Lossless data hiding method based on difference image histogram cycle spinning

A cyclic translation and data hiding technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of embedding capacity dependence, algorithm embedding capacity is small, affecting hidden data extraction, etc.

Inactive Publication Date: 2013-05-29
CENT SOUTH UNIV
View PDF1 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The image carrier has high redundancy, which is especially suitable for large-capacity data hiding. The common lossless data hiding methods are divided into two categories. One is the algorithm based on the space domain, which directly modifies the image pixels to complete the data. Embedding, the algorithm embedding capacity is large, the calculation is simple, and it is often used for data hiding of images, but its biggest feature is poor robustness, that is, when the hidden image is tampered to any degree, it will affect the extraction of hidden data and image recovery; the second The class is an algorithm based on the frequency domain. This type of algorithm converts the image pixels into the corresponding transform domain, and then modifies the coefficients of the transform domain to complete the data embedding. The algorithm embedding capacity is small and the calculation is complicate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lossless data hiding method based on difference image histogram cycle spinning
  • Lossless data hiding method based on difference image histogram cycle spinning
  • Lossless data hiding method based on difference image histogram cycle spinning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] The present invention will be described in further detail below in conjunction with accompanying drawing and specific embodiment:

[0097] Although the invention has been described with respect to specific embodiments, it is apparent that the principles of the invention, as defined by the appended claims, can be applied beyond the embodiments specifically described herein. Moreover, some details have been left out here in order not to obscure the inventive aspects of the invention. Specific details not described within this application are within the purview of any person of ordinary skill in the art.

[0098] The drawings in this application and their accompanying detailed description are for purposes of illustrating example embodiments of the invention only. In order to maintain brevity, other embodiments of the invention using the principles of the invention are not specifically described in this application and are not specifically illustrated by the present drawin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lossless data hiding method based on difference image histogram cycle spinning. The lossless data hiding method includes steps of encrypting, secret key transmitting and data recovery. During encrypting, an original image is divided into a plurality of sub image blocks at the transmitting end, cycle spinning operation is performed by aid of a sub block difference histogram to achieve step-by-step embedding of secret data, a secret image C' is formed and transmitted to the receiving end. During secret key transmitting, the size of sub image blocks, the length of embedded data and the embedding level L serve as a secret key to be distributed to the receiving end. During data recovery, the receiving end extracts the secret data step by step from the secret image C' in an inverse method of the embedding process, block difference and original image data are recovered, and secret data transmission and lossless recovery based on the image carrier are achieved. The lossless data hiding method overcomes the defect that the capacity of the original histogram spinning algorithm depends on a single peak point, and increases the embedding capacity through a cycle embedding method. Experimental results prove that the lossless data hiding method can well meet requirements for high capacity, low distortion and high efficiency.

Description

technical field [0001] The invention relates to a lossless data hiding method based on the cyclic translation of difference image histograms, and belongs to the field of image lossless data hiding (encryption). Background technique [0002] Lossless image data hiding technology, also known as reversible image data hiding, uses a specific lossless data embedding method to embed covert data in the carrier image to form a covert image, and the covert image can be restored to its original state after the data is extracted. The biggest difference between the lossless data hiding technology and the previous lossy methods is that the data of the carrier itself will not be changed, which greatly expands the application range of data hiding. For example, in some specific medical, legal, military (not related to military secrets, just to illustrate that military images have strict integrity requirements) and art carrier images have extremely high requirements for integrity. Communica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 陈志刚邓小鸿翦鹏梁涤青
Owner CENT SOUTH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products