Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Separable ciphertext domain reversible data hiding method

A technology of data hiding and secret data, applied in the field of information hiding, which can solve the problems of large decryption distortion and insufficient guarantee of reversibility

Active Publication Date: 2020-11-06
NORTHWESTERN POLYTECHNICAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In 2012, Zhang et al. proposed a separable ciphertext image data hiding mechanism, using matrix operations to compress the LSB of the encrypted image to make room for hidden data, and the receiver can independently perform the extraction of secret data or the extraction of the carrier image. recovery, but the accuracy of the extraction of secret data and the recovery of the carrier image in this scheme is based on the statistical feature of image pixel correlation, so its reversibility cannot be fully guaranteed
To sum up, the key to the separable reversible data hiding method is to ensure the reversibility of the carrier recovery process in the case of directly decrypting the embedded ciphertext, and the embedding of the ciphertext domain data will inevitably modify the encrypted data, and the more the modification Assembly leads to greater decryption distortion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Separable ciphertext domain reversible data hiding method
  • Separable ciphertext domain reversible data hiding method
  • Separable ciphertext domain reversible data hiding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Now in conjunction with embodiment the present invention will be further described:

[0068] Select Matlab as the software platform, and program to realize the design of the scheme of the present invention. The implementation process selects the 512×512 standard test image “Lena” as the carrier image, assuming the threshold T=8.

[0069] The specific operation steps are:

[0070] Ⅰ. The owner of the content preprocesses the carrier image to make room for hiding secret data, which specifically includes the following steps:

[0071] The first step is to read in a carrier image I with a size of 512×512;

[0072] In the second step, the carrier image is divided into non-overlapping blocks of 2×2 size, and the average value of each block is calculated, such as: but

[0073] The third step is to calculate the difference between each pixel in the current block and the average value of the block, for the first block: such as: D (1,1) (1,1)=163-163=0,D (1,1) (1,2)=163...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a separable ciphertext domain reversible data hiding method, which comprises three parts of a content owner, a secret data hider and a receiver, and is characterized in that the content owner preprocesses a carrier image to vacate a spare space to hide secret data; the secret data hider can directly hide secret data without knowing the content of the carrier image; after the receiver obtains the encrypted image with the secret data, the receiver can extract the secret data and recover the carrier image. According to the invention, a separable ciphertext domain reversible digital hiding method is realized. The authorized user can recover the carrier image in a lossless manner or extract the secret data in a lossless manner according to own needs or own held secret keys.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to a method for reversible data hiding in a separable ciphertext domain. Background technique [0002] Reversible data hiding in the ciphertext domain refers to the technology that the carrier used to embed the secret is encrypted, and the original carrier can still be decrypted without error after the secret is embedded. This technology combines encryption and steganography, and is one of the research hotspots of privacy data protection in the cloud environment. Separable ciphertext domain reversible data hiding emphasizes the separability of the two processes of user extraction of hidden secrets and reversible recovery of carrier data, which has greater significance for user privacy protection and information security and management in cloud environments. [0003] In 2012, Zhang et al. proposed a separable ciphertext image data hiding mechanism, using matri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209
Inventor 王丽芳蒋泽军刘丽刘志强杜承烈尤涛陈进朝
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products