Unlock instant, AI-driven research and patent intelligence for your innovation.
JPEG image robustness steganography method based on serial concatenated code and DCT coefficient relative relationship
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A serial cascading and relative relationship technology, applied in the field of information hiding, can solve the problem of secret information difficulty, etc., and achieve the effect of improving anti-detection, strong anti-detection, and anti-compression
Inactive Publication Date: 2018-05-11
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF0 Cites 8 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, when the algorithm is resistant to JPEG compression, when the quality factor of the JPEG compressionattack is different from the quality factor of the carrier image, it is difficult to extract the secret message correctly. In this case, there is about 1% error in the extracted message, which leads to Some problems in practical applications, how to reduce the error rate, ensure that the message can be extracted correctly with a high probability, and at the same time improve its security, that is, the resistance to detection, is the current problem that needs to be solved in robust steganography
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0039] Such as figure 1 Shown, a kind of JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation of the present invention comprises the following steps:
[0040] Step S101: Determine the modification area;
[0041] Step S102: designing a corresponding distortion function;
[0043] Step S104: using steganography to embed error correction codes;
[0044] Step S105: performing JPEG compression;
[0045] Step S106: Obtain an error-containing information stream by decoding the error-correcting code, and perform error correction;
[0046] Step S107: Get the original embedded message.
Embodiment 2
[0048] Such as figure 2 As shown, another kind of JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation of the present invention comprises the following steps:
[0049] Step S201: Determine the modification area, including:
[0050] Step S2011: Decode the JPEG image I to obtain a series of 8×8 blocks D of quantized and rounded DCT coefficients D k ={D k (i), i=1,2,...,64,} Among them, k=1,2,...,B, B is the total number of blocks in the image 8×8 blocks, D k (i) represents the i-th coefficient in the k-th quantized DCT block;
[0051] Step S2012: Using DCT coefficient D k (i) DCT coefficients in the same block as the adjacent block average The relative relationship of the four adjacent DCT coefficients corresponds to a length l 1 virtual steganographic carrier element x on j On, 1≤j≤l 1 ,satisfy:
[0052]
[0053] Step S2013: Establish a robust channel:
[0054] Establish a robust channel based on X a...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to the technical field of information hiding, and particularly relates to a JPEG image robustness steganography method based on a serial concatenated code and a DCT coefficient relative relationship. The JPEG image robustness steganography method based on the serial concatenated code and the DCT coefficient relative relationship comprises the steps of determining a modification area; designing a corresponding distortion function; encoding a to-be-embedded message by using an error correcting code; embedding the error correcting code through robustness steganography; performing JPEG compression; obtaining an information stream containing errors by using steganographic translated code, and correcting errors by using a translated code of the error correcting code; and obtaining the original embedded message. JPEG compression attacks of different quality factors can be defended in a larger range, the embedded message can be extracted completely at a higher probability, further, for same secret information, the method has higher detection resistance.
Description
technical field [0001] The invention relates to the technical field of information hiding, in particular to a JPEG image robust steganography method based on the relative relationship between serial concatenated codes and DCT coefficients. Background technique [0002] Steganography is a technique of constructing a covert communication channel using public carriers. In recent years, with the development of mobile communication technology, more and more digital carriers are sent and received by smart mobile terminals. However, due to the limitations of bandwidth, tariffs, and traffic, terminals often damage the carriers transmitted on such channels. Compression, so that classical steganography cannot correctly extract embedded messages in such cases. Therefore, it is of great practical value to study steganographic algorithms that can completely extract embedded messages in such channels and have stronger resistance to steganographic detection than robust watermarking algori...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.
Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32149H04N1/32165H04N1/32272H04N1/32277
Inventor 罗向阳包震坤张祎杨春芳刘粉林王道顺王平甘军军张月
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU