计算机科学 ›› 2015, Vol. 42 ›› Issue (12): 251-256.

• 信息安全 • 上一篇    下一篇

一种基于GF(23)的(K,N)有意义无扩张图像分存方案

欧阳显斌,邵利平   

  1. 陕西师范大学计算机科学学院 西安710119,陕西师范大学计算机科学学院 西安710119
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金资助

Meaningful (K,N) Free Expansion Image Sharing Scheme Based on GF(23)

OUYANG Xian-bin and SHAO Li-ping   

  • Online:2018-11-14 Published:2018-11-14

摘要: 传统有意义图像分存存在像素扩张,通常只对分存信息以较短的认证信息进行甄别,从而导致重构的秘密像素真实性无法准确鉴别。针对此问题,提出一种基于GF(23)的(K,N)有意义无扩张图像分存方案。在该方案中,首先生成加密映射表并利用秘密像素的位置信息对秘密像素进行加密;然后将秘密像素的认证信息和加密像素在GF(23)有限域下进行(K,N)分存,嵌入到掩体图像对应的像素中;最后将映射表的生成密钥进行(K,N)分存,计算每个子密钥的MD5值并公布到第3方公信方以防止掩体图像持有者作弊。实验结果表明,所提方案能准确地识别出秘密图像攻击区域,不存在任何像素扩张,掩体图像与秘密图像等大且嵌入分存信息的掩体图像具有较好的视觉质量。

关键词: 图像分存,有意义图像分存,(K,N)门限方案,GF有限域,无扩张

Abstract: There is pixel expansion in conventional meaningful image sharing schemes which usually use short authentication information to verify the correctness of sharing information and bring defect that the facticity of the reconstructed secret image pixels cannot be accurately identified.To address these problems,a meaningful (K,N) free expansion ima-ge sharing scheme based on GF(23) was proposed.In the proposed scheme,firstly a key is used to generate an encryption mapping table and then this table and secret image pi-xel location information are used to encrypt secret image pixels.Secondly (K,N)-threshold scheme based on GF(23) is used to share the ciphered pixels and pixels authentication information and then they are embedded into N cover images.Finally the key which is used to generate encryption mapping table is also shared into N sub-keys by (K,N)-threshold scheme and the sub-keys’ MD5 values are published to the third reliable party to prevent cheating from distributed cover image holders.The experimental results show the proposed scheme can accurately detect attacked regions in reconstructed secret image.By comparing with conventional methods,the proposed scheme does not have any pixel expansion and distributed cover images have better visual quality.

Key words: Image sharing,Meaningful image sharing,(K,N)-threshold scheme,Gloise field,Free expansion

[1] Shamir A.How to share a secret[J].Communications of the Association for Computing Machinery,1979,22(11):612-613
[2] Blakley G R.Safeguarding cryptographic keys[C]∥Proceedings of 1979 National Computer Conference.New York,USA:AFIPS,1979:313-317
[3] Thien C C,Lin J C.Secret image sharing[J].Computers &Graphics,2002,26(5):765-770
[4] Chen C C,Fu W Y.A Geometry-based secret image sharing approach [J].Journal of Information Science and Engineering,2008,24(5):1567-1577
[5] Tso H K.Sharing secret images using Blakley’s concept[J].Optical Engineering.2008,47(7):0770011-0770013
[6] 吴小天,孙伟.基于误差扩散的图像分存方案[J].计算机应用,2011,31(1):74-77 Wu Xiao-tian,Sun Wei.Image sharing scheme based on error diffusion[J].Journal of Computer Applications,2011,1(1):74-77
[7] 欧锻灏,吴小天,孙伟,等.基于恢复函数和误差扩散的灰度图像分存方案[J].计算机科学,2013,40(2):112-116 Ou Duan-hao,Wu Xiao-tian,Sun Wei,et al.Secret gray-level image sharing scheme based on recovery function and error diffusion[J].Computer Science,2013,40(2):112-116
[8] Lin C C,Tsai W H.Secret image sharing with steganography and authentication[J].The Journal of Systems and Software,2004,73(3):405-414
[9] Yang C N,Chen T S,Yu K H,et al.Improvements of image sharing with steganography and authentication[J].The Journal of Systems and Software,2007,80(7):1070-1076
[10] Chang C C,Hsieh Y P,Lin C H.Sharing secrets in stego images with authentication[J].Pattern Recognition,2008,41(10):3130-3137
[11] Chang C C,Chen Y H,Wang H C.Meaningful secret sharing technique with authentication and remedy abilities[J].Information Sciences,2011,1(14):3073-3084
[12] Chen Y H,Chang C C.Image tamper detection and recovery based on dual watermarks sharing strategy[J].Journal of Digi-tal Information Management,2012,10(1):39-49
[13] Yang C N,Ouyang J F,Harn L.Steganography and authentication in image sharing without parity bits[J].Optics Communications,2012,285(7):1725-1735

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!