Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

56results about How to "Increase hidden capacity" patented technology

Considerable information hide method using JPEG2000 compression image as carrier

The invention relates to a high capacity information hiding method using JPEG2000 compressing images as the carrier. The operation steps are: applying wavelet decomposition, wavelet coefficients quantification and bit-plane coding to images, and determining the truncation position of the code flow of all coding blocks and the lowest bit-plane of the embeddable information by rate-distortion optimization; primarily choosing a wavelet coefficient which is more than the threshold value as the embedding point, and making a redundancy estimation and adjusting the embedding point and the embedding strength; embedding the synchronous information and the hidden information into the quantified wavelet coefficient in an order of the bit plane from the lowest to the highest starting from the lowest embeddable bit-plane; making a second bit-plane coding and organizing the code flow after embedding the information. The high capacity information hiding method is based on a second coding strategy to determine the embedding position and improves the information hiding volume by self-adaptively choosing the embedding point and adjusting the embedding strength, The high capacity information hiding method has the advantages of being transparent completely for the standard JPEG2000 decoders and being able to be conveniently integrated in the JPEG2000 coders. Meanwhile, the code flow still can decode normally after being embedded with hiding information.
Owner:CIVIL AVIATION UNIV OF CHINA

Information hiding method facing to H.264/AVC (automatic volume control) video

The invention discloses an information hiding method facing to an H.264/AVC (automatic volume control) video. The embedding of watermark information is realized through modifying a data communication terminal (DCT) coefficient of a frame I, but for a frame B and a frame P, the embedding of the hiding information is realized through modifying motion vector data (MVD), thus on one hand, the embedded watermark information can be used for authenticating the integrity of the content of the video streaming, and on the other hand, whether the video is attacked is judged, and whether the extracted information is credible and the like at an information detection end according to the integrity of the extracted watermark information, thus ensuring the safety of the private information; as the frame P and frame B in a video sequence are divided into a motion subblocks from the size range of 16*16 to 4*4; the smaller subblock division provides a large amount of MVD data which can provide for hiding the private information, thus the video has larger information hiding capacity; and the process extracting the information is simple and rapid, does not need an original video file for reference, and only needs to decode the DCT coefficient of the frame I and the MVD data of the frame B and frame P, thereby effectively improving the instantaneity and the practicability.
Owner:NINGBO UNIV

Reversible information hiding method of encryption image based on coding compression

The invention discloses a reversible information hiding method of an encryption image based on coding compression. The method comprises steps of dividing an original image into a prediction region and a non-prediction region before encryption, calculating a pixel prediction vale of the prediction region so as to obtain a prediction difference value and carrying out lossless compression on the prediction difference value to obtain compression data; and randomly generating carrier data and carrying out image encryption and reconstruction on non-precision pixels, the compression data and the carrier data. In order to correctly restore the original image, code table hidden information should be determined and by hiding the code table information and the secret information in the carrier data, reversible hiding is achieved. For the carrier image, secret information is extracted in the carrier data; then, the non-prediction pixels and the compression data are decrypted; according to the code table information, the compression data is decompressed so that the prediction difference value is obtained; and finally, according to the non-prediction pixels and the prediction difference value, the original image is restored in a lossless manner. Compared with the prior art, the provided method has quite big hiding capacity; reversible hiding can be completely achieved; and the method has high actual application value.
Owner:GUANGXI NORMAL UNIV

Adaptive image encryption domain reversible hiding method based on hybrid encryption mechanism

The invention discloses an adaptive image encryption domain reversible hiding method based on a hybrid encryption mechanism. A user performs sequential prediction on a digital image to be encrypted toobtain the pixel type identification matrix of an original image, and adaptively selects an optimal block size of the pixel type identification matrix to generate an optimal block type identificationmatrix; a random number is taken as a secret key to combine the block type identification matrix, and 'xor plus pixel classification scrambling' is used for generating an encrypted image of the original image; the random number is taken as a secret key to encrypt partial information of the block type identification matrix, the public key of a receiver uses an asymmetric encryption algorithm to encrypt 'the random number, the residual block type identification matrix information and the optimal block size', which are then serially embedded into a variable pixel of the encrypted image; the receiver uses a private key to decrypt the extracted key information and can obtain a decrypted image the same as the original image and a plaintext image with additional information through sequence recovery. The method reduces the difficulty of secret key management, improves the security of image transmission, and brings convenience for cloud management.
Owner:SOUTHWEST JIAOTONG UNIV

HEVC video information hiding method based on intra-frame prediction mode difference

