Secret sharing method and system based on visual effect

A technology of secret sharing and visual effects, applied in image communication, electrical components, etc., can solve the problems of reducing contrast, pixel problem expansion still exists, and restoring image visual quality is reduced, so as to improve performance, eliminate pixel expansion, and achieve high contrast Effect

Active Publication Date: 2021-02-26
国家电网有限公司大数据中心
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

We can also use probabilistic methods to keep the image size constant, but these schemes also reduce the contrast with existing VCS, thus resulting in a lower visual quality of the restored image
The new model proposed by Shamir [1] improves the contrast with a multi-layer cover base, but the problem of pixel dilation still exists

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret sharing method and system based on visual effect
  • Secret sharing method and system based on visual effect
  • Secret sharing method and system based on visual effect

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Such as figure 1 As shown, the present invention provides a secret sharing method based on visual effects, including:

[0060] Split the original image into multiple secret images; map each secret image into a secret block; generate multiple shared image blocks block by block based on the size of the secret block; move each shared image block in a cyclic stacking manner to realize the shared Encryption of image blocks;

[0061] distribute the encrypted shared image blocks to at least two users in a stacked order;

[0062] Superimpose all shared image blocks distributed to users in order to obtain a decrypted image with the same quality as the original image;

[0063] Wherein, the secret block has a plurality of pixels.

[0064] The entire encryption, decryption and distribution process of shared image blocks will be described in detail below.

[0065] 1. Introduction to VCS visual cryptography technology

[0066] 1.1 The foundation of VCS

[0067] In order to illu...

Embodiment 2

[0172] In order to realize the above method, the present invention also provides the present invention also provides a secret sharing system based on visual effects, such as Figure 9 shown, including:

[0173] The encryption module is used to split the original image into multiple secret images; map each secret image into a secret block; generate multiple shared image blocks block by block based on the size of the secret block; move each shared image block in a circular stacking manner Encrypting the shared image block;

[0174] A distribution module, configured to distribute the encrypted shared image blocks to at least two users in a stacked order;

[0175] The decryption module is used to superimpose the shared image blocks distributed to users in order to obtain a decrypted image with the same quality as the original image;

[0176] Wherein, the secret block has a plurality of pixels.

[0177] Splitting the original image into multiple secret images in the encryption m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secret sharing method and system based on a visual effect. The secret sharing method comprises the following steps: splitting an original image into a plurality of secret images; mapping each secret image into a secret block; generating a plurality of shared image blocks one by one based on the size of the secret block; moving the shared image blocks in a cyclic stacking mode to achieve encryption of the shared image blocks; superposing all the shared image blocks in sequence during decryption to obtain a decrypted image with the same quality as the original image, wherein the secret block is provided with a plurality of pixels. The size of the shared image is the same as that of the secret image by encrypting the image block one by one, so that pixel expansion iseliminated, the image recovery performance is improved, and almost lossless visual encryption is realized; by processing the mapping relation of the pixel blocks before and after encryption, higher contrast is obtained, meanwhile, electronic equipment does not need to be used in the traditional encryption and decryption process, and the shared image blocks can be directly printed on paper to be decrypted by vertically arranging multiple pieces of paper.

Description

technical field [0001] The invention relates to the technical field of secret image sharing, in particular to a method and system for secret sharing based on visual effects. Background technique [0002] With the development of the Internet and smart devices, there is an urgent need to access information anytime and anywhere. Public networks usually have an open connection and untrusted communication channels. Traditional cryptography can ensure the security and privacy of information. However, storing, managing, and distributing keys is a lot of work. [0003] In 1994, Naor and Shamir[1] proposed a visual cryptography technology, Visual Cryptography Scheme (VCS), which aims to encrypt secret code information into multiple shares and transmit it to users through untrusted communication channels. While the human eye can easily reveal secret images or information by stacking a sufficient number of shares. The threshold scheme of Naor and Shamir divides the secret black-and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/44
CPCH04N1/44H04N1/4453
Inventor 朱洪斌刘圣龙赵涛王衡周鑫王迪夏雨潇吕艳丽张舸陈禹希
Owner 国家电网有限公司大数据中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products