Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image secret sharing method based on threshold increase and digital signature system

A secret sharing and image technology, applied in the direction of digital data protection, etc., can solve the problems of cumbersome, large consumption of computing resources, update secret thresholds, etc., and achieve the effect of flexible and simple calculation.

Active Publication Date: 2020-07-24
CHENGDU UNIV OF INFORMATION TECH
View PDF15 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since 1979, image secret sharing has been developed into many types of methods after in-depth research by many researchers, but there are also many problems: when some participants or secret distributors provide false keys when reconstructing secrets , will eventually lead to the receiver not being able to obtain the secret information of the image. When a cheater is found or a secret key needs to be added, the secret threshold needs to be dynamically updated
[0008] The formula of the Lagrangian interpolation method has a neat and compact structure, is easy to establish, and is very convenient in theoretical analysis. However, in the calculation, when the interpolation point is increased or decreased by one, the corresponding basic polynomials need to be recalculated, so the entire formula will change, very cumbersome
In addition, when there are many interpolation points, the degree of the Lagrange interpolation polynomial may be very high, so it has the characteristics of numerical instability
Especially when the image secret sharing technology needs to dynamically adjust the threshold value, the Lagrangian interpolation method needs to be completely recalculated, so the entire formula will change, which is very cumbersome
[0009] To sum up, the problem existing in the prior art is that the existing variable-threshold image secret sharing method consumes a large amount of computing resources.
Loss and damage of information may require the retransmission of shares, which will consume a lot of computer resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image secret sharing method based on threshold increase and digital signature system
  • Image secret sharing method based on threshold increase and digital signature system
  • Image secret sharing method based on threshold increase and digital signature system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] Aiming at the problems existing in the prior art, the present invention provides an image secret sharing method based on threshold increase. The present invention will be described in detail below with reference to the accompanying drawings.

[0038] Such as figure 1 As shown, the image secret sharing method based on threshold increase provided by the embodiment of the present invention includes the following steps:

[0039] S101: When adding data, it is necessary to add data items for the original split polynomial.

[0040] S102: Take out the k-bit pixel value in the image S again, substitute it into the new item ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of image secret sharing, and discloses an image secret sharing method based on threshold increase and a digital signature system. The method includes: whendata is newly added, newly adding a data item to an originally splitpolynomial; taking out the pixel value in the image again, substituting the pixel value into the newly added item, and correspondingly adding the obtained data value to the same pixel position of each shared part; selecting data from a certain row of the image, substituting the data into a polynomial, and storing the value of thepolynomial as a pixel value in the shared part; when pixel splitting is carried out and a remainder exists, and at the moment, supplementing 0 to the data until each pixel value in the image is processed; completing the image splitting process; in an image secret recovery stage, substituting the point pair data into a polynomial to recover a secret image; and removing the supplementary data to complete image secret recovery. According to the method, an image secret sharing method and a Newton interpolation method are combined, a large number of calculation processes are saved during thresholdadjustment, and the calculation time is greatly shortened.

Description

technical field [0001] The invention belongs to the technical field of image secret sharing, and in particular relates to an image secret sharing method and a digital signature system based on threshold increase. Background technique [0002] At present, the closest existing technology: image secret sharing technology belongs to an important branch of cryptographic technology research, which divides secret information into several small parts, which is conducive to preventing information from being abused due to excessive concentration, and is important for protecting the security and integrity of secrets. has important meaning. Since 1979, image secret sharing has been developed into many types of methods after in-depth research by many researchers, but there are also many problems: when some participants or secret distributors provide false keys when reconstructing secrets , will eventually lead to the receiver not being able to obtain the secret information of the image....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/60
Inventor 唐聃刘善政王珂
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products