Image visualization encryption algorithm based on Shamir threshold secret key sharing
An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the s...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-07-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018063 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530270431313920 |
---|---|
author | Yifu TAN Zichen LI |
author_facet | Yifu TAN Zichen LI |
author_sort | Yifu TAN |
collection | DOAJ |
description | An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission. |
format | Article |
id | doaj-art-1d63956a297e4a5ca2359025adb51ab5 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2018-07-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-1d63956a297e4a5ca2359025adb51ab52025-01-15T03:05:12ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-07-014697659553874Image visualization encryption algorithm based on Shamir threshold secret key sharingYifu TANZichen LIAn image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018063secret sharingSM2 signaturedigital watermarkingbinary image |
spellingShingle | Yifu TAN Zichen LI Image visualization encryption algorithm based on Shamir threshold secret key sharing 网络与信息安全学报 secret sharing SM2 signature digital watermarking binary image |
title | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_full | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_fullStr | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_full_unstemmed | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_short | Image visualization encryption algorithm based on Shamir threshold secret key sharing |
title_sort | image visualization encryption algorithm based on shamir threshold secret key sharing |
topic | secret sharing SM2 signature digital watermarking binary image |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018063 |
work_keys_str_mv | AT yifutan imagevisualizationencryptionalgorithmbasedonshamirthresholdsecretkeysharing AT zichenli imagevisualizationencryptionalgorithmbasedonshamirthresholdsecretkeysharing |