Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for reversible information hiding of a ciphertext image based on a urDEED algorithm

A technology of information hiding and ciphertext, which is applied in the field of reversible information hiding of ciphertext images, can solve problems such as difficulty, increased information hiding, and incomprehension, and achieve the effects of improving compatibility, ensuring safe transmission, and improving security

Inactive Publication Date: 2018-07-10
GUANGDONG KINGPOINT DATA SCI & TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is very difficult to extract feature information on the encrypted domain, because the encrypted signal is irregular and incomprehensible
Therefore, it is difficult for a third party to extract features from encrypted signals without a legal key, which adds a certain degree of difficulty to information hiding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for reversible information hiding of a ciphertext image based on a urDEED algorithm
  • Method and apparatus for reversible information hiding of a ciphertext image based on a urDEED algorithm
  • Method and apparatus for reversible information hiding of a ciphertext image based on a urDEED algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Such as figure 1 Shown is a functional block diagram of a ciphertext image reversible information hiding device based on the urDEED algorithm provided by the present invention, including a reading module 1, an encryption module 2, a data embedding module 3, a decoding module 4, and a decryption module 5.

[0046] The reading module 1 is used to read the pictures that initially need to be encrypted and hidden; the encryption module 2 is used to encrypt the pictures; the data embedding module 3 is used to embed the ciphertext; The decoding module 4 is used to extract embedded information; the decryption module 5 is used to restore the encrypted picture to its original state.

[0047] The encryption module 2 uses the AES algorithm to encrypt the picture, including: performing an AddRoundKey operation on the State, XORing the RoundKey and the State; for each round in the previous Nr-1 rounds, using S-BOX to replace the State once The operation is called SubBytes; replace t...

Embodiment 2

[0065] Such as image 3 As shown, it is a flow chart of a method for reversible information hiding of ciphertext images based on the urDEED algorithm of the present invention, and the method includes the following steps:

[0066] S1: Read pictures.

[0067] S2: Encrypt the picture with the AES algorithm.

[0068] S3: Use the urDEED algorithm to embed data in the ciphertext.

[0069] S4: This step is performed when the embedded information needs to be extracted, including the extraction of the payload and the restoration of the original host information, which is also called the decoding stage. In urDEED, this process is basically the reverse process of the encoding stage, so I won’t repeat it here.

[0070] S5: AES decryption: the structure of the AES decryption algorithm is the same as that of the encryption algorithm, and the transformation is the inverse transformation of the encryption algorithm transformation, and the key expansion strategy is slightly different.

Embodiment 3

[0072] In said step S2, AES is an encryption algorithm issued by the National Institute of Standards and Technology (NIST), which is an efficient and safe symmetric encryption algorithm. The specific steps for encrypting a picture with the AES algorithm are as follows (eg figure 2 As shown, it is the flow chart of AES encryption):

[0073] S2-1: First, perform the AddRoundKey operation on the State, and XOR the RoundKey with the State;

[0074] S2-2: For each of the previous Nr-1 rounds, use S-BOX to perform a substitution operation on State, called SubBytes;

[0075] S2-3: Do a replacement ShiftRows for State;

[0076] S2-4: Do another operation on State MixColumns;

[0077] S2-5: Then perform the AddRoundKey operation;

[0078] S2-6: Finally, perform SubBytes, ShiftRows, and AddRoundKey operations in sequence, and the data becomes ciphertext.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a ciphertext image reversible information concealment apparatus that is based on a urDDSP algorithm that includes a read module for reading a picture needing encrypting and concealing; anencryption module for encrypting a picture; a data embedding module for data embedding of ciphertext; a decoding module for extracting embedded information; a decryption module for restoring the picture to the original state. The present invention is primarily directed to the problem of increasing of information difficulty in ciphertext imageon the basis of realizing image encryption, the original image can be reversibly recovered by using an algorithm to embed information in a ciphertext image, urDEEs, through decryption and information extraction, the combination of encryption and information hiding can secure both secure transport and information authentication, thus the present invention is applicable to online memory data security storage and application scenarios for encryption information management.

Description

technical field [0001] The invention relates to the field of data encryption and information hiding, in particular to a method and device for reversible information hiding of ciphertext images based on urDEED algorithm. Background technique [0002] With the rapid development of Internet, wireless communication network and multimedia information technology, people can exchange information more and more quickly and frequently. In recent years, with the emergence of multimedia content, its usage rate in communication has gradually increased, and cloud computing has become popular, and various cloud storage platforms have emerged as the times require. Compared with storing multimedia information on hardware devices, more and more users prefer to store multimedia information on cloud platforms, because this method is convenient and fast, and the cost is very low. However, the security problem of cloud storage itself is still one of the important problems to be solved by cloud s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04N19/467
CPCH04L9/0631H04N19/467
Inventor 陈乐焱许飞月陶波
Owner GUANGDONG KINGPOINT DATA SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products