Secret image sharing method based on pixel mapping matrix embedding

A pixel mapping and secret image technology, applied in the field of information security, can solve the problems of large carrier image size, large share size, large camouflage image, etc., and achieve the effect of improving transmission speed, improving embedding ability, and enhancing embedding ability.

Active Publication Date: 2015-07-01
XIDIAN UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some defects in this method: first, there is a pixel out-of-bounds problem in this method
This method embeds the secret image data into the carrier image by using a quantization method, causing some pixels of the camouflage image to exceed the boundary of the pixel, so that the secret image cannot be recovered without distortion.
Second, although this method improves the embedding ability, the embedding ability is still smaller than the size of the cover image, so when sharing the secret image, the size of the cover image needs to be large, thus forming a large camouflage image, so each participant holds Some share sizes are large. When storing camouflage images, a large space is required. When transmitting camouflage images, it affects real-time transmission and requires high network bandwidth.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret image sharing method based on pixel mapping matrix embedding
  • Secret image sharing method based on pixel mapping matrix embedding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Combine below Attached picture The present invention is further described.

[0023] refer to figure 1 , the implementation steps of the present invention are as follows:

[0024] Step 1, input secret image S, cover image C, pixel mapping matrix T and public identity P.

[0025] The secret image S is the image that needs to be protected; the carrier image C is used to hide the secret image S; the pixel mapping matrix T specifies the embedding rules for embedding the secret image S into the carrier image C, and it also specifies the mapping rules for generating the information data Q ; The public identity P is the identity of the participants, and each participant holds a public identity.

[0026] Step 2, compress the secret image S.

[0027] refer to figure 2 , the specific implementation of this step is as follows:

[0028] 2a) Perform differential encoding on the secret image S to obtain a differential image D;

[0029] 2b) Arrange the elements of the dif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret image sharing method based on the pixel mapping matrix embedding and solves the problems of low capability of the existing embedding method and pixel border crossing. The method is characterized by including before sharing, adopting differential coding, Huffman coding and data conversion to compress secret images, and acquiring shared secret data to improve the secret image carrier embedding capability; designing fresh pixel mapping matrix to guarantee all pixels of carrier images and hid secret image information, and improving the embedding capability; in the embedding process, embedding the shared secret data into the the carrier images through the pixel mapping matrix, acquiring host images, and preventing pixel border crossing; finally, recovering secret images and carrier images through the host images. The method has the advantages that in the secret image sharing process, the image transmitting speed is increased, the real-time transmission is guaranteed on the condition of bandwidth limitation, and the method can be applied to the field of network safety.

Description

Technical field [0001] The invention is the field of information security technology. It involves a secret image sharing method with information hidden, which can be used for image protection, image sharing, and real -time transmission of images. Background technique [0002] In 1979, Blakley and Shamir proposed the concept of secret sharing, respectively.The secret sharing method is to divide the secrets into different shares. Among them, the shares of any greater than or equal to a specific quantity can be restored to the secret, otherwise it cannot.Due to the extensive use of images in life, in 1995, Naor and Shamir introduced secret sharing methods into the field of image processing, and proposed the first secret image sharing method.The secret image sharing method divides the secret image into different shares. Among them, any shares of any more than or equal to a specific quantity can restore the secret image, otherwise it cannot.The secret image sharing method provides a e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 庞辽军王琼
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products