High-capacity image steganography method and a secret information extraction method

A secret information and large-capacity technology, applied in the field of large-capacity image steganography and secret information extraction, can solve the problems of small embedded information, complex extraction, and easy detection of hidden algorithms

Active Publication Date: 2019-04-19
NINGBO UNIV
View PDF14 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In general, the spatial domain steganography algorithm is simple and the amount of information hidden is large, but the main disadvantage is that the robustness to most attacks is not strong, and the hidden algorithm is easy to be detected; the robustness of the steganographic technology based on the transformation domain Among them, the DCT domain is the most widely used transform domain algorithm, but the biggest disadvantage of the current transform domain algorithm is that the amount of embedded information is small and the extraction is complicated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-capacity image steganography method and a secret information extraction method
  • High-capacity image steganography method and a secret information extraction method
  • High-capacity image steganography method and a secret information extraction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0061] like figure 1 As shown, a large-capacity image steganography method is used to embed secret information into the carrier image, including the following steps:

[0062] Step 1. Perform scrambling processing on the carrier image to obtain a scrambled carrier image;

[0063] Among them, in this embodiment, one of the four scrambling algorithms is arbitrarily selected, and the pair size is N 1 *N 2 The carrier image is scrambled, and the specific steps of the first scrambling algorithm are as follows:

[0064] Step 1-1a, calculate the sum of the row number and column number of each pixel of the carrier image, wherein any pixel of the carrier image is represented by the i-th row and the j-th column, i=1, 2, 3... N 1 ,j=1, 2, 3..N 2 ;

[0065] Step 1-1b, judging whether the value of i+j can be divisible by 2, if yes, proceed to step 1-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-capacity image steganography method. The method comprises the following steps: carrying out scrambling processing on a carrier image; Dividing the scrambled image into N* N sub-blocks and carrying out DCT (Discrete Cosine Transform); Classifying each DCT block, and selecting an embedded block; Element values at selected positions are extracted from a matrix obtainedafter the DCT coefficient of each embedded block is scanned in a Z shape, and a coefficient matrix is obtained; Extracting element values which are the same as the element values at the selected positions from a matrix obtained after Z-shaped scanning of the Q table to form a quantization matrix; Calculating a division matrix and block capacity through the quantization matrix; Dividing the bit stream of the secret information according to the block capacity; Calculating an embedded matrix for the divided bit stream; Calculating a new coefficient matrix; Replacing the DCT coefficient with theelement value in the new coefficient matrix, and carrying out inverse operation of Z-shaped scanning to obtain a new DCT coefficient; And carrying out DCT inverse transformation on each sub-block andthen carrying out inverse scrambling processing. The invention also discloses a secret message extraction method. And the image complexity is high and the embedding capacity is large.

Description

technical field [0001] The invention relates to the image field, in particular to a large-capacity image steganography method and a secret information extraction method. Background technique [0002] Information hiding is from the perspective of hiding the existence of information, ensuring the security of secret information transmission, using the limitations of human senses, embedding secret information in the multimedia carrier for public transmission, so that the third party cannot detect the existence of secret information . Information hiding is divided into multiple branches such as steganography, numerical watermarking, information sharing, and hidden channels. From the initial military field, it has been applied to many fields such as commercial information, government confidential information, and personal sensitive information. [0003] Commonly used image steganography techniques can be divided into two categories: Steganography techniques based on spatial domai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G06T5/10
Inventor 戴洪珠郑紫微杨任尔黄冬明程劼岳淼
Owner NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products