GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods

A secret image, finite field technology, applied in the field of GF finite field multi-threshold asymptotic secret image sharing and reconstruction, which can solve the problems of limited, not, and unable to resist micro-noise attack of image visual control.

Active Publication Date: 2017-05-17
SHAANXI NORMAL UNIV
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the proposed method is to use 2 8-bit secret pixels and 2 4-bit backup image pixels totaling 24 bits as the initial 3-time 8-cell to construct a reversible cellular automaton for sharing. The problem caused by this is: it is not The real (3,N) threshold scheme requires at least 3 shared storage units with consecutive numbers to recover 2 secret pixels of the secret image and 2 backup pixels of the backup image; any pixel in the 2×4 block Attacked, that is, the 24-bit information of the 2 secret pixels and the 2 pixels of the backup image is unavailable, so the method cannot resist any small noise attack
[0006] Kong J,2007(Kong J,Zhang Y,Meng X,et al.A Scalable Secret ImageSharing Method Based on Discrete Wavelet Transform[C]//Bio-Inspired Computational Intelligence and Applications,International Conference on LifeSyste

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GF(2&lt;6&gt;) finite-field multi-threshold progressive secrete image sharing and reconstruction methods
  • GF(2&lt;6&gt;) finite-field multi-threshold progressive secrete image sharing and reconstruction methods
  • GF(2&lt;6&gt;) finite-field multi-threshold progressive secrete image sharing and reconstruction methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0166] The following takes JAVA jdk1.8.0_65 as the case implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, but is not limited to this implementation case, where figure 1 It is the flow chart of sharing storage, figure 2 Is the reconstruction flow chart. The following is a specific example to illustrate the sharing process:

[0167] Step 1: The secret holder configures the default 320-bit code length allocation table M of the sharing system, selects a large prime number p=1000000007 as the system default modulus, sets the number of subkey distribution shares N=7, and the integer random quantization threshold rq=12, r=6 sharing threshold is k 0 =3≤k 1 =4≤k 2 =5≤k 3 =6≤k 4 =7≤k 5 =7 and k 0 +k 1 +…+k 5 =32, satisfy the constraints of formula (1) and formula (2), read the secret image S=(s i,j ) 8×8 , divide it into non-overlapping 8×8 small blocks B x,y , x=0, y=0, then B 0,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides GF(2<6>) finite-field multi-threshold progressive secrete image sharing and reconstruction methods. A secret key is shared by combining a random participation value, and an MD5 value corresponding to the shared secrete key and participation value is published to prevent cheating; 8*8 frequency domain transformation is carried out on a secret image, sub-block frequency domain coefficients are quantified randomly, a specific code length distribution list is represented in a binary manner, multiple division frequency bands are formed according to a similar Z-shaped scanning sequence and frequency band recombination, and a frequency band backup is formed by scrambling; and frequency band, frequency band backup and authentication information is shared in multiple thresholds in the GF(2<6>) finite-field, and 2-bit authentication information is added to reconstruct a distribution shadow image. During recovery, the MD5 value is detected, a reconstructable frequency band is determined by combining the multiple thresholds, primary and secondary frequency band backup tables are reconstructed via dual authentication, a corresponding frequency band is reconstructed, and the reconstructed frequency band is used to reconstruct a secret image. Compared with existing methods, the distribution shadow image can be used fully to share the secret image progressively, and the visual reconstruction quality is improved.

Description

technical field [0001] The invention belongs to the intersecting field of image information security and digital image signal processing, relates to an information sharing method, in particular to a GF(2 6 ) Finite-field multi-threshold progressive secret image sharing and reconstruction method. Background technique [0002] The existing image information sharing technology is mainly derived from the secret sharing in cryptography. Combined with the secret sharing scheme, the image information sharing scheme based on (K, N) threshold has been widely proposed. The early image information sharing scheme based on (K, N) threshold There is no authentication measure in the information sharing scheme, so the authenticity of the final reconstructed secret image cannot be verified. Aiming at the potential safety hazards in the use of image sharing schemes without authentication measures, some literatures also discuss image sharing with authentication. For example, Lin C C, 2004 (L...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T5/00G06F21/60H04L9/08H04L9/06
Inventor 邵利平乐志芳
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products