检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:邵利平[1] 乐志芳 SHAO Liping;LE Zhifang(School of Computer Science, Shaanxi Normal University, Xi'anShannxi 710119, China)
机构地区:[1]陕西师范大学计算机科学学院,陕西西安710119
出 处:《信息网络安全》2018年第3期54-62,共9页Netinfo Security
基 金:国家自然科学基金[61100239];陕西省自然科学基金[2011JQ8009;2016JM6065];中央高校基本科研业务费[GK201402036;GK201703057]
摘 要:图像分存是将密图拆分为影子图像,利用分发的部分或全部影子图像对密图进行完整重构,是目前图像信息安全的研究热点。但传统数字图像分存通常是由满足门限数量的影子图像对密图进行完整重构的,而在频域随着分发份额数量增加,实现对密图由模糊到清晰的整体渐进恢复的研究工作相对较少。基于此,文章提出一种基于DCT的多门限渐进秘密图像分存方案,在该方案中,首先结合随机参与值将密钥分存,将分发子密钥和参与值对应的MD5值公布防止参与者作弊;然后对秘密图像进行8×8DCT变换,对分块DCT系数进行随机量化和指定码长分配表的2进制表示,按之字形扫描顺序和频带重组形成多个划分频带;最后在GF(2~8)有限域下对频带进行多门限分存并重构分发影子图像。实验结果表明,当参与者的数量大于最低门限,则随着参与者数量的增加,文中方法可充分利用影子图像对秘密图像进行由模糊到清晰的渐进恢复且具备较好的视觉恢复质量,且得不到秘密图像的任何信息。文中策略严格依赖于密钥,并且恢复的结果趋于稳定。Image sharing usually splits the secret image into a series ofshadow images and the secret image can be completely recovered by partial or all distributed shadow images. It is the research hotspot in image security. But traditional image sharing usually used to construct the secret imagecompletely and the research providingthe whole progressive recovery of secret image from fuzzy to clear is relatively small.Based on this, a multiple thresholds progressive secret image sharing scheme based on DCT was proposed.First the key is shared in combination with the random participation value,the MD5 values corresponding to the sub-keys and participating values are published to prevent participants from cheating,then the secret image is transformed by 8 x8 DCT where the DCT coefficients are randomly quantified and the binary representation of the assigned code length distribution table is presented to form multiple partition bands by zigzag scanning order and band reorganization.Finally, use multiple thresholds to sharing the band and reconstruct distribution shadow image in GF(2~8) Galois field.The experimental results show that when the number of participants is greater than the minimum threshold, withthe number ofparticipant'sincreases, the proposed method can make use of the shadow image to make the whole progressive recovery of secret image from fuzzy to clearand the more participantsand the better visual recovery quality. Otherwise, there will not be any information on the secret image, and the strategy is strictly dependent on the key and the recovery results tend to be stable.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49