Secret image camouflage recovery method by combining secret key and random orthogonal tensor basis

A key and secret image technology, which is applied in image data processing, graphics and image conversion, instruments, etc., can solve the problem that the mean block and the difference block do not satisfy the orthogonal relationship, cannot be restored, and cannot guarantee the accurate reconstruction and acquisition of secret image and audio High-precision secret image audio and other issues

Active Publication Date: 2018-10-30
SHAANXI NORMAL UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, whether it is ① standard Tangram algorithm, or ② block average 5-tuple matching Tangram method and the previously given ③ digital image camouflage method based on improved Tangram algorithm and 2-dimensional dual-scale rectangular mapping, ④ digital image camouflage based on block sequence and reconstruction method, ⑤ digital audio camouflage and reconstruction method based on segmented sequence, and ⑥ audio information hiding method combined with dictionary and sorting linear fitting. The transformation models based on these methods are all affine transformation models. For image , the affine transformation model only has the mean block and the difference block, and for audio, the affine transformation model only has the mean vector and the difference vector, and the mean block and the difference block as well as the mean vector and the difference vector do not satisfy the basic orthogonal relationship, resulting in affine transformation The transformation accuracy of the model is generally low, and it cannot effectively guarantee the fitting accuracy of the secret image audio to the public image audio, so that effective channel deception cannot be carried out, and at the same time, it cannot effectively guarantee the fitting accuracy of the public image audio to the secret image audio. Therefore, it is impossible to guarantee the accurate reconstruction of secret image audio and obtain high-precision secret image audio
On the other hand, if the difference block and the mean value block or the mean value vector and the difference vector of the affine model tend to be consistent, it corresponds to a constant value block or a constant value sequence processing. At this time, random disturbance must be added to improve the secret image audio and Publicly discloses the matching performance of small blocks and segments of image and audio division, otherwise it will not be restored, thus further limiting the transformation accuracy of the radial transformation model
For the Tangram algorithm based on triangulation (7), it can only approximate the reconstruction of the triangulation area of ​​the secret image, and its practical application value is still small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret image camouflage recovery method by combining secret key and random orthogonal tensor basis
  • Secret image camouflage recovery method by combining secret key and random orthogonal tensor basis
  • Secret image camouflage recovery method by combining secret key and random orthogonal tensor basis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] The present invention is described in further detail below in conjunction with accompanying drawing:

[0121] The following takes JAVA jdk1.7.0_09 as an example implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, wherein figure 1 is the embedded flowchart, figure 2 is the extraction flow chart.

[0122] Step 1: Pick a secret image such as image 3 As shown, it is an 8-bit grayscale image with a resolution of 512×512. Select a public image, such as Figure 4 As shown, it is an 8-bit grayscale image with a resolution of 512×512, that is, r=8; take m 1 = 4, n 1 = 4, m 2 = 4, n 2 = 4, that is, both the secret image and the public image are divided into 4×4 blocks, and the secret image and the public image can be divided into K=16384 small blocks in total, and the image small blocks corresponding to the secret image and the public image are respectively used as secret small bloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret image camouflage recovery method by combining a secret key and random orthogonal tensor basis. The method comprises the following steps: firstly dividing a secret image and a public image into equal number of small matrix blocks, and constructing random orthogonal tensor basis by using a unit orthogonal matrix generated by the secret key; secondly, performing sufficient and effective linear expression on small secret image blocks by solving the projections on the random orthogonal tensor basis on the small secret image blocks, selecting the front k projection coefficients with large amplitude and energy from the projection and recording an index location to construct a line sequence and a row sequence; and secondly embedding the selected projection coefficient, the line sequence and the row sequence into the corresponding public small image blocks through a secret-writing method for performing tiny adjusting and large-capacity embedding on the public image, thereby forming a channel public transmission image; and finally reconstructing the secret image through a conversion parameter extracted from the channel public transmission image and by combining the secret key.

Description

technical field [0001] The invention belongs to the intersecting field of image information security and digital image signal processing, and relates to a secret map camouflage restoration method, in particular to a secret map camouflage restoration method combined with a secret key and a random orthogonal tensor base. Background technique [0002] In recent years, with the development of computer and network technology, more and more digital images are spread in public channels. Unrestricted access to and use of secret images not only involves personal privacy, media credibility, and government integrity, but can also lead to social unrest and induce military conflicts. [0003] How to effectively protect secret images transmitted in public channels has become a hot research topic at present. Aiming at this problem, people have proposed a variety of image protection methods, such as digital image encryption technology and digital image camouflage technology that convert cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T3/00
CPCG06T3/0075
Inventor 邵利平邵京津任平安
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products