Unlock instant, AI-driven research and patent intelligence for your innovation.

(k,n) Significant Image Sharing and Restoration Method Based on Triple Backup

An image and backup technology, applied in the fields of information security, secret sharing and digital image signal processing, can solve the problems of poor error recovery quality, insufficient use of natural images, etc.

Active Publication Date: 2017-10-20
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this strategy does not fully use the correlation of natural images, and the quality of error recovery is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • (k,n) Significant Image Sharing and Restoration Method Based on Triple Backup
  • (k,n) Significant Image Sharing and Restoration Method Based on Triple Backup
  • (k,n) Significant Image Sharing and Restoration Method Based on Triple Backup

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The present invention will be described below in conjunction with specific embodiments:

[0083] Take JAVA jdk1.8.0_20 as the case implementation environment, take the (3,5) threshold scheme as an example, that is, K=3, N=5. The implementation of the present invention will be described in detail with reference to the drawings, but it is not limited to this implementation case. among them figure 1 Is the flow chart of sharing, figure 2 Is the recovery flowchart.

[0084] The following describes the sharing process with specific examples:

[0085] Step 1: Choose a 256×256 8-bit standard grayscale image boat as the secret image, such as image 3 As shown, select 512×512 8-bit standard grayscale images baboon, f16, sailboat, lena, and peppers as the cover images of the 5 participants, such as Figure 4 ~ Figure 8 As shown, the selected key is Ke=131819, and the key 131819 is used to generate a permutation sequence of x ,...,48260,218314>, this replacement sequence is used to de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a (K, N) meaningful image sharing and recovery method based on triple backup. By introducing triple backup, the secret image pixel sharing information is stored in different three positions for mutual authentication. The natural image adjacent pixel correlation is used to improve the authentication ability and error repair ability of the scheme, and multiple coefficients of the Lagrange interpolation polynomial are used to store secret information and improve the visual quality of the bunker image. The present invention uses the correlation of adjacent pixels to correct the wrongly authenticated pixels in the restoration process and uses the correlation of adjacent pixels of natural images to approximate those pixels that fail to pass the authentication. This enables the method to have better error resilience.

Description

Technical field [0001] The invention belongs to the technical field of information security, secret sharing and digital image signal processing, and relates to a method for sharing meaningful image information, in particular to a (K, N) meaningful image sharing and restoring method based on triple backup. Background technique [0002] In recent years, with the development of computer and network technology, more and more images are transmitted on the network. While providing convenience to users, it also brings a series of security risks. Improper use and malicious tampering of images will not only involve personal privacy, but also have serious negative impacts on society. [0003] For the security of digital image information, people have proposed a variety of methods, such as: ①digital image encryption technology that converts plaintext images into ciphertext images; ②digital image steganography technology that hides confidential images in unrelated carriers; ③give A digital im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32
Inventor 邵利平欧阳显斌
Owner SHAANXI NORMAL UNIV