密钥确定位置图分存信息的嵌入位置和根据位置图中不同的差值类型选择不同的差值嵌入方法;再次对密钥进行(K,N)分存,将子密钥和分发掩体对应的MD5值公布到第3方公信方作为认证码;最后将子密钥和分发掩体分发给参与者进行保管.在恢复阶段,首先核对参与者的子密钥和分发掩体对应的MD5值,若认证通过的人数小于K,则恢复失败;否则,使用认证通过的子密钥还原出密钥,然后根据密钥提取并恢复出位置图;其次根据位置图中的差值类型来提取和恢复出差值图;最后使用逆调整差值变换还原出最终密图.结果同现有方法相比,所提策略不存在像素扩张且分发掩体图像视觉质量较高,具有较强的恶意参与者检测能力.结论本文方法的掩体图像与密图等大且同为自然图像,同经典有意义图像分存方案相比,克服了像素扩张问题,嵌入信息后的掩体图像具有较高的视觉质量,使用第3方公信方存储的MD5值作为认证码,具有较强的恶意参与者识别能力.

References

[1]  Asmuth C, Bloom J. A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory, 1983, 29(2):208-210.
[2]  Karnin E, Green J W, Hellman M E. On sharing secret systems[J]. IEEE Transactions on Information Theory, 1983, 29(1):35-41.
[3]  Thien C C, Lin J C. Secret image sharing[J]. Computers & Graphics, 2002, 26(5):765-770.
[4]  Shyu S J, Chen Y R. Threshold secret Image sharing by chinese remainder theorem[C]// Proceedings of Asia-Pacific Services Computing Conference. Yilan, Taiwan, China: IEEE, 2008, 1332-1337.
[5]  Ulutas M, Nabiyev V V, Ulutas G. A new secret image sharing technique based on Asmuth Bloom\'s scheme[C]// Proceedings of International Conference on Application of Information and Communication Technologies. Azerbaijan, Baku: IEEE, 2009, 1-5.
[6]  Chen C C, Fu W Y. A geometry-based secret image sharing approach[J]. Journal of Information Science and Engineering, 2008, 24(5):1567-1577.
[7]  Tso H K. Sharing secret images using Blakley\'s concept[J]. Optical Engineering, 2008, 47(7):11-13.
[8]  Wu X T, Sun W. Image sharing scheme based on error diffusion[J]. Journal of Computer Applications, 2011, 31(1):74-77. [吴小天,孙伟. 基于误差扩散的图像分存方案[J]. 计算机应用,2011,31(1):74-77.]
[9]  Ou D H, Wu X T, Sun W, et al. Secret gray-level image sharing scheme based on recovery function and error diffusion[J]. Computer Science, 2013, 40(2):112-116. [欧锻灏,吴小天,孙伟,等. 基于恢复函数和误差扩散的灰度图像分存方案[J]. 计算机科学,2013,40(2):112-116.]
[10]  Eslami Z, Razzaghi S H, Zarepour A J. Secret image sharing based on cellular automata and steganography[J]. Pattern Recognition, 2010, 43(1):397-404.
[11]  Wu X T, Sun W. Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform[J]. Journal of Systems and Software, 2013,86(4):1068-1088.
[12]  Shamir A. How to share a secret[J]. Communications of ACM, 1979, 22(11):612-613.
[13]  Blakley G R. Safeguarding cryptographic keys[C]// Proceedings of AFIPS 1979 National Computer Conference. New York: AFIPS, 1979, 48:313-317.
[14]  Lin C C, Tsai W H. Secret image sharing with steganography and authentication[J]. Journal of Systems and Software, 2004, 73(3):405-414.
[15]  Yang C N, Chen T S, Yu K H, et al. Improvements of image sharing with steganography and authentication[J]. Journal of Systems and Software, 2007, 80(7):1070-1076.
[16]  Chang C C, Hsieh Y P, Lin C H. Sharing secrets in stego images with authentication[J]. Pattern Recognition, 2008, 41(10):3130-3137.
[17]  Chang C C, Chen Y H, Wang H C. Meaningful secret sharing technique with authentication and remedy abilities[J]. Information Sciences, 2011,181(14):3073-3084.
[18]  Chen Y H, Chang C C. Image tamper detection and recovery based on dual watermarks sharing strategy[J]. Journal of Digital Information Management, 2012, 10(1):39-49.
[19]  Tian J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8):890-896.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133