Unlock instant, AI-driven research and patent intelligence for your innovation.

A generative information hiding method combining difference clustering and minimum error texture synthesis

A texture synthesis and information hiding technology, applied in character and pattern recognition, electrical digital data processing, instruments, etc., can solve the problems of not considering the difference of sample small blocks, secret information concealment, splicing, etc.

Active Publication Date: 2019-02-26
SHAANXI NORMAL UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the problems with this type of method are: ① normal text and images have very limited ability to express irrelevant secret information, if the text and images in the database need to have sufficient expression ability, it is necessary to collect enough samples; With the enhancement of database text and image information expression capabilities, the amount of data to be searched is also increasing geometrically. Even with the help of inverted index, it will be a heavy burden for the search, storage and maintenance of large amounts of data, but with this At the same time, the embedding capacity is extremely low, involving intensive transmission of a large number of text and image collections in public channels; ③Although the isolated text or images of this method are normal text or images, which cannot detect abnormalities because they have not been modified, a large amount of text and images The dense transfer of image collections is also bound to raise suspicions
[0012] ①The same sample block usually represents the same secret information at different positions, so a specific sample small block is directly associated with a specific secret information segment, resulting in the leakage of secret information;
[0013] ②Although some methods introduce classification, one-to-one encoding is performed on the secret information segment by the category of the sample block, which leads to a fixed one-to-one relationship between the secret information segment and the sample block category. Correspondence, low security;
[0014] ③ Divide the small sample blocks into different categories, randomly select the small sample blocks from the same category, without considering the difference between the small sample blocks themselves and the sample small blocks that deviate from the classification center may lead to category extraction errors when attacked, Therefore, the ability to resist attacks is very limited
However, the error bar starting from a specific starting position does not mean the minimum error bar of all the smallest difference pixels in the overlapping area. At the same time, when there are multiple adjacent overlapping blocks, if the splicing order of non-adjacent block overlapping areas is not appropriate, It will be easy to produce traces of splicing, so that secret information cannot be concealed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A generative information hiding method combining difference clustering and minimum error texture synthesis
  • A generative information hiding method combining difference clustering and minimum error texture synthesis
  • A generative information hiding method combining difference clustering and minimum error texture synthesis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0161] The following takes JAVA jdk1.7.0_09 as an example implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, wherein figure 1 is the embedded flowchart, figure 2 is the extraction flow chart. Since the given method involves a large number of complex calculations, in order to simplify the description and clarify the calculation implementation process of each step, different examples are used in different steps to explain the corresponding calculation process. The specific implementation steps of the information hiding process are as follows :

[0162] Step 1: Input a P-level grayscale sample image S=(s) with a resolution of m×n i,j ) m×n ,s i,j ∈{0,1,…,2 P -1}, by the first key R 1 Pseudo-randomly intercept K pieces with resolution f on S h × f v Sample patches of size P 0 ,P 1 ,...,P K-1 ; select P respectively 0 ,P 1 ,...,P K-1 The center resolution is a h ×a v area as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a generative information hiding method combining difference clustering and minimum error texture synthesis. Firstly, the clustering center is obtained through the difference mean clustering of a sample block and a random key template, and the multiple mapping relationship between the secret information segmentation and the cluster center sample block is established. Then, combined with the random placement position, the appropriate sample block is selected from the sample block clustering center as the encoded representation of the secret information segmentation to encode the secret information and place it on the designated position of the blank image. Finally, the closest sample block is selected from all the sample blocks according to the minimum error texture synthesis strategy to conceal the secret information and generate texture image. Compared with the existing methods, the proposed method can effectively conceal the secret information by generating high-quality texture images, and the secret information segmentation does not correspond to the sample blocks in the clustering center, and the recovery process is completely dependent on the key and hasa strong resilience to attacks.

Description

technical field [0001] The invention belongs to the cross field of image information security and digital image signal processing, relates to an information hiding method, in particular to a generative information hiding method combining difference clustering and minimum error texture synthesis. Background technique [0002] With the continuous deepening of deep learning, the continued development of artificial intelligence and the emergence of quantum computers, the traditional multimedia information security situation with image and audio as the main transmission medium has become more severe. On the one hand, the dimensionality of steganographic classifiers based on machine learning continues to increase, making it less and less likely that traditional modified information hiding hidden information will not be discovered; on the other hand, the continuous development of compression technology also makes traditional modified The redundant space available for information hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06K9/62
CPCG06F21/602G06F2221/2107G06F18/23
Inventor 邵利平李国利任平安
Owner SHAANXI NORMAL UNIV