InactiveCN104602016AIncrease hidden capacitySubjective and objective quality declineDigital video signal modificationVideo qualityAlgorithm
The invention discloses an HEVC video information hiding method based on intra-frame prediction mode difference. The HEVC video information hiding method based on the intra-frame prediction mode difference includes that modulating a prediction mode and embedding secret information in an intra-frame prediction coding process for a 4*4 prediction unit through analyzing an HEVC coding and decoding structure, and using the difference between prediction modes of two continuous 4*4 prediction units to embed two-bit or three-bit secret information according to different mapping rules to improve the hiding capacity. Because the prediction mode correction greatly influences the subjective and objective quality of the video after embedding the secret information, the HEVC video information hiding method based on the intra-frame prediction mode difference embeds the two-bit secret information for two prediction units with prediction modes 0 or 1 according to the parity modification prediction mode of the secret information and embeds the three-bit secret information for two prediction units with directional prediction modes through the difference between the prediction modes of two prediction units, and the secret information is not embedded under the other situations; the HEVC video information hiding method based on the intra-frame prediction mode difference lowers the video quality reduction due to embedding secret information.
Owner:NINGBO UNIV

Data hiding method based on image set

The invention discloses a data hiding method based on an image set. The data hiding method comprises the step of carrying out anti-overflow process on an original carrier image, the step of developing a reserved pixel area, the step of generating a carrier image, the step of respectively carrying out subtraction on the carrier image and a basic image in the built image set to obtain difference images and histogram information, the step of regarding the difference image which has largest peak value of a histogram as a carrier and hiding data based on the information hiding method of the histogram, the step of hiding label information corresponding the difference image which has the largest peak value of the histogram and the difference image which has the lowest peak value of the histogram based on the reserved pixel area serving as the carrier, the step of adding a secret containing difference image and the corresponding image in the image set to obtain a secret containing image, the step of carrying out xor operation on the secret containing image and the basic image corresponding to the lowest histogram peak value to obtain a secret containing carrier image to be transmitted, and the step of extracting label information from the secret containing carrier image through a receiving terminal, carrying out the information hiding inverse process and recovering hidden data and hidden carrier images. The capacity of information hiding is improved through the image set, and safer lossless data hiding is achieved.
Owner:XIAN INSTITUE OF SPACE RADIO TECH

High-order airspace hiding method for resisting sample pair analysis

The invention relates to a high-order airspace hiding method for resisting sample pair analysis. The information hiding technology is a new research topic in the information security field in recent years. The technology is to hide secret information in other carriers to go beyond the awareness of people so as to ensure the security of secret information. The high-order airspace hiding method for resistable sample pair analysis comprises the following steps: finding a pixel point capable of performing high-order hiding in a carrier gray level image with a size of N1xN2, converting the to-be-hidden secret image with a size of M1xM2 into binary information stream, determining on which position of the carrier image the binary information stream is hidden through Logistic chaos mapping, the Logistic chaos mapping formula being Z(n+1)=4Zn(1-Zn), wherein Zn belonging to (0,1); if the secret information is identical to the bit information, substitution is not performed, and otherwise, substitution is performed, then necessary compensation algorithm is performed to control the variation range of the pixel points within four pixels, then repeating the process till all information is hidden. The invention is used for information hiding technology.
Owner:HARBIN UNIV OF SCI & TECH

Encryption domain three-dimensional model reversible information hiding method based on prediction error extension

The invention discloses an encryption domain three-dimensional model reversible information hiding method based on prediction error extension. In a traditional method, due to invisibility of an encrypted three-dimensional model, data security protection of the three-dimensional model cannot be achieved. According to the method, a Paillier encryption system is used for encrypting the three-dimensional model, so that the privacy of the three-dimensional model is protected. The method comprises the following steps: firstly, dividing vertexes into an embedded vertex set and a reference vertex setby utilizing the characteristic that the vertexes of embedded information are not adjacent to each other; secondly, calculating a prediction error of the embedded vertex set by utilizing the referencevertex set; and finally, expanding the module length of the prediction error by utilizing the embedded secret key so as to embed secret information; at a receiving end, extracting secret informationby comparing the module length value ranges of the prediction errors, and recovering the original model by utilizing the reference vertex set. Compared with a traditional method, the method has the advantages that the bit error rate is low when the secret information is extracted, the directly decrypted model has less distortion, and the information hiding capacity is improved to a certain extent.
Owner:绍兴聚量数据技术有限公司

