Graded-and-grouped secret image sharing method

A secret image and image technology, applied in the direction of image communication, electrical components, etc., can solve the problems of not being able to adapt to the application

Active Publication Date: 2013-11-27
山西班姆德机械设备有限公司
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above four schemes all share one or more secret images with a group of people. However, in some practical situations, it may be necessary to share secret images with multiple groups of participants with different management rights. For example, in an enterprise, according to the participant Different levels (such as chairman and general manager) allow them to have different management rights of secret images; and multiple participants in the same group, although they have the same management rights, also need to restrict each other and jointly manage secret information , at this time, the above four schemes cannot adapt to the application of this occasion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Graded-and-grouped secret image sharing method
  • Graded-and-grouped secret image sharing method
  • Graded-and-grouped secret image sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] We choose Matlab7.0 as the software platform, and program to realize the design of the scheme of the present invention. The implementation process is to select the standard test image "Spoke.bmp" of 512×512 as the secret image , select 512×512 standard test images “lena.bmp”, “barbara.bmp”, “peppers.bmp” and “goldhill.bmp” as four masking images respectively (if attached Figure 5 shown). use threshold scheme, When embedding the sub-secret image, the distortion is minimal.

[0078] The specific operation steps are:

[0079] Ⅰ. Hierarchical decomposition, sharing, and hiding of secret images at the sending end, including the following steps:

[0080] In the first step, the secret image is decomposed into bits to form multiple sub-secret images of different levels:

[0081] .read a secret image of , which are divided into non-overlapping, Image blocks of size, perform the following steps (2) and (3) from the first image block;

[0082] .The value of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a graded-and-grouped secret image sharing method, and belongs to the technical field of secret image sharing. The graded-and-grouped secret image sharing method comprises the step of graded decomposition, sharing and concealing of a sending end to a secrete image, and the step of grouped gradual recovery of a receiving end to the secret image. The sending end firstly decomposes the secret image into sub-secret-images of different grades through bit decomposition, then carries out sharing on the sub-secret-images to enable the sub-secret-images to become a set of shadow images through the Shamir threshold scheme, and conceals the shadow images of different sets in different concealing images to distribute the shadow images to different participants in different authority groups. The receiving end can recover the set of sub-secret-images only on the situation that the same authority group provides k or more than k concealed images, and gradual recovery of the secret image can be achieved when different authority groups carry out superposition on the recovered sub-secret-images. The graded-and-grouped secret image sharing method has the advantage that the secret image can be shared by a plurality of sets of participants with different administration authority according to the actual requirements.

Description

technical field [0001] The invention belongs to the technical field of secret image sharing, and in particular relates to a hierarchical-group secret image sharing method. Background technique [0002] With the development of computers and digital multimedia, more and more digital images are transmitted through the network. Therefore, the security and confidentiality of network transmission have become more and more important issues, especially for some military and commercial image information. Information security is even more important in fields that require high integrity and security. However, the digital image has a large amount of data, high redundancy, and strong correlation between pixels, so the early digital and digital encryption methods can no longer meet the requirements of digital image encryption. [0003] Secret image sharing technology (Secret image sharing) is an encryption technology applied to images, which splits the original secret image into n A noi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
Inventor 王安红刘文杰刘丽李志宏
Owner 山西班姆德机械设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products