一种具有理想对比度的可视密码方案
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:A Perfect Contrast Visual Cryptography Scheme
  • 作者:张舒 ; 艾小川
  • 英文作者:ZHANG Shu;AI Xiaochuan;College of Science,Naval University of Engineering;
  • 关键词:理想对比度 ; 可视密码 ; 像素扩展
  • 英文关键词:perfect contrast,visual cryptography,pixel expansion
  • 中文刊名:JSSG
  • 英文刊名:Computer & Digital Engineering
  • 机构:海军工程大学理学院;
  • 出版日期:2015-08-20
  • 出版单位:计算机与数字工程
  • 年:2015
  • 期:v.43;No.310
  • 基金:海军工程大学自然科学基金项目(编号:HGDQNJJ13003)资助
  • 语种:中文;
  • 页:JSSG201508022
  • 页数:3
  • CN:08
  • ISSN:42-1372/TP
  • 分类号:100-102
摘要
论文针对可视密码中像素扩展大、对比度低的特点,提出了一种具有理想对比度的可视密码方案,该方案基于完美的黑度可视密码方案(PBVCS),算法简单可行,易于操作,且实现了重构图像与原图像的一致性,没有像素扩展。
        A perfect contrast visual cryptography scheme is proposed for the features of the large pixel-expansion and low contrast in VC.The scheme is based on both the perfect black visual cryptography scheme(PBVCS),keeping the consistency between the reconstructed image and the original image without pixel expansion.And this algorithm is simple and feasible,easy to operate.
引文
[1]Shamir A.Identify-based cryptosystems and signature schemes[C]//Blakley G,Chaum D.Proceedings of Crypto 1984.New York:Spring-Verlag,1984:47-53.
    [2]A.Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
    [3]Naor M,Shamir A.Visual cryptography[C]//Advances in Cryptology—Proceedings of Eurocypt'94,Lecture Notes in Computer Science,Springerverlag,NewYork,1995,950:1-12.
    [4]Naor M,Pinkas B.Visual Authentication and Identification[C]//Advances in Cryptology—Proceedings of Crypt'97,Lecture Notes in Computer Science,Springer-verlag,NewYork,1997,1294:322-336.
    [5]蒲利群,徐祖娟.(2,n)-可视密码方案的两种构造[J].河南科学,2011,29(2):195-198.PU Liqun,XU Zujuan.Constructions of 2out of n Visual Cryptography Schemes[J].Henan Science,2011,29(2):195-198.
    [6]张慧,王洪君.一种基于排列组合的视觉密码方案[J].廊坊师范学院学报(自然科学版),2012,12(6):7-10.ZHANG Hui,WANG Hongjun.A Visual Crypotography Scheme Based on Permutation and Combination[J].Journal of Langfang Teachers College(Natural Science Edition),2012,12(6):7-10.
    [7]韩妍妍,王夙颖,胡予濮,等.一种可验证的可视密码方案[J].国防科技大学学报,2009,31(1):86-89.HAN Yanyan,WANG Suyin,HU Yuou,et al.A Verifiable Visual Cryptography Scheme[J].Journal of National University of Defense Technology,2009,31(1):86-89.
    [8]颜浩,甘志,陈克非.可防止欺骗的可视密码分享方案[J].上海交通大学学报,2004,38(1):107-110.YAN Hao,GAN Zhi,CHEN Kefei.A Cheater Detectable Visual Cryptography Scheme[J].Journal of Shaihai Jiaotong University,2004,38(1):107-110.
    [9]牛冬梅.具有掩盖图像的(2,2)-可视密码方案[J].通信技术,2009,42(7):82-84.NIU Dongmei.(2,2)Visual Cryptography Scheme With Covert Image[J].Communications Technology,2009,42(7):82-84.
    [10]杨波.现代密码学[M].北京:清华出版社,2007.YANG Bo.Modern Cryptography[M].Beijing:Tsinghua University Press,2007.
    [11]黄梅娟.新的基于身份的门限签名方案[J].计算机与数字工程,2013,41(4):625-627.HUANG Meijuan.A Novel ID-based Threshold Signature Scheme[J].Computer&Digital Engineering,2013,41(4):625-627.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700