Adaptive Image Encryption Domain Reversible Hiding Method Based on Hybrid Encryption Mechanism

A hybrid encryption and self-adaptive technology, which is applied in image communication and key distribution, can solve the problems of high time complexity of public key encrypted images, unfavorable transmission and storage of encrypted data, and large amount of digital image data.

Active Publication Date: 2021-02-26
SOUTHWEST JIAOTONG UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large amount of digital image data, the time complexity of directly encrypting the image with the public key is high, and there is serious data expansion; for example, in the algorithm of Chen et al., for each 8-bit pixel value, the pixel value expansion after homomorphic encryption to 512×4 bits
That is to say, the size of the encrypted image will be doubled, which will adversely affect the transmission and storage of encrypted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive Image Encryption Domain Reversible Hiding Method Based on Hybrid Encryption Mechanism
  • Adaptive Image Encryption Domain Reversible Hiding Method Based on Hybrid Encryption Mechanism
  • Adaptive Image Encryption Domain Reversible Hiding Method Based on Hybrid Encryption Mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0088] A specific embodiment of the present invention is a method for reversible concealment of an adaptive image encryption domain based on a hybrid encryption mechanism, comprising the following steps:

[0089] A. Image encryption

[0090] A1. Pixel type identification matrix generation:

[0091] The user calculates the original image X through the following formula, X={x i,j Pixel x in |i=1,2,...,I,j=1,2,...,J} i,j predicted value of

[0092]

[0093] Where I is the number of rows of the original image X, J is the number of columns of the original image X, and x i,j is the pixel in the i-th row and j-th column in the original image X, Represents the rounding down operation, ∪ represents the union operation of sets;

[0094] if pixel x i,j The most significant bit of the pixel x i,j predicted value of The most significant bits of the same, then the pixel x i,j the type identifier p i,j is 0; otherwise, pixel x i,j the type identifier p i,j The value is 1; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An adaptive image encryption domain reversible hiding method based on a hybrid encryption mechanism. The user treats the encrypted digital image, uses sequential prediction to obtain the pixel type identification matrix of the original image, and adaptively selects the optimal block size of the pixel type identification matrix to generate the best Block type identification matrix; use random number as key to combine block type identification matrix, use "XOR + pixel classification scrambling" to generate encrypted image of original image; use random number as key to encrypt part of the information of block type identification matrix, receive Party’s public key uses an asymmetric encryption algorithm to encrypt “random numbers, residual block type identification matrix information, and optimal block size”, and then embeds them in series in the variable pixels of the encrypted image; the receiver uses the private key to decrypt the extracted key information and passes Sequence recovery can get the same decrypted image as the original image and the plaintext image with additional information. The method reduces the difficulty of key management, improves the security of image transmission, and facilitates cloud management.

Description

technical field [0001] The invention relates to a method for reversible hiding of an image encryption domain. Background technique [0002] With the rapid development of cloud computing, digital image security and privacy protection have attracted widespread attention during cloud storage and transmission. The digital images uploaded by users to the cloud storage must be encrypted before uploading to realize the privacy protection of the digital image content; at the same time, the cloud needs to embed additional information in the ciphertext image to facilitate its management; at the receiving end, receivers with different permissions need to Extract hidden information or / and obtain original image data. Image encryption domain reversible information hiding (RDHEI: Reversible Data Hiding in Encrypted Image) technology can meet the above requirements of cloud services. Reversible information hiding in the image encryption domain can embed hidden information in the image enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32H04L9/08H04L29/06H04L29/08
CPCH04L9/0822H04L9/0869H04L63/0435H04L67/06H04N1/32267H04N1/32272H04N1/32347
Inventor 陈帆和红杰郑梦阳嫣舒尹帮旭
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products