Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for sharing and restoring a single image

An image restoration, single image technology, applied in the field of information security, can solve the problems of large pixel expansion and single decryption method, and achieve the effect of solving the excessive pixel expansion

Active Publication Date: 2021-04-20
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, common visual cryptography encryption schemes have problems such as excessive pixel expansion and single decryption means.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for sharing and restoring a single image
  • A method for sharing and restoring a single image
  • A method for sharing and restoring a single image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 It is a schematic diagram of the original image and the shared image involved in Embodiment 1 of the present invention, wherein figure 1 a is the original image, figure 1 b. figure 1 c and figure 1 d is to share the image. In this example for figure 1 The original image shown in a is shared, and the specific sharing method includes the following steps:

[0039] Step S11: put figure 1 The original image to be shared in a is denoted as I o , the original image is a binary image with a size of (512, 1024), and the size is in pixels. The value of each pixel block in the original image is recorded as 0 or 1. When the value of the pixel block is 0, it means that the color of the pixel block is white; when the value of the pixel block is 1, it means that the color of the pixel block is black. .

[0040] At this time, I o It can be expressed as a two-dimensional binary matrix with 512 rows and 1024 columns in total, each value in the matrix is ​​0 or 1, and e...

Embodiment 2

[0058] figure 2 It is a schematic diagram of an original image restored by an image restoration method involved in Embodiment 2 of the present invention. Below in conjunction with the shared image A in Embodiment 1 1 、A 2 、A 3 Let the image restoration method in this embodiment be described, the image restoration method includes the following steps:

[0059] Step S21: In the above shared image A 1 , A 2 , A 3 Choose any two of them, denoted as A l and A k , where (l, k) contains three cases: (1, 2), (1, 3) and (2, 3).

[0060] Step S22: For the two shared images A selected in step S21 l and A k Perform an OR operation to obtain the original image I o .

[0061] Specifically, share image A l and A k The value of each pixel block in is 0 or 1, so A land A k It can be represented by a two-dimensional binary matrix, denoted as I l and I k , use the computer to matrix I l and I k The OR operation is performed to obtain a matrix, which has 512 rows and 1536 colu...

Embodiment 3

[0064] image 3 It is a schematic diagram of an original image restored by an image restoration method involved in Embodiment 3 of the present invention. Below in conjunction with the shared image A in Embodiment 1 1 、A 2 、A 3 Let the image restoration method in this embodiment be described, the image restoration method includes the following steps:

[0065] Step S31: In the above shared image A 1 , A 2 , A 3 Choose any two of them, denoted as A l and A k , where (l, k) contains three cases: (1, 2), (1, 3) and (2, 3).

[0066] Step S32: For the two shared images A selected in step S31 l and A k XOR operation is performed to obtain the original image I o .

[0067] Specifically, share image A l and A k The value of each pixel block in is 0 or 1, so A l and A k It can be represented by a two-dimensional binary matrix, denoted as I l and I k , use the computer to matrix I l and I k A matrix is ​​obtained by XOR operation, and the matrix can be converted into a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for sharing and restoring a single image. When sharing an image, share two pixels at the same time, select a sharing matrix group corresponding to the pixel value, and use the sharing matrix in the sharing matrix group to generate a pixel block of the shared image , the final shared image is a random image, and any original image information cannot be obtained from any shared image. The present invention also provides a method for restoring the original image by using any two shared images, and provides three restoration schemes, namely: a restoration scheme for low visual quality images based on OR operation, and a medium visual quality image restoration scheme based on XOR operation schemes and schemes for using computers to restore accurate images. The size of the shared image obtained by the present invention is 1.5 times of the original secret image, which is the lowest level among similar methods.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular, to a sharing method and restoration method for a single binary image. Background technique [0002] The usage of image information is increasing with the popularization of electronic devices such as mobile phones and computers. At the same time, the safe transmission of image information has become particularly important. Therefore, a safe image transmission scheme is urgently needed by people, and as a safe image transmission scheme, the encrypted sharing and restoration of images has also attracted more attention. Existing traditional image encryption algorithms generally contain a key, and the security of information is entirely determined by the security of the key information, which is completely unacceptable in fields that require high information security. Visual cryptography schemes (abbreviated as VCS) have received extensive attention recently due to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/44
CPCH04N1/44
Inventor 李鹏马坚峰尹丽萍
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)