Image visualization encryption algorithm based on Shamir threshold secret key sharing

An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the s...

Full description

Bibliographic Details
Main Author: Yifu TAN,Zichen LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-07-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018063
_version_ 1817986344765358080
author Yifu TAN,Zichen LI
author_facet Yifu TAN,Zichen LI
author_sort Yifu TAN,Zichen LI
collection DOAJ
description An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.
first_indexed 2024-04-14T00:08:47Z
format Article
id doaj.art-752abde1f08645c98e083a19f424204c
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-14T00:08:47Z
publishDate 2018-07-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-752abde1f08645c98e083a19f424204c2022-12-22T02:23:26ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-07-0147697610.11959/j.issn.2096-109x.2018063Image visualization encryption algorithm based on Shamir threshold secret key sharingYifu TAN,Zichen LI0School of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,ChinaAn image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018063secret sharingsm2 signaturedigital watermarkingbinary image
spellingShingle Yifu TAN,Zichen LI
Image visualization encryption algorithm based on Shamir threshold secret key sharing
网络与信息安全学报
secret sharing
sm2 signature
digital watermarking
binary image
title Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_full Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_fullStr Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_full_unstemmed Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_short Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_sort image visualization encryption algorithm based on shamir threshold secret key sharing
topic secret sharing
sm2 signature
digital watermarking
binary image
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018063
work_keys_str_mv AT yifutanzichenli imagevisualizationencryptionalgorithmbasedonshamirthresholdsecretkeysharing