Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Secret Graph Masquerading Recovery Method Combining Key and Random Orthogonal Tensor Basis

A key and secret image technology, applied in the field of secret image camouflage recovery combining secret key and random orthogonal tensor base, can solve the problems of channel spoofing, unrecoverable, limiting the transformation accuracy of radiation transformation model, etc., to avoid overlapping, Improve the fitting accuracy and eliminate the effect of redundancy

Active Publication Date: 2022-03-29
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, whether it is ① standard Tangram algorithm, or ② block average 5-tuple matching Tangram method and the previously given ③ digital image camouflage method based on improved Tangram algorithm and 2-dimensional dual-scale rectangular mapping, ④ digital image camouflage based on block sequence and reconstruction method, ⑤ digital audio camouflage and reconstruction method based on segmented sequence, and ⑥ audio information hiding method combined with dictionary and sorting linear fitting. The transformation models based on these methods are all affine transformation models. For image , the affine transformation model only has the mean block and the difference block, and for audio, the affine transformation model only has the mean vector and the difference vector, and the mean block and the difference block as well as the mean vector and the difference vector do not satisfy the basic orthogonal relationship, resulting in affine transformation The transformation accuracy of the model is generally low, and it cannot effectively guarantee the fitting accuracy of the secret image audio to the public image audio, so that effective channel deception cannot be carried out, and at the same time, it cannot effectively guarantee the fitting accuracy of the public image audio to the secret image audio. Therefore, it is impossible to guarantee the accurate reconstruction of secret image audio and obtain high-precision secret image audio
On the other hand, if the difference block and the mean value block or the mean value vector and the difference vector of the affine model tend to be consistent, it corresponds to a constant value block or a constant value sequence processing. At this time, random disturbance must be added to improve the secret image audio and Publicly discloses the matching performance of small blocks and segments of image and audio division, otherwise it will not be restored, thus further limiting the transformation accuracy of the radial transformation model
For the Tangram algorithm based on triangulation (7), it can only approximate the reconstruction of the triangulation area of ​​the secret image, and its practical application value is still small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secret Graph Masquerading Recovery Method Combining Key and Random Orthogonal Tensor Basis
  • A Secret Graph Masquerading Recovery Method Combining Key and Random Orthogonal Tensor Basis
  • A Secret Graph Masquerading Recovery Method Combining Key and Random Orthogonal Tensor Basis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0120] The present invention is described in further detail below in conjunction with accompanying drawing:

[0121] The following takes JAVA jdk1.7.0_09 as an example implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, wherein figure 1 is the embedded flowchart, figure 2 is the extraction flow chart.

[0122] Step 1: Pick a secret image such as image 3 As shown, it is an 8-bit grayscale image with a resolution of 512×512. Select a public image, such as Figure 4 As shown, it is an 8-bit grayscale image with a resolution of 512×512, that is, r=8; take m 1 =4,n 1 =4,m 2 =4,n 2 = 4, that is, both the secret image and the public image are divided into 4×4 blocks, and the secret image and the public image can be divided into K=16384 small blocks in total, and the image small blocks corresponding to the secret image and the public image are respectively used as secret small blocks Bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret image camouflage restoration method combined with a key and a random orthogonal tensor base. Firstly, the secret image and the public image are divided into the same number of small matrix blocks, and the random orthogonal matrix is ​​constructed by using the unit orthogonal matrix generated by the key. Intersecting tensor base; secondly, by obtaining the projection of the dense graph small block on the random orthogonal tensor base to fully and effectively linearly express the dense graph small block, select the first k projection coefficients with larger amplitude and energy and record the index position To form a row sequence and column sequence; again, the selected projection coefficients, row sequence and column sequence are embedded into the corresponding public image small blocks through the steganography method of small adjustments to the public image and large-capacity embedding to form a public channel The image is transmitted; finally, the transformation parameters extracted from the image are publicly transmitted through the channel and combined with the key to reconstruct the secret image. Compared with the existing method, the present invention can realize the reconstruction of the secret map with different precision and strictly depends on the user key, thus possessing higher security.

Description

technical field [0001] The invention belongs to the intersecting field of image information security and digital image signal processing, and relates to a secret map camouflage restoration method, in particular to a secret map camouflage restoration method combined with a secret key and a random orthogonal tensor base. Background technique [0002] In recent years, with the development of computer and network technology, more and more digital images are spread in public channels. Unrestricted access to and use of secret images not only involves personal privacy, media credibility, and government integrity, but can also lead to social unrest and induce military conflicts. [0003] How to effectively protect secret images transmitted in public channels has become a hot research topic at present. Aiming at this problem, people have proposed a variety of image protection methods, such as digital image encryption technology that converts plaintext images into ciphertext and digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T3/00
CPCG06T3/0075
Inventor 邵利平邵京津任平安
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products