Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method

A technology of Fourier transform and inverse Fourier transform, which is applied in the field of image encryption and information security research, can solve the problems of incomplete restoration of information and large amount of calculation, and achieve improved hiding and restoration efficiency, small amount of calculation, and increased The effect of practicality

Inactive Publication Date: 2015-07-22
SOUTH CHINA NORMAL UNIVERSITY
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has the disadvantages of large amount of calculation and information cannot be completely restored.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method
  • Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method
  • Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The image hiding method based on phase-cut Fourier transform in this embodiment can be found in figure 1 , including the following steps:

[0045] (1) Two grayscale images of known size M*N, the normalized grayscale value matrix is ​​f, f respectively 1 , where f is the image to be hidden, f 1 as the carrier image.

[0046] (2) F(x,y)=IFT[f(u,v)] can be obtained from the image f(u,v) to be hidden through inverse Fourier transform, and F(x,y) is a complex value, which can be Expressed as Then after phase truncation (that is, extracting the amplitude matrix) and phase preservation (that is, extracting the phase matrix) to get:

[0047] g(x,y)=PT{IFT[f(u,v)]}=|F(x,y)|,

[0048]

[0049] Among them, g(x, y) is the amplitude after phase truncation, and P(x, y) is the retained phase, which is used as the decryption key when restoring.

[0050] (3) by the carrier image f 1 (x, y) after Fourier transform, can get F 1 (u,v)=FT[f 1 (x,y)], and then through phase trunca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a phase-cut Fourier transform based image hiding method, an image restoring method and an image encrypted transmission method. The image hiding method includes: subjecting a to-be-hidden image f to Fourier inverse transform prior to extracting an amplitude matrix g(x, y) and a phase matrix P(x, y) of the image subjected to Fourier inverse transform, and subjecting a carrier image f1 to Fourier transform prior to extracting an amplitude matrix g1(u, v) and a phase matrix P1(u, v) of the image subjected to Fourier transform; enabling g'1 (u, v)=g1(u, v)+g(x, y), then multiplying the g'1 (u, v) by the P1(u, v), obtaining a hidden result after Fourier transform and extracting an amplitude matrix f'1(x, y) of the hidden result so as to obtain a final hidden result image. The image restoring method is implemented by taking the P(x, y) as a private decryption key and performing the image hiding method reversely. The phase-cut Fourier transform based image hiding method, the image restoring method and the image encrypted transmission method have the advantages that difference between the obtained hidden result and the carrier image is small, so that deception is achieved; original information can be restored completely, and the problems of image quality degradation and the like are avoided; calculated quantity is small, and high safety during encrypted transmission is achieved.

Description

technical field [0001] The invention relates to the field of image encryption and information security research, in particular to an image hiding, restoration and encryption transmission method based on phase-cut Fourier transform. Background technique [0002] With the rapid development of Internet technology and the advent of the information age, the demand for the transmission of a large amount of image information is increasing, and information hiding is an important direction in the research of information security processing. [0003] Information hiding means that the encryptor uses a certain algorithm to hide important information in another information called carrier, so that unauthorized persons cannot know the existence of information from it. Exploring and developing image hiding technology has high academic and application value. Image processing technology based on optical principles is one of the research hotspots in the field of image security processing. At ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 黄佐华曹邦
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products