Information steganography algorithm of binary image double disturbance scoring based on STC coding

A technology of binary image and algorithm, applied in the field of information hiding

Active Publication Date: 2019-07-02
SUN YAT SEN UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the formulation of the distortion measurement function is often based on the nature of the carrier image. After embedding the secret information, when evaluating the secret image according to the same rules, the disturbance score of the pixels in the neighborhood of the embedded position is different from the disturbance score of the carrier image, and it is easy to be analyzed by the corresponding steganalysis. Algorithm detection, the undetectability of steganographic algorithms is facing severe challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information steganography algorithm of binary image double disturbance scoring based on STC coding
  • Information steganography algorithm of binary image double disturbance scoring based on STC coding
  • Information steganography algorithm of binary image double disturbance scoring based on STC coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] like figure 1 , figure 2 as well as image 3 As shown, the embedding process of an information steganography algorithm based on STC-coded binary image double perturbation scoring includes the following steps:

[0065] (1) Use the crmiLTP disturbance measurement method to calculate the disturbance score map D of the carrier image X, obtain the disturbance score score1(x,y) of each pixel, and filter the embeddable point set C 1 ;

[0066] (2) Flip the embeddable point set C sequentially 1 Pixels at the included positions, recalculate the image S 1 Disturb the map D' to get the perturbation score score2(x,y) of each pixel;

[0067] (3) Set the threshold T 2 , when both score1(x,y) and score2(x,y) are less than T 2 , from the steganographic image S 1 Filtering embeddable point sets in C 2 ;

[0068] (4) Remove point set C 2 Neighborhood pixels, filter out the embeddable point set C 3 ;

[0069] (5) Set the threshold T 3 , make the difference between score1(x,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a binary image double disturbance scoring information steganography algorithm based on STC coding. According to the algorithm, disturbance scoring is conducted on an image through an improved crmiLTP distortion measurement method, the influence of pixel point overturning before steganography and pixel point overturning after steganography on a disturbance mapping graph is considered, secret information is embedded through efficient STC coding on the basis of block hiding, and finally the steganography algorithm small in visual distortion and high in safety is designed. According to the invention, the carrier image property is considered; a double disturbance scoring criterion is set, bidirectional evaluation analysis is carried out on reversible points of an image edge area, and STC coding is combined, so that the algorithm has high image quality, small visual distortion and certain anti-steganography analysis and detection performance, and has a very large effect on secure secret communication.

Description

technical field [0001] The present invention relates to the field of information hiding, and more specifically, relates to an information steganography algorithm based on STC coded binary image double disturbance scoring. Background technique [0002] Information hiding technology is to embed secret information into the public carrier, and achieve the purpose of secret information transmission through the transmission of the carrier. Its essence is to use the visual masking effect and carrier redundancy to hide information. Compared with traditional encryption technology, information hiding has better undetectability, and it is difficult to distinguish the original carrier from the secret carrier only by visual senses, that is, this technology hides the fact of communication while protecting secret information. Coupled with the characteristics of various information hiding processing methods, abundant available carriers, and good security, this technology has broad applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/467
CPCH04N19/467
Inventor 修长振孙伟张宇
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products