Ciphertext information generation method for image steganography

A technology of information generation and secret information, applied in the direction of image data processing, image data processing, instruments, etc., can solve the problem of not being a bit stream, reducing the anti-statistical detection of the steganography system, achieving good universality and improving steganography The effect of low performance and computational complexity

Active Publication Date: 2017-09-15
NINGBO UNIV +1
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This shows that the encrypted secret information is a bit stream with pseudo-random characteristics, which can improve the anti-statistical detection and security of the steganographic system for some steganographic systems, but for other steganographic systems It will reduce the anti-statistical detection of the steganography system, so it is not the best distributed bit stream, that is to say, we cannot judge whether a bit stream distribution is good or bad alone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphertext information generation method for image steganography
  • Ciphertext information generation method for image steganography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0023] Such as figure 1 A method for generating ciphertext information for image steganography in the present invention is characterized in that: comprising the following steps:

[0024] Step (1), original secret information grouping: encode the original secret information into a bit stream with length n, use A=(e 1 ,e 2 ,...,e n ) means, where e i ∈{0,1}, i=1,2,...,n, then divide the bit stream with length n into k groups with length l, where k=n / l, the bit stream after grouping A=(A 1 ,A 2 ,...,A k ), where the mth group of secret information is A m =(e l(m-1)+1 ,e l(m-1)+2 ,...,e l(m-1)+l ), m=1,2,...,k;

[0025] Step (2), generate 2 l A key of length l: put 0, 1, ..., 2 l -1 out of 2 l The number is converted into a binary number of length l as 2 l keys, where the xth key uses key x =(e x1 ,e x2 ,...,e xl ) means, where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a ciphertext information generation method for image steganography. Through grouping original secret information, generated 2<l> cipher keys with the length to be l are used for XOR encryption, the obtained ciphertext information is embedded to a pre-selected test carrier image, and different test steganography images are obtained; according to the test carrier image and the different steganography images, the steganography performance is evaluated to obtain a cipher key used by the secret information when the steganography performance is the best, the cipher key is used as the best cipher key for the secret information, the original secret information and the best cipher key are subjected to XOR encryption, the ciphertext information of the original secret information is obtained, and the ciphertext information for steganography is finally acquired. Compared with the prior art, the method has the advantages that the performance of the steganography system after the best cipher key for the secret information is searched is enhanced, the encryption and decryption calculation complexity is low, and the method can be applicable to a mobile terminal.

Description

technical field [0001] The invention relates to a method for generating ciphertext information for image steganography. Background technique [0002] Steganography is a covert communication that uses redundancy in multimedia such as text, sound, image, and video, and human sensory redundancy to hide information in multimedia and transmit it through a public network. Steganography not only hides the content of the communication, but also hides the fact of the communication. Due to the large number of images on the network, the large redundancy of image data, and the large capacity of embedding secret information, the current mainstream steganography uses images as carriers. The purpose of the image steganography algorithm is to embed as much secret information as possible into the image without being discovered by the steganalyst. Therefore, visual imperceptibility, anti-statistical detection, and hiding capacity are the most important performances of the image steganography...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 李亚峰陈贞佐杨任尔郑紫微
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products