Image visualization encryption algorithm based on Shamir threshold secret key sharing
An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the s...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-07-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018063 |
_version_ | 1817986344765358080 |
---|---|
author | Yifu TAN,Zichen LI |
author_facet | Yifu TAN,Zichen LI |
author_sort | Yifu TAN,Zichen LI |
collection | DOAJ |
description | An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission. |
first_indexed | 2024-04-14T00:08:47Z |
format | Article |
id | doaj.art-752abde1f08645c98e083a19f424204c |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-04-14T00:08:47Z |
publishDate | 2018-07-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-752abde1f08645c98e083a19f424204c2022-12-22T02:23:26ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-07-0147697610.11959/j.issn.2096-109x.2018063Image visualization encryption algorithm based on Shamir threshold secret key sharingYifu TAN,Zichen LI0School of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,ChinaAn image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018063secret sharingsm2 signaturedigital watermarkingbinary image |
spellingShingle | Yifu TAN,Zichen LI Image visualization encryption algorithm based on Shamir threshold secret key sharing 网络与信息安全学报 secret sharing sm2 signature digital watermarking binary image |
title | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_full | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_fullStr | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_full_unstemmed | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_short | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_sort | image visualization encryption algorithm based on shamir threshold secret key sharing |
topic | secret sharing sm2 signature digital watermarking binary image |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018063 |
work_keys_str_mv | AT yifutanzichenli imagevisualizationencryptionalgorithmbasedonshamirthresholdsecretkeysharing |