摘要
论文针对可视密码中像素扩展大、对比度低的特点,提出了一种具有理想对比度的可视密码方案,该方案基于完美的黑度可视密码方案(PBVCS),算法简单可行,易于操作,且实现了重构图像与原图像的一致性,没有像素扩展。
A perfect contrast visual cryptography scheme is proposed for the features of the large pixel-expansion and low contrast in VC.The scheme is based on both the perfect black visual cryptography scheme(PBVCS),keeping the consistency between the reconstructed image and the original image without pixel expansion.And this algorithm is simple and feasible,easy to operate.
引文
[1]Shamir A.Identify-based cryptosystems and signature schemes[C]//Blakley G,Chaum D.Proceedings of Crypto 1984.New York:Spring-Verlag,1984:47-53.
[2]A.Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[3]Naor M,Shamir A.Visual cryptography[C]//Advances in Cryptology—Proceedings of Eurocypt'94,Lecture Notes in Computer Science,Springerverlag,NewYork,1995,950:1-12.
[4]Naor M,Pinkas B.Visual Authentication and Identification[C]//Advances in Cryptology—Proceedings of Crypt'97,Lecture Notes in Computer Science,Springer-verlag,NewYork,1997,1294:322-336.
[5]蒲利群,徐祖娟.(2,n)-可视密码方案的两种构造[J].河南科学,2011,29(2):195-198.PU Liqun,XU Zujuan.Constructions of 2out of n Visual Cryptography Schemes[J].Henan Science,2011,29(2):195-198.
[6]张慧,王洪君.一种基于排列组合的视觉密码方案[J].廊坊师范学院学报(自然科学版),2012,12(6):7-10.ZHANG Hui,WANG Hongjun.A Visual Crypotography Scheme Based on Permutation and Combination[J].Journal of Langfang Teachers College(Natural Science Edition),2012,12(6):7-10.
[7]韩妍妍,王夙颖,胡予濮,等.一种可验证的可视密码方案[J].国防科技大学学报,2009,31(1):86-89.HAN Yanyan,WANG Suyin,HU Yuou,et al.A Verifiable Visual Cryptography Scheme[J].Journal of National University of Defense Technology,2009,31(1):86-89.
[8]颜浩,甘志,陈克非.可防止欺骗的可视密码分享方案[J].上海交通大学学报,2004,38(1):107-110.YAN Hao,GAN Zhi,CHEN Kefei.A Cheater Detectable Visual Cryptography Scheme[J].Journal of Shaihai Jiaotong University,2004,38(1):107-110.
[9]牛冬梅.具有掩盖图像的(2,2)-可视密码方案[J].通信技术,2009,42(7):82-84.NIU Dongmei.(2,2)Visual Cryptography Scheme With Covert Image[J].Communications Technology,2009,42(7):82-84.
[10]杨波.现代密码学[M].北京:清华出版社,2007.YANG Bo.Modern Cryptography[M].Beijing:Tsinghua University Press,2007.
[11]黄梅娟.新的基于身份的门限签名方案[J].计算机与数字工程,2013,41(4):625-627.HUANG Meijuan.A Novel ID-based Threshold Signature Scheme[J].Computer&Digital Engineering,2013,41(4):625-627.