Image visualization encryption algorithm based on Shamir threshold secret key sharing

An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the s...

Full description

Saved in:
Bibliographic Details
Main Authors: Yifu TAN, Zichen LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-07-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018063
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530270431313920
author Yifu TAN
Zichen LI
author_facet Yifu TAN
Zichen LI
author_sort Yifu TAN
collection DOAJ
description An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.
format Article
id doaj-art-1d63956a297e4a5ca2359025adb51ab5
institution Kabale University
issn 2096-109X
language English
publishDate 2018-07-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-1d63956a297e4a5ca2359025adb51ab52025-01-15T03:05:12ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-07-014697659553874Image visualization encryption algorithm based on Shamir threshold secret key sharingYifu TANZichen LIAn image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018063secret sharingSM2 signaturedigital watermarkingbinary image
spellingShingle Yifu TAN
Zichen LI
Image visualization encryption algorithm based on Shamir threshold secret key sharing
网络与信息安全学报
secret sharing
SM2 signature
digital watermarking
binary image
title Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_full Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_fullStr Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_full_unstemmed Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_short Image visualization encryption algorithm based on Shamir threshold secret key sharing
title_sort image visualization encryption algorithm based on shamir threshold secret key sharing
topic secret sharing
SM2 signature
digital watermarking
binary image
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018063
work_keys_str_mv AT yifutan imagevisualizationencryptionalgorithmbasedonshamirthresholdsecretkeysharing
AT zichenli imagevisualizationencryptionalgorithmbasedonshamirthresholdsecretkeysharing