Novel high-security image secret sharing method

A secret sharing, high security technology, applied in the new high security image secret sharing field, can solve the problems of high computational time complexity, large shadow images, increased transmission burden, etc., to achieve low algorithm complexity and reduce time complexity. The effect of reducing the burden of transmission and storage

Active Publication Date: 2021-01-15
CHENGDU UNIV OF INFORMATION TECH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The calculation time complexity of the above two methods is too high, and the segmented shadow image is as large as the original image, which increases the burden of transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel high-security image secret sharing method
  • Novel high-security image secret sharing method
  • Novel high-security image secret sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] Please refer to figure 1 , the present invention provides a novel high-security image secret sharing method, comprising the following steps:

[0047] S1. According to the secret image to be shared, obtain multiple pixel value functions d(x i ,y i ) matrix D composed of s ;

[0048] In the embodiment of the present invention, step S1 is specifically to digitally process the secret image to be shared, decompose it into i pixels, and set the pixel value function d(x i ,y i ), where (x i ,y i ) is the coordinate value of the i-th pixel, 0≤xs :

[0049]

[0050] S2. The index stores t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a novel high-security image secret sharing method. The method comprises the steps of obtaining a matrix Ds composed of a plurality of pixel value functions according to a secret image to be shared; indexing and storing pixel coordinates and corresponding pixel values of the secret image, and obtaining a scrambled pixel matrix S1 according to the matrix Ds; determining a (k,n) threshold of secret sharing, and constructing a check matrix H on a finite field GF (2m); obtaining n shadow images and distributing the n shadow images to n trusted participants; and calculatingunknown n-k shadow image data according to the known k shadow images so as to recover the secret image. In order to solve the problems in the prior art that the algorithm time complexity is too high and the sub-secret images are too large in capacity to increase the storage and transmission burden, the image is split and reconstructed by combining a generation matrix and a check matrix of the MDScode, the image recovery accuracy is ensured, and meanwhile, the method has the advantages of reducing the algorithm time complexity, improving the image recovery efficiency, and shortening the secretimage splitting and reconstruction time.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a novel high-security image secret sharing method. Background technique [0002] With the increasing development of the Internet and the popularity of mobile phones, computers, cameras and other equipment, it is becoming more and more common for people to use images to record life, important information and personal privacy, but the security issues of image storage and transmission that follow people's attention. Therefore, in the late 1970s, two scholars, Shamir and Blakley, proposed the image secret sharing technology, which is an important branch of modern cryptography. With the development of technology, it has become a solution to contemporary information security and key management and One of the effective means of secure storage and access control of image data. This technology is widely used in fields such as medicine, military affairs and scientific research....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/44H04L9/08
CPCH04N1/44H04L9/085
Inventor 唐聃何瑞蔡红亮高燕黄晓明刘敦龙
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products