高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于环形共享份的多秘密视觉密码

付正欣 郁滨 房礼国

付正欣, 郁滨, 房礼国. 基于环形共享份的多秘密视觉密码[J]. 电子与信息学报, 2010, 32(4): 880-883. doi: 10.3724/SP.J.1146.2009.00410
引用本文: 付正欣, 郁滨, 房礼国. 基于环形共享份的多秘密视觉密码[J]. 电子与信息学报, 2010, 32(4): 880-883. doi: 10.3724/SP.J.1146.2009.00410
Fu Zheng-xin, Yu Bin, Fang Li-guo. The Multi-secret Visual Cryptography Based on Ring Shares[J]. Journal of Electronics & Information Technology, 2010, 32(4): 880-883. doi: 10.3724/SP.J.1146.2009.00410
Citation: Fu Zheng-xin, Yu Bin, Fang Li-guo. The Multi-secret Visual Cryptography Based on Ring Shares[J]. Journal of Electronics & Information Technology, 2010, 32(4): 880-883. doi: 10.3724/SP.J.1146.2009.00410

基于环形共享份的多秘密视觉密码

doi: 10.3724/SP.J.1146.2009.00410

The Multi-secret Visual Cryptography Based on Ring Shares

  • 摘要: 通过对秘密图像和环形共享份进行纵向区域分割,该文提出了相关矩阵组,并在此基础上设计了一种新的多秘密视觉密码方案。与现有的多秘密方案相比,该方案不仅实现了加密任意数量的秘密图像,而且在像素扩展度和相对差等方面有明显改善。
  • Blakley G R. Safeguarding cryptographic keys[C].Proceedings of the National Computer Conference, NJ, USA,1979, 48: 242-268.[2]Shamir A. How to share a secret[J]. Communications of theACM, 1979, 22(11): 612-613.[3]Naor M and Shamir A. Visual cryptography[C][J].Advances inCryptology-Eurocrypt94, Berlin.1995, LNCS 950:1-12[4]Ateniese G, Blundo C, De Santis A, and Stinson D R. Visualcryptography for general access structures[J].Informationand Computation.1996, 129(2):86-106[5]Tuyls P, Hollmann H D L, Lint J H V, and Tolhuizen L.XOR-based visual cryptography schemes[J].Designs, Codesand Cryptography.2005, 37(1):169-186[6]Fang Li-guo and Yu Bin. Research on pixel expansion of (2, n)visual threshold scheme[C]. 1st International Symposium onPervasive Computing and Applications Proceedings(SPCA06), Ningbo, 2006: 856-860.[7]Lin Sen-jen, Lin Ja-chen, and Fang Wen-pinn. VisualCryptography (VC) with non-expanded shadow imagesHilbert-curve approach[C]. ISI2008, Taipei, 2008: 271-272.[8]Yang Ching-nung, Wang Chung-chun, and Chen Tse-shih.Visual cryptography schemes with reversing[J]. TheComputer Journal, 2008, bxm118: 1-13.[9]Lin Chang-chou and Tai Wen-hsiang. Visual cryptographyfor gray-level images by dithering techniques[J]. PatternRecognition Letters, 2003, 24(1-3): 349-358.[10]Cimato S, De Prisco R, and De Santis A. Optimal coloredthreshold visual cryptography schemes[J].Designs, Codesand Cryptography.2005, 35(3):311-335[11]Yang Ching-nung and Chen Tse-shih. Colored visualcryptography scheme based on additive color mixing[J].Pattern Recognition.2008, 41(10):3114-3129[12]Ng F Y and Wong D S. On the security of a visualcryptography scheme for color images[J].Pattern Recognition.2009, 42(5):929-940[13]Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharingthreshold visual cryptography scheme[C]. 2007 InternationalConference on Computational Intelligence and Security(CIS2007), Harbin, 2007: 815-818.[14]Chen L H and Wu C C. A study on visual cryptography[D].[Master Thesis], National Chiao Tung University, Taiwan,1998.[15]Hsu H C.[J].Chen T S, and Lin Y H. The ring shadow imagetechnology of visual cryptography by applying diverserotating angles to hide the secret sharing[C]. Proceedings ofthe 2004 IEEE International Conference on Networking,Sensing Control, Taipei, Taiwan.2004,:-[16]Feng Jen-bang, Wub Hsien-chu, and Tsaic Chwei-shyong, etal.. Visual secret sharing for multiple secrets[J]. PatternRecognition, 2008, 41(12): 3572-3581.
  • 加载中
计量
  • 文章访问数:  3387
  • HTML全文浏览量:  116
  • PDF下载量:  840
  • 被引次数: 0
出版历程
  • 收稿日期:  2009-03-26
  • 修回日期:  2009-09-21
  • 刊出日期:  2010-04-19

目录

    /

    返回文章
    返回