Image steganography method and secret information extraction method

A secret information and image technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of embedding and steganographic methods with small embedding capacity and image distortion

Inactive Publication Date: 2013-11-27
NINGBO UNIV
View PDF1 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since this method does not embed different data information in different regions according to the human visual system (HVS), it will inevitably cause image distortion.
[0015] In summary, under the premise of maintaining good image imperceptibility and certain anti-steganographic analysis ability, it is urgent to provide an image steganography method to solve the problem of small embedding capacity of steganography method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image steganography method and secret information extraction method
  • Image steganography method and secret information extraction method
  • Image steganography method and secret information extraction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] This embodiment first provides an image steganography method for embedding secret information S with size N 1 ×N 2 In the carrier image I, it includes the following steps, see figure 1 Shown:

[0045] (1), using the zigzag scanning method, in order from top to bottom, the size is N 1 ×N 2 The pixel information of the two-dimensional carrier image I is converted into a set of continuous non-overlapping one-dimensional pixel value data, two adjacent pixel values ​​are a group, and each group of pixel values ​​is represented by W i said, W i A pair of pixel values ​​in (x i ,y i ) means, 0≤i≤N 1 ×N 2 / 2, finally by d i =|x i -y i |, calculate the difference between each pair of pixel values;

[0046] (2) Perform DES encryption on the secret information S, and convert the encrypted secret information S′ into a decimal integer q;

[0047] (3), d calculated by (1) i Values ​​are divided into four intervals T j , j=1,2,3,4, where T 1 The interval range is [0,15...

Embodiment 2

[0065] Different from Embodiment 1, in the step (6), select scheme A or scheme B for the secret-carrying pixel pair (x i ',y i ') to adjust:

[0066] calculate X A = log 2 B ( d i ) ( x i - x i ′ ′ ′ ) 2 + ( y i - ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image steganography method and a secret information extraction method. The image steganography method comprises the steps: (1), converting pixel information of a two-dimensional carrier image I into a set of continuous and non-overlapping one-dimensional pixel value data, and computing a difference value of each pair of pixel values, wherein the size of the two-dimensional carrier image I is N1*N2; (2), performing DES encryption on secret information S, and transferring encrypted secret information S' into a decimal integer q; (3), dividing a di value computed in the step (1) into four sections Tj; (4), obtaining SB(di) according to the equation: SB(di)=qmodB(di), and inserting SB(di) into a pixel pair (xi, yi) through a DE method; (5), detecting whether overflowing occurs or not. Compared with the prior art, the image steganography method has the advantages of being capable of improving insertion capacity of the carrier image remarkably and controlling image distortion effectively. The image steganography method has the steganalysis abilities such as the certain safety performance and resistance to RS attack, and can operate efficiently on mainstream software and hardware platforms of a mobile intelligent terminal.

Description

technical field [0001] The invention relates to an image steganography method and a secret information extraction method. Background technique [0002] Steganography is a covert communication that uses redundancy in multimedia such as text, sound, image, and video, and human sensory redundancy to hide information in multimedia and transmit it through a public network. Steganography not only hides the content of the communication, but also hides the fact of the communication. Due to the large number of images on the network, the large redundancy of image data, and the large capacity of embedding secret information, the current mainstream steganography uses images as carriers. Imperceptibility is an important characteristic of steganography, also called transparency or anti-detection performance. It includes visual imperceptibility or statistical imperceptibility. By improving the implementation method of steganography, or selecting a suitable steganographic carrier, or impr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 杨任尔郑紫微周福成马澄洪金涛杨虎
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products