Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for hiding secret information in images

A technology of secret information and images, applied in the field of information security, can solve problems such as the exact method has not been proposed, the loss of strong robustness, etc.

Active Publication Date: 2016-03-09
西安纳容电子通讯有限公司
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will allow the attacker to obtain the key of the system by breaking the security of the system, and then obtain the hidden message. At this time, the strong robustness of the system also loses its meaning of existence
Moreover, according to the latest research data, the exact method that can be compatible with both robustness and security has not yet been proposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for hiding secret information in images
  • Method for hiding secret information in images
  • Method for hiding secret information in images

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Embodiments of the present invention will be further described below with reference to the drawings and specific embodiments.

[0063] refer to figure 1 , the present invention is to realize steps as follows:

[0064] Step 1, the sender determines the probability distribution of the bearers.

[0065] (1a) The sender uses the shared key k to select the carrier image from the carrier image database;

[0066] (1b) The sender divides the selected carrier image into small blocks of 8×8, and calculates the blur value of each small block;

[0067] (1b1) Define the membership degree of fuzzy set as follows:

[0068] u ( p , q ) = 1 1 + | d ( p , q ) - d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for hiding secret information in images, and mainly aims to solve the problem that consideration cannot be given to both robustness and security in the prior art. The method comprises the following steps: 1) a sender selects carrier images from a carrier image library via a shared key, conducts block segmentation on the selected carrier images, and selects a pseudorandom number generator for each block, so as to acquire the probability distribution of candidate hiding carriers; 2) the sender creates a characteristic matrix of the carrier images; 3) the sender acquires a final characteristic matrix set and the key space size; 4) the sender hides the secret information in carriers via the final characteristic matrix set and the key space size; 5) the sender sends an obtained carrier set in which the secret information is embedded to a receiver; and 6) the receiver acquires the secret information. The method can improve the security of a hiding system while guaranteeing the robustness of the hiding system, and can be used for changing the hiding position of the secret information in an image in real time when the contents of the image are changed.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a method for hiding secrets in images, which can be used to change the hidden position of secret information in the images in real time when the content of the images changes. Background technique [0002] There are many international and domestic scientific and technological documents on image secret information hiding. In these documents, the method of air domain and the method of transform domain are mainly considered. Among them, the concealment technology based on the airspace mainly adopts the least significant bit LSB algorithm. Before sending the information, the sender replaces the least significant bits of the pixels of the carrier image with the bits of the binary secret information one by one, thereby hiding the secret information in the carrier image. The hiding capacity of spatial information hiding technology is large, but it is difficult to resist at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602H04L9/08
Inventor 杨世勇孙森
Owner 西安纳容电子通讯有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products