Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for hiding running coding of confidential information

A technology of secret information and encoding, which is applied in the field of information hiding and can solve problems such as visual distortion

Inactive Publication Date: 2015-02-25
SHANGHAI UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the shortcomings of the previous encoding methods are: 1. Data embedding and extraction are carried out in the form of packets, that is, the embedding / extraction process is independent of each other in different carrier blocks
2. By default, the modification of all carrier positions due to embedded data has the same impact on the carrier image itself, ignoring the obvious visual distortion that may occur due to the destruction of the correlation between pixels after embedding secret information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for hiding running coding of confidential information
  • Method for hiding running coding of confidential information
  • Method for hiding running coding of confidential information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] Embodiment one: see figure 1 , figure 2 and image 3 , the mobile code hiding method of confidential information is characterized in that: one is the secret information embedding process of the sender, and the other is the secret information extraction process of the receiver. The specific operation steps are as follows:

[0051] 1. Embedding process of recipient’s secret information:

[0052] a. Define the transmission rate of the system k , k = the number of lowest bits of the carrier / the number of bits of secret information, and it is considered to be a positive integer, and it is always greater than 1.

[0053] assume existing L The secret information to be embedded is expressed as: X = [x 1 , x 2 ,...,x L ],vector X is a binary sequence, namely x i ∈{0,1}, i =1,2,..., L .

[0054] Express the lowest bit of the carrier pixel that can be embedded with secret data as:

[0055] ,

[0056] here, b i,j The value of is 0 or 1, indicating the lowest b...

Embodiment 2

[0073] Embodiment 2: This embodiment is basically the same as Embodiment 1, and an example is described in conjunction with the accompanying drawings. The operating steps of the mobile code hiding method for this confidential information are as follows:

[0074] 1. Embedding process of recipient’s secret information:

[0075] 1. The original carrier image is usually relatively large. In order to illustrate the working principle of this embodiment, the Figure 4 An image block with a size of 10×6 in the upper left corner (for the pixel values ​​of the image block, see Figure 5 ), here in order to facilitate the calculation of the change cost value of each pixel, we take the 8×4 block in the middle of the image block as the carrier space (actually, for the pixels located on the edge of the image, when calculating the change cost value, the points are correspondingly reduced counts). Figure 6 It is the LSB bit value of the 8×4 pixel block, that is, the carrier space B,

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for hiding running coding of confidential information. The method comprises a process of embedding the confidential information of a sender and a process of extracting the confidential information of a receiver. The figure 1 represents a general flow diagram provided in the invention; the confidential information and carrier data are both taken as bit streams by the sender, that is, each confidential bit can be represented by a series of continuous carrier bits; and after the receiver receives graphics containing the confidential information, the receiver extracts the confidential data according to the secret key shared by the sender and the receiver. The method provided by the invention can be used for hiding the information by taking digital images such as grey, color and the like as carriers, and is an efficient and safe information hiding method.

Description

technical field [0001] The invention relates to an information hiding method using a digital image as a carrier. Background technique [0002] Information hiding technology is to embed the secret message to be sent into the multimedia carrier signal (usually a digital image), and transmit it through public channels, especially the Internet, in a way that does not attract the attention of the outside world, so as to realize covert communication, which can be used for military intelligence and espionage The secret transmission of intelligence and commercial secrets is of great significance to information security and national interests. At present, there are many effective detection methods for information hiding, which mainly reveal the existence of hidden signals in the carrier by detecting statistical anomalies caused by data embedding. Generally, the more secret information embedded in the carrier, the weaker its ability to resist detection attacks, so when using informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 施柳栗风永张新鹏钱振兴王朔中
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products