计算机应用 ›› 2012, Vol. 32 ›› Issue (03): 669-678.DOI: 10.3724/SP.J.1087.2012.00669

• 信息安全 • 上一篇    下一篇

视图的秘密分享及其代数编码方法

王晓京,方佳嘉,蔡红亮,王一丁   

  1. 中国科学院 成都计算机应用研究所, 成都 610041
  • 收稿日期:2011-09-13 修回日期:2011-11-29 发布日期:2012-03-01 出版日期:2012-03-01
  • 通讯作者: 方佳嘉
  • 作者简介:王晓京(1953-),男,安徽滁州人,研究员,博士,主要研究方向:编码与信息安全;方佳嘉(1985-),男,福建漳州人,博士研究生,主要研究方向:编码与信息安全;蔡红亮(1983-),男,山西临汾人,博士研究生,主要研究方向:编码与信息安全;王一丁(1983-),男,四川成都人,博士,主要研究方向:编码与信息安全。
  • 基金资助:

    国家863计划项目(2008AAO1Z402);中国科学院知识创新工程项目(2004CB18003)。

Secret image sharing and its algebraic coding method

WANG Xiao-jing, FANG Jia-jia, CAI Hong-liang, WANG Yi-ding   

  1. Chengdu Institute of Computer Applications, Chinese Academy of Sciences, Chengdu Sichuan 610041,China
  • Received:2011-09-13 Revised:2011-11-29 Online:2012-03-01 Published:2012-03-01

摘要: 视图的秘密分享是图像信息安全领域独具吸引力的研究问题。寻求秘密视图完全的(Perfect)和理想的(Ideal)门限秘密分享方案(也称图像门限分享的完备方案),则是其中富有挑战性的未决课题。文中引入灰度值域GF(2m)上像素矩阵秘密分享的新观点和相应的代数几何编码方法,实现了数字图像(t,n)门限秘密分享的一种完备方案。该方案能够将一幅或多幅秘密图像编码为n幅各具随机视觉内容,同时又共具(t,n)门限结构的影子图像(或称份额图像)。证明了这种秘密分享方案的(t,n)门限结构不仅是完全的而且也是理想的,并给出了提高像素灰度值域GF(2m)上图像秘密分享算法效率的“m位像素值的分拆与并行”方法。分析表明,该图像秘密分享方法可以应用于高安全等级的秘密图像的网络多路径传输、保密图像信息的分散式存储控制、高维图形码(Bar-code in k dimension)和弹出码(Popcode)等新一代信息载体技术的识读控制等各方面。

关键词: 图像分享, (t,n)门限, 像素灰度值域GF(2m), 代数几何编码, m位像素值的分拆与并行

Abstract: Image sharing is an attractive research subject in computer image information security field. Seeking for Perfect and Ideal image threshold secret sharing scheme (i.e. the complete image sharing scheme) is one of the unresolved challenging problems. By introducing into the methods of pixel matrix secret sharing over pixel value field GF(2m) and algebraic-geometry coding, a complete scheme of image sharing with a (t, n) threshold structure was achieved in this paper. The scheme could encode secret images into n shadow images in such a way that all the shadow images were in a Perfect and Ideal (t, n) threshold structure, while each shadow image had its own visual content assigned at random. This approach to image sharing was able to be applied to the new information carrier technology, e.g. network multipathed transmission of secret image in high security level, distributed storage control of secret image, bar-code in k dimension and Popcode. This paper also presented a method to cut down a great deal of computational time for image sharing based on a pixel field GF(2m), called "partition and paralleling of m-bit pixel".

Key words: image sharing, (t,n) threshold, pixel value field GF(2m), algebraic-geometry coding, partition and paralleling of m-bit pixel

中图分类号: