Constructive information hiding method based on automatic contour generation

An information hiding and automatic generation technology, applied in the field of information security, can solve the problems of small hidden capacity and difficulty in extracting secret information, and achieve the effects of high extraction accuracy, reduced training pressure, and easy extraction

Active Publication Date: 2021-11-05
NANJING UNIV OF INFORMATION SCI & TECH
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The existing carrier-constructed information hiding method uses GAN to convert secret information into a dense image, but since the essence of GAN is not a reversible Markov model, it is difficult to extract secret information
[0006] 2. In order to avoid mode collapse, the existing carrier-based information hiding methods usually construct a mapping relationship between one or a type of picture and one bit of secret information, which has the disadvantage of small hidden capacity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Constructive information hiding method based on automatic contour generation
  • Constructive information hiding method based on automatic contour generation
  • Constructive information hiding method based on automatic contour generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The drawings constituting a part of the present invention are used to provide a further understanding of the present invention, and the schematic embodiments and descriptions of the present invention are used to explain the present invention, and do not constitute an improper limitation of the present invention.

[0031] Such as figure 1As shown, this embodiment provides a constructive information hiding method based on automatic contour generation: in the contour generation stage, the secret information binary sequence is segmented, and the segmented sequence segments are input into the LSTM network segment by segment to obtain candidate pools , determine the position of the contour point according to the decimal value of the next sequence segment, and obtain the target contour image. In the contour-image reversible transformation stage, the target contour image is sent to the contour-image reversible transformation model. When training the contour-image reversible tra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a constructive information hiding method based on automatic contour generation. The method specifically comprises the following steps: segmenting a binary sequence S of secret information with the length of L into n binary sequences with the lengths of l; 2, constructing a target contour image; 3, constructing a contour-image reversible transformation model; and 4, inputting the target contour image into the trained contour-image reversible transformation model, generating a secret-containing image by the generation model according to the target contour image, and extracting the contour of the secret-containing image by the extraction model so as to hide the binary sequence of the secret information in the contour extracted by the extraction model. The generated secret-containing image is high in quality, and the visual effect is better.

Description

technical field [0001] The invention belongs to the field of information security. Background technique [0002] For a long time, information security has been an issue that people pay close attention to. The traditional method based on cryptography encrypts and retransmits information, but the encrypted information is disordered and therefore vulnerable to attacks by monitors. In contrast, steganography is an information hiding technology that embeds secret information in multimedia carriers (such as text, images, audio, video, etc.) for covert communication. security. Steganography has important application value in information transmission and other fields. [0003] In the previous research, researchers often adopt the traditional carrier modification information hiding method, design a reasonable loss function, and modify the carrier image according to certain rules to realize the embedding of secret information. To mitigate the impact of modification on image qualit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T7/13G06N3/04G06N3/08
CPCG06T7/13G06N3/08G06T2207/20081G06T2207/20084G06N3/044
Inventor 周志立朱剑宇王美民吉千凡
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products