Image sharing method based on multi-version backup and restrictive dual-authentication master key (t, s, k, n)

A dual-authentication and master-key technology, which is applied in the intersecting field of image signal processing and image information security, can solve problems such as poor recovery ability, high computational complexity, and low storage precision.

Active Publication Date: 2018-06-15
SHAANXI NORMAL UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a multi-version backup and restrictive dual authentication master key (t, s, k, n) image sharing method, which solves the problem of high computational complexity and low storage accuracy in existing image sharing. Defects with low and poor resilience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image sharing method based on multi-version backup and restrictive dual-authentication master key (t, s, k, n)
  • Image sharing method based on multi-version backup and restrictive dual-authentication master key (t, s, k, n)
  • Image sharing method based on multi-version backup and restrictive dual-authentication master key (t, s, k, n)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] Taking JAVA jdk1.8.0_65 as the case implementation environment, taking the (2,3,4,5) threshold scheme as an example to describe the implementation of the present invention in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 It is the flow chart of sharing storage, figure 2 Is the reconstruction flow chart. The following is a specific example to illustrate the sharing process:

[0128] Step 1: Input the large prime number p=1000000007, the master key key=131819, the parameters corresponding to the (t,s,k,n) scheme, and the resolution is 256×256 secret image S=(s i,j ) 256×256 ,s i,j ∈{0,1,…,255} (such as image 3 shown) and 5 cover images (Such as Figure 4 ~ Figure 8 shown); where, t=2, s=3, k=4, n=5, satisfying t≤s≤n, t≤k≤n, where t is the threshold of the number of important participants, and s is the number of important participants , k is the threshold of the number of participants, n is the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image sharing method based on multi-version backup and restrictive dual-authentication master key (t, s, k, n). On the basis of the constructed multi-version backup strategyand restrictive dual-authentication strategy, the high authentication accuracy is ensured and more embedding bits are used for backing up of backup images to form a plurality of versions of a backup image; and the pixels of the backup image are divided into salient, non-salient, and most salient bits further in each backup image version, wherein more salient bits are backed up and less non-salientbits are backed up. Therefore, the recovery capability of the single backup image is improved; and the recovery capability of the backup image is enhanced based on cooperative recovery of multiple versions of images. Meanwhile, according to the constructed multi-version backup strategy, high-confidence recovery of backup images is carried out by using the same bits stored at different positions;and the influence caused by the individual bits passing dual authentication luckily is eliminated by the statistic operation and the good anti-attack capability is realized.

Description

technical field [0001] The invention belongs to the cross field of image signal processing and image information security, relates to a digital image sharing method, in particular to a multi-version backup and restrictive double authentication master key (t, s, k, n) image sharing method . Background technique [0002] Image sharing is to split the secret image into shadow images, and then use part or all of the distributed shadow images to completely reconstruct the secret image. Image sharing can provide a higher level of security protection for important images, and is currently a research hotspot in image information security. Its main idea comes from secret sharing in cryptography. The simplest secret sharing is (k, n) threshold secret sharing, which was first proposed by Shamir and Blakley in combination with Lagrange interpolation polynomials and vector space point properties (Shamir A,1979:Shamir A.How to share a secret[J].Communications of theAssociation for Compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T5/00G06F21/60H04L9/08H04L9/06
CPCG06F21/602G06T5/001H04L9/0656H04L9/085
Inventor 邵利平乐志芳
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products