Improved EMD image steganography embedding and extraction methods based on weight vector prevention

A value vector, image technology, applied in the field of improved EMD image steganography embedding and extraction based on unweighted vector, image steganography embedding and extraction field, can solve the limitation of secret information expression range, EMD method image visual embedding quality and embedding Capacity compromise, limited embedded capacity, etc.

Active Publication Date: 2017-05-31
SHAANXI NORMAL UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2) The traditional EMD embedding method can only use the combination of weight vectors to form 1 as the starting number of continuous combinations to perform ±1 adjustment and 0 means no adjustment as the expression range of secret information, which makes the weight vector cannot Sufficient and effective combination, thus limiting the range of expression of secret information, making the embedding capacity very limited
[0012] For the traditional simple EMD method and EMD-n method, although the maximum embedding capacity within the adjustment range can be achieved, the traditional EMD method can only provide a limited number of adjustment schemes, such as only adjusting 1 for n carrier data The simple EMD method, the EMD-2 method that only adjusts 2 carrier data for n carrier data, and the EMD-n method that adjusts n carrier data for n carrier data, thus severely restricts the application of the EMD method, making the EMD method unable to Good compromise between image visual embedding quality and embedding capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved EMD image steganography embedding and extraction methods based on weight vector prevention
  • Improved EMD image steganography embedding and extraction methods based on weight vector prevention
  • Improved EMD image steganography embedding and extraction methods based on weight vector prevention

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0152] The following takes JAVA jdk1.8.0_65 as the case implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, but is not limited to this implementation case, where figure 1 is the embedded flowchart, figure 2 is the extraction flow chart.

[0153] The specific implementation steps of the embedding method:

[0154] Step 1: Assume that the carrier image C is converted into a 1-dimensional sequence in row-first order as S={160,160,163,157,153}; initialize the remaining sequence S of S last =S, input the secret information bit string B={1,1,1,0,1,0}, initialize the remaining sequence B of B last =B, initialize the carrier element sequence S that has been embedded with secret information embedded = φ;

[0155] Step 2: Enter user key μ=4,x 0 = 0.3519407329674913, IT = 1059, n max =6: A number of random numbers can be continuously generated by the formula (2), and the first IT numbers are ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides improved EMD image steganography embedding and extraction methods based on weight vector prevention. The improved EMD image steganography extraction method comprises: a carrier image is scanned to form a one-dimensional element sequence; on the basis of combination of a user secret key with chaotic mapping, the secret embedding element number and the maximum adjusted secret embedding element number are designated randomly and a secret information combination number and a secret embedding adjusting table are generated; according to the secret embedding element number and the secret information combination number, a carrier element and a binary-system secret information bit are intercepted from a carrier element sequence and a binary system secret information sequence; and then table row adjustment is carried out on scrambled secret embedding elements mapped by the secret information bit to adjust the intercepted carrier element, thereby realizing secret information bit embedding. Compared with the existing EMD method, the provided methods have the following beneficial effects: the maximum embedding capacity can be realized on the premise that the equal embedded visual quality is kept, so that a problem of capacity restriction caused weight vector setting can be solved; and with an embedded extraction link associated with the carrier and the secret key, security of the embedded information can be enhanced.

Description

technical field [0001] The invention belongs to the cross field of image information security and digital image signal processing, relates to an image steganography embedding and extraction method, in particular to an improved EMD image steganography embedding and extraction method based on a weightless vector. Background technique [0002] In recent years, with the development of computer and network technology, more and more images are transmitted on the network, which brings a series of security risks while providing convenience to users. Improper use and malicious tampering of images will not only involve personal privacy, but also bring serious negative impacts to society. [0003] Aiming at the security of digital image information, people have proposed a variety of methods, such as: ① digital image encryption technology that converts plaintext images into ciphertext images; ② digital image steganography technology that hides secret information in irrelevant carriers; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32144H04N1/32272
Inventor 邵利平张洋任平安
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products