Optimal coupling image steganography method based on packet replacement

An optimal matching and best matching technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as inability to obtain secret information, and achieve the effect of improving concealment performance and security, and improving visual concealment.

Inactive Publication Date: 2016-01-20
NINGBO UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous improvement of computer performance, it is possible to use the exhaustive method to decipher the encryption algorithm. In addition, even if the attacker fails to crack the key, he can destroy the detected ciphertext so that the recipient can

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optimal coupling image steganography method based on packet replacement
  • Optimal coupling image steganography method based on packet replacement
  • Optimal coupling image steganography method based on packet replacement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0022] In this embodiment, it is assumed that the cover image is marked C, and the secret mark that needs to be embedded in the cover image C is S. The following combination figure 1 , to illustrate the optimal matching image steganography method based on packet permutation in this embodiment. The image steganography method includes the following steps in sequence:

[0023] (1) Convert the secret information S into a binary bit stream, and group the converted binary bit stream with 8 bits as a group to obtain N groups of binary bit streams, wherein each group of binary bit streams has 2 8 There are 256 combination schemes for each group of binary bit rates;

[0024] (2) According to each combination scheme in each group of binary bit streams, select the corresponding inversion bits of each combination scheme, and perform inversion processin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an optimal coupling image steganography method based on packet replacement. The method comprises steps that, secret information is converted into binary bit rates which are divided at 8 bits into sets to form N sets of binary bit streams, each set of binary bit streams has 28 types of combination schemes; according to each combination scheme of each set of binary bit streams, and bit position reversion processing for each combination scheme is carried out to generate 28 sets of counter-rotating binary bit streams; the 28 sets of counter-rotating binary bit streams are embedded into a carrier image through a least histogram distortion method to acquire a secret carrying image; through calculation and determination, when a coupling value of the secret carrying image and the carrier image reaches a preset optimal coupling value, relevant parameters are taken as an encryption key, the secret carrying image reaching the optimal coupling value is selected to enter channel transmission, otherwise, each combination scheme of other N-1 sets of binary bit streams is calculated till the secret carrying image having the optimal coupling value appears; secret information in the secret carrying image is extracted by a receiver by utilizing a decryption key corresponding to the encryption key.

Description

technical field [0001] The invention relates to the field of image steganography, in particular to an optimal matching image steganography method based on group permutation. Background technique [0002] Information encryption and information hiding are two core technical modes in the field of information security. Information encryption is a security technology that uses mathematical or physical means to encrypt the transmitted plaintext information to ensure the unrecognizability of the information. Only the recipient with the correct key can decrypt the plaintext information. However, with the continuous improvement of computer performance, it is possible to use the brute force method to decipher the encryption algorithm. In addition, even if the attacker fails to crack the key, he can destroy the detected ciphertext so that the recipient cannot obtain the correct secret information. It can be seen that the traditional information encryption technology fails to play a go...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 郑紫微丁石磊
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products