Method for hiding Chebyshev neural network chaotic digital watermark information

A Chebyshev, neural network technology, applied in the field of information security, can solve the problems of restricting the application of sequence passwords and the time can not be calculated theoretically, to increase the difficulty and improve the security effect.

Inactive Publication Date: 2010-11-10
GUANGDONG OCEAN UNIVERSITY
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the only theoretically safe "one-time pad" sequence cipher is used for encryption, there are limitations in the distribution of a large number of random key streams, how to synchronize after out-of-synchronization, parameter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for hiding Chebyshev neural network chaotic digital watermark information
  • Method for hiding Chebyshev neural network chaotic digital watermark information
  • Method for hiding Chebyshev neural network chaotic digital watermark information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Chebyshev neural network chaotic digital watermark information hiding method of the present invention:

[0035] 1. The sender performs the following operations:

[0036] (1) Generate chaotic sequence

[0037] For the Logistic chaotic sequence x k+1 =μx k (1-x k ); k=1, 2, ..., s, take the standard Logistic chaos μ=4.0, let the initial value of the chaos x 1 =0.12, the number of samples s=100, the available training samples are (x t , x t+1 ), t=1, 2, ..., 100;

[0038] (2) Construct a neural network model

[0039] exist figure 1 In the shown neural network, the number of neurons in the hidden layer is assumed to be n=3, the learning rate η=0.1, and the initial weight is randomly selected. For training samples (x t , x t+1 ), t=1, 2,..., 100 After 300 times of learning, the training index J=3.2517×10 -6 , the final weight vector W=[-2, 4, -2], indicating that the neural network model is constructed successfully;

[0040] (3) Information encryption

[0041] T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for hiding Chebyshev neural network chaotic digital watermark information. The method comprises the following steps: utilizing a neural network to generate a chaotic sequence; carrying out XOR encryption on digital image secret information needing to be hidden to generate chaotic digital watermark; embedding the digital watermark into a carrier image; under the condition of basically not changing the external character and the use value of the carrier image, ensuring that the sense organs of people can not sense the existence of hardly-sensing digital watermark on the appearance of a stego-image, thereby escaping the attention and attacks of illegal users to achieve the covert transfer of secret information as well as achieve the purpose of covert communication. The invention can be widely used in covert communication, data non-repudiation, digital copyright protection, antifalsification and data integrity.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a Chebyshev (Chebyshev) neural network chaotic digital watermark information hiding method. Background technique [0002] The traditional information security technology is to apply the basic principles, techniques and methods of cryptography to encrypt secret information, making it difficult for illegal users to decipher the encrypted ciphertext. Because the ciphertext is usually a group of unrecognizable garbled codes, and it is transmitted in an open channel, it is easy to attract the attention and attack of illegal users; according to the principle of Shannon's information theory, the only safe one in theory is the "one-time pad" sequence cipher. [0003] Information hiding is a method of hiding secret information in another non-secret medium (image, sound, document file), so as not to be discovered by illegal users. This non-secret medium is usually called a ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G06N3/02
Inventor 邹阿金
Owner GUANGDONG OCEAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products