Digital image secret sharing method, restoration method and devices
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A secret sharing and image technology, applied in the field of image information hiding, which can solve the problem of low accuracy in recovering secret images
Inactive Publication Date: 2017-01-18
CAS OF CHENGDU INFORMATION TECH CO LTD
View PDF6 Cites 2 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] Embodiments of the present invention provide a digital image secret sharing method, recovery method and device, to solve the problem of low accuracy in recovering secret images existing in the prior art
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0080] Embodiment 1 of the present invention provides a secret sharing method for a digital image. For an image to be shared secretly, based on m+1 masked images, the information of the image to be shared secretly is hidden in it, so as to achieve the purpose of secret sharing, as shown in figure 1 As shown, it specifically includes the following processing steps:
[0081] Step 11. Construct a shared two-dimensional array of (m-1)×(m+3), and use the elements of the shared two-dimensional array as the storage space block C i,j , i represents a row, j represents a column, and 0≤i
[0082] Wherein, the two-dimensional array can also be called a STAR code, the first m columns of which are information columns, and the last three columns are check columns.
[0083] Step 12. Obtain the image to be secretly shared, and store the bit data corresponding to the pixel value of the pixel of the image to be secretly shared in the R of the shared...
Embodiment 2
[0106] After the digital image is secretly shared through the digital image secret sharing method provided in the above-mentioned embodiment 1, m+1 shadow images are obtained. This embodiment 2 is based on the above-mentioned sharing method, and accordingly, a digital secret image restoration method is proposed. Based on at least any m shadow images in the m+1 shadow images, the recovery of the shared digital secret image can be realized, K=m, N=m+1 can be set, (K, N) is provided by the embodiment of the present invention The threshold value of the digital image secret sharing method and the recovery method, the specific value can be set according to the actual needs, and it only needs to meet the requirements in the method.
[0107] In the digital secret image recovery method provided by Embodiment 2 of the present invention, m shadow images in the above m+1 shadow images are known, as figure 2 As shown, specifically, the following steps may be included:
[0108] Ste...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention provides a digital image secret sharing method, a digital image secret restoration method, a digital image secret sharing device and a digital image secret restoration device. The digital image secret sharing method includes the following steps that: a sharing two-dimensional array is constructed; bit data corresponding to the pixel values of the pixel points of an image to be secretly shared and each of m-1 masking images are stored into storage space blocks of corresponding columns of the sharing two-dimensional array according to a preset pixel point order; based on the first m columns of the sharing two-dimensional array, a redundant column is constructed according to a pre-set redundant column construction algorithm; redundant bit data in the redundant column are replaced with data at the preset bits of the bit data corresponding to the pixel values of the pixel points of the m-th masking image and the (m+1)-th masking image according to a preset replacement order, so that two post-replacement images can be obtained; and the first m-1 masking images and the two post-replacement images are determined as m+1 shadow images corresponding to the image to be secretly shared. With the digital image secret sharing method, the digital image secret restoration method, the digital image secret sharing device and the digital image secret restoration device provided by the technical schemes of the invention adopted, the accuracy of the restoration of a secret image can be improved.
Description
technical field [0001] The invention relates to the technical field of image information hiding, in particular to a digital image secret sharing method, recovery method and device. Background technique [0002] As a means of expressing and storing information in the network, digital images are more vivid and intuitive than many other types of digital information, but their content may contain sensitive information related to security issues, so they need to be encrypted before they can be transmitted. Through the image secret sharing scheme, the validity of the digital image can be protected, and the information output through the digital image can not be intercepted and tampered with. [0003] At present, the digital image secret sharing scheme in the prior art realizes the secret sharing of grayscale images, but the accuracy of the scheme to restore the secret image is not high, and there is still a huge waste in storage, transmission and calculation . Contents of the i...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.