{"title":"基于双重加密和隐藏技术的图像视觉密码","authors":"Chen Pan, Xiao-ling Huang, G. Ye, Zhengxia Wang","doi":"10.1145/3373419.3373454","DOIUrl":null,"url":null,"abstract":"In this paper, an image visual cryptography based on double encryption and hiding technology is proposed. The secret plain-image is scrambled, added under modulo operation and cyclically left-shifted to obtain the pre-encrypted image. Carrier image is also encrypted by scrambling and diffusion, and then the pre-encrypted image is embedded into the encrypted carrier image by lifting wavelet transform (LWT) and QR decomposition. As a result, the final encrypted carrier image with encrypted secret image is generated. After realizing double visual encryption and hiding technology, attacker cannot know that the meaningless of encrypted carrier image containing an encrypted secret image. Chaotic sequences used in the scrambling and diffusion stages are generated by a 2D logistic-sine-coupling map (2D-LSCM), which is related to secret plain-image and can resist effectively the known-plaintext and chosen-plaintext attacks. Experimental results show that the proposed algorithm has high security and good application prospects.","PeriodicalId":352528,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Advances in Image Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An Image Visual Cryptography Using Double Encryption and Hiding Technology\",\"authors\":\"Chen Pan, Xiao-ling Huang, G. Ye, Zhengxia Wang\",\"doi\":\"10.1145/3373419.3373454\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an image visual cryptography based on double encryption and hiding technology is proposed. The secret plain-image is scrambled, added under modulo operation and cyclically left-shifted to obtain the pre-encrypted image. Carrier image is also encrypted by scrambling and diffusion, and then the pre-encrypted image is embedded into the encrypted carrier image by lifting wavelet transform (LWT) and QR decomposition. As a result, the final encrypted carrier image with encrypted secret image is generated. After realizing double visual encryption and hiding technology, attacker cannot know that the meaningless of encrypted carrier image containing an encrypted secret image. Chaotic sequences used in the scrambling and diffusion stages are generated by a 2D logistic-sine-coupling map (2D-LSCM), which is related to secret plain-image and can resist effectively the known-plaintext and chosen-plaintext attacks. Experimental results show that the proposed algorithm has high security and good application prospects.\",\"PeriodicalId\":352528,\"journal\":{\"name\":\"Proceedings of the 2019 3rd International Conference on Advances in Image Processing\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2019 3rd International Conference on Advances in Image Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3373419.3373454\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 3rd International Conference on Advances in Image Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3373419.3373454","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Image Visual Cryptography Using Double Encryption and Hiding Technology
In this paper, an image visual cryptography based on double encryption and hiding technology is proposed. The secret plain-image is scrambled, added under modulo operation and cyclically left-shifted to obtain the pre-encrypted image. Carrier image is also encrypted by scrambling and diffusion, and then the pre-encrypted image is embedded into the encrypted carrier image by lifting wavelet transform (LWT) and QR decomposition. As a result, the final encrypted carrier image with encrypted secret image is generated. After realizing double visual encryption and hiding technology, attacker cannot know that the meaningless of encrypted carrier image containing an encrypted secret image. Chaotic sequences used in the scrambling and diffusion stages are generated by a 2D logistic-sine-coupling map (2D-LSCM), which is related to secret plain-image and can resist effectively the known-plaintext and chosen-plaintext attacks. Experimental results show that the proposed algorithm has high security and good application prospects.