Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

124 results about "Image steganography" patented technology

Spatial-domain image steganography method and system based on generative adversarial network

ActiveCN108346125ASimple designSmall number of structural parametersImage enhancementImage analysisCode moduleSteganalysis
The invention discloses a spatial-domain image steganography method and system based on generative adversarial network. The carrier image is converted into a probability graph through the generation network of a U-shaped structure, and then the probability graph is coded by utilizing a hyperbolic tangent coding module, a tampering point graph is generated, and the carrier image and the tampering point graph are added to generate a secret-carrying image; and then a steganography analysis network is used for distinguishing the carrier image and the secret-carrying image, and the classification result is fed back to the generation network in an error mode; and finally, the trained generation network and the coding module are combined together, as a final spatial-domain image steganography model, the carrier image is input into the whole model, and the secret-carrying image is output. The invention further discloses a space-domain image steganography system based on the generative adversarial network, and the system includes a generation network module, an encoding module and an image steganography module. According to the spatial-domain image steganography method based on the generative adversarial network, the security is obviously improved, and the design is simple.
Owner:SUN YAT SEN UNIV

Privacy protection system and method based on social network

The invention discloses a privacy protection system and method based on a social network. The privacy protection method includes the steps that an information sender and an information receiver obtain the function of information interaction between the privacy protection system and a microblog based on the social network; the information sender logs in the privacy protection system and uses a self-adaptive JPEG image steganography for embedding information needing to be transmitted into an image needing to be published in the microblog after encrypting the information; the privacy protection system publishes the microblog containing the encrypted image and updates a microblog head portrait image of the information sender to finish sending the information; the information receiver logs in the privacy protection system and extracts and decrypts the encrypted information in the microblog image published by the information sender, and the information is pushed to the information receiver to finish receiving the information. By the adoption of the privacy protection system and method, it can be guaranteed that a safe and private communication channel is set up between the information sender and the information receiver which communicate in the Internet, and the privacy data of a user are effectively protected from illegal monitoring and stealing.
Owner:UNIV OF SCI & TECH OF CHINA

JPEG domain image steganography method and system based on generative adversarial network

The invention discloses a JPEG domain image steganography method based on a generative adversarial network. The method comprises: generating a tampering probability matrix corresponding to a carrier image DCT coefficient matrix through a generation network; using an analog coding embedding module and a transmittable gradient JPEG transformation module for generating a corresponding secret carryingimage according to the tampering probability matrix; distinguishing the carrier image and the secret-carrying image through the discrimination network, using the classification error as a loss function to perform adversarial training on the generation network and the discrimination network, and finally obtaining the generation network model capable of generating the adaptive steganography cost value. Through combination of the model and a traditional information coding module, secret information is embedded into a carrier image to obtain a secret-carrying image. Compared with a traditional JPEG domain image steganography method, the method has the advantages of being simple in design, easy to implement, high in detection resistance and the like. The invention further discloses a JPEG domain image steganography system. The system comprises a generative adversarial network module, an information coding module and a JPEG transformation module which are obtained through the JPEG domain image steganography method based on the generative adversarial network.
Owner:SUN YAT SEN UNIV

Image steganography and secret information extraction method based on intelligent mobile terminal

The invention relates to an image steganography and secret information extraction method based on an intelligent mobile terminal. The intelligent mobile terminal comprises a secret information embedder, a secret information extractor and a multimedia message transmitter, and images are selected by the intelligent mobile terminal for different use purposes. If secret information needs to be embedded, original pictures are selected. If the secret information needs to be extracted, encrypted pictures are selected. The selected original pictures are uploaded into the secret information embedder for the secret information embedding operation, and the encrypted pictures are uploaded into the secret information extractor for the secret information extraction operation. If the current operation is the secret information embedding operation, the encrypted pictures embedded with the secret information are uploaded into the multimedia message transmitter, and are sent to a receiver in a multimedia message mode. Compared with the prior art, the image steganography and secret information extraction method has the advantages that the functions of secret information embedding, multimedia message sending and secret information extraction are achieved in the intelligent mobile terminal, system safety is enhanced, and meanwhile multimedia message sending efficiency is improved.
Owner:NINGBO UNIV

A generative image steganography method based on an adversarial network

The invention particularly relates to a generative image steganography method based on an adversarial network, which comprises the following steps: a rule table is established, and secret informationto be hidden is converted into coordinate information according to the rule table; According to a two-point one-line principle, a ciphertext generator is established, and ciphertext coordinate point information is obtained; The sender randomly selects the ciphertext coordinate point information, replaces the label information with the ciphertext coordinate point information, inputs the ciphertextcoordinate point information into the generator, and generates a transfer image of a specified category; After receiving the transmission image, the receiver inputs the transmission image into a discriminator to obtain a category label, and then ciphertext information can be extracted; Decrypting is performed to obtain hidden coordinate information according to a two-point one-line principle; Andhidden secret information is obtained by comparing with the rule table, and information extraction is realized. According to the method, steganalysis detection based on statistics can be fundamentallyresisted, the safety of information transmission is improved, and meanwhile the steganalysis resisting capability is greatly enhanced.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Generative robust image steganography method

