Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Support steganographic methods based on attribute information extraction

A technology of attribute information and attributes, applied in the field of image information hiding, can solve the problems of insecure and inconvenient secure communication, and achieve high imperceptibility, good detection effect, and high concealment effect

Active Publication Date: 2020-09-04
JINAN UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is neither safe nor convenient for actual secure communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Support steganographic methods based on attribute information extraction
  • Support steganographic methods based on attribute information extraction
  • Support steganographic methods based on attribute information extraction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] The present invention combines secret sharing and steganographic scheme design technology based on adaptive steganographic coding (STC), to hide a plurality of private information with different attributes at one time. In order to hide multiple private messages, the present invention uses secret sharing to generate a message embedding position mask for them based on a key assigned to each message. According to this mask and the embedding perturbation measure based on the image content, we judge the suitable embedding degree of each pixel, and use the embedding technology of STC to complete the embedding of the secret message. Receivers can and can only locate the mask of the corresponding message according to their identity attributes, and then use the extraction technology of STC to extract the message. If the recipient does not have the identity attribute, then they cannot be located, or even know that other secret messages exist.

[0031] That is to say, the present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a steganography method supporting extraction based on attribute information. A sender can simultaneously hide multiple pieces of information having different attributes in one carrier, and a receiver can only decrypt the corresponding information according to the identity attribute. The steganography method comprises the following steps: selecting, by a key center, a symmetric encryption algorithm and an embedded key, and extracting a common parameter; embedding, by the sender, a message; selecting a carrier image, calculating a mask value of each pixel, obtaining an embedded position mask, generating an embedding fit measure of each pixel point, inputting the pixels belonging to the mask, the embedding fit measure and the secret message to be embedded to an embedding device to obtain embedded pixels; merging the embedded pixels and the pixels not belonging to the mask to obtain a temporary key-containing image, and sending the temporary key-containing image to each receiver; extracting, by the receiver, the message, recovering the embedded key, calculating the mask value of each pixel position, and embedding the position mask, and inputting all the pixels belonging to the mask to an extractor to obtain a secret message.

Description

technical field [0001] The invention belongs to the field of image information hiding, and specifically supports a steganography method based on attribute information extraction. Background technique [0002] Steganography is an important means to ensure the privacy of message transmission. Although message encryption can ensure the privacy of messages, the behavior of message transmission will be known to attackers, and the encrypted ciphertext in the form of garbled characters will also arouse the interest of attackers; in contrast, steganography can ensure message transmission The behavior is invisible, and the attacker cannot tell whether it is an ordinary transmission or a secret transmission, so steganography is an important supplement to encryption technology. Steganography can be applied in various high-security message transmission fields, effectively preventing attackers from attacking. [0003] Using Adaptive Steganographic Coding (STC) to design a steganographi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N19/467G06F21/60
CPCG06F21/602H04L63/0435H04L63/0876H04N19/467
Inventor 冯丙文翁健许序跋聂乾开魏凯敏刘志全
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products