高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种共享份分块构造的异或区域递增式视觉密码方案

郁滨 胡浩 陈武平 沈刚

郁滨, 胡浩, 陈武平, 沈刚. 一种共享份分块构造的异或区域递增式视觉密码方案[J]. 电子与信息学报, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
引用本文: 郁滨, 胡浩, 陈武平, 沈刚. 一种共享份分块构造的异或区域递增式视觉密码方案[J]. 电子与信息学报, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
Yu Bin, Hu Hao, Chen Wu-ping, Shen Gang. XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385
Citation: Yu Bin, Hu Hao, Chen Wu-ping, Shen Gang. XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction[J]. Journal of Electronics & Information Technology, 2015, 37(8): 1978-1983. doi: 10.11999/JEIT141385

一种共享份分块构造的异或区域递增式视觉密码方案

doi: 10.11999/JEIT141385
基金项目: 

国家自然科学基金(61070086)和信息保障技术重点实验室开放基金(KJ-13-107)

XOR-based Region Incrementing Visual Cryptography Scheme with Share Block Construction

  • 摘要: 该文依据授权子集的个数将共享份划分若干块,按照共享份分块构造的设计思路,结合(n, n)异或单秘密视觉密码的加密矩阵,构造了异或区域递增式视觉密码的秘密分享与恢复流程。与现有方案相比,该方案可以实现解密区域图像的完全恢复,且明显减小了共享份的大小。
  • 付正欣, 郁滨, 房礼国. 一种新的多秘密分享视觉密码[J]. 电子学报, 2011, 39(3): 712-718.
    Fu Zheng-xin, Yu Bin, and Fang Li-guo. A new multi-secret sharing visual cryptography[J]. Acta Electronica Sinica, 2011, 39(3): 712-718.
    付正欣, 郁滨, 房礼国. 基于压缩算法的存取式多秘密视觉密码[J]. 电子与信息学报, 2013, 35(5): 1055-1062.
    Fu Zheng-xin, Yu Bin, and Fang Li-guo. The access-based multi-secret visual cryptography with compression algorithm[J]. Journal of Electronics Information Technology, 2013, 35(5): 1055-1062.
    Yu B and Shen G. Multi-secret visual cryptography with deterministic contrast[J]. Multimedia Tools and Applications, 2014, 72[U3](2): 1867-1886.
    Shyu S J and Jiang H W. General constructions for threshold multiple-secret visual cryptography schemes[J]. IEEE Transactions on Information Forensics Security, 2013, 8(5): 733-743.
    Wang R Z. Region incrementing visual cryptography[J]. IEEE Signal Processing Letters, 2009, 16(8): 659-662.
    Shyu S J and Jiang H W. Efficient construction for region incrementing visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 769-777.
    Yang C N, Shih H W, Chu Y Y, et al.. New region incrementing visual cryptography scheme[C]. Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition in Conjunction with WORLDCOMP, LasVegas, USA, 2011: 323-329.
    Yang C N, Shih H W, Wu C C, et al.. k out of n region incrementing scheme in visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(5): 799-810.
    Yang C N, Lin Y C, and Wu C C. Region-in-Region incrementing visual cryptography scheme[C]. Proceedings of 12th International Workshop on Digital-Forensics and Watermarking, Auckland, New Zealand, 2013 (LNCS 7809) 449-463.
    Chen Y C, Tsai D S, and Horng G. A new authentication based cheating prevention scheme in Naor-Shamirs visual cryptography[J]. The Journal of Visual Communication and Image Representation, 2012, 23[U4](8): 1225-1233.
    Naor M, and Shamir A. Visual cryptography[C]. Proceedings of the Advances in Cryptology-Eurocrypt94, Berlin, 1995 (LNCS 950): 1-12.
    Ateniese G, Blundo C, Santis A D, et al.. Visual cryptography for general access structures[J]. Information and Computation, 1996, 129(2): 86-106.
    Tuyls P, Hollmann H D L, Lint J H V, et al.. XOR-based visual cryptography schemes[J]. Designs, Codes and Cryptography, 2005, 37(1): 169-186.
    Wang D S, Zhang L, Ma N, et al.. Two secret sharing schemes based on Boolean operations[J]. Pattern Recognition, 2007, 40(10): 2776-2785.
    Liu F, Wu C, and Lin X. Step construction of visual cryptography schemes[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 27-38.
    Wu X and Sun W. Random grid-based visual secret sharing with abilities of OR and XOR decryptions[J]. The Journal of Visual Communication and Image Representation, 2013, 24[U5](1): 48-62.
    Yang C and Wang D S. Property analysis of XOR based visual cryptography[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(2): 189-197.
  • 加载中
计量
  • 文章访问数:  1173
  • HTML全文浏览量:  167
  • PDF下载量:  340
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-10-31
  • 修回日期:  2015-02-04
  • 刊出日期:  2015-08-19

目录

    /

    返回文章
    返回