Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Image visual security encryption method based on compressed sensing and least significant bits

A least significant bit, compressed sensing technology, applied in the field of information security, can solve problems that cannot meet the needs of scenarios

Pending Publication Date: 2022-04-12
HARBIN INST OF TECH AT WEIHAI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some scenarios, simply compressing and encrypting an image to obtain a ciphertext image cannot meet the requirements of the scenario, so some scholars study compressing the image and embedding it into a carrier image to achieve visual security. [9-10]

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image visual security encryption method based on compressed sensing and least significant bits
  • Image visual security encryption method based on compressed sensing and least significant bits
  • Image visual security encryption method based on compressed sensing and least significant bits

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The present invention will be further described below in conjunction with the embodiments. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0083] The image compression encryption method that the present invention proposes mainly has the following steps:

[0084] The first step is to select an image X with a size of M×N, and perform a hash operation on it to obtain a string of 512-bit binary numbers, which are converted into decimal numbers and decimalized to obtain the initial key x of the equation 0 ;

[0085] In the second step, the initial key x 0 Input it into the one-dimensional high randomness chaotic equation, iterate 4×M×N times, in order to ensure the randomness of the pseudo-random seq...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image visual security method based on compressed sensing and least significant bits, and belongs to the technical field of information security. The invention designs an image visual security algorithm based on compressed sensing and a least significant bit to solve the problems that an image after compressed sensing is not safe enough due to statistical information, and a visual security effect cannot be achieved. According to the method, a one-dimensional chaotic equation with high randomness is designed to serve as a pseudorandom sequence generator, a three-layer index network is used for scrambling an original text image, a compressed sensing technology is used for compressing the scrambled image, and then an XOR operation related to a plaintext is used for achieving a ciphertext security effect. And finally, the image is embedded into a carrier image, so that visual safety is realized. Through theoretical analysis and experimental simulation, the encryption performance is excellent, the embedding method can achieve visual safety and high efficiency, lossless extraction and maximum original text image reconstruction can be achieved after embedding, and the method has wide application value under the condition that resources are limited.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an image visual security encryption method based on compressed sensing and least significant bits. Background technique [0002] With the development of information technology in the Internet age, people are increasingly using pictures to obtain and convey information. In order to prevent information leakage during communication and transmission, it is very important to perform visual security operations such as encryption and embedding of images. When a large number of images need to be encrypted, embedded and transmitted, pre-compression of images is a necessary operation. [0003] Compressed sensing is widely used in the field of image signal processing because it can achieve Yannyquist sampling rate without losing important information. Compressed sensing can realize fast compression of images and restore the image to the greatest extent. The main in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06F21/60
Inventor 佟晓筠潘涛张淼
Owner HARBIN INST OF TECH AT WEIHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products