Unlock instant, AI-driven research and patent intelligence for your innovation.

Information hiding method based on local histogram

A histogram and partial technology, applied in the field of information security processing, can solve the problems of carrier distortion, small embedding capacity, and small embedding capacity of information hiding algorithm, so as to achieve the effect of improving embedding capacity and avoiding distortion

Inactive Publication Date: 2014-03-05
XI AN JIAOTONG UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the histogram-based information hiding algorithm also has shortcomings, moving those pixels between the peak point and the zero value point will bring additional distortion, and these distortions are the main distortions that cause the carrier
Use peak points to embed secret information. The size of the embedding capacity is the number of peak points. Usually, the number of peak points is small, which directly leads to a small embedding capacity.
In general, the histogram-based information hiding algorithm has a small embedding capacity and will cause additional distortion, which cannot meet the needs of practical applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information hiding method based on local histogram
  • Information hiding method based on local histogram
  • Information hiding method based on local histogram

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below in conjunction with specific embodiments, which are explanations of the present invention rather than limitations.

[0033] see image 3 and Figure 4 , the information embedding module of the present invention mainly uses boundary points and extreme value points to replace peak points and zero value points, and uses boundary points to carry out information embedding, where the boundary point information embedding is divided into single boundary point information embedding, and double boundary point information Embedding, the advantage of single boundary point information embedding is that the distortion of the carrier image is small, and the visual effect of the carrier image after embedding information is good; the advantage of double boundary point information embedding is that the embedding capacity is large, and which method to use for information embedding depends on actual needs. If the visual effec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information hiding method based on a local histogram, and belongs to the technical field of the information security. The method includes: 1) an original carrier image is divided into blocks to acquire boundary points and extreme points of an image block histogram; 2) the boundary points of the image block histogram is embedded with secret information; 3) all image blocks divided by the original carrier image are processed; 4) after the carrier image with the secret information is transmitted, a recipient divides the carrier image with the secret information into blocks, and the size of the blocks is consistent with the size of the blocks in step 1); 5) a histogram of each image block is obtained to get the boundary points and to get the secret information of the boundary points; and 6) after all image blocks of the carrier image with the secret information are processed, the original carrier image is extracted. The method of the invention realizes the important information hiding and protection and at the same time can improve the embedding capacity, and the distortion caused by the movement is avoided.

Description

technical field [0001] The invention belongs to the technical field of information security processing, and relates to a method for hiding image information, in particular to an information hiding method based on a local histogram. Background technique [0002] The rapid development of information technology (digital technology, network technology, computer technology) enables multimedia information such as images, audio, and video to be quickly and quickly transmitted in various communication networks, providing information compression, storage, copy processing and other applications. Greater convenience. Although it has brought huge benefits to people's life and work, it has also brought increasingly serious security problems. All kinds of confidential information, including national security information, military information, private information (such as credit card account numbers), etc., need to be transmitted through the network, but the Internet is an open environmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 潘志斌胡森马肖肖王凌飞
Owner XI AN JIAOTONG UNIV