可视加密在图书版权保护与增值服务方面的应用研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Visual Cryptography in Books and Application Research on Copyright Protection and Value-added Services
  • 作者:朱建乐 ; 曹鹏 ; 曹晓鹤
  • 英文作者:ZHU Jianle;CAO Peng;CAO Xiaohe;School of Information Engineering,Beijing Institute of Graphic Communication;
  • 关键词:可视加密 ; 二进制相位调制 ; 信息隐藏 ; 光栅
  • 英文关键词:visual cryptography;;2PSK;;information hiding;;grating
  • 中文刊名:BYXB
  • 英文刊名:Journal of Beijing Institute of Graphic Communication
  • 机构:北京印刷学院信息工程学院;
  • 出版日期:2017-04-26
  • 出版单位:北京印刷学院学报
  • 年:2017
  • 期:v.25
  • 基金:国家自然科学基金面上项目(61370140);; 北京市科技专项(Z161100005016007)
  • 语种:中文;
  • 页:BYXB201702007
  • 页数:4
  • CN:02
  • ISSN:11-3136/TS
  • 分类号:29-32
摘要
可视加密的基本思想是把密文信息分解成为多个部分,这些部分被称为可视密码的共享信息。自从可视加密算法出现,就被运用到各种领域,从而使可视加密的方法得到完善。给出一种基于网点位置的二进制相位调制(2PSK)和光栅的光学特性相结合的信息植入方法,来实现可视加密。其利用一个和载体图像相同频率的光栅片叠加产生莫尔条纹,该方法能够通过莫尔现象的性质和印刷加网技术的特性来实现信息的解码。由于利用可视加密的信息隐藏和显现,可减少对设备的依赖性并降低防伪成本。在图书版权保护方面,采用这种方法能有效的解决盗版侵权问题,同时也给图书提供了增值性服务,获得相应的图书增值效果。
        The basic idea of Visual Cryptography( VC) is to divide a secret image into several partitions which are called VC share. Various categories of VC schemes have been developed to enhance the maturity of VC since its emergence. In this paper,we present a method of information embedding based on the position of the binary phase modulation( 2PSK)and the optical characteristics of the grating to achieve visual encryption. This method is based on the superposition of a grating with the same frequency as the carrier image to generate moire fringe which can be used to realize the decoding of information by the nature of moire phenomenon and the characteristics of the printing and halfton technique. Due to the use of visual encryption of information hiding and display,we can reduce the dependence on the device and reduce the cost of security. This method can effectively solve the problem of piracy,but also provide value-added services to books,access to the corresponding value-added effect of the book.
引文
[1]Naor M,Shamir A.Visual cryptography[C].Berlin:SpringerVerlag,1995:1-12.
    [2]A Shamir.How to Share a Secret[J].Communication of the ACM,1979,22(11):612-612.
    [3]Moni Naor,Adi Shamir.Visual CryptographyⅡ:Improving the Contrast via the Cover Base in Proc.of Security Protocols[C].International Workshop 1996,Lecture Notes in the Computer Science,No.1189,Spring-Verlag,1997:69-74.
    [4]房礼国,郁滨.一种基于排列的(2,n)可视门限方案[J].计算机工程,2007(9):157-162.
    [5]任乐义.基于数字加网的半色调防伪技术的研究[D].南京:南京林业大学,2012:23-39.
    [6]Hartung F,Kutter M.Multi-media watermarking techniques[Y].Proceeding of the IEEE,1999,87(7):1079-1094.
    [7]Jonathan Weir,Wei Qi Yan.Visual Cryptography and Its Applications[C].Copenhagen:Ventus Publishing Ap S,2012.
    [8]Guang Wang,Feng Liu,Wei Qi Yan.2D Barcodes for Visual Cryptography[J].New York:Spring Science Business Media,2014:1223-1241.
    [9]Zhi Zhou,Gonzalo R.Arce&Giovanni Di Crescenzo.Halftone Visual Cryptography[J].IEEE Transaction on Image Processing,2006(8):2441-2452.
    [10]商逸潇.可视密码方案构造与应用研究[D].西安:西安电子科技大学,2014.
    [11]左晓燕,黄敏,李敏,顾烨.基于莫尔现象的印刷品防伪技术[J].包装工程,2016(15):35-39.
    [12]郭凌华,陈燕,刘国栋,邢铁豆.半色调图像的网点式光栅显隐防伪研究[J].西安理工大学学报,2015(3):335-339.
    [13]赵向凯.图像光栅效应的信息隐藏技术研究[D].北京:北京化工大学,2015.
    [14]Naor M,Shamir A.Visual Cryptography[C].Proceeding of Eurocrypt,Lecture Notes in Computer Science,LNCS 963,Berlin:Spring,1994:1-11.
    [15]刘喆灿,曹鹏.基于网点位置的半色调加网及信息隐藏算法[J].北京信息科技大学学报(自然科学版),2013,28(6):24-28.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700