Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi-image hiding method based on fractional mellin transform

A Merlin transformation and multi-image technology, applied in the field of information security, can solve the problem of limited amount of hidden information

Inactive Publication Date: 2015-03-11
NANCHANG UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of method has good security and robustness, but the amount of hidden information is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-image hiding method based on fractional mellin transform
  • Multi-image hiding method based on fractional mellin transform
  • Multi-image hiding method based on fractional mellin transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the embodiments and drawings, but the protection scope of the present invention should not be limited thereby.

[0030] Step 1: Image compression.

[0031] (1) Discrete cosine transform (DCT) is performed on n=8 grayscale images with a size of 256×256 respectively to obtain 8 two-dimensional matrices.

[0032] (2) Carry out Zigzag scanning on 8 two-dimensional matrices respectively to obtain 8 one-dimensional matrices.

[0033] (3) Starting from the first element respectively, 8 one-dimensional matrices are cut by the cutting coefficient M×N / n=8192, and the gained elements are formed into a one-dimensional matrix containing 256×256 elements, which are divided into rows ( or column) into a two-dimensional matrix with a size of 256×256 to obtain a compressed image W(x,y).

[0034] From step 3, when the number n of images to be compressed increases, the low-frequency part of each image will be kept...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-image hiding method based on fractional mellin transform. According to the method, compression of multiple to-be-hidden images is carried out by utilizing a frequency spectrum cutting and splicing method, carrier images and compression images are respectively divided into multiple ring zone sub images, fractional mellin transform in different orders on each image is carried out, fusion of all results in a random combination mode is carried out by utilizing a primary Bezier curve, and fractional mellin transform is carried out by utilizing the same orders of carrier image transform to acquire fusion images containing to-be-hidden image information. The orders of fractional mellin transform and the fusion coefficients are taken as secret keys, and a center coordinate of coordinate transform and an inner radius and an outer radius for carrying out ring zone transform are taken as secondary secret keys. The method utilizes real property of discrete cosine transform to realize compression of the multiple images, increases hidden information amount in a frequency domain processing method, utilizes fractional mellin transform for encryption and improves anti-attacking capability and safety of systems.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to image compression, encryption and multi-image hiding technologies. Background technique [0002] Information hiding technology is a cutting-edge research field in academia, and countries all over the world have great interest in the research of information hiding technology. Information hiding technology, like cryptography, is dedicated to the protection of information. Information hiding technology uses the redundancy of the carrier itself to hide secret information in the carrier for covert transmission. At the same time, because human senses are not sensitive, the sensory effect and use value of the carrier It will not be affected, making it difficult for attackers to detect, so as to achieve the purpose of protecting copyright and secret information. Images, videos, voices, texts, etc. can be used as carriers. Because images are vivid, vivid, and intuitive, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 周南润谭长法朱启标
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products