Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Visual Encryption Method for Grayscale Image

A technology of grayscale image and encryption method, which is applied in image analysis, image data processing, image data processing, etc., can solve the problem of low detail resolution and achieve the effect of improving visual quality

Active Publication Date: 2019-05-28
SHANDONG UNIV OF SCI & TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Recently, X.T.Wu et al. proposed a visual cryptography that can generate blue noise shared images. However, after superimposing two blue noise shared images, the reconstructed image will no longer have blue noise characteristics, so this type of algorithm is only suitable for gray images. The high-degree secret image is simply binarized and then encrypted, so it has very low detail resolution ability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Visual Encryption Method for Grayscale Image
  • A Visual Encryption Method for Grayscale Image
  • A Visual Encryption Method for Grayscale Image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Basic idea of ​​the present invention is as follows:

[0072] Such as figure 1 As shown, an cipher with a closed-loop feedback analysis-by-synthesis (Analysis-by-Synthesis, AbS) framework is proposed, and a visual cipher is designed from the perspective of analysis-synthesis, that is, the process of dividing the secret image into shared images is the analysis part; and the superposition of the shared image in the encryptor to generate the reconstructed image is the synthetic part.

[0073] The basic meaning of AbS is to decode the shared image obtained by encryption in the encryptor (not in the decoder), and use the decoding result as the basis for optimizing the visual quality. Specifically, in this AbS framework, the reconstructed image synthesized by the encryptor is fed back to the analysis part to obtain the difference between the current reconstructed pixel (or image block) and the secret pixel (or image block), so that the halftoning process can This difference...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a grayscale image visual encryption method. In this method, the two processes of image generation and superposition decoding in visual cryptography are placed in an error diffusion feedback loop. That is to say, at the encoder side, each pixel or image block is sequentially processed according to a certain scanning order, and for each pixel or image block on the generated shared image, the superimposed decoding effect is checked immediately, and the superimposed obtained The reconstructed target image is compared with the original secret image to obtain the difference between the two, and the contrast difference is fed back and diffused to surrounding pixels or image blocks that have not been quantified, so as to improve the quality of the decoded and reconstructed secret image. The process of generating shared images, and the synthesis process corresponds to the process of obtaining target images from shared images, the method of the present invention puts synthesis in analysis, that is, analysis based on synthesis.

Description

technical field [0001] The invention relates to the field of multimedia communication security, in particular to a grayscale image visual encryption method. Background technique [0002] Visual encryption is a secret sharing method that is efficient in the decoding process and does not require any calculation. For a (n,k) threshold visual cipher, it divides a secret image into n parts for transmission, and only obtains at least k of them. It is superimposed to recover the contents of the secret image. In recent years, research on visual cryptography has two focuses: one is to reduce the size of the shared image, and the other is to improve the visual quality of the reconstructed image. Among them, the size of the shared image is generally expanded compared to the size of the secret image. A small expansion factor or even a visual cryptography with no expansion in size has many advantages, such as low processing complexity, small storage space, and low transmission bandwidth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0028G09C5/00H04L9/085G06T7/11H04L9/06H04L9/0838
Inventor 颜斌杨红梅潘正祥陈娜郝建军
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products