Unlock instant, AI-driven research and patent intelligence for your innovation.
Method for hiding running coding of confidential information
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of secret information and encoding, which is applied in the field of information hiding and can solve problems such as visual distortion
Inactive Publication Date: 2015-02-25
SHANGHAI UNIV
View PDF2 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] However, the shortcomings of the previous encoding methods are: 1. Data embedding and extraction are carried out in the form of packets, that is, the embedding / extraction process is independent of each other in different carrier blocks
2. By default, the modification of all carrier positions due to embedded data has the same impact on the carrier image itself, ignoring the obvious visual distortion that may occur due to the destruction of the correlation between pixels after embedding secret information
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0050] Embodiment one: see figure 1 , figure 2 and image 3 , the mobile code hiding method of confidential information is characterized in that: one is the secret information embedding process of the sender, and the other is the secret information extraction process of the receiver. The specific operation steps are as follows:
[0052] a. Define the transmission rate of the system k , k = the number of lowest bits of the carrier / the number of bits of secret information, and it is considered to be a positive integer, and it is always greater than 1.
[0053] assume existing L The secret information to be embedded is expressed as: X = [x 1 , x 2 ,...,x L ],vector X is a binary sequence, namely x i ∈{0,1}, i =1,2,..., L .
[0054] Express the lowest bit of the carrier pixel that can be embedded with secret data as:
[0055] ,
[0056] here, b i,j The value of is 0 or 1, indicating the lowest b...
Embodiment 2
[0073] Embodiment 2: This embodiment is basically the same as Embodiment 1, and an example is described in conjunction with the accompanying drawings. The operating steps of the mobile code hiding method for this confidential information are as follows:
[0075] 1. The original carrier image is usually relatively large. In order to illustrate the working principle of this embodiment, the Figure 4 An image block with a size of 10×6 in the upper left corner (for the pixel values of the image block, see Figure 5 ), here in order to facilitate the calculation of the change cost value of each pixel, we take the 8×4 block in the middle of the image block as the carrier space (actually, for the pixels located on the edge of the image, when calculating the change cost value, the points are correspondingly reduced counts). Figure 6 It is the LSB bit value of the 8×4 pixel block, that is, the carrier space B,
[...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a method for hiding running coding of confidential information. The method comprises a process of embedding the confidential information of a sender and a process of extracting the confidential information of a receiver. The figure 1 represents a general flow diagram provided in the invention; the confidential information and carrier data are both taken as bit streams by the sender, that is, each confidential bit can be represented by a series of continuous carrier bits; and after the receiver receives graphics containing the confidential information, the receiver extracts the confidential data according to the secret key shared by the sender and the receiver. The method provided by the invention can be used for hiding the information by taking digital images such as grey, color and the like as carriers, and is an efficient and safe information hiding method.
Description
technical field [0001] The invention relates to an information hiding method using a digital image as a carrier. Background technique [0002] Information hiding technology is to embed the secret message to be sent into the multimediacarrier signal (usually a digital image), and transmit it through public channels, especially the Internet, in a way that does not attract the attention of the outside world, so as to realize covert communication, which can be used for military intelligence and espionage The secret transmission of intelligence and commercial secrets is of great significance to information security and national interests. At present, there are many effective detection methods for information hiding, which mainly reveal the existence of hidden signals in the carrier by detecting statistical anomalies caused by data embedding. Generally, the more secret information embedded in the carrier, the weaker its ability to resist detection attacks, so when using informat...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.