Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

High-safety JPEG image steganography method

A high-security, image technology, applied in the field of high-security JPEG image steganography, can solve the problems of no model or solution, different degrees of importance, unreasonable distortion functions, etc., to achieve good image quality and ensure security , to ensure the effect of image quality

Active Publication Date: 2013-10-09
UNIV OF SCI & TECH OF CHINA
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Research shows that using an unreasonable distortion function for steganography will not guarantee the quality of the embedded message image and the security of the embedded message
[0004] However, there is currently no general model or solution for how to define the distortion function
The reason is that there are various factors affecting carrier embedding distortion
Moreover, the importance of each factor affecting carrier embedding distortion is not the same

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-safety JPEG image steganography method
  • High-safety JPEG image steganography method
  • High-safety JPEG image steganography method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a flow chart of a high-security JPEG image steganography method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method mainly includes the following steps:

[0022] Step 11, obtain the quantized rounding error of each quantized discrete cosine transform DCT coefficient in the transform domain during the JPEG image compression process, and the quantized DCT coefficient x before and after rounding i with X i ;.

[0023] The DCT coefficients include DC coefficients and AC coefficients. After the DCT transformation is performed according to the 8×8 blocks, the coefficient in the upper left corner of the 8×8 block is the DCT DC coefficient, and the remaining 63 coefficients are all the DCT AC coefficients.

[0024] In addition, the quantized DCT coefficient x before and after rounding i with X i The relationship between can be expressed as: X i =round(x i ), that is, X i to take the closest to x i an integer of .

...

Embodiment 2

[0039] In order to facilitate understanding of the present invention, below in conjunction with figure 2 The present invention is further introduced. Such as figure 2 As shown, the method mainly includes the following steps:

[0040] Step 21, obtain the quantized rounding error of each quantized discrete cosine transform DCT coefficient in the transform domain during the JPEG image compression process, and the quantized DCT coefficient x before and after rounding i with X i ;.

[0041] The DCT coefficients include DC coefficients and AC coefficients. After DCT transformation is performed according to 8×8 blocks, the coefficient in the upper left corner of the 8×8 block is DCT DC coefficients, and the remaining 63 coefficients are all DCT AC coefficients.

[0042] In addition, the quantized DCT coefficient x before and after rounding i with X i The relationship between can be expressed as: X i =round(x i ), that is, X i to take the closest to x i an integer of .

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-safety JPEG image steganography method. The method includes the steps of acquiring the quantitative rounding error of each quantitative discrete cosine transformation coefficient in a transformation domain in the JPEG image compression process, and quantitative DCT coefficients x and X before and after rounding, defining corresponding longitudinal distortion and transverse distortion by the utilization of the quantitative DCT coefficient x and X before and after the rounding, building a minimized imbedded distortion model of the longitudinal distortion by the utilization of the quantitative rounding errors, calculating the optimal modification probability of each quantitative DCT coefficient according to the minimized embedded distortion model of the longitudinal distortion, the corresponding longitudinal distortion and the corresponding transverse distortion, converting the acquired optimal modification probability of each quantitative DCT coefficient into ternary distortion, calling check space time trellis codes, embedding a secrete message into the rounded quantitative DCT coefficient X which serves as a carrier, and performing packaging to form an integral JPEG image. The method ensures the safety of the embedded secrete message and good image quality after the secrete message is embedded.

Description

technical field [0001] The invention relates to the technical fields of image compression and information hiding, in particular to a high-security JPEG image steganography method. Background technique [0002] As an important branch of information hiding, steganography is used to convey secret messages in seemingly normal communication channels. Steganalysis is a passive attack on steganography, which is used to detect whether hidden information is contained in multimedia data. Secure steganography should be able to resist all kinds of steganalysis attacks, that is, it has universality against detection. [0003] JPEG image is the most popular image format in the network, and it is a practical steganographic carrier. In the prior art, the NCSR (New Channel Selection Rule) method proposed by Huang Fangjun et al. is currently one of the most effective JPEG image steganography methods. This method uses quantization rounding errors and absolute values ​​of DCT coefficients to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T9/00
Inventor 俞能海张卫明包震坤姚远志
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products