非等量备份和双认证自修复有限域图像分存  被引量:5

Gloise Field Self-Recovery Image Sharing Scheme with Non-Equivalent Backup and Double Authentications

在线阅读下载全文

作  者:欧阳显斌 邵利平[1,2] 乐志芳 

机构地区:[1]现代教学技术教育部重点实验室(陕西师范大学),陕西西安710062 [2]陕西师范大学计算机科学学院,陕西西安710119

出  处:《软件学报》2017年第12期3306-3346,共41页Journal of Software

基  金:国家自然科学基金(61100239);陕西省科技新星计划(2011kjxx17);陕西省自然科学基金(2011JQ8009;2016JM6065);中央高校基本科研业务费支持项目(GK201402036;GK201703057)~~

摘  要:传统有意义图像分存方案存在认证能力偏低、攻击后不具备修复能力或修复能力整体较弱以及嵌入掩体视觉质量不高等问题.针对以上问题,提出一种结合非等量备份和双认证自修复有限域图像分存方案,包含分存和恢复阶段.在分存阶段,首先对密图做1级离散小波变换,取LL子带按密钥置乱,并对置乱后LL子带每个系数比特按比特位重要程度分组进行非等量备份来构造与密图等大备份图;然后对密图和备份图每个像素及其对应7K-13位认证信息在GF(2~7)有限域进行(K,N)分存,将产生的7位分存信息和使用密钥产生的1位认证信息使用优化LSB法嵌入到N个掩体2×2分块中;最后对密钥进行(K,N)分存,将子密钥对应的MD5值公开到第3方公信方并将子密钥和嵌入掩体分发给参与者.在恢复阶段,首先对参与者提供的子密钥真实性进行检验,利用检验通过子密钥对密钥进行恢复;其次对分发掩体2×2分块嵌入的分存信息和1位认证信息使用密钥进行第1重认证,利用第1重认证通过分存信息重建GF(2~7)有限域分存多项式,提取出密图和备份图每个像素及其对应的7K-13位认证信息并对其进行第2重检验和构造初步密图、备份图以及认证图;再次由备份图和认证图重构密图LL子带,然后对其做逆置乱和逆离散小波变换得到密图修复参考图;最后对认证图每一个认证不通过秘密像素,根据其周围像素认证情况选择多项式插值拟合或进行修复参考图像素替代修复.理论和实验结果表明,与现有方法相比,所提方法具备更好的认证能力,并能充分使用双认证和自然图像邻近像素相关性来提升其攻击后修复能力,且分发掩体具备较高视觉质量.In conventional meaningful image sharing schemes, there exist some shortages such as low authentication ability, weak to no repair or recovery ability after being attacked, and low visual quality in embedded carriers. To address these problems, this paper proposes a Gloise field self-recovery image sharing scheme with non-equivalent backup and double authentication. The proposed scheme includes both distributing and recovery stages. The distributing stage include three steps. First, the LL subband of the secret image is obtained by one layer DWT and then the LL subband coefficients is scrambled by a secret key to generate the non-equivalent backup image according to different bit important degree groups where both the backup image and the secret image are in same size. Second, each pixel in both the secret image and the backup image are shared with their 7K-13 authentication bits into 7 bits distributed information on GF(27), and then the distributed 7 bits information with its 1 bit authentication generated by the secret key is embedded into 2×2 blocks of N distributed carriers by the optimized LSB embedding method. Finally, the secret key used to scramble LL subband and generate 1 bit authentication is also shared into N sub-keys by (K,N)-threshold scheme, and then the sub-keys' MD5 values are published into the third reliable party and the N sub-keys and embedded carriers are distributed to N participants. The recovery stage has four steps. First, the facticity of participants' sub-keys is verified, and then the sub-keys are used to recovery the secret key. Second, the embedded distributed information with its 1 bit authentication is checked by the first authentication, the checked distributed information is used to reconstruct GF(2^7) interpolation polynomial, and then the pixels in the secret image and the backup image with their 7K-13 authentication bits are recovered to construct the preliminary secret image, backup image and authentication image. Third, the backup image and authentication

关 键 词:图像分存 有意义图像 (K N)门限方案 有限域 备份图 非等量备份 比特位分组 双认证 自修复 多项式插值拟合 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象