Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (7): 69-76.doi: 10.11959/j.issn.2096-109x.2018063

• Papers • Previous Articles    

Image visualization encryption algorithm based on Shamir threshold secret key sharing

Yifu TAN,Zichen LI   

  1. School of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,China
  • Revised:2018-06-25 Online:2018-07-01 Published:2018-09-10
  • Supported by:
    The National Natural Science Foundation of China(61370188);Beijing Municipal College Improvement Plan(PXM2017_014223_000063);BIGC Project(Ec201803Ed201802Ea201806)

Abstract:

An image visualization encryption algorithm with authentication function by using Shamir scheme was proposed.The main idea of this algorithm is to obtain the data by segmenting the binary secret image into blocks.Then,Shamir scheme was used to obtain the sub-secret data and simultaneously sign the secret image with the SM2 signature algorithm.And it would embed the shared data and signature information into carrier images.When the restoration is required,a specified number of sub-secret images are required for information extraction,restoration and authentication.The simulation experiment of the scheme shows that the secret image sharing scheme improves the security of secret image storage and transmission.

Key words: secret sharing, SM2 signature, digital watermarking, binary image

CLC Number: 

No Suggested Reading articles found!