Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Separable encryption domain information hiding method

An information hiding and encryption domain technology, applied in key distribution, can solve problems such as limited effective embedding capacity, inability to meet the needs of embedding capacity, data extraction and image recovery errors, etc.

Active Publication Date: 2019-03-29
TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the encryption process hides the content of the original data, making the signal highly uneven and uncertain, and the information entropy reaches the maximum value from the perspective of visual information theory, which undoubtedly increases the difficulty of information embedding.
[0003] In 2011, Professor Zhang Xinpeng of Shanghai University proposed the concept of encryption domain information hiding for the first time. The carrier image is encrypted with a stream cipher and then divided into blocks, and the spatial domain structure characteristics of the image block are cleverly used to hide the encryption domain. However, under the premise of strict non-destructive The effective embedding capacity is limited, and data extraction and image restoration errors will occur when the embedding capacity increases
However, the improvement of embedded capacity still cannot meet the needs of existing users
With the increasing demand for data security, many problems in encrypted domain information hiding in terms of reversibility, embedding capacity, and algorithm execution efficiency still need to be further studied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Separable encryption domain information hiding method
  • Separable encryption domain information hiding method
  • Separable encryption domain information hiding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the purpose, features and advantages of the present invention more comprehensible, specific implementations of the present invention will be described in detail below.

[0082] We choose Matlab as the software platform, and programming realizes the design of the scheme of the present invention. The implementation process selects the 512×512 standard test image “Lena” as the image to be protected, assuming that the selected observation rate MR=0.25, and the block size B=8.

[0083] The specific operation steps are:

[0084] Ⅰ. The image encryption and secret information embedding part at the sending end, including the following steps:

[0085] The first step is the encryption process based on Block Compressive Sensing (BCS):

[0086](1). Read in a size 512 * 512 image I that needs to be protected, and divide the image into a plurality of non-overlapping, 8 * 8 size image blocks;

[0087] (2). Arrange each image block into a 64×1 column vector x i , i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a separable encryption domain information hiding method, and belongs to the technical field of the information hiding. The method is characterized by comprising the following steps: firstly reading in an image needing to protect and blocking the image, selecting an appropriate observation rate according to storage space and a user demand to perform the observation, quantitatively encoding the obtained observation values, and embedding secret information (such as copyright and identity authentication) into low 4-bit of each observation value in the encoding process, thereby producing a ciphertext image containing the secret information. Through the method provided by the invention, the extraction of the secret information and the reconstruction of the protected imageare separable; if a user extracts a key, the secret information can be directly and nondestructively extracted from the ciphertext image containing the secret information; if the user is authorized toreconstruct the image, the protected image can be reconstructed in high quality; if both key extraction and image reconstruction are existent, the secret information and the reconstructed image can be acquired at the same time.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to a separable encryption domain information hiding method. Background technique [0002] With the popularization of cloud computing, more and more image data involving personal privacy are stored and processed on open cloud platforms, such as credit records, medical records, court records, private property records, military fields, business information, etc. How to protect the security of these private data has become one of the most important and urgent research topics at present. Traditional encryption algorithms can convert user data into ciphertext for transmission and storage in the network, thereby hiding the content of user data well; information hiding technology can hide certain secret information (such as copyright, identity authentication, etc.) In the ciphertext, so as to realize the management of ciphertext data retrieval, classification or auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N19/467H04L29/06H04L9/08H04N19/176
CPCH04L9/0863H04L63/0428H04N19/176H04N19/467
Inventor 刘丽王安红李志宏吕琪牛志伟
Owner TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products