Image secret sharing method based on threshold reduction and application

A secret sharing and image technology, which is applied in image communication and key distribution, can solve the problems of cumbersome, unstable values, update secret threshold, etc., and achieve the effect of flexible and simple calculation

Inactive Publication Date: 2020-07-14
CHENGDU UNIV OF INFORMATION TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since 1979, image secret sharing has been developed into many types of methods after in-depth research by many researchers, but there are also many problems: when some participants or secret distributors provide false keys when reconstructing secrets , will eventually lead to the receiver not being able to obtain the secret information of the image. When a cheater is found or a secret key needs to be added, the secret threshold needs to be dynamically updated
[0008] The formula of the Lagrangian interpolation method has a neat and compact structure, is easy to establish, and is very convenient in theoretical analysis. However, in the calculation, when the interpolation point is increased or decreased by one, the corresponding basic polynomials need to be recalculated, so the entire formula will change, very cumbersome
In addition, when there are many interpolation points, the degree of the Lagrange interpolation polynomial may be very high, so it has the characteristics of numerical instability
Especially when the image secret sharing technology needs to dynamically adjust the threshold value, the Lagrangian interpolation method needs to be completely recalculated, so the entire formula will change, which is very cumbersome
[0009] To sum up, the problem existing in the prior art is that the existing variable-threshold image secret sharing method consumes a large amount of computing resources.
The existence of the cheater will cause the end user to make mistakes when recovering the secret information, which will waste a lot of resources. Therefore, it is necessary to delete the cheater in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image secret sharing method based on threshold reduction and application
  • Image secret sharing method based on threshold reduction and application
  • Image secret sharing method based on threshold reduction and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] Aiming at the problems existing in the prior art, the present invention provides an image secret sharing method based on threshold reduction. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] Such as figure 1 As shown, the image secret sharing method based on threshold reduction provided by the embodiment of the present invention includes the following steps:

[0038] S101: When reducing data, it is necessary to eliminate data items for the original polynomial.

[0039] S102: Take out the k-bit pixel value in the image S again, substitute it into the eli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of image secret sharing, and discloses an image secret sharing method based on threshold reduction and an application. The method comprises the steps: eliminating a data item for an original polynomial during data reduction; taking out the pixel value in the image again, substituting the pixel value into the elimination item, and subtracting the elimination item from the pixel value corresponding to the same pixel position of each shared part to serve as the pixel value to be stored again; selecting data from the row of the image, substituting the data into a polynomial, and storing the value of the polynomial as a pixel value in the shared part; when pixel splitting is carried out and the remainder exists, supplementing 0 to the data until eachpixel value in the image is processed; completing the image splitting process; in an image secret recovery stage, substituting the point pair data into a polynomial to recover a secret image; removing the supplementary data to complete image secret recovery. According to the method, an image secret sharing method is combined with a Newton interpolation method; the threshold structure is dynamically adjusted, and only corresponding items need to be increased or decreased, so that calculation time is greatly shortened.

Description

technical field [0001] The invention belongs to the technical field of image secret sharing, and in particular relates to an image secret sharing method and application based on threshold reduction. Background technique [0002] At present, the closest existing technology: image secret sharing technology belongs to an important branch of cryptographic technology research, which divides secret information into several small parts, which is conducive to preventing information from being abused due to excessive concentration, and is important for protecting the security and integrity of secrets. has important meaning. Since 1979, image secret sharing has been developed into many types of methods after in-depth research by many researchers, but there are also many problems: when some participants or secret distributors provide false keys when reconstructing secrets , will eventually lead to the receiver not being able to obtain the secret information of the image. When a cheate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/44H04L9/08
CPCH04L9/085H04L9/0891H04N1/44
Inventor 唐聃刘善政蔡红亮
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products