Font Size: a A A

Research And Implementation On Secret Image Progressive Recovery Protocol

Posted on:2021-11-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y X HuFull Text:PDF
GTID:2518306458969439Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development and widespread application of network communication technology and social software,digital images have been more and more easily obtained,transmitted and modified.People should pay attention to the privacy and security of secret data such as commercial or military images during sharing and transmission.The protection of images containing sensitive information(such as national high-tech patent images,corporate engineering confidential images,and personal privacy images,is becoming increasingly important.Compared with direct image encryption and information hiding,the secret image sharing(SIS)method has the characteristics of lose-tolerant and reducing the probability of loss of secret images,and it can also be considered for access control and identity authentication.This paper focuses on the progressive secret image sharing(PSIS)protocol scheme containing shadow images with different weights.Based on the basic principle of secret sharing,this paper researches and analyzes the proposed main algorithm model of progressive secret sharing.Inspired by Yang et al.,in view of the problems of the previous progressive secret sharing algorithms with different-weights shadows,such as the accidently loss or damage of shadows or shares held by users with high authority,the secret image will always lose all the information about this part,and perform complex algorithm operations on the entire secret image,etc.This paper proposes progressive secret sharing algorithms based on weight function and object detection algorithm to achieve different numbers of different-weight shadows recover secret images of different quality.(1)In the Internet communication environment,it is very important to ensure the security of secret images containing sensitive information.This protocol considers issues such as access control and identity authentication.The scheme researches a secret image sharing scheme that that uses the weight function and the secret image sharing method to achieve progressively recover secret images in shadows with different weights.Participants in this paper have different priorities.The information about the secret images is recovered by different numbers of different-weight shadows.(2)Considering that not all the information in the secret image is sensitive,we use an object detection algorithm to detect the target part that is identified as sensitive information.Participants in the protocol scheme have different priorities.The participants with higher priority have information about the target part and the background part,while the participants with lower priority have only information about the background part.The different numbers of different-weight shadows recover sensitive information of different quality in the secret image.
Keywords/Search Tags:secret images, secret sharing, progressive recovery, sensitive information
PDF Full Text Request
Related items