Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A gf (2 6 ) Finite Field Multi-Threshold Progressive Secret Image Sharing and Reconstruction Method

A secret image and finite field technology, which is applied in the field of GF finite field multi-threshold progressive secret image sharing and reconstruction, can solve the problems of being unable to resist micro-noise attacks, not being able to control image vision, etc.

Active Publication Date: 2019-10-08
SHAANXI NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the proposed method is to use 2 8-bit secret pixels and 2 4-bit backup image pixels totaling 24 bits as the initial 3-time 8-cell to construct a reversible cellular automaton for sharing. The problem caused by this is: it is not The real (3,N) threshold scheme requires at least 3 shared storage units with consecutive numbers to recover 2 secret pixels of the secret image and 2 backup pixels of the backup image; any pixel in the 2×4 block Attacked, that is, the 24-bit information of the 2 secret pixels and the 2 pixels of the backup image is unavailable, so the method cannot resist any small noise attack
[0006] Kong J,2007(Kong J,Zhang Y,Meng X,et al.A Scalable Secret ImageSharing Method Based on Discrete Wavelet Transform[C] / / Bio-Inspired Computational Intelligence and Applications,International Conference on LifeSystem Modeling and Simulation,LSMS 2007, Shanghai, China, September 14-17, 2007, Proceedings. 2007:736-745.) Combined with the work of Chen S K, 2005, perform block DWT transformation on the image to be shared, and perform integer quantization and bit-plane reorganization on the transformed coefficients According to the importance of the bit plane where the recombined DWT coefficients are located, different sharing thresholds are allocated to realize progressive sharing. However, compared with spatial domain pixels, the importance of frequency domain coefficients is usually closely related to the frequency of the coefficients, that is, the position. It simply depends on the frequency domain The degree of importance of the bit planes divided by the coefficients still has a very limited effect on the visual control of the image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A gf (2  <sup>6</sup> ) Finite Field Multi-Threshold Progressive Secret Image Sharing and Reconstruction Method
  • A gf (2  <sup>6</sup> ) Finite Field Multi-Threshold Progressive Secret Image Sharing and Reconstruction Method
  • A gf (2  <sup>6</sup> ) Finite Field Multi-Threshold Progressive Secret Image Sharing and Reconstruction Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0166] The following takes JAVA jdk1.8.0_65 as the case implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, but is not limited to this implementation case, where figure 1 It is the flow chart of sharing storage, figure 2 Is the reconstruction flow chart. The following is a specific example to illustrate the sharing process:

[0167] Step 1: The secret holder configures the default 320-bit code length allocation table M of the sharing system, selects a large prime number p=1000000007 as the system default modulus, sets the number of subkey distribution shares N=7, and the integer random quantization threshold rq=12, r=6 sharing threshold is k 0 =3≤k 1 =4≤k 2 =5≤k 3 =6≤k 4 =7≤k 5 =7 and k 0 +k 1 +…+k 5 =32, satisfy the constraints of formula (1) and formula (2), read the secret image S=(s i,j ) 8×8 , divide it into non-overlapping 8×8 small blocks B x,y , x=0, y=0, then B 0,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a GF (2 6 ) Finite field multi-threshold progressive secret image sharing and reconstruction method. This method first shares the key with random participation values, and publishes the MD5 values ​​corresponding to the shared keys and participation values ​​to prevent cheating; then the secret image is 8×8 frequency domain transformation, randomly quantizing the block frequency domain coefficients and specifying the binary representation of the code length allocation table, forming multiple divided frequency bands according to the zigzag scanning sequence and frequency band reorganization, and forming frequency band backup through scrambling; secondly Band, band backup and authentication information are provided in GF(2 6 ) finite domain performs multi-threshold sharing, and appends 2-bit authentication information to reconstruct and distribute the shadow image. During recovery, the MD5 value is first detected and combined with multiple thresholds to determine the reconstructable frequency band, and then double authentication is used to reconstruct the primary and secondary frequency band backup tables and the corresponding frequency bands, and the reconstructed frequency band is used to reconstruct the secret image. Compared with existing methods, the proposed method can make full use of distributed shadow images to progressively store secret images and improve the quality of visual reconstruction.

Description

technical field [0001] The invention belongs to the intersecting field of image information security and digital image signal processing, relates to an information sharing method, in particular to a GF(2 6 ) Finite-field multi-threshold progressive secret image sharing and reconstruction method. Background technique [0002] The existing image information sharing technology is mainly derived from the secret sharing in cryptography. Combined with the secret sharing scheme, the image information sharing scheme based on (K, N) threshold has been widely proposed. The early image information sharing scheme based on (K, N) threshold There is no authentication measure in the information sharing scheme, so the authenticity of the final reconstructed secret image cannot be verified. Aiming at the potential safety hazards in the use of image sharing schemes without authentication measures, some literatures also discuss image sharing with authentication. For example, Lin C C, 2004 (L...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T5/00G06F21/60H04L9/08H04L9/06
CPCH04L9/0656H04L9/085G06F21/602G06T5/00
Inventor 邵利平乐志芳
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products