Adaptive image encryption domain reversible hiding method based on hybrid encryption mechanism

A hybrid encryption and self-adaptive technology, which is applied in image communication and key distribution, can solve the problems of high time complexity of public key encrypted images, unfavorable transmission and storage of encrypted data, and large amount of digital image data.

Active Publication Date: 2018-09-21
SOUTHWEST JIAOTONG UNIV
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large amount of digital image data, the time complexity of directly encrypting the image with the public key is high, and there is serious data expansion; for example, in the algorithm of Chen et al., for eac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive image encryption domain reversible hiding method based on hybrid encryption mechanism
  • Adaptive image encryption domain reversible hiding method based on hybrid encryption mechanism
  • Adaptive image encryption domain reversible hiding method based on hybrid encryption mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0088] A specific embodiment of the present invention is a method for reversible concealment of an adaptive image encryption domain based on a hybrid encryption mechanism, comprising the following steps:

[0089] A. Image encryption

[0090] A1. Pixel type identification matrix generation:

[0091] The user calculates the original image X through the following formula, X={x i,j Pixel x in |i=1,2,...,I,j=1,2,...,J} i,j predicted value of

[0092]

[0093] Where I is the number of rows of the original image X, J is the number of columns of the original image X, and x i,j is the pixel in the i-th row and j-th column in the original image X, Represents the rounding down operation, ∪ represents the union operation of sets;

[0094] if pixel x i,j The most significant bit of the pixel x i,j predicted value of The most significant bits of the same, then the pixel x i,j the type identifier p i,j is 0; otherwise, pixel x i,j the type identifier p i,j The value is 1; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an adaptive image encryption domain reversible hiding method based on a hybrid encryption mechanism. A user performs sequential prediction on a digital image to be encrypted toobtain the pixel type identification matrix of an original image, and adaptively selects an optimal block size of the pixel type identification matrix to generate an optimal block type identificationmatrix; a random number is taken as a secret key to combine the block type identification matrix, and 'xor plus pixel classification scrambling' is used for generating an encrypted image of the original image; the random number is taken as a secret key to encrypt partial information of the block type identification matrix, the public key of a receiver uses an asymmetric encryption algorithm to encrypt 'the random number, the residual block type identification matrix information and the optimal block size', which are then serially embedded into a variable pixel of the encrypted image; the receiver uses a private key to decrypt the extracted key information and can obtain a decrypted image the same as the original image and a plaintext image with additional information through sequence recovery. The method reduces the difficulty of secret key management, improves the security of image transmission, and brings convenience for cloud management.

Description

technical field [0001] The invention relates to a method for reversible hiding of an image encryption domain. Background technique [0002] With the rapid development of cloud computing, digital image security and privacy protection have attracted widespread attention during cloud storage and transmission. The digital images uploaded by users to the cloud storage must be encrypted before uploading to realize the privacy protection of the digital image content; at the same time, the cloud needs to embed additional information in the ciphertext image to facilitate its management; at the receiving end, receivers with different permissions need to Extract hidden information or / and obtain original image data. Image encryption domain reversible information hiding (RDHEI: Reversible Data Hiding in Encrypted Image) technology can meet the above requirements of cloud services. Reversible information hiding in the image encryption domain can embed hidden information in the image enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/32H04L9/08H04L29/06H04L29/08
CPCH04L9/0822H04L9/0869H04L63/0435H04L67/06H04N1/32267H04N1/32272H04N1/32347
Inventor 陈帆和红杰郑梦阳嫣舒尹帮旭
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products