GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method

A dual-authentication, finite-field technology, applied in image data processing, graphics and image conversion, instruments, etc., can solve problems such as bunker image authentication without embedded sharing information, unrecognizable bunkers, and affecting repair capabilities

Active Publication Date: 2016-05-18
SHAANXI NORMAL UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, Wu,2013 used 2 8-bit secret pixels and 2 4-bit backup image pixels totaling 24 bits as the initial 3-time 8-cell to construct a reversible cellular automaton for sharing, and the sharing information and the corresponding The 8-bit authentication information is embedded into the lower 2 bits of the cover image corresponding to the 2×4 block using the LSB method. The problems caused by this are: ①It is not a real (3,N) threshold scheme, and at least 3 numbers are required The two secret pixels and the backup image of the secret image can be recovered only by continuous sharing units; ②Any pixel in the 2×4 block is attacked, that is, the 24-bit information in the two secret pixels and their backup image is unavailable, Therefore, this method cannot resist any tiny noise attack; ③ It is unreasonable to use the same backup strategy for the low-orde...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method
  • GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method
  • GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] The present invention is described below in conjunction with specific embodiment:

[0112] Taking JAVAjdk1.8.0_20 as the case implementation environment, taking the (3,5) threshold scheme as an example, that is, K=3, N=5, the implementation of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 It is the flow chart of sharing storage, figure 2 Is the reconstruction flow chart.

[0113] The following is a specific example to illustrate the sharing process:

[0114] Select the 8-bit standard grayscale image boat of 256×256 as the secret image, such as image 3As shown in , the 8-bit standard grayscale images of 512×512, baboon, f16, sailboat, lena and peppers were selected as the mask images of the five participants, as Figure 4 ~ Figure 8 As shown, the selected key is key=131819, K=3, N=5.

[0115] Step 1: Right image 3 Secret image S=(s i,j ) 256×256 Do a d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method. Ring the sharing period, the sub-band of a secret image LL is scrambled, and the coefficients of bits are backed up by different numbers according to the degrees of importance thereof. Finally, a backup image of the same size with the secret image is formed. After that, secret pixels, backup pixels and the corresponding dual-authentication information are shared in the form of (K, N) in the GF (27) finite field. Based on the optimized LSB method, the shared information and primary authentication bits are embedded into the lower-order bits of a bunker block to maximally ensure the visual quality of distributed bunker images. During the reconstruction process, the shared information for recovery is screened through the primary authentication step. After that, the reliability of recovered secret pixels and the reliability of recovered backup pixels are verified through the secondary authentication step, so that an authentication image, a backup image and a preliminary secret image are formed. In combination with the secret image, a recovered reference image and the authentication image, the non-pass pixels of the secret image during the authentication process are subjected to polynomial fitting repair and alternative repair, so that the repair quality after the attack is better.

Description

technical field [0001] The invention belongs to the cross field of image information security and digital image signal processing, and relates to an image sharing and reconstruction method, in particular to a method based on GF(2 7 ) Meaningful (K,N) Image Sharing and Reconstruction Method for Finite Fields and Dual Authentication. Background technique [0002] Digital image information sharing technology is a research hotspot in image information security. The existing image information sharing technology is mainly derived from secret sharing in cryptography, which was first proposed by Shamir, 1979 (ShamirA. .Safeguardingcryptographickeys[C] / / Proceedingsof1979NationalComputerConference.NewYork,USA:AFIPS,1979,48:313–317.) Combining Lagrange interpolation method and vector space point properties respectively. [0003] Combined with the secret sharing scheme, the image information sharing scheme based on the (K,N) threshold is widely proposed, that is, the secret image is d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T3/40
CPCG06T3/40
Inventor 邵利平欧阳显斌
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products