Font Size: a A A

Based On The Gray Semi-generated Information Sharing

Posted on:2006-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:C M WuFull Text:PDF
GTID:2208360155966025Subject:System theory
Abstract/Summary:PDF Full Text Request
With the development of modern communication technology and it's quick spreading , especially for the widely used of internet, the application of information sharing have more widespread and profound influence, and people rely more and more on internet information technology. But for the opening and sharing characteristics of internet, the problem of information security standing out in modern time, and the situation become more complicated. Information security technology is a comprehensive subject, it's main task is to find the way to protect the security of computer system and the information in internet by mathematical means, as to realize the information security. In the study of information security system, people make use of all kinds of mathematical tools to enhance the system's security. Doctor K.Q Shi put forward "On the grey encryption problems of information security", which marked the beginning of the grey system theory been used in the research fields of information system security. Along with the development of grey system theory, it will be widely used in the field of information security.Secret sharing is put forward by Blakey and Shamir indenpendently in 1979, it work well in dispersing information, and this bring a completely new way to key management, at the same time it became a main technology in key management. With the development of digital technology of multi-media, secret sharing is widely used in fields of image information security, among them image sharing is a directly application in image information hiding fields.In this text , we associate grey half generation theory and secret sharing, give research in fields of key sharing and image sharing, and the results indicate: grey half generation theory achieved good application in these two fields.In chapter 4, we give out a plan for key sharing, and it can resist cheat between membership . In this plan , the in-reversible property of grey half generation is used toprovide a protection for key, thus we solved the reuse problem of key; at the same time, we put forward a function which can testing and prevent cheat between membership, also we give out the corresponding proof.Chapter 5 provides a new algorithm of image sharing, which based on grey half generation and sharing ideal. In algorithm, we research the information security problem of sharing image from different angles, which make the security of secret image is not only rely on the dispersing of image information, but also rely more on the secret management of key which used to share secret image 0 In this algorithm, we share secret image through keys, and different courses of sharing with different keys, which avoid the attack of collecting sharing images through different sharing processes to recover secret image. Different from the other image sharing algorithms, in our algorithm, pixel is been shared as a unit and different pixels with different keys, thus every sharing image is of good randomness, then it can be directly used in secret image dispersing management or transmission.
Keywords/Search Tags:grey system, grey half generation, secret sharing, key sharing, image sharing
PDF Full Text Request
Related items