Adaptive image information hiding method based on critical value

A technology of image information and critical value, applied in the field of information processing, can solve problems such as limited capacity, achieve enhanced security, simple implementation, and improved quality

Inactive Publication Date: 2017-03-22
XIHUA UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hayat Al-Dmour and others proposed the SEMX algorithm, which uses boundary valu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive image information hiding method based on critical value
  • Adaptive image information hiding method based on critical value
  • Adaptive image information hiding method based on critical value

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the present invention clearer, the following technical solutions in the present invention are clearly and completely described. Obviously, the described embodiments are some embodiments of the present invention, rather than all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] The present invention comprises the following steps:

[0028] Definition 1. Non-overlapping pixel block B of the image, its size is n×n, such as n=3, such as figure 1 shown.

[0029] Definition 2. Block maximum difference D

[0030] D=MAX(B i )-MIN(B i )

[0031] Among them, MAX(B i ) represents the maximum value of block B, MIN(B i ) represents the minimum value of block B.

[0032] Definition 3. Threshold TH

[0033] Rule 1. Set secret informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an adaptive image information hiding method based on a critical value. By combining a critical value of a subblock and an adaptive judgment critical block, an AIHC information hiding algorithm is provided. Through the AIHC algorithm, the capacity of image hiding is improved and through adaptively embedded secret information, safety is improved. The algorithm can be finished under the polynomial time complexity, thereby achieving simplicity. The secret information is extracted in the AIHC algorithm without additional information. Under the circumference that the image quality is kept, capacity is increased. The performance of the provided AIHC algorithm is better than that of other similar algorithms.

Description

technical field [0001] The invention belongs to the field of information processing and relates to an adaptive image information hiding method based on a critical value. Background technique [0002] The method of prior art graphic information hiding, including TBPC:Hou,C.-L.,Lu,C.,Tsai,S.-C.,&Tzeng,W.-G.(2011).An optimal data hiding scheme withtree -based paritycheck. IEEE Transactions on Image Processing, 20(3), 880–886. Although the TBPC algorithm has a large capacity, its security is poor. [0003] EALSB-MR: Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201–214. Luo et al. designed the EALSB-MR algorithm. This algorithm destroys the correlation between the vertical direction and the horizontal direction, and its security needs to be improved. [0004] SEMX: Hayat Al-Dmour, Ahmed Al-Ani (2016), A steganography embedding method based on edge ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/00
Inventor 唐明伟蒋忠远陈晓亮曾晟珂夏梅宸何明星赵成芳邓英高振伟
Owner XIHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products