计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 123-128.doi: 10.11896/j.issn.1002-137X.2019.04.020
袁茜茜, 蔡占川
YUAN Xi-xi, CAI Zhan-chuan
摘要: 网络的不安全性导致图像信息在传输过程中容易丢失、损坏,或被不法分子窃取并用于非法传输,因此,研究数字图像的加密技术可以有效加强图像信息的安全性。数字图像分存算法是一种重要的图像信息加密技术,但是以往的图像分存技术没有考虑像素灰度分布特征,对图像进行逐像素加密,既降低了安全性,也产生了不必要的时空开销。为此,文中采用了基于数字图像像素灰度特征的非均匀三角剖分算法,结合门限方案,提出了一种新的数字图像分存算法。首先,使用非均匀三角网格剖分算法,得到随图像灰度值变化的剖分网格;其次,使用门限方案对剖分网格中每一个子三角形的顶点像素进行加密和共享;最后,使用拉格朗日插值多项式和剖分网格编码信息重构出原始图像。实验结果表明,该方法降低了像素的冗余加密,提高了安全性且图像重构效果较好,是一种有效的图像分存算法。
中图分类号:
[1]OUYANG X B,SHAO L P.A (K,N) Significant Nonexpansive Image Sharing Scheme Based on GF (23)[J].Computer Science,2015,42(12):251-256.(in Chinese) 欧阳显斌,邵利平.一种基于 GF (23) 的(K,N)有意义无扩张图像分存方案[J].计算机科学,2015,42(12):251-256. [2]HU C Q,DENG S J,QIN M F,et al.Digital image encryption algorithm based on Logistic and standard mapping[J].Computer Science,2010,37(12):57-59.(in Chinese) 胡春强,邓绍江,秦明甫,等.基于 Logistic 与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59. [3]SUN W,ZHOU J,ZHU S,et al.Robust Privacy-Preserving Ima- ge Sharing over Online Social Networks (OSNs)[J].ACM Transactions on Multimedia Computing,Communications,and Applications (TOMM),2018,14(1):14. [4]ROZANTSEV A,SALZMANN M,FUA P.Beyond sharing weights for deep domain adaptation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2019,41(4):801-814. [5]SASAKI M,WATANABE Y.Visual Secret Sharing Schemes Encrypting Multiple Images[J].IEEE Transactions on Information Forensics and Security,2018,13(2):356-365. [6]HU C Q.Research and Implementation of Image Secret Sharing Algorithm[D].Chongqing:Chongqing University,2009.(in Chinese) 胡春强.图像分存算法的研究与实现[D].重庆:重庆大学,2009. [7]YI F,WANG D S,DAI Y Q.Multi-secure color image visual sharing scheme for general access structure[J].Progress inNa-tural Science,2006,16(1):95-100.(in Chinese) 易枫,王道顺,戴一奇.一般存取结构的多密图彩色可视分存方案[J].自然科学进展,2006,16(1):95-100. [8]YI F,WANG D S,LUO P,et al.Two new color image (n,n) sharing schemes[J].Journal of Communications,2007,28(5):30-35.(in Chinese) 易枫,王道顺,罗平,等.两种新的彩色图像 (n,n) 分存方案[J].通信学报,2007,28(5):30-35. [9]DENG S J,HU C Q,WANG F X,et al.Digital Image Sharing Algorithm Based on Quadratic Remainder Theorem[J].Computer Engineering,2009,35(15):124-125.(in Chinese) 邓绍江,胡春强,王方晓,等.基于二次剩余定理的数字图像分存算法[J].计算机工程,2009,35(15):124-125. [10]SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. [11]BLAKLEY G R,KABATIANSKII G A.Linear algebra ap- proach to secret sharing schemes[M]∥Error Control,Crypto-logy,and Speech Compression.Springer,Berlin,Heidelberg,1994:33-40. [12]LIU S,WANG D S.(k,n) Visual Extension of True Color Extension[J].Journal of Wuhan University(Natural Science Edition),2008,54(5):603-606.(in Chinese) 刘硕,王道顺.(k,n) 真彩色扩展可视分存技术[J].武汉大学学报 (理学版),2008,54(5):603-606. [13]NAOR M,SHAMIR A.Visual cryptography[C]∥Workshop on the Theory and Application of of Cryptographic Techniques.Springer,Berlin,Heidelberg,1994:1-12. [14]WANG D S,ZHANG L,MA N,et al.Two secret sharing schemes based on Boolean operations[J].Pattern Recognition,2007,40(10):2776-2785. [15]LEE K H,CHIU P L.Sharing visual secrets in single image random dot stereograms[J].IEEE Transactions on image proces-sing,2014,23(10):4336-4347. [16]DANG W,HE M,WANG D,et al.K out of K Extended Visual Cryptography Scheme Based on “XOR”[J].International Journal of Computer and Communication Engineering,2015,4(6):439. [17]KATZ J,MENEZES A J,VANOORSCHOT P C,et al.Hand- book of applied cryptography[M].CRC Press,1996:64-69. [18]DHAMIJA R,PERRIG A.Deja Vu-A User Study:Using Images for Authentication[C]∥USENIX Security Symposium.2000:4. [19]THIEN C C,LIN J C.Secret image sharing.Computers & Graphics,2002,26(5):765-770. [20]SINGH