Font Size: a A A

Design And Implementation Of Image Secret Sharing Scheme

Posted on:2021-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y F TanFull Text:PDF
GTID:2428330623481256Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Image sharing is an algorithm that can split and save secret images and recover images by collecting shadows.It is an important image saving method.Modern information technology is changing with each passing day,and the number of multimedia files on the network is also increasing.As an intuitive information carrier,images play a variety of roles in modern life,and the number is exploding.According to different application scenarios,this paper designs and implements the corresponding image secret sharing scheme to improve the security of image application,storage and transmission.This paper focuses on the security application and verifiability of image sharing scheme.1.Aiming at the security of image transmission and storage,a secret image transmission and storage scheme was proposed based on Shamir secret sharing,combining LSB watermarking algorithm and SM2 signature algorithm.Shamir secret sharing scheme was used to share the images and split them into multiple meaningless sharing images.LSB digital watermarking technology is used to embed the signature of Shared image and secret image into the carrier image.On the receiving side,only a certain number of Shared images can restore the original secret image.Even if an attacker intercepts a Shared image,he cannot obtain information about the secret image.Experimental results show that the scheme can effectively resist the theft and tampering of attackers,and the image restoration accuracy is high,can completely restore the secret image.2.A secure secret image sharing scheme is proposed based on Asmuth-bloom sharing technology and sign-secret algorithm based on discrete logarithm.After splitting the image with Asmuth-bloom sharing technology,ZUC algorithm was used to encrypt the share.The ZUC key is processed by the sign-secret algorithm.The processing result and the encrypted image are sent to the participants.Participants can decrypt the ZUC key according to the signed ciphers and private keys.Participants can also verify the ZUC key and the encrypted share.The signed files have low security requirements for the transmission mode,and can be sent by mail or social software.Experimental results show that the scheme is feasible and safe.3.For QR code,combined with visual cryptography technology,add visual verification scheme for the payment process,make shopping more secure,effectively solve the criminals through QR code fraud crime problem.Before confirming the payment,the payer can obtain the security authentication image of the QR code from the merchant,so as to judge the legality of the payer.Only the merchant with the key can provide an authenticated share.
Keywords/Search Tags:image sharing, visual cryptography, secret sharing, signature and cryptography, discreate logarithm
PDF Full Text Request
Related items