Low-disturbance information security steganography encoding method based on Chinese remainder theorem

A Chinese remainder theorem and information security technology, applied in the field of information steganography, can solve the problems of image redundancy, inability to improve, underutilization, etc.

Active Publication Date: 2019-08-09
HUBEI UNIV OF TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, the single-pixel embedding capacity is limited, and the image quality cannot be effectively impro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-disturbance information security steganography encoding method based on Chinese remainder theorem
  • Low-disturbance information security steganography encoding method based on Chinese remainder theorem
  • Low-disturbance information security steganography encoding method based on Chinese remainder theorem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0050] The present invention provides a low-disturbance information security steganographic encoding method based on the Chinese remainder theorem. For the convenience of description, an image is regarded as a pixel matrix, and the monochrome component of each pixel in the pixel matrix is ​​denoted as CP. For example, the CP description can be applied to grayscale image pixels, and monochrome components of RBG images. The original CP matrix used for information hiding is denoted as Cover image, referred to as C; the CP matrix obtained after hiding information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a low-disturbance information security steganography encoding and decoding method based on the Chinese remainder theorem. The coding comprises four steps: 1) initializing a system based on an image C, to-be-embedded information M and a hidden key K; 2) pre-coding the hidden information M based on the Chinese remainder theorem, and carrying out selective optimization; 3) pre-coding the scrambled and mapped information to be hidden in C to obtain S; and 4) recovering hidden information M from the S based on the shared information. According to the invention, the output result is marked in each line and each column of CPs, and at most only the LSB of one CP is marked, so that the marked S image quality can be obviously improved. At most one LSB is marked in each row andeach column of CPs, and with the increase of the C size, the improved gain of the image quality and the hidden capacity can be obtained at the same time. The hidden operation based on two-dimensionalrandom mapping can avoid the scanning attack aiming at the statistical characteristics of the LSB marking method.

Description

technical field [0001] The invention belongs to the field of information steganography in information security technology, and specifically relates to a steganography method based on image size and position information of image pixels in a matrix as auxiliary information. Background technique [0002] Information steganography is a kind of information security technology. Information steganography technology can hide binary information in various electronic media coding redundancy. The electronic media used for steganography can be video, audio, bitmap, compressed image, etc. The cost is a certain distortion, which must be based on the distortion Information steganography technology can hide sensitive private data in media so that it cannot be detected. More and more Internet applications, including mobile Internet applications, rely on convenient and fast third-party platforms for private data storage, transmission, computing and other operations. While the application br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/32H04N1/44
CPCH04N1/32149H04N1/4446
Inventor 陈永辉余辉张明武袁金龙舒红章屠明明
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products