Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Adaptive steganography algorithm based on binary image

A binary image and self-adaptive technology, applied in the field of information hiding, can solve the problems that third parties cannot read secret information, destroy communication behavior, and communication failure

Active Publication Date: 2018-09-14
SUN YAT SEN UNIV
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Traditional secret communication adopts the method of encrypting the message. Without the key, the third party cannot read the effective secret information.
However, the fact of secret communication is easily exposed. Tracking, destruction or modification of secret information will destroy the communication behavior and lead to communication failure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive steganography algorithm based on binary image
  • Adaptive steganography algorithm based on binary image
  • Adaptive steganography algorithm based on binary image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0054] It should be noted that if there is a directional indication (such as up, down, left, right, front, back...) in the embodiment of the present invention, the directional indication is only used to explain the position in a certain posture (as shown in the accompanying drawing). If the specific posture changes, the directional indication will also change accordingly.

[0055] In addition, if there are descriptions involving "first", "second" and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an adaptive steganography algorithm based on a binary image. The adaptive steganography algorithm based on the binary image comprises the following steps: calculating perturbation of a carrier image according to image texture features, dividing the carrier image into blocks, scrambling image blocks, encrypting secret information, performing STC encoding embedding, reverselyscrambling the encrypted image blocks, and restoring the encrypted image to obtain the encrypted image having the complete texture and the embedded secret information. According to the invention, a novel carrier scrambling algorithm having high security performance and capable of effectively resisting exhaustion cracking is used; through combination of a high-detection resistance measurement method and STC encoding, a designed binary image information hiding method has very high security performance and detection resistance and plays a very important role in secure covert communication.

Description

technical field [0001] The invention belongs to image information hiding in the field of information hiding, and in particular relates to an adaptive information steganography algorithm based on a binary image. Background technique [0002] Traditional secret communication adopts the method of encrypting the message, without the key, the third party cannot read the effective secret information. However, the fact of secret communication is easily exposed. Tracking, destruction or modification of secret information will destroy the communication behavior and cause communication failure. Information hiding technology is relatively more concealed. It hides the encrypted information in the carrier. The difference between the carrier after hiding the secret information and the original carrier is very small, and it cannot be found within the normal range of human senses. The existence of secret communication. Information hiding has been a technology to achieve secure communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06T7/40
CPCG06F21/602G06T7/40
Inventor 吴腾孙伟卢伟
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products