A multi-version backup and restricted double authentication master key (t, s, k, n) image sharing method

A dual-authentication and master-key technology is applied in the intersecting fields of image signal processing and image information security. The effect of small channel transmission complexity and computational complexity

Active Publication Date: 2021-11-02
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a multi-version backup and restrictive dual authentication master key (t, s, k, n) image sharing method, which solves the problem of high computational complexity and low storage accuracy in existing image sharing. Defects with low and poor resilience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-version backup and restricted double authentication master key (t, s, k, n) image sharing method
  • A multi-version backup and restricted double authentication master key (t, s, k, n) image sharing method
  • A multi-version backup and restricted double authentication master key (t, s, k, n) image sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] Taking JAVA jdk1.8.0_65 as the case implementation environment, taking the (2,3,4,5) threshold scheme as an example to describe the implementation of the present invention in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 It is the flow chart of sharing storage, figure 2 Is the reconstruction flow chart. The following is a specific example to illustrate the sharing process:

[0128] Step 1: Input the large prime number p=1000000007, the master key key=131819, the parameters corresponding to the (t,s,k,n) scheme, and the resolution is 256×256 secret image S=(s i,j ) 256×256 ,s i,j ∈{0,1,…,255} (such as image 3 shown) and 5 cover images (Such as Figure 4 ~ Figure 8 shown); where, t=2, s=3, k=4, n=5, satisfying t≤s≤n, t≤k≤n, where t is the threshold of the number of important participants, and s is the number of important participants , k is the threshold of the number of participants, n is the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a multi-version backup and restricted double authentication master key (t, s, k, n) image sharing method, the constructed multi-version backup strategy and restricted double authentication strategy maintain a high authentication accuracy At the same time, use as many embedded bits as possible to backup the backup image, thereby forming multiple versions of the backup image, and further divide the backup image pixels into significant, insignificant and least significant bits in each backup image version, More backups are made for significant bits, and less backups are made for non-significant bits, which not only improves the recovery ability of a single backup image, but also improves the recovery ability of backup images through the collaborative recovery of multi-version images. At the same time, the constructed multi-version backup strategy can be Make full use of the same bit stored in different locations to restore the backup image with high confidence. At the same time, it can effectively eliminate the influence of individual bits that have passed double authentication through statistical operations and has better anti-attack capabilities.

Description

technical field [0001] The invention belongs to the cross field of image signal processing and image information security, relates to a digital image sharing method, in particular to a multi-version backup and restrictive double authentication master key (t, s, k, n) image sharing method . Background technique [0002] Image sharing is to split the secret image into shadow images, and then use part or all of the distributed shadow images to completely reconstruct the secret image. Image sharing can provide a higher level of security protection for important images, and is currently a research hotspot in image information security. Its main idea comes from secret sharing in cryptography. The simplest secret sharing is (k, n) threshold secret sharing, which was first proposed by Shamir and Blakley in combination with Lagrange interpolation polynomials and vector space point properties (Shamir A,1979:Shamir A.How to share a secret[J].Communications of theAssociation for Compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T5/00G06F21/60H04L9/08H04L9/06
CPCG06F21/602G06T5/001H04L9/0656H04L9/085
Inventor 邵利平乐志芳
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products