Large-capacity hiding method for reversible data in bitstream encryption domain of JPEG image

A technology of data hiding and bit stream, which is applied in encryption devices with shift registers/memory, image communication, digital transmission systems, etc. It can solve problems such as the influence of steganographic capacity, inconsistent size of encrypted images, and potential safety hazards in encryption algorithms, etc.

Active Publication Date: 2019-01-04
SOUTHWEST JIAOTONG UNIV
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above algorithm only uses part of the image block entropy coding (information hiding entropy coding) as the carrier of information embedding, which affects the steganography capacity, and because the hidden entropy coding information is hidden in the JPEG header file, the encrypted bitstream can be decoded to get The si

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Large-capacity hiding method for reversible data in bitstream encryption domain of JPEG image
  • Large-capacity hiding method for reversible data in bitstream encryption domain of JPEG image
  • Large-capacity hiding method for reversible data in bitstream encryption domain of JPEG image

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0091] Example

[0092] A specific implementation of the present invention is a large-capacity reversible data hiding method in the JPEG image bitstream encryption domain, which includes the following steps:

[0093] A, JPEG bitstream encryption

[0094] A1, exchange coefficient scrambling

[0095] A1.1. Bit stream data read:

[0096] The user reads the image X in the JPEG format with a size of H×W, and obtains the original bit stream J of the image X, J={SOI, JH, ECS 1 , ECS 2 ,..., ECS n ,..., ECS N ,EOI}, where:

[0097] SOI is the image start marker, JH is the JPEG header file, and EOI is the image end marker;

[0098] ECS n Is the n-th image block entropy coding in the image, N is the number of image block entropy coding,

[0099] ECS n ={DCC , ACC , ACC ,..., ACC ,...ACC ,EOB}; DCC Is the DC coefficient entropy coding of the nth image block entropy coding, ACC Is ECS n The i-th AC coefficient entropy coding in the, EOB is the end marker of the image block entropy coding, I i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a large-capacity hiding method for reversible data in a bitstream encryption domain of a JPEG image. According to the method, a user performs exclusive or encryption on extension bits of entropy coding in each of image blocks according to an encryption key in JPEG bitstreams, performs pseudo-random scrambling on remaining AC coefficients except a last non-zero AC coefficient, and then performs the pseudo-random scrambling on the entropy coding of all the image blocks; a cloud performs embedding of extraneous information by a histogram shifting method on the AC coefficients in a bitstream ciphertext according to a hiding key, and can perform non-destructive extraction; and a receiver performs pseudo-random scrambling resumption on the entropy coding of ciphertext image blocks in the bitstream ciphertext according to the encryption key, and then the pseudo-random scrambling resumption and exclusive or decryption of the AC coefficients are performed in the entropycoding of each of the ciphertext image blocks to obtain decrypted bitstreams same as original JPEG bitstreams. The method not only achieves encryption of the extension bits of the entropy coding, butalso encrypts Huffman coding of the entropy coding; and the steganographic capacity is large, and the safety is high.

Description

technical field [0001] The invention relates to a large-capacity JPEG image encryption domain reversible data hiding method. Background technique [0002] With the rapid development of cloud computing, the security and privacy protection of digital images stored in the cloud has attracted widespread attention. Image encryption domain reversible information hiding (RDH-EI: Reversible Data Hiding in Encrypted Image) is a method of reversibly hiding additional information in the ciphertext image (encrypted domain) after encrypting the original image, and after the additional information is extracted, the original image A technique that can be reconstructed losslessly. This technology can not only realize the privacy protection of cloud digital images through encryption, but also facilitate its management by hiding additional information in ciphertext images; at the same time, at the receiving end, the recipient can extract additional information and restore the original image....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N19/88H04N19/91H04N19/184H04L9/06
CPCH04L9/0618H04N19/184H04N19/88H04N19/91
Inventor 陈帆郑梦阳和红杰董梦瑶
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products