(k,n) threshold based user-friendly visual secret sharing method

A secret sharing and threshold technology, applied in the field of information security, can solve problems such as low security, inconvenient management, and damage to image integrity, and achieve the effects of improving contrast, improving visual effects, and increasing the scope of image application.

Active Publication Date: 2016-03-16
XIDIAN UNIV
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some defects in this method: first, the contrast ratio of this method is very low
Due to the random acquisition of n-k pixels in this method, the contrast after superimposing the image is particularly low
Second, the security of this method is particularly low. Randomly generated random grids are mea

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • (k,n) threshold based user-friendly visual secret sharing method
  • (k,n) threshold based user-friendly visual secret sharing method
  • (k,n) threshold based user-friendly visual secret sharing method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] The specific embodiments of the present invention will be described below with reference to the accompanying drawings.

[0037] Reference figure 1 , The implementation steps of the present invention are as follows:

[0038] Step 1. Input a secret image S and n cover images C to be protected.

[0039] The secret image S is the image that needs to be protected. The cover image C is used to hide the secret image S. The size of the cover image and the secret image must be equal, here set to r×c, where r represents the height of the secret image and the cover image, and c represents the secret image and The width of the cover image.

[0040] Step 2: Use the traditional random grid-based method to generate a shared image. The secret image S uses a binary image. For the traditional random grid-based visual secret sharing method, firstly, the pixel S of the secret image S i,j For coding, the following first introduces the traditional random grid.

[0041] 2a) Generate random grid G ​​a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a (k,n) threshold based user-friendly visual secret sharing method and mainly solves the problems of low security and contrast in the prior art. The method is implemented by the steps of 1, performing (k,n) random grid processing on a binary secret image S to obtain n basic shared images of random grids; 2, performing block segmentation on an input gray cover image by using histogram equalization to obtain a gray level equivalent to the gray level of each small image block; 3, performing halftone processing on the cover image subjected to the block segmentation, and according to a generated dithering matrix, obtaining a shared cover image after the halftone processing; and 4, performing block segmentation on the generated basic shared images and cover image, performing combination according to a stacking ratio of a constant value delta, and performing block segmentation and combination to generate a meaningful final shared image. According to the method, the attack of attackers can be prevented, the meaningful final shared image can be generated, and the application range of visual secret sharing can be extended.

Description

technical field [0001] The present invention relates to the technical field of information security, and is a visual secret sharing method for information hiding, a user-friendly visual secret sharing method called (k, n) threshold, which can be used for image protection, image sharing, and real-time transmission of images Wait. Background technique [0002] In 1979, Blakley and Shamir respectively proposed the concept of secret sharing. The secret sharing method is to divide the secret into different shares, and any share greater than or equal to a certain number can recover the secret, and vice versa. Due to the widespread use of images in daily life, in 1995, Naor and Shamir introduced the secret sharing method into the field of image processing, and proposed the first visual secret image sharing method. The visual secret sharing method divides the secret image into different shares, and any share greater than or equal to a certain number can recover the secret image, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 庞辽军苗得雨
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products