Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Double Encryption Method for Reversible Data Hiding of Encrypted Domain Image

A double encryption, data hiding technology, applied in image communication, digital video signal modification, selective content distribution, etc., can solve the problems of complex protocol, low embedding capacity, low distortion, etc.

Active Publication Date: 2019-08-20
NINGBO UNIVERSITY OF TECHNOLOGY
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing encryption domain reversible data hiding technology can be divided into three categories: the first category is to encrypt the image and then find the data embedding space, this kind of method generally has a low embedding capacity, and data extraction errors will occur; the second category is the image The data embedding space is reserved before encryption. This type of method has a large embedding capacity and low distortion, but the disadvantage is that a complex protocol is required between the image encryptor and the data embedder; the third type is to use homomorphic encryption to realize reversible image data in the ciphertext domain Hidden, but homomorphic encryption can easily cause ciphertext data expansion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Double Encryption Method for Reversible Data Hiding of Encrypted Domain Image
  • A Double Encryption Method for Reversible Data Hiding of Encrypted Domain Image
  • A Double Encryption Method for Reversible Data Hiding of Encrypted Domain Image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] A double-encrypted encrypted domain image reversible data hiding method proposed in this embodiment includes three parts: image encryption, encrypted domain image reversible data hiding, hidden data extraction and original image lossless restoration; wherein,

[0069] Such as figure 2 As shown, the processing process of the image encryption part is:

[0070] ①_1. Set the width and height of the original image to be encrypted to correspond to W and H. If W×H can be divisible by g×g, divide the original image to be encrypted into non-overlapping image blocks of size g×g; if W×H cannot be divisible by g×g, the original image to be encrypted is divided into non-overlapping image blocks with a size of g×g, and the blocks to the right and bottom of the original image to be encrypted whose size is not g×g are also used as image blocks. image blocks; among them, the value of g is 2 or 3, and the symbol is the rounding down sign, the sign is the round up symbol.

[00...

Embodiment 2

[0095] This embodiment proposes a double-encryption encryption domain image reversible data hiding method, the image encryption part and the encryption domain image reversible data hiding part are the same as the image encryption part and the encryption domain image reversible data hiding part in Embodiment 1. The focus is only on the part of the secret data extraction and the lossless restoration of the original image. In this embodiment, the receiving end only has the data hiding key, and only extracts the secret information from the encrypted domain image containing the secret information. The specific process is as follows:

[0096] ③_2_1. The width and height of the encrypted domain image containing hidden information correspond to W and H, and the encrypted domain image containing hidden information is divided into non-overlapping image blocks of size g×g; where, the symbol is the rounding down symbol.

[0097] The third key key3 is used as an input parameter of the r...

Embodiment 3

[0105] A double-encryption encryption domain image reversible data hiding method proposed in this embodiment, its image encryption part and encryption domain image reversible data hiding part are the same as the image encryption part and encryption domain image reversible data hiding part in Embodiment 1 or Embodiment 2 The same, the difference is only in the hidden data extraction and lossless restoration of the original image, in this embodiment, such as image 3 As shown, the receiving end has both the data hiding key and the encryption key. First, the secret information is extracted from the encrypted domain image containing hidden information, and then the encrypted domain image after the secret information extraction is decrypted. The specific process is as follows:

[0106] ③_3_1. The width and height of the encrypted domain image containing hidden information correspond to W and H, and the encrypted domain image containing hidden information is divided into non-overla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual encryption type reversible data hiding method of an encryption domain image. The method comprises three parts, namely, image encryption, reversible data hiding of the encryption domain image, secrete data extraction and original image lossless restoration; a double encryption mechanism is adopted in the image encryption part to enhance the security; secret information can be directly embedded in the encrypted images, even if the data hider knows nothing about the original image contents, the image content security and privacy leakage problems can still be effectively solved, no complex protocol is needed between the image encipherer and the secret information embedding person, and the encryption and data embedding generate no expansion of image data; the practicability is high, if only a data hiding key is present, the hidden secret information can be directly extracted from a ciphertext domain image; if only an encryption key is present, an approximate original image can be obtained by direct decryption; and if the data hiding key and the encryption key are present, it can be guaranteed that the original image can be restored without distortion afterthe hidden secret information is extracted.

Description

technical field [0001] The invention relates to an image reversible data hiding technology, in particular to a double-encrypted encryption domain image reversible data hiding method. Background technique [0002] Under the cloud computing platform, the provider of multimedia content does not have to be a storer and a processor at the same time. In this mode of work, user data is largely "out of control". One of the best ways to ensure the security of multimedia data is to encrypt the multimedia. Users first encrypt sensitive content before uploading. All processing and calculations in the cloud are performed in the ciphertext domain, and the processing results are provided to the user. The user can only obtain the plaintext data after decryption. For example, medical institutions are obliged to protect the privacy of patients, but their data processing capabilities are weak. In order to achieve better medical effects or scientific research levels, they need to entrust a th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N19/467H04N21/8358
Inventor 徐达文
Owner NINGBO UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products