Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Visual Encryption and Decryption Method with the Functions of Disguised Image and Tampering Authentication

A technology of disguising images and tampering with authentication, applied in the field of information hiding, can solve the problem of inability to distinguish between false secret images and real secret images, and achieve the effect of protecting copyright and protecting copyright ownership.

Inactive Publication Date: 2017-05-03
SHANDONG UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The fake shared image 2 and the real shared image 1 are superimposed to recover the false secret image, and ordinary users cannot distinguish the false secret image from the real secret image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Visual Encryption and Decryption Method with the Functions of Disguised Image and Tampering Authentication
  • A Visual Encryption and Decryption Method with the Functions of Disguised Image and Tampering Authentication
  • A Visual Encryption and Decryption Method with the Functions of Disguised Image and Tampering Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0039] Such as figure 1 and figure 2 As shown, a visual encryption method with camouflage image and tampering authentication function includes the following steps:

[0040] a1 Input a secret image, two camouflage images and a watermark image, use the error diffusion method to binarize each image, and generate a binarized image for each input image;

[0041] a2 uses the key Kw to scramble the watermark image with random numbers to generate a scrambled watermark image of the same size;

[0042] a3 According to the following requirements, construct the visible encryption rules and watermark embedding rules, called the encryption rule table T, such as image 3 Shown:

[0043] 1) Condition 1: If the bit of the secret image is 0, it is necessary to ensure that there is at least one 0 after the 2x2 pixel blocks corresponding to the two shared imag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a visual encryption and decryption method with the functions of disguising images and tampering authentication. In the visual encryption process, using the encryption rule table T designed by the present invention, two meaningful shared images are constructed from an input secret image, two camouflaged images and a watermark image, that is, the shared images have camouflage The characteristics of the image can confuse the attacker. At the same time, the watermark image is embedded in the two shared images, which can be used to identify the false shared image made by the attacker, thereby identifying illegal tampering with the shared image; in the process of visual decryption Among them, the secret image can be recovered by superimposing the two shared images. For the extraction of watermark information, the watermark image can be extracted from the two shared images according to the encryption rule table T of the present invention. The method of the invention does not change the contrast between the stored image and the restored secret image, and can completely restore the watermark image.

Description

technical field [0001] The invention relates to an information hiding method, in particular to a visual encryption method with the functions of disguising images and tampering authentication, and a visual decryption method with the functions of disguising images and tampering authentication. Background technique [0002] In recent years, the rapid development and popularization of network communication and portable communication have brought about serious data security problems, and data encryption technology is an important means to solve this problem. However, traditional encryption technology relies on complex cryptographic algorithms, and its huge amount of computation limits its application on portable devices. Moreover, the user also needs to save the secret key so as not to be lost or intercepted by others, which severely restricts the portability and reliability of data encryption. [0003] In recent years, as a secret sharing scheme, visual cryptography has made gr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 颜斌王亚菲宋凌云杨红梅刘得源王恒郭银景白培瑞赵海涛
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products