Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for separately storing and recovering (K, N) meaningful images based on triple backup

An image and backup technology, applied in the fields of information security, secret sharing and digital image signal processing, can solve problems such as poor error recovery quality and insufficient use of natural images

Active Publication Date: 2015-06-10
SHAANXI NORMAL UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this strategy does not fully use the correlation of natural images, and the quality of error recovery is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for separately storing and recovering (K, N) meaningful images based on triple backup
  • Method for separately storing and recovering (K, N) meaningful images based on triple backup
  • Method for separately storing and recovering (K, N) meaningful images based on triple backup

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The present invention is described below in conjunction with specific embodiment:

[0083] Taking JAVA jdk1.8.0_20 as the case implementation environment, taking the (3,5) threshold scheme as an example, that is, K=3, N=5, the embodiment of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, in figure 1 It is the flow chart of sharing storage, figure 2 is the recovery flow chart.

[0084] The following is a specific example to illustrate the sharing process:

[0085] Step 1: Select the 256×256 8-bit standard grayscale image boat as the secret image, such as image 3 As shown in , the 8-bit standard grayscale images of 512×512, baboon, f16, sailboat, lena and peppers were selected as the mask images of the five participants, as Figure 4 ~ Figure 8 As shown, the selected key is Ke=131819, and the key 131819 is used to generate a permutation sequence x ,...,48260,218314>, this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for storing and recovering (K, N) meaningful images based on a triple backup. The method comprises the following steps: storing separated storage information of secrete image pixels at three different positions through introducing a triple backup so as to play the effect of mutual authentication; in the recovery stage, prompting the authentication ability and mistake repair ability of a scheme by using the correlation of adjacent pixels of nature images, and applying multiple Lagrang interpolation multi-item type coefficients to store secrete information, and improving the visual quality of mask images. The method applies correlation of adjacent pixels to amend the pixel with wrong authentication in the recovery process and applies the correlation of adjacent pixels of the nature images to approach the pixel points which fail to pass the authentication. Thus, the method has a better mistake recovery capability.

Description

technical field [0001] The invention belongs to the technical fields of information security, secret sharing and digital image signal processing, and relates to a method for sharing and storing meaningful image information, in particular to a (K, N) meaningful image sharing and restoring method based on triple backup. Background technique [0002] In recent years, with the development of computer and network technology, more and more images are transmitted on the network, which brings a series of security risks while providing convenience to users. Improper use and malicious tampering of images will not only involve personal privacy, but will also have a serious negative impact on society. [0003] For digital image information security, people have proposed a variety of methods, such as: ① digital image encryption technology that converts plaintext images into ciphertext images; ② digital image steganography technology that hides confidential images in irrelevant carriers; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
Inventor 邵利平欧阳显斌
Owner SHAANXI NORMAL UNIV