通过图像融合保护秘密图像并验证经销商和秘密图像的新算法

P. Devaki, G. R. Rao
{"title":"通过图像融合保护秘密图像并验证经销商和秘密图像的新算法","authors":"P. Devaki, G. R. Rao","doi":"10.1109/ICSIP.2014.17","DOIUrl":null,"url":null,"abstract":"In the recent past the images of various fields are being considered for processing for various purposes. In this paper we are proposing an algorithm for protecting the secret image whose confidentiality needs to be maintained, and also to authenticate the distributor who distributes that secret image to multiple users. The secret image will be fused with the fingerprint of the dealer for authentication purpose. Fusion of the finger print will be done by using image fusion technique to generate a single image consisting of the secret image as well as the finger print image of the dealer. The fused image will be divided in to number of shares based on the threshold secret sharing technique. This provides both confidentiality of the secret image and as well as the authentication of the dealer who has sent the image. The verification will be done during reconstruction of the secret image.","PeriodicalId":111591,"journal":{"name":"2014 Fifth International Conference on Signal and Image Processing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Novel Algorithm to Protect the Secret Image through Image Fusion and Verifying the Dealer and the Secret Image\",\"authors\":\"P. Devaki, G. R. Rao\",\"doi\":\"10.1109/ICSIP.2014.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the recent past the images of various fields are being considered for processing for various purposes. In this paper we are proposing an algorithm for protecting the secret image whose confidentiality needs to be maintained, and also to authenticate the distributor who distributes that secret image to multiple users. The secret image will be fused with the fingerprint of the dealer for authentication purpose. Fusion of the finger print will be done by using image fusion technique to generate a single image consisting of the secret image as well as the finger print image of the dealer. The fused image will be divided in to number of shares based on the threshold secret sharing technique. This provides both confidentiality of the secret image and as well as the authentication of the dealer who has sent the image. The verification will be done during reconstruction of the secret image.\",\"PeriodicalId\":111591,\"journal\":{\"name\":\"2014 Fifth International Conference on Signal and Image Processing\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-01-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Fifth International Conference on Signal and Image Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSIP.2014.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Fifth International Conference on Signal and Image Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIP.2014.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

在最近的过去,正在考虑为各种目的处理各种领域的图像。在本文中,我们提出了一种算法来保护需要保持机密性的秘密映像,并对将该秘密映像分发给多个用户的分发者进行身份验证。秘密图像将与经销商的指纹融合以进行身份验证。指纹的融合将通过图像融合技术生成由秘密图像和经销商指纹图像组成的单一图像来完成。基于阈值秘密共享技术,将融合后的图像分割为多个共享。这既提供了秘密图像的保密性,也提供了发送图像的经销商的身份验证。验证将在秘密图像的重建过程中进行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Novel Algorithm to Protect the Secret Image through Image Fusion and Verifying the Dealer and the Secret Image
In the recent past the images of various fields are being considered for processing for various purposes. In this paper we are proposing an algorithm for protecting the secret image whose confidentiality needs to be maintained, and also to authenticate the distributor who distributes that secret image to multiple users. The secret image will be fused with the fingerprint of the dealer for authentication purpose. Fusion of the finger print will be done by using image fusion technique to generate a single image consisting of the secret image as well as the finger print image of the dealer. The fused image will be divided in to number of shares based on the threshold secret sharing technique. This provides both confidentiality of the secret image and as well as the authentication of the dealer who has sent the image. The verification will be done during reconstruction of the secret image.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信