Multi-image hiding method based on secret sharing

A secret sharing and multi-image technology, applied in the field of multi-image hiding, can solve problems such as low robustness, small hiding capacity, and weak security

Active Publication Date: 2020-09-11
CHINA UNIV OF MINING & TECH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the present invention: To solve the problems of weak security, low robustness and small ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-image hiding method based on secret sharing
  • Multi-image hiding method based on secret sharing
  • Multi-image hiding method based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0042] figure 1 is the encryption flowchart of this method.

[0043] The programming software used is Matlab R2016a, select Figure 2-4 The 3 sizes shown are 768 × 1024 image as the original image. Using this method, Alice describes the detailed process of embedding the cover image into the hidden image as follows.

[0044] Step 1: Image segmentation: Let the 3 original images be I 1 0 , I 2 0 , I 3 0 ,Such as Figure 2-4 As shown, its size is 768×1024; using the block function, divide the three original images into 8×8 small blocks, and the three image block sets can be obtained as { B 1 ij},{ B 2 ij}, { B 3 ij}.

[0045] Step 2: Two-dimensional Zigzag transformation: take the image block as the scrambling unit, pair { B 1 ij}, { B 2 ij}, { B 3 ij} carry out the two-dimensional Zigzag transformati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-image hiding method based on secret sharing, and belongs to the field of information security. The invention provides a multi-image hiding method based on secret sharing in order to protect the safety of hidden image content, improve the algorithm robustness and expand the hiding capacity. The method comprises the following steps of: firstly, partitioning k carrierimages, scrambling image blocks by using two-dimensional Zig transform, and respectively mapping the scrambled image blocks from a spatial domain to a discrete cosine transform (DCT) domain; secondly,embedding the hidden image bits into k carrier images by using an additive spread spectrum algorithm or a multiplicative spread spectrum algorithm; and finally, mapping the disguised DCT coefficientsback to a spatial domain, performing scrambling recovery on the image blocks by using two-dimensional zigzag inverse transformation, and splicing the image blocks according to an original sequence toobtain k disguised images. Experiments show that the algorithm is efficient, good in embedding effect, large in hiding capacity, high in robustness and high in safety.

Description

technical field [0001] The invention relates to an information encryption technology, in particular to a multi-image hiding method. Background technique [0002] The rapid development of multimedia technology and the popularization of Internet have brought a series of political, economical, military and cultural issues, resulting in many new research hotspots. As a new multimedia security technology, image hiding has the characteristics of good concealment, and gradually attracts the attention of researchers. Researchers have proposed some image hiding methods. Some of these methods have been deciphered, some have weak security, some have low robustness, and some have problems such as limited hidden capacity, which are unsatisfactory. [0003] Inspired by secret sharing, on the basis of additive spread spectrum algorithm and multiplicative spread spectrum algorithm, multiple images are introduced to embed hidden images with the same spread spectrum algorithm. In order to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/32
CPCH04N1/32165H04N1/32154
Inventor 张晓强周苏西
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products