JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation

A serial cascading and relative relationship technology, which is applied in the field of information hiding, can solve the problems of secret information difficulty and achieve the effects of improving detection resistance, compression resistance, and strong detection resistance

Active Publication Date: 2019-04-19
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the algorithm is resistant to JPEG compression, when the quality factor of the JPEG compression attack is different from the quality factor of the carrier image, it is difficult to extract the secret message correctly. In this case, there is about 1% error in the extracted message, which leads to Some problems in practical applications, how to reduce the error rate, ensure that the message can be extracted correctly with a high probability, and at the same time improve its security, that is, the resistance to detection, is the problem that needs to be solved in robust steganography.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation
  • JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation
  • JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 Shown, a kind of JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation of the present invention comprises the following steps:

[0040] Step S101: Determine the modification area;

[0041] Step S102: designing a corresponding distortion function;

[0042] Step S103: Encoding the message to be embedded by using error correction coding;

[0043] Step S104: using steganography to embed error correction codes;

[0044] Step S105: performing JPEG compression;

[0045] Step S106: Obtain an error-containing information stream by decoding the error-correcting code, and perform error correction;

[0046] Step S107: Get the original embedded message.

Embodiment 2

[0048] Such as figure 2 As shown, another kind of JPEG image robust steganography method based on serial concatenated code and DCT coefficient relative relation of the present invention comprises the following steps:

[0049] Step S201: Determine the modification area, including:

[0050] Step S2011: Decode the JPEG image I to obtain a series of 8×8 blocks D of DCT coefficients D after quantization and rounding k ={D k (i), i=1,2,...,64}, where, k=1,2,...,B, B is the total number of blocks in the image 8×8 blocks, D k (i) represents the i-th coefficient in the k-th quantized DCT block;

[0051] Step S2012: Using DCT coefficient D k (i) DCT coefficients in the same block as the adjacent block average The relative relationship of the four adjacent DCT coefficients corresponds to a length l 1 virtual steganographic carrier element x on j On, 1≤j≤l 1 ,Satisfy:

[0052]

[0053] Step S2013: Establish a robust channel:

[0054] Establish a robust channel based o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information hiding, and particularly relates to a JPEG image robust steganography method based on a serial concatenated code and DCT coefficient relative relation. The JPEG image robust steganography method based on the serial concatenated code and DCT coefficient relative relation comprises the following steps: determining a modification area; designing a corresponding distortion function; encoding a to-be-embedded message through error correction encoding; embedding the error correction encoding through robust steganography; performing JPEG compression; obtaining an information stream containing errors through steganographic decoding, and performing error correction through decoding of error correction encoding; and obtaining an original embedded message. The method provided by the invention can resist JPEG compression attacks of different quality factors in a larger range, and can guarantee that the embedded message can be completely extracted out with high probability, meanwhile, under the premise of bearing the same secret message, the method provided by the invention has higher detection resistance.

Description

technical field [0001] The invention relates to the technical field of information hiding, in particular to a JPEG image robust steganography method based on the relative relationship between serial concatenated codes and DCT coefficients. Background technique [0002] Steganography is a technique of constructing a covert communication channel using public carriers. In recent years, with the development of mobile communication technology, more and more digital carriers are sent and received by smart mobile terminals. However, due to the limitations of bandwidth, tariffs, and traffic, terminals often damage the carriers transmitted on such channels. Compression, so that classical steganography cannot correctly extract embedded messages in such cases. Therefore, it is of great practical value to study steganographic algorithms that can completely extract embedded messages in such channels and have stronger resistance to steganographic detection than robust watermarking algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32149H04N1/32165H04N1/32272H04N1/32277
Inventor 罗向阳包震坤张祎杨春芳刘粉林王道顺王平甘军军张月
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products