期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Security Analysis of Secret Image Sharing
1
作者 Xuehu Yan Yuliang Lu +3 位作者 Lintao Liu Song Wan Wanmeng Ding Hanlin Liu 《国际计算机前沿大会会议论文集》 2017年第1期75-78,共4页
Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image... Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image can be reconstructed by collecting sufficient shadow images.In recent years,many SIS schemes are proposed,among which Shamir’s polynomial-based SIS scheme and visual secret sharing(VSS)also called visual cryptography scheme(VCS)are the primary branches.However,as the basic research issues,the security analysis and security level classification of SIS are rarely discussed.In this paper,based on the study of image feature and typical SIS schemes,four security levels are classified as well as the security of typical SIS schemes are analyzed.Furthermore,experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics. 展开更多
关键词 SECRET IMAGE SHARING Shamir’s polynomial-based SECRET IMAGE SHARING Visual CRYPTOGRAPHY Security analysis Linear CONGRUENCE
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部