A method for lossless piggyback information in arbitrary byte data
An arbitrary byte, data technology
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] In order to verify the performance of the algorithm proposed in this paper, an 8-bit grayscale image H with a size of 512×512 is used in the simulation experiment to carry out information carrying transmission and restoration by the method of the present invention.
[0030] Secret information is arbitrary data: images or other data.
[0031] Example:
[0032] For image format data (length in bytes), each pixel is composed of 8 bits to form a byte, or each LSB of 8 bytes forms a byte.
[0033] Select data with the following characteristics or processed data with the following characteristics:
[0034] (1) Dataset 1:
[0035] 000XX000
[0036] 001XX001
[0037] 010XX010
[0038] 011XX011
[0039] 100XX100
[0040] 101XX101
[0041] 110XX110
[0042] 111XX111
[0043] The original data is:
[0044] 00XX0000 is 000XX000 after cyclic shift left by 1 bit
[0045] 01XX0010 is 001XX001 after cyclic shift left by 1 bit
[0046] 10XX0100 is 010XX010 after cyclic shif...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com

