(k,n) Significant Image Sharing and Restoration Method Based on Triple Backup
An image and backup technology, applied in the fields of information security, secret sharing and digital image signal processing, can solve the problems of poor error recovery quality, insufficient use of natural images, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0082] The present invention will be described below in conjunction with specific embodiments:
[0083] Take JAVA jdk1.8.0_20 as the case implementation environment, take the (3,5) threshold scheme as an example, that is, K=3, N=5. The implementation of the present invention will be described in detail with reference to the drawings, but it is not limited to this implementation case. among them figure 1 Is the flow chart of sharing, figure 2 Is the recovery flowchart.
[0084] The following describes the sharing process with specific examples:
[0085] Step 1: Choose a 256×256 8-bit standard grayscale image boat as the secret image, such as image 3 As shown, select 512×512 8-bit standard grayscale images baboon, f16, sailboat, lena, and peppers as the cover images of the 5 participants, such as Figure 4 ~ Figure 8 As shown, the selected key is Ke=131819, and the key 131819 is used to generate a permutation sequence of x ,...,48260,218314>, this replacement sequence is used to de...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


