Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

76 results about "Image hiding" patented technology

Image hiding and authentication method based on secret sharing

ActiveCN103761702AImprove securityDifferences in Statistical PropertiesImage data processing detailsPattern recognitionHash function
The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.
Owner:TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY

Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method

The invention discloses a phase-cut Fourier transform based image hiding method, an image restoring method and an image encrypted transmission method. The image hiding method includes: subjecting a to-be-hidden image f to Fourier inverse transform prior to extracting an amplitude matrix g(x, y) and a phase matrix P(x, y) of the image subjected to Fourier inverse transform, and subjecting a carrier image f1 to Fourier transform prior to extracting an amplitude matrix g1(u, v) and a phase matrix P1(u, v) of the image subjected to Fourier transform; enabling g'1 (u, v)=g1(u, v)+g(x, y), then multiplying the g'1 (u, v) by the P1(u, v), obtaining a hidden result after Fourier transform and extracting an amplitude matrix f'1(x, y) of the hidden result so as to obtain a final hidden result image. The image restoring method is implemented by taking the P(x, y) as a private decryption key and performing the image hiding method reversely. The phase-cut Fourier transform based image hiding method, the image restoring method and the image encrypted transmission method have the advantages that difference between the obtained hidden result and the carrier image is small, so that deception is achieved; original information can be restored completely, and the problems of image quality degradation and the like are avoided; calculated quantity is small, and high safety during encrypted transmission is achieved.
Owner:SOUTH CHINA NORMAL UNIVERSITY

Invisible code graphics, processing method thereof and anti-fake application

The invention discloses invisible code graphics, a processing method of the invisible code graphics and anti-fake application and belongs to the field of information processing. The processing method includes a processing method with the image hiding technology and the coding technology combined. Images are divided into two parts, two different screening manners are adopted for screening the two parts of the images respectively, amplitude-modulating screening is conducted on an information hiding part, frequency modulating screening is conducted on the other part of the images, and meanwhile coding information is recorded according to the sequence of exposing pixel points in a grid of an area needing information hiding so that the purpose of information hiding can be achieved. The hidden code graphics serves as anti-fake labels, after the labels are copied by a common copying machine, the images with amplitude-modulating dot screening can be well shown, however, the images with amplitude-modulating dot screening cannot be completely shown, and therefore the code graphics can be shown and initial fake prevention is achieved. Meanwhile, buried coded messages can be obtained through an image sensor, and therefore authenticity is identified after the coded messages are compared with content on certificates and securities.
Owner:广东绿之彩科技股份有限公司

An image hiding method based on a video carrier and under an off-line controllable mechanism

The invention discloses an image hiding method based on a video carrier and under an off-line controllable mechanism. A key frame of a video is firstly subjected to 2-DWT transformation; then Arnold transformation is carried out on sub-bands; through characteristics of singular value decomposition and multi-resolution characteristics of wavelet transformation, images are embedded in sub-band singular values which have undergone scrambling; when the video is under different attacks, blind extraction of the image can be realized; and the blind extraction specifically comprises two steps which are color image confidential storage and color image extraction checking. As technology of embedding and extraction of the color image in the video and the technology of limited frequency checking and anti-copying in an image off-line condition, the method of the invention is the image confidential storage technology based on the video carrier and under the off-line controllable mechanism, and can solve problems of confidentiality and storage of confidential and private images, thereby reaching a purpose of protecting private and confidential information, and realizing validity and controllability access of the image in an extent of competence.
Owner:ANHUI UNIVERSITY

High-fidelity hidden image figure screen frequency determination method and system based on direct correction

The invention provides a high-fidelity hidden image figure screen frequency determination method and system based on direct correction, and relates to the technical field of anti-counterfeiting printing. The method includes the steps that after a bottom image is hidden in a surface image at a conventional screen frequency, image defects caused in the image hiding and printing processes are quantitatively and accurately predicted through a printed image distortion prediction system, accurate alignment compensation is carried out through an image compensation optimization system, and a high-fidelity printed product including the bottom image is obtained. The system comprises a color separation module, a screen frequency determination module, a screen point modulation module, a printed image distortion prediction module, an image distortion compensation optimization module, an optimization result judgment module and a platemaking printing module. By means of the high-fidelity hidden image figure screen frequency determination method and system based on direct correction, the multilayer high-definition and multi-gray level bottom image is hidden under the condition that the high fidelity of the surface image is guaranteed, the quality of the surface image can be effectively improved, the selection range can be widened, the bottom image is large in modulation amplitude, good in visual effect and high in resolution ratio, and the high-fidelity hidden image figure screen frequency determination method and system based on direct correction are suitable for various screen point modulation modes and a combination thereof.
Owner:臧戈平

Anti-counterfeiting method for high-fidelity image hiding in information code area

ActiveCN107578079ADoes not affect normal readingDoes not affect detectabilityRecord carriers used with machinesImage hidingSystem optimization
The invention provides an anti-counterfeiting method for high-fidelity image hiding in an information code area, and relates to the technical field of anti-counterfeiting printing. The method comprises the steps that the local or whole information code area is adjusted as an image hiding area aiming at an surface image suitable for image hiding optimized by a specific printing system, so that theinformation code surface image containing the image hiding area is obtained; anti-counterfeiting image hiding screening and printing are conducted on a base image which needs to be hidden in the imagehiding area through the specific printing system; during color separation, screening and printing, at least one local or whole color separation is half-tone in the image hiding area. According to themethod, reading and detection of an information code through a code scanning machine or a mobile phone are not affected, and meanwhile, one or more base images can be hidden under the information code area; the information code of the surface image can be read by a conventional means, and the base images can be read and detected by an optical means or a scanning means or the mobile phone corresponding to image hiding, so that the purpose of counterfeiting resistance is achieved.
Owner:臧戈平

Image hiding and recovering method and device and storage medium

The invention belongs to the crossing field of image information security and digital image signal processing and discloses an image hiding and recovering method and device and a storage medium, and the method comprises the steps: taking generated black and white noisy point small blocks with different gray scales as candidate sample small blocks, filtering similar sample small blocks with different gray scales through secondary clustering coding, and screening coding sample small blocks with the same gray scale for secret information coding representation; and finally, placing coded sample small blocks with different gray scales through a random binary reference image in combination with a random secret embedding position to generate a secret-containing shelter. During recovery, coded sample small blocks are generated by the secret key, and secret information is extracted by combining the binary reference image and the secret embedding position. Compared with the prior art, the invention has the advantages that the meaningful image with good visual quality can be generated, no splicing trace is generated, no modification embedding is involved, and the invention has good anti-attack capability; no matter how secret information is embedded, the secret-containing shelter can be recovered into a multi-order halftone shelter image in an equal-quality and lossless mode, the embedding and extracting process completely depends on a user secret key, and high safety is achieved.
Owner:SHAANXI NORMAL UNIV

A Method of Image Hiding and Authentication Based on Secret Sharing

ActiveCN103761702BImprove securityDifferences in Statistical PropertiesImage data processing detailsHash functionInformation recovery
The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.
Owner:TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products