Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital image steganography method based on best key searching

A digital image and key technology, which is applied in the field of digital image steganography based on searching for the best key, can solve the problems of not being a bit stream, reducing the statistical detection resistance of the steganography system, achieving good universality, and improving the steganography The effect of low write performance and computational complexity

Active Publication Date: 2017-09-15
湖州优研知识产权服务有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This shows that the encrypted secret information is a bit stream with pseudo-random characteristics, which can improve the anti-statistical detection and security of the steganographic system for some steganographic systems, but for other steganographic systems It will reduce the anti-statistical detection of the steganography system, so it is not the best distributed bit stream, that is to say, we cannot judge whether a bit stream distribution is good or bad alone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital image steganography method based on best key searching
  • Digital image steganography method based on best key searching

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0023] The digital image steganography method based on searching for the best key of the present invention encrypts the original secret information, and then embeds the encrypted ciphertext information into the carrier image through the steganographic algorithm to form the final steganographic image. In that: the original secret information is encrypted through the following steps:

[0024] Step (1), original secret information grouping: encode the original secret information into a bit stream with length n, use A=(e 1 ,e 2 ,...,e n ) means, where e i ∈{0,1}, i=1,2,...,n, then divide the bit stream with length n into k groups with length l, where k=n / l, the bit stream after grouping A=(A 1 ,A 2 ,...,A k ), where the mth group of secret information is A m =(e l(m-1)+1 ,e l(m-1)+2 ,...,e l(m-1)+l ), m=1,2,...,k;

[0025] Step (2), gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a digital image steganography method based on best key searching. The original secret information is encrypted; and the encrypted ciphertext information is embedded to a carrier image through a steganography algorithm, and a final steganography image is formed. The method is characterized in that the original secret information is encrypted in a ciphertext information generation method, and the final to-be-embedded ciphertext information is acquired. Compared with the prior art, the method has the advantages that the steganography system by using the best key to encrypt the secret information has good performance, the decryption calculation complexity of the steganography system is low, and the method is applicable to a mobile communication terminal.

Description

technical field [0001] The invention relates to a digital image steganography method based on searching for an optimal key. Background technique [0002] Steganography is a covert communication that uses redundancy in multimedia such as text, sound, image, and video, and human sensory redundancy to hide information in multimedia and transmit it through a public network. Steganography not only hides the content of the communication, but also hides the fact of the communication. Due to the large number of images on the network, the large redundancy of image data, and the large capacity of embedding secret information, the current mainstream steganography uses images as carriers. The purpose of the image steganography algorithm is to embed as much secret information as possible into the image without being discovered by the steganalyst. Therefore, visual imperceptibility, anti-statistical detection, and hiding capacity are the most important performances of the image steganogr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00H04L9/06H04L9/08
CPCG06T1/0021H04L9/0618H04L9/0822H04L9/0861
Inventor 陈贞佐杨任尔王让定陈计
Owner 湖州优研知识产权服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products