高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于迭代算法的可验证视觉密码

郁滨 卢锦元 房礼国

郁滨, 卢锦元, 房礼国. 基于迭代算法的可验证视觉密码[J]. 电子与信息学报, 2011, 33(1): 163-167. doi: 10.3724/SP.J.1146.2010.00270
引用本文: 郁滨, 卢锦元, 房礼国. 基于迭代算法的可验证视觉密码[J]. 电子与信息学报, 2011, 33(1): 163-167. doi: 10.3724/SP.J.1146.2010.00270
Yu Bin, Lu Jin-Yuan, Fang Li-Guo. Verifiable Visual Cryptography Based on Iterative Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 163-167. doi: 10.3724/SP.J.1146.2010.00270
Citation: Yu Bin, Lu Jin-Yuan, Fang Li-Guo. Verifiable Visual Cryptography Based on Iterative Algorithm[J]. Journal of Electronics & Information Technology, 2011, 33(1): 163-167. doi: 10.3724/SP.J.1146.2010.00270

基于迭代算法的可验证视觉密码

doi: 10.3724/SP.J.1146.2010.00270
基金项目: 

国家自然科学基金(61070086)和河南省科技创新杰出青年基金(094100510002)资助课题

Verifiable Visual Cryptography Based on Iterative Algorithm

  • 摘要: 通过改变验证图像的分享和恢复方式,该文提出了一种基于迭代算法的可验证视觉密码方案。该方案设计专用算法分享验证图像,利用算法的迭代优化验证过程,不仅大幅减小了像素扩展度,而且显著提高了验证效率。同时,通过引入异或操作实现了验证图像的完全恢复。
  • Shamir A. How to share a secret[J].Communications of the ACM.1979, 22(11):612-613[2]Blakley G R. Safeguarding cryptographic keys[C]. Proceedings of the National Computer Conference, NJ, USA, 1979, 48: 242-268.[3]Naor M and Shamir A. Visual cryptography[C][J].Advances in Cryptology-Eurocrypt94, Lecture Notes in Computer Science.1995, 950:1-12[4]Ateniese G, Carlo B, and Santis A D, et al.. Visual cryptography for general access structures[J].Information and Computation.1996, 129(2):86-106[5]Steve L, Daniel M, and Rafail O. Visual Cryptography on Graphs[C]. COCOON 2008, LNCS 5092: 225-234.[6]Boundo C, Santis A D, and Stinson D R. On the contrast in visual cryptography schemes[J]. Journal of Cryptography, 1999, 12(4): 261-289.[7]Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n) visual threshold scheme[C]. 1st International Symposium on Pervasive Computing and Applications Proceedings (SPCA06), Ningbo, 2006: 856-860.[8]Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. Visual Cryptography (VC) with non-expanded shadow images Hilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.[9]Cimato S, De Prisco R, and De Santis A. Optimal colored threshold visual cryptography schemes[J].Designs, Codes and Cryptography.2005, 35(3):311-335[10]Yang Ching-nung and Chen Tse-shih. Colored visual cryptography scheme based on additive color mixing[J].Pattern Recognition.2008, 41(10):3114-3129[11]Ng F Y and Wong D S. On the security of a visual cryptography scheme for color images[J].Pattern Recognition.2009, 42(5):929-940[12]Wu H C and Chang C C. Sharing visual multi-secrets using circle shares[J].Computer Standards Interfaces.2005, 134(28):123-135[13]Yu B, Fu Z X, and Fang L G. A modified multi-secret sharing visual cryptography scheme[C]. CIS2008, Suzhou, 2008: 351-354.[14]Fu Z X and Yu B. Research on rotation visual cryptography scheme[C]. International symposium on information engineering and electronic commerce, IEEE, Ternopil, Ukraine, 2009: 533-536.[15]陈玲慧. 视觉化密码之研究及其应用. 中国台湾专题研究计划成果报告, 计划编号:NSC 89-2213-E-009-016, 1999.[16]Chen Ling-hui. A study on visual cryptography and its applications. NSC 89-2213-E-009-016, 1999.[17]郭洁,颜浩,刘妍,陈克非.一种可防止欺骗的可视密码分享方案[J]. 计算机工程,2005, 31(6): 126-128.Guo Jie, Yan Hao, Liu Yan, and Chen Ke-fei. A cheater detectable visual cryptography scheme[J]. Computer Engineering, 2005, 31(6): 126-128.[18]徐晓辉,郁滨. 无重影的可防欺骗视觉密码方案[C].全国第18届计算机技术与应用学术会议(CACIS2007), 宁波, 2007: 1335-1339.[19]Xu Xiao-hui and Yu Bin. A cheater detectable VCS without fringes[C]. CACIS2007, Ningbo, 2007: 1335-1339.[20]Gwoboa H, Tzungher C, and Dushiau T. Cheating in visual cryptography[J].Designs, Codes and Cryptography.2006, 38(2):219-236[21]王益伟,郁滨. 一种(k', k, n)可防欺骗视觉密码方案[C]. 全国第19届计算机技术与应用学术会议(CACIS08), 合肥, 2008: 492-496.[22]Wang Yi-wei and Yu Bin. A (k',k,n)-cheater prevention VCS[C], CACIS08, Hefei, 2008: 492-496.Yu B, Fang L G, and Xu X H. A Verifiable visual cryptography scheme[C]. CIS2008, Suzhou, 2008: 347-350.
  • 加载中
计量
  • 文章访问数:  3370
  • HTML全文浏览量:  86
  • PDF下载量:  861
  • 被引次数: 0
出版历程
  • 收稿日期:  2010-03-23
  • 修回日期:  2010-08-25
  • 刊出日期:  2011-01-19

目录

    /

    返回文章
    返回