Image encryption and hiding method and device, image decryption method and device

An image, encrypted image technology, applied in computer security devices, instruments, electronic digital data processing and other directions, can solve the problems of attack, increase information leakage, loss or change, etc., to achieve the effect of reducing image leakage

Active Publication Date: 2019-02-15
西安润月云网络科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the texture-like or noise-like features of encrypted images are obvious visual symbols, which are easy to attract more people's attention, thus bringing attacks and cryptanalysis, and increasing the risk of information leakage, loss or change

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption and hiding method and device, image decryption method and device
  • Image encryption and hiding method and device, image decryption method and device
  • Image encryption and hiding method and device, image decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] The embodiment of the present invention provides an image encryption and hiding method, such as figure 1 As shown, the method includes the following steps:

[0072] S101: Use discrete wavelet transform to decompose the original image into a first approximate subband and a first detail subband in the time domain.

[0073] Using discrete wavelet decomposition, the original image is decomposed into approximation sub-bands (LL) and detail sub-bands (LH, HL, HH), so that different encryption algorithms are performed on different domains for encryption.

[0074] S102: Perform pseudo-random encryption on the first approximate subband, and perform quantization processing to obtain a second approximate subband.

[0075] First, pseudo-random encryption is performed on the first approximate subband (LL). During pseudo-random encryption, a pseudo-random generator (Pseudo Random Number Generator, PRNG for short) is used to set a key K, which is used to generate data S randomly. A ...

Embodiment 2

[0106] An image decryption method provided by an embodiment of the present invention, such as Figure 7 As shown, the method includes:

[0107]S201: Extract a bit stream from an explicitly encrypted image by using lifting wavelet transform.

[0108] The above step S201 specifically includes:

[0109] S2011: Perform lifting wavelet decomposition on the explicit encrypted image to obtain a third approximation subband and a third detail subband.

[0110] The third detail subband (LH, HL, HH) is obtained after processing the explicitly encrypted image by lifting wavelet transform.

[0111] S2012: Take out the least significant bit of the binary number corresponding to each pixel value of the third detail subband in turn to obtain a bit stream.

[0112] The inverse process of the least significant bit replacement is performed, and the last two bits of the binary number corresponding to each pixel value of the third detail sub-band (LH, HL, HH) are sequentially taken out, and the...

Embodiment 3

[0129] An image encryption hiding device provided by an embodiment of the present invention, such as Figure 10 shown, including:

[0130] The decomposition module 31 is used to decompose the original image into a first approximate sub-band and a first detail sub-band in the time domain by using discrete wavelet transform. The main function of the decomposition module 31 is to use discrete wavelet decomposition to decompose the original image into approximate sub-bands (LL) and detail sub-bands (LH, HL, HH), so that different encryption algorithms are performed on different domains to encrypt. .

[0131] The approximate sub-band encryption module 32 is configured to perform pseudo-random encryption on the first approximate sub-band, and perform quantization processing to obtain the second approximate sub-band. The main function of the approximate sub-band encryption module 32 is to first perform pseudo-random encryption on the first approximate sub-band, and use a pseudo-ran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption and hiding method and a device, an image decryption method and a device, belonging to the technical field of image protection. The method comprises the following steps: firstly, the original image is decomposed into a first approximate sub-band and a first detail sub-band in the time domain by using a discrete wavelet transform; Then the first approximatesubband is encrypted pseudo-randomly and quantized to obtain the second approximate subband. Performing Arnold transform encryption on the first detail sub-band to obtain a second detail sub-band; Then the second approximation sub-band and the second detail sub-band data are merged to obtain merged data; Finally, the combined data is compressed according to Huffman coding to form a bit stream. Anexplicit encrypted image is obtained by hiding the bit stream into a host image. The method reduces the risk of image leakage, loss or alteration due to the attack or modification of encrypted images.

Description

technical field [0001] The present invention relates to the technical field of image protection, and in particular, to an image encryption and hiding method and device, and an image decryption method and device. Background technique [0002] For the confidentiality of digital images, in practice, the two-dimensional images are generally converted into one-dimensional data, and then encrypted by traditional encryption algorithms. Different from ordinary text information, images and videos are temporal, spatial, and visually perceptible, and can also be compressed with loss. These characteristics make it possible to design more efficient and secure encryption algorithms for images. The technological development and rise of hidden images comes from the embedding of digital watermarks so that intellectual property rights can be better protected. Hidden image technology can hide the information of the image, so that the effect of image encryption can be achieved. [0003] Curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 叶从欢熊曾刚张学敏徐方刘振
Owner 西安润月云网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products