Font Size: a A A

Research On Application Of Image Secret Sharing Technology In Information Protection

Posted on:2021-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z ZhangFull Text:PDF
GTID:2428330626462972Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the rapidly developing society today,with the popularization of computers and the rapid development of network technology,diversified smart phones,various high-end cameras,high-end electronic watches and other electronic products are widely popularized.the security and integrity of image transmission,storage,and recovery are extremely important.Focus on this problem,many scholars have proposed image secret sharing to solve such problems.Based on this solution the problem of image security during transmission,storage space during image storage,and image restoration during image distortion and the time of image restoration can be solved effectively.the secret sharing phase and the secret recovery phase of the image secret sharing scheme was studied and improved in this thesis.Experiments shown that the scheme proposed can effectively solve the problems in the image secret sharing scheme.The research content of this article are as follows:(1)In order to solve the problem of security of secret images in the secret sharing phase,a new image secret sharing scheme was proposed based on polynomial.This scheme is a secret sharing scheme with variable thresholds based on interpolation polynomials.It can modify the thresholds for image restoration through changes in the current environment,which greatly increases the flexibility and security during the image restoration phase.In the proposed new scheme,the leakage of secret image information during secret sharing can be effectively prevented.The experimental results shown that the same algorithm was used in the secret sharing phase for the propose new method,the original secret image information is not leaked,so that the original secret image can be effectively protected.(2)In order to solve the problem of the security of important information in secret images,a progressive image secret sharing scheme using XOR operation was proposed.This scheme needs to divide the secret image into different regions according to the importance of the information in the figure.The secret sharing phase needs to use the exclusive OR operation to generate shadow images.When the secret image is restored,different forms of thresholds are used to reconstruct the secret image.Compared with the existing scheme,important information contained in the image can be effectively protected by the improved scheme.Through the comparative analysis of experiments,the progressive image secret sharing scheme using XOR operation can protect the important information in the image,thereby improving the security of the secret image.(3)Since the image secret sharing scheme and the secret document protection scheme are intrinsically linked,in the image secret sharing scheme,the gray-scale image and the secret document protection scheme are used to process the document,a similar method is used to process the secret,so the image secret sharing technique is used Into the protection of secret documents.In order to reduce the size of the secret share of the secret document in the sharing phase and the computational complexity during secret sharing,a double byte is used to implement the sharing and recovery phase of the secret document.The scheme uses a polynomial-based secret sharing scheme.The scheme requires the original secret document and the concealment document.The concealment document is used to disguise the original secret document.In the process of calculating the polynomial,double bytes are used instead of single bytes.The experimental results show that calculating the polynomial through double bytes can effectively reduce the size of the secret share and reduce its computational complexity,thereby greatly improving the efficiency of secret document sharing.
Keywords/Search Tags:Secret sharing, interpolation polynomial, threshold, image secret sharing
PDF Full Text Request
Related items