A Highly Adaptable Secret Image Sharing Method
A secret image and adaptive technology, applied to key distribution, can solve problems such as vulnerability to attack, low security, and limited split groups, so as to reduce transmission costs, reduce distortion, and improve reconstruction efficiency Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0018] In the embodiment of the present invention, participants with higher positions are assigned higher priorities, and then different participants are grouped according to different priorities. This can better adapt to the actual motion, while reducing the distortion of the shared mask image, reducing the burden of transmission and storage, and greatly saving the reconstruction time.
[0019] figure 1 is a flow chart of a highly adaptable secret image sharing method provided by an embodiment of the present invention, as shown in figure 1 shown, including:
[0020] Step S101: Receive a secret image that needs to be encrypted and sent by the first term...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


