Unlock instant, AI-driven research and patent intelligence for your innovation.

A Highly Adaptable Secret Image Sharing Method

A secret image and adaptive technology, applied to key distribution, can solve problems such as vulnerability to attack, low security, and limited split groups, so as to reduce transmission costs, reduce distortion, and improve reconstruction efficiency Effect

Active Publication Date: 2021-09-24
北京孔皆数智科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem solved by the solution provided according to the embodiment of the present invention is that in the current image secret sharing technology, equating all participants cannot be well adapted to real life, and at the same time, some participants have unequal amounts of information, and This not only increases the transmission burden, but also is extremely vulnerable to attacks, and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Highly Adaptable Secret Image Sharing Method
  • A Highly Adaptable Secret Image Sharing Method
  • A Highly Adaptable Secret Image Sharing Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0018] In the embodiment of the present invention, participants with higher positions are assigned higher priorities, and then different participants are grouped according to different priorities. This can better adapt to the actual motion, while reducing the distortion of the shared mask image, reducing the burden of transmission and storage, and greatly saving the reconstruction time.

[0019] figure 1 is a flow chart of a highly adaptable secret image sharing method provided by an embodiment of the present invention, as shown in figure 1 shown, including:

[0020] Step S101: Receive a secret image that needs to be encrypted and sent by the first term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a highly adaptable secret image sharing method, which includes: receiving a secret image sent by a first terminal that needs to be encrypted, and using the pixel values ​​of the secret image to construct a binary symmetric matrix on a finite field GF; According to the identifiers of k trusted participants and the binary symmetric matrix, k coefficient matrices are obtained, and the k coefficient matrices are sequentially converted into k eight-bit binary data; n masking images are obtained, and utilized The n masking images process the k eight-bit binary data to obtain n shared images, and send them to n participants respectively, so as to realize the splitting of the secret image; when reconstructing the secret image , obtain the unprocessed k pixel values ​​in the known k shadow images, and use the k pixel values ​​to obtain the original coefficient matrix; use the original coefficient matrix and the identifier of the holder of the k shadow images , to recover the secret image.

Description

technical field [0001] The invention belongs to the technical field of computer software, in particular to a highly adaptable secret image sharing method. Background technique [0002] With the advent of the industry 4.0 and 5G era, the amount of image data has increased dramatically; and in real life, the economic losses caused by image data leakage and loss are also increasing. According to the latest update of the global data field by the International Data Corporation (IDC), more than 59ZB of data will be created, captured, copied and used globally this year, and this data will continue to grow. The compound annual growth rate (CAGR) for the next five years is expected to be about About 40.3%, of which image data accounted for more than about a quarter, and the economic losses caused by image data leakage and loss have reached as high as 1.2 trillion US dollars. Therefore, in the security, personalization, efficiency and personal Finding the right balance between privac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/085
Inventor 唐聃何瑞高燕刘斌耿微
Owner 北京孔皆数智科技有限公司