基于Asmuth-Bloom门限共享秘密图像信息隐藏算法研究
Research on Secret Image Threshold Sharing Information Hiding Algorithm Based on Asmuth-Bloom
摘要:
为安全传输保密的图像,本文基于Asmuth-Bloom共享方案,设计了一个(t, n)门限秘密图像信息隐藏算法。首先将秘密图像共享成n份表面看似无意义的秘密共享图像,使用DCT算法将n份秘密共享图像分别嵌入到n个用户提供的彩色载体图像中,再将n份含秘密共享的载体图像分发给n个用户。在秘密恢复时,大于等于门限值t的用户从含秘密共享的彩色载体图像盲提取出秘密共享图像,再使用中国剩余定理还原秘密图像。实验结果表明,本文提出的算法能正确恢复秘密图像。通过峰值信噪比(PSNR),平均结构相似性(MSSIM),比特出错概率(BER)对本方案进行评估,优于其他方案。
Abstract:
In order to transmit secret images more securely, this paper proposes a (t, n) threshold image data hiding algorithm based on Asmuth-Bloom secret sharing. First share the secret image into n meaningless secret shared images, use the DCT algorithm to embed the n meaningless images into n user-provided color cover images, and then distribute the n cover images with secret sharing to n users. Secondly, when the secret is recovered, users who are greater than or equal to the threshold t blindly extract meaningless secret sharing images from the cover image containing secret sharing, and then use the Chinese remainder theorem to recover the secret images. Finally, the experimental results proved that the algorithm proposed in this paper can recover the secret image correctly. This scheme is evaluated by peak signal-to-noise ratio (PSNR), mean structural similarity (MSSIM), and bit error ratio (BER), it is proved that this scheme is superior to other schemes.
参考文献
|
[1]
|
Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef]
|
|
[2]
|
Asmuth, C. and Bloom, J. (1983) A Modular Approach to Key Safe-guarding. IEEE Transactions on Information Theory, 29, 208-210. [Google Scholar] [CrossRef]
|
|
[3]
|
王丽娜, 张焕国, 叶登攀, 等. 信息隐藏技术与应用[M]. 武汉: 武汉大学出版社, 2012: 17-18.
|
|
[4]
|
Kutter, M., Jordna, F. and Bossen, F. (1997) Digital Signature of Color Images Using Amplitude Modulation. Proceedings Volume 3022, Storage and Retrieval for Image and Video Databases V, 200-205. [Google Scholar] [CrossRef]
|
|
[5]
|
张亚泽. 图像秘密共享技术在信息保护中的应用研究[D]: [硕士学位论文]. 西安: 西安理工大学, 2020.
|
|
[6]
|
Deng, Y., Kenney, C., Moore, M.S., et al. (1999) Peer Group Filtering and Perceptual Color Image Quantization. IEEE International Symposium on Circuits and Systems, Orlando, 30 May-2 June 1999, 21-24.
|
|
[7]
|
唐明伟. 图像信息隐藏与隐藏分析算法研究[D]: [博士学位论文]. 成都: 电子科技大学, 2012.
|
|
[8]
|
Yuan, H.D. (2014) Secret Sharing with Multi-Cover Adaptive Steganography. Information Sciences, 254, 197-212, [Google Scholar] [CrossRef]
|
|
[9]
|
Singh, P. and Raman, B. (2018) Reversible Data Hiding Based on Shamir’s Secret Sharing for Color Images over Cloud. Information Sciences, 422, 77-97. [Google Scholar] [CrossRef]
|