浏览全部资源
扫码关注微信
1. 北京信息科技大学计算机学院,北京 100101
2. 国家信息中心信息与网络安全部,北京 100045
[ "马利民(1983- ),男,山东泰安人,博士,北京信息科技大学讲师,主要研究方向为网络安全协议、信息隐藏技术、大数据安全。" ]
[ "王佳慧(1983- ),女,山西大同人,博士,国家信息中心研究员,主要研究方向为云计算安全、数据安全、大数据分析及安全、云取证安全。" ]
网络出版日期:2019-07,
纸质出版日期:2019-07-25
移动端阅览
马利民, 王佳慧. 基于改进FEMD算法的可逆秘密图像共享方案[J]. 通信学报, 2019,40(7):48-56.
Limin MA, Jiahui WANG. Invertible secret image sharing scheme based on improved FEMD[J]. Journal on communications, 2019, 40(7): 48-56.
马利民, 王佳慧. 基于改进FEMD算法的可逆秘密图像共享方案[J]. 通信学报, 2019,40(7):48-56. DOI: 10.11959/j.issn.1000-436x.2019130.
Limin MA, Jiahui WANG. Invertible secret image sharing scheme based on improved FEMD[J]. Journal on communications, 2019, 40(7): 48-56. DOI: 10.11959/j.issn.1000-436x.2019130.
基于改进的FEMD算法提出了一种可逆秘密图像共享方案。首先改进秘密数据的嵌入过程,使原始像素对和嵌入后含密像素对成为一对一的映射;然后通过设置溢出标识位来记录溢出像素对的原始值并进行相应处理。实验数据和分析表明,所提算法可以在保证生成高质量的含密图像的同时,解决不能恢复原始载体图像的问题。
Based on the improved FEMD algorithm an invertible secret image sharing scheme was proposed.Firstly
the embedding process of secret data was improved to make the original pixel pair and the stego pixel-pair to become a one-to-one mapping.Then a unique status flag was set to be calculated to record and process the original status of the over flow pixel-pair.Experimental data and analysis show that the proposed algorithm can guarantee the generation of high quality cryptographic images and solve the problem that the original carrier image can not be restored.
梁建武 , 刘晓书 , 程资 . 基于图态和中国剩余定理的量子秘密共享方案 [J ] . 通信学报 , 2018 , 39 ( 10 ): 72 - 78 .
LIANG J W , LIU X S , CHEN Z . Quantum secret sharing with graph states based on Chinese remainder theorem [J ] . Journal on Communications , 2018 , 39 ( 10 ): 72 - 78 .
孙曦 , 张卫明 , 俞能海 . 基于空域图像变换参数扰动的隐写术 [J ] . 通信学报 , 2017 , 38 ( 10 ): 167 - 174 .
SUN X , ZHANG W M , YU N H . Steganography based on parameters’ disturbance of spatial image transform [J ] . Journal on Communications , 2017 , 38 ( 10 ): 167 - 174 .
SHAMIR A . How to share a secret [J ] . Communications of the ACM , 1979 , 22 ( 11 ): 612 - 613 .
THIEN C C , LIN J C . Secret image sharing [J ] . Computers and Graphics , 2002 , 26 ( 5 ): 765 - 770 .
WANG R Z , SU C H . Secret image sharing with smaller shadow images [J ] . Pattern Recognition Letters , 2006 , 27 ( 6 ): 551 - 555 .
LIN C C , TSAI W H . Secret image sharing with steganography and authentication [J ] . Journal of Systems and Software , 2004 , 73 ( 3 ): 405 - 414 .
AMIR M A , MARYAM A . A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms [J ] . Signal Processing:Image Communication , 2019 , 74 ( 5 ): 78 - 88 .
JAMAL Z A , MOHAMMADEBRAHIM S A , ALIMOHAMMAD L . An adaptive secret image sharing with a new bitwise steganographic property [J ] . Information Sciences , 2016 , 369 ( C ): 467 - 480 .
YANG C N , CHEN T S , YU K H , et al . Improvements of image sharing with steganography and authentication [J ] . Journal of Systems and Software , 2007 , 80 ( 7 ): 1070 - 1076 .
WU C C , KAO S J , HWANG M S . A high quality image sharing with steganography and adaptive authentication scheme [J ] . Journal of Systems and Software , 2011 , 84 ( 12 ): 2196 - 2207 .
ULUTAS M , ULUTAS G , NABIYEV V V . Secret image sharing with enhanced visual quality and authentication mechanism [J ] . Journal of Photographic Science , 2011 , 59 ( 3 ): 154 - 165 .
ESLAMI Z , AHMADABADI J Z . Secret image sharing with authentication-chaining and dynamic embedding [J ] . Journal of Systems and Software , 2011 , 84 ( 5 ): 803 - 809
CHANG C C , CHEN Y H , WANG H C . Meaningful secret sharing technique with authentication and remedy abilities [J ] . Information Sciences , 2011 , 181 ( 14 ): 3073 - 3084 .
LIN P Y , LEE J S , CHANG C C . Distortion-free secret image sharing mechanism using modulus operator [J ] . Pattern Recognition , 2009 , 42 ( 5 ): 886 - 895 .
LIN P , CHAN C . Invertible secret image sharing with steganography [J ] . Pattern Recognition Letter , 2011 , 31 ( 13 ): 1887 - 1893 .
LIN Y Y , WANG R Z . Improved Invertible Secret Image Sharing with Steganography [C ] // International Conference of Intelligent Information Hiding and Multimedia Signal Processing . 2011 : 93 - 96 .
FENG B , YUAN Q Q , GUO C , et al . Invertible proactive secret image sharing [J ] . Journal of Chinese Computer Systems , 2015 , 36 ( 3 ): 514 - 518 .
LIU Y , CHEN L , HU M , et al . A reversible data hiding method for H.264 with Shami’s (t,n)-threshold secret sharing [J ] . Neurocomputing , 2016 , 188 ( 2 ): 63 - 70 .
MENG Q Q , YANG X Y , ZHONG W D , et al . Implementation and optimization of S-box resisting DPA attacks based on secret sharing [J ] . Netinfo Security , 2018 , 18 ( 2 ): 71 - 77 .
CHENG Z , JIN L R , SHI J J . (k,n) Threshold quantum secret sharing scheme based on the generation of reed solomon code [J ] . Netinfo Security , 2016 , 16 ( 4 ): 44 - 49 .
KIEU T D , CHANG C C . A steganographic scheme by fully exploiting modification directions [J ] . Expert Systems with Applications , 2011 , 38 ( 8 ): 10648 - 10657 .
KUO W C , KAO M C . A steganographic scheme based on formula fully exploiting modification directions [J ] . IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences , 2013 , E96-A ( 11 ): 2235 - 2243 .
KUO C W , LI J J , WANG C C , et al . An improved data hiding scheme based on formula fully exploiting modification directions and pixel value differencing method [C ] // The 11th Asia Joint Conference on Information Security . 2016 : 136 - 140 .
0
浏览量
992
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构