Font Size: a A A

Research On Essential Secret Image Sharing Scheme With Authentication

Posted on:2023-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z H RenFull Text:PDF
GTID:2558307091987249Subject:Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of the information age,the amount of communication data is increasing,and the types of communication data are also increasing.The content of communication data encryption is not only simple digital and text encryption,but also the encryption of multimedia information such as images and videos.Traditional encryption techniques therefore show more and more limitations.Image secret sharing technology can not only solve the security problem of image information in communication,but also provide new ideas for solving the key problem and identity verification problem existing in traditional encryption technology.However,there are still many limitations in the actual use of image secret sharing.For example,it cannot be verified whether the shadow image has been tampered with,and the equal rights of participants cannot adapt to different application scenarios.This paper studies a sharing scheme that can choose whether participants are equal in power,and can also verify whether the shadow image has been tampered with.The main research contents include the following two aspects:(1)Research a verifiable core secret image secret sharing scheme.This paper innovates the embedding method of secret information: the traditional image secret sharing embeds the pixel value of the secret image in the polynomial coefficients,the proposed scheme only embeds the pixel value of the secret image in some polynomial coefficients,and the other part of the coefficients The function value after the pixel value is brought into the hash function.When performing secret recovery,comparing the recovered pixel value with the hash function value can prove whether the secret image has been tampered with.The scheme of this paper uses a random image and a secret image to XOR,the random image and the XORed image are secretly shared according to the number of participants with different powers,and the obtained shadow images are spliced,and the spliced image is used as the core.image.(2)Research the realization method of secret image secret recovery based on matrix operation.Traditional image secret sharing schemes usually reuse Lagrangian interpolation in the recovery stage to obtain polynomials in the sharing stage.Different from the traditional image secret sharing scheme,in the recovery stage,this paper first uses the participant’s identification code as an element to generate a matrix and calculates its inverse matrix,and quickly solves the polynomial coefficients in the sharing stage through the calculation of matrix multiplication,and then recovers the secret image.The innovation of this paper is that a verifiable core secret image sharing scheme is proposed.By changing the algorithm structure,the verifiability and threshold of the algorithm are simultaneously achieved.There is no image secret sharing scheme that can achieve this.In addition,this paper proposes an implementation method based on matrix operations.Through theoretical analysis and experiments,it is proved that the implementation method in this paper is more efficient than the traditional implementation method.
Keywords/Search Tags:image secret sharing, hash functions, essential images, tamper verification, matrix operations, Lagrange interpolation
PDF Full Text Request
Related items