Satellite short message and information cooperative transmission method

According to a satellite short message and information cooperative transmission method provided by the invention, information hiding processing is carried out in a navigation short message, and cooperative transmission of information and the short message is carried out by utilizing the characteristics of short message data. The method is applied to the framework of the national Chinese charactercoding standard GB2312. Through information preprocessing and encoding and decoding methods, the 3 / 16 lossless information hiding and embedding rate is realized, nearly 20% of characters can be hiddenand transmitted in any standard character by utilizing a short message transmission channel on the basis of not increasing the transmission data volume, the hidden character information and the original short message can be recovered in a lossless manner, and the security and confidentiality are realized. According to the method, the practicability of a satellite short message system is expanded,the application range of satellite communication and navigation satellite systems in China is expanded, and new value-added short message information service can be provided for millions and tens ofmillions of users.
Owner:XIAN INSTITUE OF SPACE RADIO TECH

High-capacity data protection method based on GAN augmented image foreground object

The invention discloses a high-capacity data protection method based on a GAN augmented image foreground object. By applying various GANs to information hiding, the high-capacity data protection method obtains an embedded distortion probability graph, calculates an unsuitable steganography area according to the embedded distortion probability graph, generates a foreground object in the unsuitablesteganography area through a fixed area object generation and information embedding module, and then hides the secret information in the generated graph. The high-capacity data protection method mainly comprises the following steps: (1) inputting an original image into a steganography probability graph generator; (2) calculating the steganography probability graph; (3) calculating the unsuitable steganography area; (4) adding a texture object into the original image; and (5) carrying out an information hiding algorithm to embed secret information. According to the high-capacity data protectionmethod, the unsuitable hidden area is calculated for the image in advance, so that the directional hiding capability of the unsuitable hidden area of the original image in information hiding is improved; and provided is a high-capacity data protection method which increases hiding capacity and has high security.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Image tampering detection positioning and self-recovery method based on fragile watermark

The invention discloses an image tampering detection positioning and self-recovery method for fragile watermarks, and the method comprises the steps: carrying out the one-dimensional arrangement of each row of pixels in an original image I to form a one-dimensional pixel image, dividing the one-dimensional pixel image into a non-overlapping image block sequence, and enabling each image block to comprise two continuous pixel points; constructing a Hash indicator table HIT, a Hash address table HAT, a tag table FT and an inverse Hash address table IHAT of each image block; determining a puzzle matrix corresponding to the key K, and constructing a dual matrix DM based on the puzzle matrix; generating authentication data B based on the Hash indicator table HIT of the image block Bu and the feature information of the image block BIHAT(u), and embedding the authentication data B into the image block Bu to generate a digital watermark image I '; and according to the determined image authentication rule, carrying out tampering detection positioning and self-recovery on the digital watermark image I'. According to the method, a perfect Hash model is used for generating authentication data, so that the authentication data has the self-recovery performance of a tampered area while a high tampering detection rate is obtained.
Owner:ANHUI NORMAL UNIV

High-order airspace hiding method for resisting differential detection

The invention relates to a high-order airspace hiding method for resisting differential detection. As a necessary supplement of cryptology and a hot research topic in the information security field in recent years, the information hiding technology draws the attention of more and more people. The technology is to hide secret information in other carriers to go beyond the awareness of people so as to avoid the attack of attackers and ensure the security of secret information. The high-order airspace hiding method for resistable differential detection comprises the following steps: finding a pixel point capable of performing high-order hiding in a carrier gray level image with a size of N1xN2, converting the to-be-hidden secret image with a size of M1xM2 into binary information stream, determining on which position of the carrier image the binary information stream is hidden through Logistic chaos mapping, the Logistic chaos mapping formula being Z(n+1)=4Zn(1-Zn), wherein Zn belonging to (0,1); if the secret information is identical to the bit information, substitution is not performed, and otherwise, substitution is performed, then repeating the process till all information is hidden; in order to resist differential detection, interval size exchange is performed between the pixel points where information is hidden, i.e. +/-5 operation is performed. The invention is used for information hiding technology.
Owner:哈尔滨佳云科技有限公司

Password map carrier-free test question disguise method of non-direct transmission and random codebook

