Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Complexity-Based Emd(n,m,δ) Adaptive Image Steganography Method

A complex and adaptive technology, applied in image communication, electrical components, etc., can solve the problems of not considering the complexity of different textures of images, maintaining the visual quality of embedded dense carriers, and different visual masking effects.

Active Publication Date: 2020-05-12
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, the proposed strategy fixes the modification amount of a single pixel of the EMD(n,m) model to ±1, and the overflow modification amount to ±2 without considering the different texture complexities in different regions of the image, and the masking effect on vision is also different. Therefore, it is difficult to perform large-capacity embedding while maintaining the visual quality of the embedding carrier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Complexity-Based Emd(n,m,δ) Adaptive Image Steganography Method
  • A Complexity-Based Emd(n,m,δ) Adaptive Image Steganography Method
  • A Complexity-Based Emd(n,m,δ) Adaptive Image Steganography Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0174] The following takes JAVA jdk1.8.0_65 as the case implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, but is not limited to this implementation case, where figure 1 is the embedded flowchart, figure 2 is the extraction flow chart.

[0175] The specific implementation steps of the embedding method:

[0176] Step 1: Input the p-level grayscale carrier image C=(c i,j ) M×N , for example: if the input resolution is 4×4 8-level grayscale carrier image C, then M=4, N=4, p=8; input Pre psnr >0, Pre SSIM ∈(0,1], for example, you can enter Pre psnr = 45.91, Pre SSIM =0.87; Initialize the embedding bunker C equal to the resolution of C E =C, that is, C E and C are initialized to the same image; by Pre psnr and Pre SSIM Determine C=(c i,j ) M×N The specific method of the maximum adjustment amount δ is:

[0177] Step 1.1: Initialize δ=1, then apply integer random disturbance r to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an EMD (n, m, [Delta]) adaptive image secret writing method based on complexity. The method comprises the steps of: determining the maximum of the [Delta] according to carriers PSNR and SSIM and a control threshold value, and calculating block complexity according to the carrier blocking block intensity, the block contrast, block positions, blocks edge and block textures and determining regulation amount of the blocks; and finally, organizing a carrier secret-embedded information table and adaptively embedding 2-bit secret bits from high to low according to the EMD (n, m, [Delta]) and the complexity. In order to improve the safety, a carrier block Hash value and a user secret key are introduced to dynamically generate block secret-embedded parameters n and mand scramble a secret-embedded regulation table. Compared to the current method, the method provided by the invention performs embedding maximization of the secret information while maintaining the high visual quality and the structure similarity, the embedding process is tightly bound with the user secret key and the carrier block Hash value, and a secret-containing carrier has a high visual quality through embedding of the complexity from high to low and enhances the safety.

Description

technical field [0001] The invention belongs to the cross field of image information security and digital image signal processing, relates to an image steganography method, in particular to an EMD (n, m, δ) adaptive image steganography method based on complexity. Background technique [0002] Digital image steganography is to use the redundancy of digital images and the masking characteristics of human vision to hide secret information in irrelevant image carriers, so as to carry out covert communication, making it difficult for illegal attackers to extract information from a large number of publicly transmitted images. Concealed secret information, so as to maximize the security of confidential information in transmission. [0003] For digital image steganography, people have proposed a variety of digital image steganographic embedding methods. For example, the BPCS method (E, Eason RO. Principle and applications of BPCS-Steganography[C] / / Proceedings of SPIE-The Internatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32
CPCH04N1/32272H04N1/32283
Inventor 邵利平张洋赵迪任平安
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products