JPEG image robustness steganography method based on serial concatenated code and DCT coefficient relative relationship

A serial cascading and relative relationship technology, applied in the field of information hiding, can solve the problem of secret information difficulty, etc., and achieve the effect of improving anti-detection, strong anti-detection, and anti-compression

Inactive Publication Date: 2018-05-11
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the algorithm is resistant to JPEG compression, when the quality factor of the JPEG compression attack is different from the quality factor of the carrier image, it is difficult to extract the secret message correctly. In this case, there is about 1% error in the extracted message, which leads to Some problems in practical applications, how to reduce the error rate, ensure that the message can be extracted correctly with a high probability, and at the same time improve its security, that is, the resistance to detection, is the current problem that needs to be solved in robust steganography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JPEG image robustness steganography method based on serial concatenated code and DCT coefficient relative relationship
  • JPEG image robustness steganography method based on serial concatenated code and DCT coefficient relative relationship
  • JPEG image robustness steganography method based on serial concatenated code and DCT coefficient relative relationship

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 Shown, a kind of JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation of the present invention comprises the following steps:

[0040] Step S101: Determine the modification area;

[0041] Step S102: designing a corresponding distortion function;

[0042] Step S103: Encoding the message to be embedded by using error correction coding;

[0043] Step S104: using steganography to embed error correction codes;

[0044] Step S105: performing JPEG compression;

[0045] Step S106: Obtain an error-containing information stream by decoding the error-correcting code, and perform error correction;

[0046] Step S107: Get the original embedded message.

Embodiment 2

[0048] Such as figure 2 As shown, another kind of JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation of the present invention comprises the following steps:

[0049] Step S201: Determine the modification area, including:

[0050] Step S2011: Decode the JPEG image I to obtain a series of 8×8 blocks D of quantized and rounded DCT coefficients D k ={D k (i), i=1,2,...,64,} Among them, k=1,2,...,B, B is the total number of blocks in the image 8×8 blocks, D k (i) represents the i-th coefficient in the k-th quantized DCT block;

[0051] Step S2012: Using DCT coefficient D k (i) DCT coefficients in the same block as the adjacent block average The relative relationship of the four adjacent DCT coefficients corresponds to a length l 1 virtual steganographic carrier element x on j On, 1≤j≤l 1 ,satisfy:

[0052]

[0053] Step S2013: Establish a robust channel:

[0054] Establish a robust channel based on X a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information hiding, and particularly relates to a JPEG image robustness steganography method based on a serial concatenated code and a DCT coefficient relative relationship. The JPEG image robustness steganography method based on the serial concatenated code and the DCT coefficient relative relationship comprises the steps of determining a modification area; designing a corresponding distortion function; encoding a to-be-embedded message by using an error correcting code; embedding the error correcting code through robustness steganography; performing JPEG compression; obtaining an information stream containing errors by using steganographic translated code, and correcting errors by using a translated code of the error correcting code; and obtaining the original embedded message. JPEG compression attacks of different quality factors can be defended in a larger range, the embedded message can be extracted completely at a higher probability, further, for same secret information, the method has higher detection resistance.

Description

technical field [0001] The invention relates to the technical field of information hiding, in particular to a JPEG image robust steganography method based on the relative relationship between serial concatenated codes and DCT coefficients. Background technique [0002] Steganography is a technique of constructing a covert communication channel using public carriers. In recent years, with the development of mobile communication technology, more and more digital carriers are sent and received by smart mobile terminals. However, due to the limitations of bandwidth, tariffs, and traffic, terminals often damage the carriers transmitted on such channels. Compression, so that classical steganography cannot correctly extract embedded messages in such cases. Therefore, it is of great practical value to study steganographic algorithms that can completely extract embedded messages in such channels and have stronger resistance to steganographic detection than robust watermarking algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32149H04N1/32165H04N1/32272H04N1/32277
Inventor 罗向阳包震坤张祎杨春芳刘粉林王道顺王平甘军军张月
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products