Multi-image hiding method based on secret sharing
A secret sharing and multi-image technology, applied in the field of multi-image hiding, can solve problems such as low robustness, small hiding capacity, and weak security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.
[0042] figure 1 is the encryption flowchart of this method.
[0043] The programming software used is Matlab R2016a, select Figure 2-4 The 3 sizes shown are 768 × 1024 image as the original image. Using this method, Alice describes the detailed process of embedding the cover image into the hidden image as follows.
[0044] Step 1: Image segmentation: Let the 3 original images be I 1 0 , I 2 0 , I 3 0 ,Such as Figure 2-4 As shown, its size is 768×1024; using the block function, divide the three original images into 8×8 small blocks, and the three image block sets can be obtained as { B 1 ij},{ B 2 ij}, { B 3 ij}.
[0045] Step 2: Two-dimensional Zigzag transformation: take the image block as the scrambling unit, pair { B 1 ij}, { B 2 ij}, { B 3 ij} carry out the two-dimensional Zigzag transformati...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com