Unlock instant, AI-driven research and patent intelligence for your innovation.

A jpeg image adaptive steganography method

An adaptive, image technology, applied in the field of image processing, can solve problems such as infeasibility, achieve the effect of small distortion and strong anti-steganographic detection ability

Inactive Publication Date: 2019-05-17
TIANJIN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On this basis, people try to design an image steganography algorithm using the method of maintaining the carrier image model, but in the end this method proves to be infeasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A jpeg image adaptive steganography method
  • A jpeg image adaptive steganography method
  • A jpeg image adaptive steganography method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings.

[0033] Before introducing the specific design idea of ​​the present invention, firstly, briefly introduce the KV prediction operator and check lattice coding technology.

[0034] KV predictor:

[0035] The KV prediction operator is a residual detection operator used in model-rich steganographic detection to predict the residual of the image to be tested. The size of the prediction residual reflects the complexity of the image. Nowadays, the steganography algorithms with strong anti-detection performance are adaptive steganography algorithms. These algorithms can embed secret information into complex areas with complex textures and rich edges in the carrier image, so they are not easy to be detected, and the algorithm security is good. The complex region in the image to be detected is solved by the KV prediction operator, and the prediction residual can be used for fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an adaptive steganography method of a JPEG (Joint Photographic Experts Group) image. The adaptive steganography method comprises the following steps: extracting a coefficient matrix and a quantization table in a carrier image; initializing a KV (Key Value) prediction operator, and extracting a noise residual error; calculating influence on a transform domain by the revision of a JPEG image coefficient; according to influence on the transform domain by the revision of the JPEG image coefficient, calculating a loss distribution function; through the loss distribution function, determining a pixel ''dry point'' in which secret information is embedded, and a pixel ''wet point'' in which the secret information is not embedded; and according to the determined ''dry point'' and ''wet point'', utilizing a checkout trellis coding technology to embed the secret information into the carrier image so as to generate a secret-carrying image. The method is novel and high in anti-steganography detection capability and is suitable for information hiding subfields in an information security field.

Description

technical field [0001] The invention relates to the field of image processing, in particular to a JPEG image self-adaptive steganography method. Background technique [0002] With the continuous development of information technology, people's daily life and work are increasingly dependent on the Internet. While enjoying the convenience brought by the information age, some security risks are threatening people's normal life order all the time. For example, terrorists can use the convenient network to transmit illegal information in a very covert manner and engage in illegal activities. By listening to and deciphering the exchange of information between national politicians or military agencies, some hegemonic countries wantonly expand themselves while restricting the economic development of other countries and destroying the political balance of other countries. These will seriously threaten the personal safety of the people and the stability of the country. Therefore, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0028G06T2201/0065
Inventor 王龙飞郭继昌刘晓娟
Owner TIANJIN UNIV