Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Image Hiding and Authentication Based on Secret Sharing

A technology of secret sharing and authentication method, which is applied in the field of secret image sharing, and can solve problems such as potential safety hazards, differences in statistical characteristics, and reduced security of secret information

Active Publication Date: 2017-01-11
TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although these schemes have improved the authentication ability and camouflage image quality, they still have two problems: (1) Each element in the shadow vector is sequentially hidden in each cover image block. When the number of elements in the embedded shadow vector is less than the number of blocks in the cover image, there is no secret information embedded in some blocks of the cover image. Therefore, the statistical characteristics of the part embedded with secret information and the part without secret information in the camouflage image will have A noticeable difference that would attract the attention of an attacker, reducing the security of secret information
(2) The previous schemes all use the LSB replacement method to hide the secret information. This method can easily detect the existence of embedded information by steganalysis such as RS analysis, and can accurately determine the length of embedded information. This also gives The scheme brings certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Image Hiding and Authentication Based on Secret Sharing
  • A Method of Image Hiding and Authentication Based on Secret Sharing
  • A Method of Image Hiding and Authentication Based on Secret Sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] We choose Matlab7.0 as the software platform, and program to realize the design of the scheme of the present invention. During the implementation process, the standard test image "Jet" of 256×256 was selected as the secret image, and four standard test images of 512×512 "Lena", "Peppers", "Baboon" and "Elaine" were selected as the carrier images, and parameters were selected in the sharing scheme k=3, n=4.

[0070] The present invention is characterized in that it is composed of two parts: secret sharing and information hiding, image authentication and secret information recovery. The specific operation steps are:

[0071] Ⅰ. Secret sharing and information hiding, including the following steps:

[0072] The first step is to read in a 256×256 standard test image “Jet” as the secret image SE;

[0073] In the second step, use the formula (1) to convert the secret image SE into a differential image DIFF={diff ij};

[0074] diff i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.

Description

technical field [0001] The invention belongs to the technical field of secret image sharing, in particular to an image hiding and authentication method based on secret sharing. Background technique [0002] As an important technology of information security in the network era, information hiding has become a new research hotspot in information security in recent years. Information hiding technology is to hide a certain secret information in another public media information in some way, and transmit the secret information through the transmission of public information. The purpose of this technology is to hide the existence of secret information, so that any third party except the communication parties will not be aware of the existence of secret information, thereby providing further protection for digital media. In addition, the authenticity and integrity of digital images have become the focus of multimedia information security, and image authentication is an important te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 刘丽王安红刘世忠李志宏
Owner TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products