检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:邵利平[1] 乐志芳 SHAO Li-ping;LE Zhi-fang(School of Computer Science,Shaanxi Normal University,Xi’an,Shaanxi 710119,China)
机构地区:[1]陕西师范大学计算机科学学院,陕西西安710119
出 处:《电子学报》2019年第2期390-403,共14页Acta Electronica Sinica
基 金:国家自然科学基金(No.61100239);陕西省自然科学基金(No.2011JQ8009;No.2016JM6065);中央高校基本科研业务费支持项目(No.GK201402036;No.GK201703057)
摘 要:传统影子图像连接的(t,s,k,n)分存易导致分发影子图像大小不等,基于伯克霍夫插值的(t,s,k,n)分存不能高效恢复;而双认证自修复图像分存对密图和备份图恢复能力十分有限.针对以上问题,采用随机参与值通过(k,s)和(k-t,n-s)分存来构造主密钥(t,s,k,n)分存并通过第3方公信方存储的MD5值以防止作弊.所提策略由主密钥对密图LL子带置乱来形成对显著比特多备份、对非显著比特少备份和经主密钥不同程度置乱的多版本备份图;引入限制性双重认证在保持认证精度的同时,将尽可能多的备份比特通过GF(2^8)域(k,n)分存嵌入来形成嵌密掩体.理论和实验表明,主密钥(t,s,k,n)分存可高效求解;随机参与值可避免参与者编号泄露,分发信息的篡改和认证比特的揣测;多版本备份可对备份图高置信度地恢复;而限制性双重认证在认证能力上不低于双认证自修复图像分存.Conventional shadow image connection based( t,s,k,n )sharing is prone to different size shadow images and Birkhoff interpolation based( t,s,k,n )sharing leads to low recovery efficiency,while in double authentications based self-recovery image sharing,the recovery capabilities of secret image and backup image are very limited.To address these problems,random participation values were used to construct master key based( t,s,k,n )sharing by means of( k,s )and( k-t,n-s )schemes and MD5 values stored in the third party were used to prevent cheating.The proposed scheme scrambled LL subband of secret image by master key and formed multi-version backup images with different scrambling degrees where more backups for more significant bits.Restricted double authentication strategy can embed as many backup bits as possible while maintaining authentication accuracy by( k,n )sharing over GF(2^8)field to form stego carriers.Theoretical and experimental results show,master key based(t,s,k,n )scheme can be solved efficiently.Random participation values avoid the disclosure of participant numbers and prevent tampering distributed information or guessing authentication bits.Multi-version backup strategy can restore backup images with high confidence while authentication capability of restricted double authentication strategy is no less than that of double authentications based self-recovery image sharing scheme.
关 键 词:图像分存 限制性双重认证 有限域 多版本备份 (t s k n)分存 (k n)分存 模p逆矩阵
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.137.210.133