Visible encryption and decryption method with image disguising function and tampering identification function

A technology of disguising images and tampering with authentication, applied in the field of information hiding, can solve the problem of being unable to distinguish between false secret images and real secret images, and achieve the effect of protecting copyright and copyright attribution

Inactive Publication Date: 2015-03-25
SHANDONG UNIV OF SCI & TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The fake shared image 2 and the real shared image 1 are superimposed to recover the false secret image, and ordinary users cannot distinguish the false secret image from the real secret image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visible encryption and decryption method with image disguising function and tampering identification function
  • Visible encryption and decryption method with image disguising function and tampering identification function
  • Visible encryption and decryption method with image disguising function and tampering identification function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0039] Such as figure 1 and figure 2 As shown, a visual encryption method with camouflage image and tampering authentication function includes the following steps:

[0040] a1 Input a secret image, two camouflage images and a watermark image, use the error diffusion method to binarize each image, and generate a binarized image for each input image;

[0041] a2 uses the key Kw to scramble the watermark image with random numbers to generate a scrambled watermark image of the same size;

[0042] a3 According to the following requirements, construct the visible encryption rules and watermark embedding rules, called the encryption rule table T, such as image 3 Shown:

[0043] 1) If the bit of the secret image is 0, it is necessary to ensure that there is at least one 0 after the 2x2 pixel blocks corresponding to the two shared images are superi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a visible encryption and decryption method with the image disguising function and the tampering identification function. In the visible encryption process, an encryption rule table T designed in the method is used, and two meaningful separated-storage images are built from an input secret image, two input disguising images and an input watermark image; in other words, the separated-storage images have the characteristics of the disguising images, and therefore an attacker can be confused; meanwhile, the watermark image is embedded into the two separated-storage images to be capable of being used for identifying false separated-storage images made by the attacker, and illegal tampering to the separated-storage images is accordingly identified; in the visible decryption process, the secret image can be recovered by stacking the two separated-storage images; as for extracting of watermark information, the watermark image can be extracted from the two separated-storage images according to the encryption rule table T of the method. By means of the visible encryption and decryption method, the contrast ratio of the separated-storage images and the contrast ratio of the recovered secret image are not changed, and the watermark image can be completely recovered.

Description

technical field [0001] The invention relates to an information hiding method, in particular to a visual encryption method with the functions of disguising images and tampering authentication, and a visual decryption method with the functions of disguising images and tampering authentication. Background technique [0002] In recent years, the rapid development and popularization of network communication and portable communication have brought about serious data security problems, and data encryption technology is an important means to solve this problem. However, traditional encryption technology relies on complex cryptographic algorithms, and its huge amount of computation limits its application on portable devices. Moreover, the user also needs to save the secret key so as not to be lost or intercepted by others, which severely restricts the portability and reliability of data encryption. [0003] In recent years, as a secret sharing scheme, visual cryptography has made gr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 颜斌王亚菲宋凌云杨红梅刘得源王恒郭银景白培瑞赵海涛
Owner SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products