Unlock instant, AI-driven research and patent intelligence for your innovation.
Method and device for hiding and recovering information
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of information transmission and original data, applied in the field of information concealment, it can solve problems such as loud noise and inability to ensure concealment, and achieve the effect of improving concealment
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, when the amount of secret data is large, even using the wavelet transform method will make the original image representation after embedding show a large amount of noise, so that it cannot meet the requirement of not letting the third party realize that there is secret data embedding. The problem
At the same time, if a third party discovers the basis function of the wavelet transform used, it is possible to obtain the secret data from the embedded original image, resulting in the problem of not being able to ensure reliable concealment
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
no. 1 Embodiment approach
[0114] In the first embodiment of the present invention, the information concealment method and restoration method are as follows figure 2 and image 3 illustrate.
[0115] figure 2 It is a schematicflowchart of the information hiding method in this embodiment, image 3 Shown is a schematicflowchart of the restoration of secret data related to the information concealment method in this embodiment.
[0116] exist figure 2 The information hiding method in this embodiment is composed of the following steps:
[0117] Step 21, deriving the transformation coefficients of the multi-band original image for regular matrix transformation;
[0118] Step 22, safely storing the derived transformation coefficients;
[0119] Step 23, dividing the multi-band original image into components by the derived transform coefficients;
[0120] Step 24, performing wavelet transformation on the component images;
[0121] Step 25, embedding the secret data into the high-frequency components...
Embodiment
[0143] The data used is, Figure 4 is the original data, Figure 5 for secret data. That is, will Figure 5 data hidden in Figure 4 in the data.
[0149] Then, for Figure 6 The data used for information transmission, the result of using the reversible transformation coefficient matrix C to restore the secret data is as follows Figure 7 shown.
[0150] Depend on Figure 5 and Figure 7 It can be seen that the result of using the reversible transformation coefficient matrix C to restore the secret data has zero error consistency with the secret data.
[0151]In this method, only the party concerned who knows the reversible transformation coefficient ma...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The method is used to embed secret data into original data with multi frequency-bands and comprises: as preprocess, a canonical transformation is made for the original data with multi frequency-bands; a reversible wavelet transformation is made for the data of at least one of processed components; the secret data is embedded into the high frequency component processed with the reversible wavelet transformation; making wavelet inverse transformation for the component data embedded by the secret data; making inverse transformation for the regular matrix so as to generate multi frequency-bands data used in transmitting message. By the invention, a third party can not know which component data is embedded into the secret data so as to promote the secrecy level, and embedding the secret data into the component data can also make its image quality close to the original image quality.
Description
technical field [0001] The invention relates to information concealment technology, which can better maintain the quality of original data while improving confidentiality; in particular, it relates to an information concealment and recovery method and its device. Background technique [0002] Information hiding technology is a general term for electronic watermarking technology, steganography technology, etc., and it is a technology that embeds secret data into original data unobtrusively. [0003] Information hiding methods can be divided into methods of embedding secret data in the actual space of original data (hereinafter referred to as: actual space embedding method) and methods of embedding secret data in the frequency space of original data (hereinafter referred to as: frequency space embedding method). When performing compression and other processing on an image embedded with secret data, since the secret data can be embedded in a specific frequency band that is rela...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.