Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

JPEG asymmetric digital image steganography method

A digital image, asymmetric technology, applied in the field of JPEG asymmetric digital image steganography, can solve problems affecting the security performance of the algorithm

Active Publication Date: 2019-07-12
SUN YAT SEN UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the embedded changes of these pre-fixed DCT coefficients are not optimal, and will affect the security performance of the algorithm to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JPEG asymmetric digital image steganography method
  • JPEG asymmetric digital image steganography method
  • JPEG asymmetric digital image steganography method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] Such as figure 1 Shown, a kind of JPEG asymmetric digital image steganography method, comprises the following steps:

[0082] S1: Using BOSSbase ver1.01, a representative database of digital image steganography, as the data source, JPEG compression is performed on it with quality factors 75 and 95 respectively to obtain the carrier image X, and the carrier image is divided into two interleaved sub-images X 1 、X 2 ;

[0083] S2: Obtain the initial distortion cost value C of the carrier image based on the JPEG image symmetric steganography algorithm ori and initialize the embedding modification graph in R 1 , R 2 ;

[0084] S3: Optimizing R 1 The embedded modification of each DCT block in the block, update the subgraph X 1 The cost value of each element, through simulation embedding to obtain a new charge carrier graph Y′ 1 and the new embedding modification graph R′ 1 ;

[0085] S4: Construct a four-neighborhood model, and modify the graph R′ in combination wit...

Embodiment 2

[0150] On the basis of Embodiment 1, further, in order to compare the security performance of the JPEG asymmetric digital image steganography method mentioned in the present invention, this embodiment conducts a performance test.

[0151] More specifically, all performance tests in the present invention are based on Bossbase ver1.01, an image library commonly used in digital image steganography, with 10,000 grayscale images with a size of 512×512. First, to construct the cover images, the above images are compressed into JPEG images with quality factors 75 and 95, respectively. Next, choose the three safest JPEG digital image steganography algorithms, respectively J-UNIWARD, GUED, and BET, to initialize the cost value. Then, select the three steganalysis algorithms GFR with the highest performance for JPEG steganalysis detection [9] ,CC-JRM [10] and SCA-GFR [11] . Classification error rate P E As an index to measure the performance of the algorithm, the classification err...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a JPEG asymmetric digital image steganography method, which comprises the following steps of: obtaining a carrier image, and dividing the carrier image into two interleaved sub-images X1X2; calculating an initialization distortion cost value of the carrier image and initializing embedded modification graphs R1 and R2; optimizing the in-block embedding modification condition of each DCT block in the R1, updating the cost value of each element of the sub-image X1, and obtaining a new secret-carrying sub-image Y'1 and a new embedded modification graph R'1; constructing afour-neighborhood model, updating the cost value of each element in the X2 by combining an embedded modification image R'1 and a BBC strategy, and obtaining a new secret-carrying sub-image Y'2; and merging the secret-carrying sub-image Y'1 and the secret-carrying sub-image Y'2 to obtain a complete secret-carrying image Y', and sending the complete secret-carrying image Y' into a steganography analyzer to detect the safety performance of the JPEG asymmetric steganography algorithm. According to the JPEG asymmetric digital image steganography method provided by the invention, a new cost value updating method is constructed, the safety performance of the algorithm is effectively improved, and through establishment of a four-neighborhood model, simultaneous updating of + 1 / -1 distortion cost values in the horizontal direction and the vertical direction is realized, and the convergence speed is high.

Description

technical field [0001] The invention relates to the field of multimedia information security, and more specifically, relates to a JPEG asymmetrical digital image steganography method. Background technique [0002] In recent years, with the continuous development of global networking and informatization, the research on information security has been pushed to an upsurge. Among them, multimedia information security, as an important branch of information security, is also developing rapidly. Therefore, as an important research content in the field of multimedia information security, digital image steganography has also attracted the attention of many research inventors. great application. [0003] Digital image steganography refers to using digital images as carriers to embed secret information into public carrier images, so as to achieve the effect of secret information transmission. There are currently three basic metrics used to measure the performance of digital image ste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 李潇焓倪江群张东苏文康
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products