Compressed sensing based visually secure multi-secret image encryption-sharing scheme

被引:1
|
作者
Wu, Bin [1 ]
Xie, Dong [1 ]
Chen, Fulong [1 ]
Zhu, Huijun [2 ]
Wang, Xueli [1 ]
Zeng, Yangyang [1 ]
机构
[1] Anhui Normal Univ, Sch Comp & Informat, Wuhu 241002, Peoples R China
[2] Nanyang Inst Technol, Sch Digital Media, Nanyang 473000, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Image encryption; Semi-tensor product; Compressed sensing; Secret image sharing; NEURAL-NETWORKS; CHAOS;
D O I
10.1007/s11042-023-15922-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing encryption schemes of visually secure image have drawbacks, such as excessive concentration of image data and insufficient resistance to various attacks in the transmission channel. Based on the combination of compressed sensing and secret image sharing, this paper presents a visually secure multi-secret image encryption-sharing scheme, which effectively solves the above shortcomings. First, the plain image is perceived as sparse and encrypted by semi-tensor compressed sensing for security. Secondly, the encrypted image is divided into n shadows by secret image sharing. This solves the problem of image data being too centralized and meets the requirements of risk dispersion and intrusion tolerance. Finally, the n shadows are embedded into n carriers by steganography technology to form a visually secure image. On the basis of guaranteeing the quality of image reconstruction, this paper has high compression and security.
引用
收藏
页码:18919 / 18941
页数:23
相关论文
共 50 条
  • [41] Multi-secret sharing scheme based on the general access structure
    Pang, Liaojun
    Jiang, Zhengtao
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 33 - 38
  • [42] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [43] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [44] An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs
    Hsu, Ching-Fang
    Harn, Lein
    Cui, Guohua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (01) : 383 - 394
  • [45] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [46] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [47] An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs
    Ching-Fang Hsu
    Lein Harn
    Guohua Cui
    Wireless Personal Communications, 2014, 77 : 383 - 394
  • [48] Identity (ID)-based threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Pei, Qing-Qi
    Jiao, Li-Cheng
    Wang, Yu-Min
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
  • [49] A Multi-secret Sharing Scheme Based on General Linear Groups
    Dong, Xuedong
    Zhang, Yan
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 480 - 483
  • [50] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490