Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reversible watermarking algorithm of ciphertext image

An image and ciphertext technology, applied in the field of image information security, can solve problems such as high distortion, low embedding capacity, and insufficient security, and achieve the effect of strong confidentiality and high embedding capacity

Inactive Publication Date: 2017-05-03
SICHUAN YONGLIAN INFORMATION TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods all face the shortcomings of low embedding capacity or high distortion or insufficient security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reversible watermarking algorithm of ciphertext image
  • Reversible watermarking algorithm of ciphertext image
  • Reversible watermarking algorithm of ciphertext image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] Below, describe the present invention in detail, its concrete implementation steps are as follows:

[0009] Step 1: Image Encryption

[0010] Images, videos and other information must be encrypted before being uploaded to the cloud. After encryption, select λ as the private key and (N, g) as the public key. The plaintext image F is encrypted, and the ciphertext image is C, assuming random large prime numbers p, q, N=p*q; λ=lcm(p-1, q-1), yes in all with N 2 coprime sets of integers, is less than N 2 The integer set of , then the encryption formula of the ciphertext image C is:

[0011] C=E[F,r]=g F r N modN 2

[0012] Step 2: High frequency DWT wavelet transform of ciphertext image

[0013] The ciphertext image is subjected to wavelet transformation with integer conditions, and the image is subjected to DWT transformation. In order to solve the decimal problem, according to the integer constraint conditions:

[0014] Δa k (i,j)+Δb k (i,j)+Δc k (i,j)+...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a reversible watermarking algorithm of a ciphertext image. The method relates to the field of image information security and encrypted signal processing. The method comprises the following steps: directly embedding watermark information in a high-frequency area sub-band of the image according to a key after performing integer wavelet transform on the ciphertext image, and removing data expansion by corresponding inverse transformation and multiplicative inverse methods to obtain a ciphertext picture containing watermark; and performing the same transformation at a receiving end, directly extracting the watermark according to the key, and performing lossless recovery of the original image after decryption. The method has the advantages of high embedding capacity, high security, reversible watermark extraction, and capability of realizing lossless or approximately lossless watermark embedding and extraction of the image.

Description

[0001] Field [0002] The invention relates to the fields of image information security and encrypted signal processing. Background technique [0003] Image reversible watermarking technology is a technology that uses the redundancy of digital images to embed secret information into digital image carriers, and can correctly extract watermark information and restore the original picture at the receiving end; this technology is mostly used for copyright of digital images Protection, integrity authentication, tampering location and recovery, etc., and are widely used in digital images that require high confidentiality, security and fidelity. With the rapid development of cloud computing, cloud technology has been applied to various fields. Users can upload data to the cloud through the Internet, and then download from the cloud to the customer through the network when they need to use the uploaded data or other resources in the network. This allows users using cloud technology t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T2201/0203
Inventor 范勇胡成华
Owner SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products