系统仿真学报 ›› 2020, Vol. 32 ›› Issue (1): 20-26.doi: 10.16182/j.issn1004731x.joss.17-CACIS010

• 仿真建模理论与方法 • 上一篇    下一篇

基于理想存取结构划分的(2, n)异或视觉密码

程羽乔, 付正欣, 郁滨   

  1. 信息工程大学,郑州 450000
  • 收稿日期:2017-07-18 修回日期:2017-08-28 发布日期:2020-01-17
  • 作者简介:程羽乔(1994-),女,江西丰城,硕士生,研究方向为视觉密码、信息安全;付正欣(通讯作者1986-),男,山东曹县,博士,讲师,研究方向为视觉密码、信息安全。
  • 基金资助:
    国家自然科学基金(61602513),信息工程大学优秀青年基金(2016611303)

A XOR-based Visual Cryptography Scheme for (2, n) Access Structure with Ideal Structure Division

Cheng Yuqiao, Fu Zhengxin, Yu Bin   

  1. Information Engineering University, Zhengzhou 450000, China
  • Received:2017-07-18 Revised:2017-08-28 Published:2020-01-17

摘要: 针对(2, n)异或视觉密码的完全恢复问题,依据理想存取结构定义,在分析最小授权子集之间特殊的共享份关系基础上,借助图论思想设计了一种存取结构划分算法,并证明了该算法划分得到的理想存取结构数目最少。设计并实现了秘密分享与恢复算法。实验结果表明,提出的(2, n)异或视觉密码方案可以实现秘密图像的完全恢复,且与现有方案相比,像素扩展度达到最优。

关键词: 异或视觉密码, 完全恢复, 理想结构划分, (2, n)存取结构, 最小像素扩展

Abstract: We propose a XOR-based visual cryptography scheme for (2, n) access structures. According to the definition of ideal access structure, the relationship of shares among the minimal qualified subsets is analyzed. And based on it, a division algorithm of access structures is presented with the theory of graph. By this approach, we can obtain the least number of ideal access structures. Additionally the processes of secret sharing and recovering are given. Experimental results show that this scheme can achieve a perfect secret recovery. Compared with existing schemes, the pixel expansion of our paper is the best.

Key words: XOR-based visual cryptography scheme, perfect recovery, ideal structure division, (2, n) access structure, optimal pixel expansion

中图分类号: