Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

One based on gf(2 3 )'s (k,n) meaningful non-expansion image sharing and reconstruction method

An image and secret image technology, applied in image data processing, image data processing, instruments, etc., can solve the problem of not introducing forward authentication strategy

Active Publication Date: 2018-02-13
SHAANXI NORMAL UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In the invention patent applied for: (K, N) meaningful image sharing and restoration method based on difference transformation, although the proposed strategy does not have any expansion, the proposed strategy adopts a strict authentication strategy and does not allow continuous There is no cheating behavior in the bunker image embedded in the sharing information and the sub-key kept by the owner, and no forward authentication strategy is introduced, that is, the secret pixel before the sharing is authenticated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One based on gf(2  <sup>3</sup> )'s (k,n) meaningful non-expansion image sharing and reconstruction method
  • One based on gf(2  <sup>3</sup> )'s (k,n) meaningful non-expansion image sharing and reconstruction method
  • One based on gf(2  <sup>3</sup> )'s (k,n) meaningful non-expansion image sharing and reconstruction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The method of the present invention is described in detail below in conjunction with the specific embodiments of the accompanying drawings:

[0088] Principle of the present invention:

[0089] The traditional sharing method is usually based on the Shamir-(K,N) threshold scheme, and its main idea is to construct the Lagrange polynomial shown in formula (1):

[0090] f(k)=(s+r 1 k+r 2 k 2 +…+r K-1 k K-1 ) mod p (1)

[0091] In formula (1), s is the secret, r 1 ,r 2 ,...,r K-1 Is a random integer, p is a prime number and satisfies s, r 1 ,r 2 ,...,r K-1 ∈[0,p), N is an integer in the range of [K,p). Substituting x=1,2,...,N into formula (1) in order to form N distribution information (1,f(1)),(2,f(2)),...,(N,f(N) ).

[0092] If t (t≥K) different distribution information (num k ,f(num k )), k=1, 2, ..., t, then f(x) can be restored first according to the Lagrange interpolation formula of formula (2), and then the distributed secret s=f(0) can be reconstruct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a (K,N) meaningful non-expansion image divide-storage and reconstruction method based on GF(23); the method comprises the following steps: firstly generating an encryption mapping table and encrypting secret pixels through using secret pixel positional information; carrying out (K, N) divide-storage for secret pixel authentication information and the encrypted pixels under a GF (23) Galois field, and embedding the information into corresponding pixels of a mask image; finally carrying out (K,N) divide-storage for a mapping table generation secret key, calculating a MD5 value of each subkey, and publishing the MD5 values to a third party trusted party so as to prevent cheating of a subkey holder. Compared with a conventional method, the (K,N) meaningful non-expansion image divide-storage and reconstruction method can accurately identify a secret image attack zone without any pixel expansion; the mask image is equal in size with the secret image, and the mask image with embedded divide-storage information has excellent visual sense quality.

Description

technical field [0001] The invention belongs to the cross field of image information security and digital image signal processing, and relates to an image sharing and reconstruction method, in particular to a method based on GF(2 3 )'s (K,N) meaningful non-dilation image sharing and reconstruction method. Background technique [0002] Digital image information sharing technology is a research hotspot in image information security. The existing image information sharing technology is mainly derived from the secret sharing in cryptography, which was first proposed by Shamir (Shamir A. How to share a secret[J]. Communications of the Association for Computing Machinery, 1979, 22(11): 612 –613.) and Blakley (Blakley G R. Safeguarding cryptographic keys[C] / / Proceedings of 1979National Computer Conference. New York, USA: AFIPS, 1979,48:313–317.) combined Lagrange interpolation method and vector space point nature proposed. [0003] Combined with the secret sharing scheme, the im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06F21/60
Inventor 邵利平欧阳显斌
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products