• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

鲁棒的秘密图像共享方案抵抗 AMBTC 和量化的恶意篡改阴影。

Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.

机构信息

National University of Defense Technology, Hefei, 230037, China; Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei, 230037, China.

Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, 974, Taiwan.

出版信息

Gene Expr Patterns. 2022 Sep;45:119267. doi: 10.1016/j.gep.2022.119267. Epub 2022 Aug 5.

DOI:10.1016/j.gep.2022.119267
PMID:35940552
Abstract

For (k, n)-threshold secret image sharing (SIS) scheme, only k or more than k complete parts can recover the secret information, and the correct image cannot be obtained if the count of shadow images is not enough or the shadow images are damaged. The existing schemes are weak in resisting large-area shadow image tampering. In this paper, we propose a robust secret image sharing scheme resisting to maliciously tampered shadow images by Absolute Moment Block Truncation Coding (AMBTC) and quantization (RSIS-AQ). The secret image is successively compressed in two ways: AMBTC and quantization. The sharing shadow images contain the sharing results of both compressed image from different parts, so that even the shadow images are faced with large-scale area of malicious tampering, the secret image can be recovered with acceptable visual quality. Compared with related works, our scheme can resist larger area of tampering and yield better recovered image visual quality. The experimental results prove the effectiveness of our scheme.

摘要

对于(k,n)-门限秘密图像共享(SIS)方案,只有 k 个或更多完整部分才能恢复秘密信息,如果阴影图像的数量不足或阴影图像损坏,则无法获得正确的图像。现有的方案在抵抗大面积的阴影图像篡改方面较弱。本文提出了一种通过绝对矩块截断编码(AMBTC)和量化(RSIS-AQ)抵抗恶意篡改的阴影图像的鲁棒秘密图像共享方案。秘密图像通过两种方式依次压缩:AMBTC 和量化。共享的阴影图像包含来自不同部分的压缩图像的共享结果,因此,即使面对大面积的恶意篡改,也可以恢复具有可接受视觉质量的秘密图像。与相关工作相比,我们的方案可以抵抗更大面积的篡改,并产生更好的恢复图像视觉质量。实验结果证明了我们方案的有效性。

相似文献

1
Robust secret image sharing scheme resistance to maliciously tampered shadows by AMBTC and quantization.鲁棒的秘密图像共享方案抵抗 AMBTC 和量化的恶意篡改阴影。
Gene Expr Patterns. 2022 Sep;45:119267. doi: 10.1016/j.gep.2022.119267. Epub 2022 Aug 5.
2
AMBTC-based visual secret sharing with different meaningful shadows.基于AMBTC的具有不同有意义阴影的可视秘密共享
Math Biosci Eng. 2021 Jun 11;18(5):5236-5251. doi: 10.3934/mbe.2021266.
3
A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.一种具有高图像保真度的 AMBTC 篡改检测方案的位翻转方法。
PLoS One. 2020 Apr 16;15(4):e0230997. doi: 10.1371/journal.pone.0230997. eCollection 2020.
4
A Novel General (, )-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain.一种基于共享域信息隐藏的新型通用(,)阈值多秘密图像共享方案。 (注:原文括号处内容缺失,翻译可能不太完整准确)
Entropy (Basel). 2022 Feb 23;24(3):318. doi: 10.3390/e24030318.
5
A recoverable AMBTC authentication scheme using similarity embedding strategy.基于相似性嵌入策略的可恢复 AMBTC 认证方案
PLoS One. 2019 Feb 27;14(2):e0212802. doi: 10.1371/journal.pone.0212802. eCollection 2019.
6
Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy.可视物联网安全:基于块嵌入策略的 AMBTC 图像数据隐藏
Sensors (Basel). 2019 Apr 27;19(9):1974. doi: 10.3390/s19091974.
7
Fake and dishonest participant location scheme in secret image sharing.秘密图像共享中的虚假和不诚实参与者位置方案。
Math Biosci Eng. 2021 Mar 12;18(3):2473-2495. doi: 10.3934/mbe.2021126.
8
Image inpainting-based behavior image secret sharing.基于图像修复的行为图像秘密共享
Math Biosci Eng. 2020 Mar 31;17(4):2950-2966. doi: 10.3934/mbe.2020166.
9
Meaningful secret image sharing for JPEG images with arbitrary quality factors.具有任意质量因子的 JPEG 图像的有意义的秘密图像共享。
Math Biosci Eng. 2022 Aug 11;19(11):11544-11562. doi: 10.3934/mbe.2022538.
10
Meaningful Secret Image Sharing with Saliency Detection.基于显著性检测的有意义秘密图像共享
Entropy (Basel). 2022 Feb 26;24(3):340. doi: 10.3390/e24030340.

引用本文的文献

1
Reversible extended secret image sharing with ability to correct errors based on Chinese remainder theorem.基于中国剩余定理的具有纠错能力的可逆扩展秘密图像共享
Heliyon. 2023 Mar 25;9(4):e14918. doi: 10.1016/j.heliyon.2023.e14918. eCollection 2023 Apr.