Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Extension visual encryption and decryption method

An encryption method and secret image technology, applied in the field of extended visual decryption, can solve the problems of carrier image interference, meaningless image sharing, and no tampering authentication function, so as to reduce storage capacity requirements, transmission bandwidth requirements, and The effect of the probability of interception and analysis

Inactive Publication Date: 2015-04-29
SHANDONG UNIV OF SCI & TECH
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the existing visual encryption methods have the following defects: (1) the generated shared image is meaningless; (2) the generated shared image has pixel expansion relative to the masked image; (3) when decoding secret information Computer participation is required; (4) there is no tampering authentication function; (5) there is interference from the carrier image on the recovered secret information or watermark

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extension visual encryption and decryption method
  • Extension visual encryption and decryption method
  • Extension visual encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0055] In the embodiment of the present invention, the binary secret image and watermark image used are as figure 2 shown.

[0056] It should be noted that, in the embodiment of the present invention, any size conforms to Binary images of any size can be used as secret images, and any size conforms to Binary images of any size can be used as watermark images, where Indicates that x is rounded towards -∞.

[0057] The parameters used in the embodiment of the present invention are shown in Table 1.

[0058] The parameters used in the specific embodiment of table 1

[0059]

[0060] The overall block diagram of the extended visual encryption and decryption process is as follows figure 1 shown.

[0061] The extended visual encryption process includes three stages: (1) pixel division, (2) embedding of secret image and watermark, (3) res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an extension visual encryption and decryption method. In the extension visual encryption process, a cover image is chunked first, and pixels in each block are divided into secret information pixels, auxiliary black pixels and common pixels; then (2,2) lines of a visual cryptography fundamental matrix are filled at the position of secret information, share images are divided into four areas, and secret images and watermark images are sequentially embedded into the four areas; at last, limited error diffusion is used for incorporating the characteristics of the cover image. In the extension visual decryption process, the two share images are overlaid in a staggered mode, and watermarks are recovered; then the two images align to each other to recover secret images. The extension visual encryption and decryption method has the advantages that image sharing is meaningful, the dimension is not extended, decryption does not need a computer, a tampering authentication function is achieved, and the recovered secrete images and the watermarks can be free of interference of the cover images at the same time.

Description

technical field [0001] The invention relates to an extended visual encryption method and an extended visual decryption method. Background technique [0002] Visual encryption is a secret sharing method that is efficient in the decoding process and does not require any calculation. It divides a secret image into n parts for transmission. Only when at least k parts are obtained, the content of the secret image can be recovered by superimposing them. However, the shared images generated by general visual encryption methods appear as meaningless noise, which may attract the attention of potential attackers during transmission and arouse the attacker's interest in intercepting or cracking. In addition, the shared image may be intercepted by the attacker during the transmission process, and the attacker may carry out a replacement attack on the intercepted shared image. Image 1 constructs a forged shared image 2, superimposes shared image 1 and forged shared image 2, and recovers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 颜斌宋凌云杨红梅王亚菲郝建军白培瑞郭银景张仁彦王恒刘得源
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products