High-safety JPEG image steganography method

A high-security, image technology, applied in the field of high-security JPEG image steganography, can solve the problems of no model or solution, different degrees of importance, unreasonable distortion functions, etc., to achieve good image quality and ensure security , to ensure the effect of image quality

Active Publication Date: 2013-10-09
UNIV OF SCI & TECH OF CHINA
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Research shows that using an unreasonable distortion function for steganography will not guarantee the quality of the embedded message image and the security of the embedded message
[0004] However, there is currently no general mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-safety JPEG image steganography method
  • High-safety JPEG image steganography method
  • High-safety JPEG image steganography method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0020] Example one

[0021] figure 1 This is a flowchart of a high-security JPEG image steganography method provided in the first embodiment of the present invention. Such as figure 1 As shown, the method mainly includes the following steps:

[0022] Step 11. Obtain the quantization rounding error of each quantized discrete cosine transform DCT coefficient in the transform domain in the JPEG image compression process, and the quantized DCT coefficient x before and after rounding i With X i ;.

[0023] The DCT coefficient includes a direct current coefficient and an alternating current coefficient. After the DCT transformation is performed according to the 8×8 block, the coefficient at the upper left corner of the 8×8 block is the DCT direct current coefficient, and the remaining 63 coefficients are all DCT alternating current coefficients.

[0024] In addition, the quantized DCT coefficient x before and after rounding i With X i The relationship between can be expressed as: X i =roun...

Example Embodiment

[0038] Example two

[0039] In order to facilitate the understanding of the present invention, the following is attached figure 2 The present invention is further introduced. Such as figure 2 As shown, the method mainly includes the following steps:

[0040] Step 21: Obtain the quantized rounding error of each quantized discrete cosine transform DCT coefficient in the transform domain in the JPEG image compression process, and the quantized DCT coefficient x before and after the rounding i With X i ;.

[0041] The DCT coefficients include DC coefficients and AC coefficients. After DCT transformation is performed according to 8×8 blocks, the upper-left coefficient of the 8×8 block is the DCT DC coefficient, and the remaining 63 coefficients are all DCT AC coefficients.

[0042] In addition, the quantized DCT coefficient x before and after rounding i With X i The relationship between can be expressed as: X i =round(x i ), which means X i To get the closest x i Integer.

[0043] Step 22...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-safety JPEG image steganography method. The method includes the steps of acquiring the quantitative rounding error of each quantitative discrete cosine transformation coefficient in a transformation domain in the JPEG image compression process, and quantitative DCT coefficients x and X before and after rounding, defining corresponding longitudinal distortion and transverse distortion by the utilization of the quantitative DCT coefficient x and X before and after the rounding, building a minimized imbedded distortion model of the longitudinal distortion by the utilization of the quantitative rounding errors, calculating the optimal modification probability of each quantitative DCT coefficient according to the minimized embedded distortion model of the longitudinal distortion, the corresponding longitudinal distortion and the corresponding transverse distortion, converting the acquired optimal modification probability of each quantitative DCT coefficient into ternary distortion, calling check space time trellis codes, embedding a secrete message into the rounded quantitative DCT coefficient X which serves as a carrier, and performing packaging to form an integral JPEG image. The method ensures the safety of the embedded secrete message and good image quality after the secrete message is embedded.

Description

technical field [0001] The invention relates to the technical fields of image compression and information hiding, in particular to a high-security JPEG image steganography method. Background technique [0002] As an important branch of information hiding, steganography is used to convey secret messages in seemingly normal communication channels. Steganalysis is a passive attack on steganography, which is used to detect whether hidden information is contained in multimedia data. Secure steganography should be able to resist all kinds of steganalysis attacks, that is, it has universality against detection. [0003] JPEG image is the most popular image format in the network, and it is a practical steganographic carrier. In the prior art, the NCSR (New Channel Selection Rule) method proposed by Huang Fangjun et al. is currently one of the most effective JPEG image steganography methods. This method uses quantization rounding errors and absolute values ​​of DCT coefficients to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T9/00
Inventor 俞能海张卫明包震坤姚远志
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products