P,RAMAN B.Reversible data hiding based on Shamir’s secret sharing for color images over cloud[J].Information Sciences,2018,422:77-97. [21]YAN X,LIU X,YANG C N.An enhanced threshold visual secret sharing based on random grids[J].Journal of Real-time Ima-ge Processing,2018,14(1):61-73. [22]HUA W,LIAO X.A secret image sharing scheme based on piecewise linear chaotic map and Chinese remainder theorem[J].Multimedia Tools and Applications,2017,76(5):7087-7103. [23]BAO L,YI S,ZHOU Y.Combination of Sharing Matrix and Ima- ge Encryption for Lossless (k,n)-Secret Image Sharing[J].IEEE Transactions on Image Processing,2017,26(12):5618-5631. [24]MATSUMOTO R.Quantum stabilizer codes can realize access structures impossible by classical secret sharing[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2017,100(12):2738-2739. [25]齐东旭,宋瑞霞,李坚.非连续正交函数[M].北京:科学出版社,2011:280-281. [26]YU J D,SONG R X,QI D X.A scheme for steganography based on triangular partition of digital images [J].Journal of Compu-ter Research and Development,2009,46(9):1432-1437.(in Chinese) 余建德,宋瑞霞,齐东旭.基于数字图像三角形剖分的信息伪装算法[J].计算机研究与发展,2009,46(9):1432-1437. [27]U K T,JI N,QI D X,et al.A novel image denoising algorithm based on non-uniform triangular partition and interpolation[C]∥2010 International Conference on Future Power and Energy Engineering (ICFPEE).IEEE,2010:67-70. [28]CAI Z,LAN T.Method for coding data:U.S.Patent 9,755,661[P].2017-09-05. [29]SHARMA V K,SRIVASTAVA D K,MATHUR P.Efficient image steganography using graph signal processing[J].IET Image Processing,2018,12(6):1065-1071. [30]MUHAMMAD K,HAMZA R,AHMAD J,et al.Secure Surveillance Framework for IoT systems using Probabilistic Image Encryption[J].IEEE Transactions on Industrial Informatics,2018,14(8):3679-3689. [31]TOMPA M,WOLL H.How to share a secret with cheaters[M]∥ Advances in Cryptology-CRYPTO’ 86.Springer Berlin Heidelberg,1987:261-265. |
[1] | 陈士杰, 张森林, 刘妹琴, 郑荣濠. 基于改进Delaunay三角剖分的水下地形三维重建算法 Underwater Terrain Three-dimensional Reconstruction Algorithm Based on Improved Delaunay Triangulation 计算机科学, 2020, 47(11): 137-141. https://doi.org/10.11896/jsjkx.191100051 |
[2] | 孟文权, 武利生. 基于深度特征的足底曲面三角剖分重构 Triangulation Reconstruction of Plantar Surface Based on Depth Feature 计算机科学, 2019, 46(6A): 205-207. |
[3] | 欧阳显斌,邵利平. 一种基于GF(23)的(K,N)有意义无扩张图像分存方案 Meaningful (K,N) Free Expansion Image Sharing Scheme Based on GF(23) 计算机科学, 2015, 42(12): 251-256. |
[4] | 欧锻灏,吴小天,孙 伟,刘 娟. 基于恢复函数和误差扩散的灰度图像分存方案 Secret Gray-level Image Sharing Scheme Based on Recovery Function and Error Diffusion 计算机科学, 2013, 40(2): 112-116. |
[5] | 张玉臣,王亚弟,韩继红,范钰丹. 自组网环境下基于组合公钥的分布式密钥管理 Distributed Key Management for Ad-hoc Network Based on CPK 计算机科学, 2011, 38(10): 75-77. |
[6] | 步山岳,王汝传. 一种可验证和高效的多秘密共享门限方案 Verifiable and Efficient Multi-secret Sharing Threshold Scheme 计算机科学, 2011, 38(1): 100-103. |
[7] | 鲍洋,卢正鼎,黄保华,李瑞轩,胡和平,路松峰. 适合P2P环境的动态多秘密共享方案 Dynamic Multi-secret Sharing Scheme for P2P Environment 计算机科学, 2010, 37(9): 40-43. |
[8] | 柳毅,郝彦军,庞辽军. 基于ElGamal密码体制的可验证秘密共享方案 Verifiable Secret Sharing Scheme Based on ElGamal Cryptosystem 计算机科学, 2010, 37(8): 80-82. |
[9] | 陈养奎,于佳,郝蓉,刘红艳,许曰滨. 具有前摄能力的可公开验证秘密共享 Publicly Verifiable Secret Sharing Scheme with Proactive Ability 计算机科学, 2010, 37(6): 125-127. |
[10] | 闫德勤 赵洪波 靳虹. 对基于单向函数的He-Dawson多步骤秘密共享方案的改进 计算机科学, 2009, 36(6): 75-77. |
[11] | . 约束三角剖分研究 计算机科学, 2008, 35(8): 6-9. |
[12] | . 一种基于最近邻决策的点集分类方法的确定与实现 计算机科学, 2007, 34(12): 182-183. |
[13] | . 基于埃尔米特插值的秘密分割门限方案的构造 计算机科学, 2006, 33(8): 126-127. |
[14] | . 一种三维表面重构中的轮廓集拼合新方法 计算机科学, 2006, 33(6): 221-224. |
[15] | 吴开贵 刘东 冯永. 基于椭圆曲线的门限多重秘密共享方案 计算机科学, 2006, 33(3): 97-98. |
|