Secret image sharing and recovering method based on block chain

A technology of secret image and recovery method, which is applied in the field of information security, can solve problems such as consuming large computing resources, achieve the effect of solving low efficiency, reducing computing burden, and ensuring data security

Active Publication Date: 2022-07-29
NANJING UNIV OF INFORMATION SCI & TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the security of the shadow image during transmission is guaranteed, the generation of the shadow image and the recovery of the secret image in the ciphertext domain need to consume a lot of computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret image sharing and recovering method based on block chain
  • Secret image sharing and recovering method based on block chain
  • Secret image sharing and recovering method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The accompanying drawings constituting a part of the present invention are used to provide further understanding of the present invention, and the exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention.

[0052] This example provides a secure and efficient method for sharing and restoring secret images based on blockchain, such as figure 1 As shown, the method mainly includes the sharing and recovery stages of the secret image.

[0053] Sharing stage of secret image: This example uses the construction-generating polynomial method to generate a shadow image, and then encrypts it using the BFV scheme and uploads it to the IPFS system, such as figure 2 The specific steps are as follows:

[0054] Step 1: Generate a set of shadow images from the secret image, specifically: dividing the secret image pixels into several groups, each group containing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based secret image sharing and recovery method, which comprises two parts of sharing and recovery of a secret image, and is characterized in that: 1) the secret image generates a group of shadow images, and the shadow images are sent to corresponding users; 2) partitioning each shadow image, and encrypting each image block; and 3) uploading the encrypted shadow image to an IPFS (Internet Protocol File System) and a block chain. The recovery comprises the following steps: 1) a certain user sends a recovery application to the smart contract; 2) the smart contract broadcasts a recovery application event to other users; 3) the secret image sharer selectively authorizes the access right to the smart contract; 4) the smart contract issues a recovery task to the block chain; 5) selecting an agent mining machine by the intelligent contract; (6) the proxy mining machine recovers the secret image in the ciphertext domain, and an encrypted secret image is obtained; and 7) the intelligent contract forwards the encrypted secret image to the application user for decryption. According to the method, the problems of stealing, tampering and losing of the shadow image can be completely prevented.

Description

technical field [0001] The invention belongs to the field of information security. Background technique [0002] With the rapid development of the Internet and the widespread use of digital multimedia (text, images, audio, video), the security of digital products has been challenged, especially some personal privacy pictures, trade secret drawings, medical images and military drawings, etc. These digital products are easily intercepted, tampered with and destroyed during storage and transmission. Therefore, their safety has received extensive attention. The secret image sharing technology is a technology that distributes a group of messy shadow images obtained by decomposing secret images to different people for independent storage, and can be extracted and restored when needed. This technology has two characteristics: one is that the shadow image can hide the information of the original image, and the other is that the restoration of the original image requires a certain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40H04L67/06H04L67/1074H04L67/1097G06F21/64G06F21/60G06F16/182
CPCH04L9/085H04L63/0442H04L63/10H04L67/1078H04L67/06H04L67/1097G06F21/602G06F21/64G06F16/182
Inventor 黄敬旺周志立苏日成万耀丁淳
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products