Method for separately storing and recovering (K, N) meaningful images based on triple backup
An image and backup technology, applied in the fields of information security, secret sharing and digital image signal processing, can solve problems such as poor error recovery quality and insufficient use of natural images
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0082] The present invention is described below in conjunction with specific embodiment:
[0083] Taking JAVA jdk1.8.0_20 as the case implementation environment, taking the (3,5) threshold scheme as an example, that is, K=3, N=5, the embodiment of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, in figure 1 It is the flow chart of sharing storage, figure 2 is the recovery flow chart.
[0084] The following is a specific example to illustrate the sharing process:
[0085] Step 1: Select the 256×256 8-bit standard grayscale image boat as the secret image, such as image 3 As shown in , the 8-bit standard grayscale images of 512×512, baboon, f16, sailboat, lena and peppers were selected as the mask images of the five participants, as Figure 4 ~ Figure 8 As shown, the selected key is Ke=131819, and the key 131819 is used to generate a permutation sequence x ,...,48260,218314>, this...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


