• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于迷宫矩阵的带欺骗者检测的秘密图像共享方案。

A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.

机构信息

Department of Electronic Engineering, Tsinghua University, Beijing 100084, China.

Department of Electronic Engineering, National Quemoy University, Kinmen 89250, Taiwan.

出版信息

Sensors (Basel). 2020 Jul 7;20(13):3802. doi: 10.3390/s20133802.

DOI:10.3390/s20133802
PMID:32646024
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7374487/
Abstract

Secret image sharing is a technique for sharing a secret message in such a fashion that stego image shadows are generated and distributed to individual participants. Without the complete set of shadows shared among all participants, the secret could not be deciphered. This technique may serve as a crucial means for protecting private data in massive Internet of things applications. This can be realized by distributing the stego image shadows to different devices on the Internet so that only the ones who are authorized to access these devices can extract the secret message. In this paper, we proposed a secret image sharing scheme based on a novel maze matrix. A pair of image shadows were produced by hiding secret data into two distinct cover images under the guidance of the maze matrix. A two-layered cheat detection mechanism was devised based on the special characteristics of the proposed maze matrix. In addition to the conventional joint cheating detection, the proposed scheme was able to identify the tampered shadow presented by a cheater without the information from other shadows. Furthermore, in order to improve time efficiency, we derived a pair of Lagrange polynomials to compute the exact pixel values of the shadow images instead of resorting to time-consuming and computationally expensive conventional searching strategies. Experimental results demonstrated the effectiveness and efficiency of the proposed secret sharing scheme and cheat detection mechanism.

摘要

秘密图像共享是一种在生成和分发隐藏图像阴影给各个参与者的方式来共享秘密消息的技术。没有所有参与者共享的完整阴影集,秘密就无法被解密。这项技术可以作为保护大规模物联网应用中私人数据的重要手段。这可以通过将隐藏图像阴影分发给互联网上的不同设备来实现,只有授权访问这些设备的人才能提取秘密消息。在本文中,我们提出了一种基于新型迷宫矩阵的秘密图像共享方案。在迷宫矩阵的指导下,通过将秘密数据隐藏到两个不同的掩蔽图像中来生成一对图像阴影。基于提出的迷宫矩阵的特殊特征,设计了一种两层欺骗检测机制。除了传统的联合欺骗检测外,该方案还能够在没有其他阴影信息的情况下识别欺骗者提供的篡改阴影。此外,为了提高时间效率,我们推导出了一对拉格朗日多项式来计算阴影图像的确切像素值,而不是采用耗时且计算密集的传统搜索策略。实验结果证明了所提出的秘密共享方案和欺骗检测机制的有效性和效率。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/a96c4127ceda/sensors-20-03802-g012a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/c29f03d94b21/sensors-20-03802-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/01cb5106af56/sensors-20-03802-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/95ec904d8dc2/sensors-20-03802-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/12dfbac7d3dd/sensors-20-03802-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/aac77b9f897d/sensors-20-03802-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/b1d5b5ff38ce/sensors-20-03802-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/23ede27532b0/sensors-20-03802-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/c21f1cf9cbc1/sensors-20-03802-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/a2882aeefc83/sensors-20-03802-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/04f515ca9806/sensors-20-03802-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/e399f24f8506/sensors-20-03802-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/a96c4127ceda/sensors-20-03802-g012a.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/c29f03d94b21/sensors-20-03802-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/01cb5106af56/sensors-20-03802-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/95ec904d8dc2/sensors-20-03802-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/12dfbac7d3dd/sensors-20-03802-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/aac77b9f897d/sensors-20-03802-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/b1d5b5ff38ce/sensors-20-03802-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/23ede27532b0/sensors-20-03802-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/c21f1cf9cbc1/sensors-20-03802-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/a2882aeefc83/sensors-20-03802-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/04f515ca9806/sensors-20-03802-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/e399f24f8506/sensors-20-03802-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/913d/7374487/a96c4127ceda/sensors-20-03802-g012a.jpg