The invention provides a password map carrier-free test question disguise method of non-direct transmission and a random codebook. The method comprises the following steps: firstly, scrambling the codebook via a pseudo-random sequence, then, performing pseudo-random encoding on password map pixels by using the scrambled codebook index to avoid direct channel transmission of the password map; then,converting the encoded index location into a 32-ary sequence, and further expressing the same through 24-ary and 9-ary numbers; and finally, indirectly expressing choice question arrangement sequencenumbers and gap filling answers randomly generated by each 24-ary and 9-ary numbers in the sequence relative to a random offset to generate random test questions. Compared with the existing method, the method has the advantages of avoiding the direct channel transmission of the password map, the problems that the additional carrier is modified, the hiding capacity of the traditional non-embeddedcarrier-free information is small, a large text or image database needs to be constructed and maintained and that the search cost is high are avoided by using a password containing test question generation mode, and the password map is restored just by a correct key.
Owner:SHAANXI NORMAL UNIV

Reversible information hiding method for bit plane compressed encrypted image

The invention provides an encrypted image reversible information hiding method based on bit plane compression. For an image owner, the method comprises the steps: firstly, performing median edge detection prediction on an original image to obtain a prediction error; secondly, calculating a bit plane compression space by using an adaptive selection method; thirdly, selecting an available bit plane to carry out self-adaptive variable-length block coding so as to code the image block; and finally, generating an encrypted connection information flow and sending the encrypted connection information flow to an information hider. For an information hiding person, the information hiding person encrypts secret information by using the hiding secret key and embeds the secret information into the vacated redundant space to obtain a secret-containing image. For the receiver, if the receiver has the encryption key, the original image can be obtained through decryption; if the mobile terminal has a hidden key, the mobile terminal can be used for decrypting and acquiring secret information; if the two secret keys are contained at the same time, the original image and the secret information can be decrypted at the same time. Compared with other existing related work, the scheme provided by the invention has relatively excellent performance in embedding capacity.
Owner:绍兴聚量数据技术有限公司

Two-stage mobile edge computing communication method based on NOMA and unmanned aerial vehicle assistance

The invention discloses a two-stage mobile edge computing communication method based on NOMA and unmanned aerial vehicle assistance, which is applied to a communication system, the communication system comprises a user group, a relay unmanned aerial vehicle group and a ground base station, and the user group communicates with the ground base station through the relay unmanned aerial vehicle group. Each user in the user group executes the following steps that: the task load of each user in the user group is acquired, the average task load of the users in the user group is calculated, and when the task load of the user is greater than or equal to the average task load, the user is determined as a completely unloaded user; the complete unloading user completely unloads the task load to the relay unmanned aerial vehicle determined in the relay unmanned aerial vehicle group; the relay unmanned aerial vehicle receives the task amount sent by the complete unloading user and unloads a part of the received task amount to the ground base station according to the calculated task unloading ratio; user task data unloading is reasonably carried out in the communication system, and the performance of the communication system can be improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Information hiding method, device and system based on cavity space pyramid

In order to solve the problems of low image information hiding capacity and distortion in the aspect of data privacy protection, the invention provides an information hiding method, device and system based on a cavity spatial pyramid, which are used for embedding and extracting watermark information in a protected image to realize image version authentication and protection. According to the method, a cavity space pyramid module is built by adopting cascaded and parallel cavity convolution layers, the receptive field is expanded, the multi-scale and multi-cavity-rate characteristics are extracted, information is more accurately hidden in a semantic redundancy position, and the decoding capability of a network on embedded information is improved; meanwhile, the decoding accuracy is improved by using cross entropy loss; in addition, the quality of the generated image is improved through residual error and linear operation confrontation in the discrimination network; finally, in order to improve the network stability, updating of different scales, cosine annealing adjustment and an intensive connection strategy are used in training. According to the method, high-capacity information hiding is achieved, meanwhile, it is guaranteed that images are not distorted, and experiments prove that the method has high information hiding capacity.
Owner:SHANDONG UNIV

Encrypted image reversible information hiding method based on adaptive parameter binary tree marking

The invention provides an encrypted image reversible information hiding method based on adaptive parameter binary tree marking. The method comprises the steps: for an image owner, carrying out vector quantization prediction on an original image to obtain a prediction error; obtaining an optimal parameter set for the original image by using a self-adaptive parameter binary tree marking method, and marking image blocks by using the optimal parameter set; and finally, encrypting the index value and the non-embeddable pixel of the image block and sending the encrypted index value and non-embeddable pixel to an information hider. For an information hiding person, secret information is encrypted by using the encryption key and embedded into the vacated redundant space to obtain a secret-containing image. For the receiver, if the receiver has the encryption key, the original image can be obtained through decryption; if the mobile terminal has a hidden key, the mobile terminal can be used for decrypting and acquiring secret information; if the two secret keys are contained at the same time, the original image and the secret information can be decrypted at the same time. The scheme provided by the invention has relatively excellent performance in embedding capacity.
Owner:绍兴图信物联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products