Asymmetric prediction error histogram modification-based reversible information hiding method

A prediction error and information hiding technology, which is applied in the field of information security and confidential communication, can solve the problems that cannot meet the actual needs, cannot reflect the compensation principle well, and cannot be well reflected.

Active Publication Date: 2018-04-20
ANHUI UNIVERSITY
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The asymmetric prediction error histogram modification algorithm has the advantages of large embedding capacity and high quality of secret-carrying images, but when the amount of embedded secret information is small, the advantages of protecting the quality of secret-carrying images cannot be well reflected, namely It means: when the amount of embedded information is small, the second embedding process may not be able to be carried out, and the compensation principle cannot be well reflected, so that it cannot meet all actual needs and needs further improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric prediction error histogram modification-based reversible information hiding method
  • Asymmetric prediction error histogram modification-based reversible information hiding method
  • Asymmetric prediction error histogram modification-based reversible information hiding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] In this example, information hiding is performed on an original image with a block size of 4×4. It includes the following five steps in turn: perform overflow preprocessing on the original image; search for peak points and zero points on the image after overflow preprocessing; embed 4×4 blocks into secret information; 4×4 blocks after embedding secret information The embedded information is extracted, and the image of the 4×4 block after the secret information is extracted is obtained; overflow recovery processing is performed on the image of the 4×4 block after the secret information is extracted. Specific steps are as follows:

[0069] 1. Perform overflow preprocessing on the original image:

[0070] Such as Figure 4 In the 4×4 block shown in (a), the pixels are traversed in order, and the pixels of 255 or 0 are marked as 1, and the pixels of 254 or 1 are marked as 0, and 254 is assigned to the pixel with a value of 255. 1 is assigned to a pixel with a value of 0, r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asymmetric prediction error histogram modification-based reversible information hiding method. The method comprises the following steps of performing overflow preprocessing;calculating a peak point and a zero point; embedding secret information; extracting the secret information; and performing overflow recovery processing. A compensation principle can be well utilizedno matter whether an embedded information quantity is maximal or minimal; when the embedded information quantity is relatively small, fewer pixel points can be modified, so that the quality of a secret-carrying image is improved; and meanwhile, by utilizing secondary embedding, the image quality is improved while the embedding capacity is expanded.

Description

technical field [0001] The invention relates to the technical field of information security and confidential communication, in particular to a reversible information hiding method based on asymmetric prediction error histogram modification. Background technique [0002] With the development of digitalization and informationization, communication is becoming more and more important. In the communication process, information security is extremely important, so information hiding technology is developed. It breaks the scope of traditional cryptography and examines information security from a new perspective. Its principle is to use redundant information in the carrier to hide secret information. , to achieve secure communication. As a technology for embedding secret information into carriers, it has been widely used in covert communication and other fields. As a branch of information hiding technology, reversible information hiding not only has the characteristics of accurate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06T5/40
CPCG06F21/602G06T5/40
Inventor 殷赵霞陈思吕志恒刘磊
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products