相似文献

1
A Maze Matrix-Based Secret Image Sharing Scheme with Cheater Detection.基于迷宫矩阵的带欺骗者检测的秘密图像共享方案。
Sensors (Basel). 2020 Jul 7;20(13):3802. doi: 10.3390/s20133802.
2
Image inpainting-based behavior image secret sharing.基于图像修复的行为图像秘密共享
Math Biosci Eng. 2020 Mar 31;17(4):2950-2966. doi: 10.3934/mbe.2020166.
3
Fake and dishonest participant location scheme in secret image sharing.秘密图像共享中的虚假和不诚实参与者位置方案。
Math Biosci Eng. 2021 Mar 12;18(3):2473-2495. doi: 10.3934/mbe.2021126.
4
Meaningful Secret Image Sharing with Saliency Detection.基于显著性检测的有意义秘密图像共享
Entropy (Basel). 2022 Feb 26;24(3):340. doi: 10.3390/e24030340.
5
Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.鲁棒的秘密图像共享方案抵抗 AMBTC 和量化的恶意篡改阴影。
Gene Expr Patterns. 2022 Sep;45:119267. doi: 10.1016/j.gep.2022.119267. Epub 2022 Aug 5.
6
AMBTC-based visual secret sharing with different meaningful shadows.基于AMBTC的具有不同有意义阴影的可视秘密共享
Math Biosci Eng. 2021 Jun 11;18(5):5236-5251. doi: 10.3934/mbe.2021266.
7
A Novel General (, )-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain.一种基于共享域信息隐藏的新型通用(,)阈值多秘密图像共享方案。 (注:原文括号处内容缺失,翻译可能不太完整准确)
Entropy (Basel). 2022 Feb 23;24(3):318. doi: 10.3390/e24030318.
8
SABMIS: sparse approximation based blind multi-image steganography scheme.SABMIS:基于稀疏逼近的盲多图像隐写术方案。
PeerJ Comput Sci. 2022 Nov 28;8:e1080. doi: 10.7717/peerj-cs.1080. eCollection 2022.
9
A compressed secret image sharing method with shadow image verification capability.一种具有阴影图像验证能力的压缩秘密图像共享方法。
Math Biosci Eng. 2020 Jun 18;17(4):4295-4316. doi: 10.3934/mbe.2020237.
10
Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.基于像素值排序和秘密共享的多数据隐藏器加密图像无损可逆数据隐藏。
Sensors (Basel). 2023 May 18;23(10):4865. doi: 10.3390/s23104865.

引用本文的文献

1
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019).第一届未来信息通信国际研讨会(Future-ICT 2019)与第四届移动互联网安全国际研讨会(MobiSec 2019)联合精选论文集
Sensors (Basel). 2021 Jan 3;21(1):265. doi: 10.3390/s21010265.

本文引用的文献

1
An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu.一种基于多维迷你数独的高效数据隐藏方案。
Sensors (Basel). 2020 May 11;20(9):2739. doi: 10.3390/s20092739.
2
A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things.一种物联网中区块链传感图像的安全传输与存储解决方案。
Sensors (Basel). 2020 Feb 9;20(3):916. doi: 10.3390/s20030916.
3
Security protection using two different image shadows with authentication.使用带有认证功能的两种不同图像阴影进行安全保护。
Math Biosci Eng. 2019 Mar 7;16(4):1914-1932. doi: 10.3934/mbe.2019093.
4
Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy.可视物联网安全:基于块嵌入策略的 AMBTC 图像数据隐藏
Sensors (Basel). 2019 Apr 27;19(9):1974. doi: 10.3390/s19091974.
5
Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications.多接收者物联网应用中具有解密公平性的聚合签名加密的安全智能相机。
Sensors (Basel). 2019 Jan 15;19(2):327. doi: 10.3390/s19020327.
6
Color extended visual cryptography using error diffusion.颜色扩展的使用误差扩散的视觉密码术。
IEEE Trans Image Process. 2011 Jan;20(1):132-45. doi: 10.1109/TIP.2010.2056376. Epub 2010 Jul 8.