The invention provides a generative robust image steganography method, which comprises the following steps of: constructing an image data set, and preprocessing the image data set; constructing and initializing a deep learning network architecture; training a deep learning network architecture by adopting a joint-fine adjustment method to obtain a network architecture model; and generating a secret-carrying pseudo graph by using the network architecture model and carrying out secret communication to complete an image steganography process. According tothe image steganography method, a generative adversarial network StyleGAN is utilized to fuse the embedding process of the secret information into the generation process of the image; a generative image steganography architecture which can bear secret information with relatively large capacity and has certain robustness is constructed; therefore, the obtained generative image steganography method has the advantages of being large in embedded capacity, good in generated image quality, high in secret-loaded image statistics undetectability, high in practicability and the like, and the problems that an existing generative image steganography method is poor in secret-loaded image quality, low in embedded capacity, low in information extraction accuracy and the like are solved.
Owner:SUN YAT SEN UNIV

Edge detection-based grayscale image steganography method

The present invention discloses an edge detection-based grayscale image steganography method. The objective of the invention is to carry out concealed communication in a public transport channel and prevent the theft and disclosure of confidential information. According to the method, a grayscale image is divided into two parts according to an edge detection method, namely a contour pixel sequence and a non-contour pixel sequence; based on different characteristics of the pixel sequence obtained through the image edge detection and other pixels, steganographic data are embedded into a contour part and a non-contour part according to different embedding rates; and therefore, high efficiency, reliability and concealment of an steganographic image can be improved in aspects such as image sensing and security. The method is divided into two stages, namely, the embedding stage and extraction stage of confidential information; in an embedding process, in order to ensure the integrity of the confidential information, contour extraction is performed by using the high bits of the pixel value of an image, and the embedding of the confidential information is performed by using the low bits of the pixel value of the image; in the embedding stage, the encryption of the confidential information and the conversion of a binary sequence are ensured, and then the binary sequence is embedded into the pixel value of the image; and in the extraction stage, it can be ensured that the binary sequence can be extracted from the steganographic image, and therefore, the confidential information can be obtained through decoding conversion and restoration.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Optimal coupling image steganography method based on packet replacement

The invention relates to an optimal coupling image steganography method based on packet replacement. The method comprises steps that, secret information is converted into binary bit rates which are divided at 8 bits into sets to form N sets of binary bit streams, each set of binary bit streams has 28 types of combination schemes; according to each combination scheme of each set of binary bit streams, and bit position reversion processing for each combination scheme is carried out to generate 28 sets of counter-rotating binary bit streams; the 28 sets of counter-rotating binary bit streams are embedded into a carrier image through a least histogram distortion method to acquire a secret carrying image; through calculation and determination, when a coupling value of the secret carrying image and the carrier image reaches a preset optimal coupling value, relevant parameters are taken as an encryption key, the secret carrying image reaching the optimal coupling value is selected to enter channel transmission, otherwise, each combination scheme of other N-1 sets of binary bit streams is calculated till the secret carrying image having the optimal coupling value appears; secret information in the secret carrying image is extracted by a receiver by utilizing a decryption key corresponding to the encryption key.
Owner:NINGBO UNIV

High-capacity image steganography method and a secret information extraction method

The invention discloses a high-capacity image steganography method. The method comprises the following steps: carrying out scrambling processing on a carrier image; Dividing the scrambled image into N* N sub-blocks and carrying out DCT (Discrete Cosine Transform); Classifying each DCT block, and selecting an embedded block; Element values at selected positions are extracted from a matrix obtainedafter the DCT coefficient of each embedded block is scanned in a Z shape, and a coefficient matrix is obtained; Extracting element values which are the same as the element values at the selected positions from a matrix obtained after Z-shaped scanning of the Q table to form a quantization matrix; Calculating a division matrix and block capacity through the quantization matrix; Dividing the bit stream of the secret information according to the block capacity; Calculating an embedded matrix for the divided bit stream; Calculating a new coefficient matrix; Replacing the DCT coefficient with theelement value in the new coefficient matrix, and carrying out inverse operation of Z-shaped scanning to obtain a new DCT coefficient; And carrying out DCT inverse transformation on each sub-block andthen carrying out inverse scrambling processing. The invention also discloses a secret message extraction method. And the image complexity is high and the embedding capacity is large.
Owner:NINGBO UNIV

Image steganography detection method based on Gabor filtering and convolutional neural network

The invention provides an image steganography detection method based on Gabor filtering and a convolutional neural network, and belongs to the technical field of information hiding, and is characterized by comprising the following steps: selecting a carrier image and a secret-carrying image to generate a sample image; extracting steganography detection characteristics of the sample image; the steganalysis features and the class labels of the sample images are trained through an integrated classifier to obtain a steganalysis detector; and after steganography detection characteristics of the to-be-detected image are extracted, the steganography detection characteristics are input into the steganography detector for image steganography detection. Image filtering is performed by using a filterto construct a plurality of deep convolutional neural networks to carry out steganography detection feature learning, and the extraction of diversified learning type steganography detection characteristics is realized. Meanwhile, according to the method, the filtering coefficient is used for carrying out structural steganography detection feature extraction. Finally, the learning type steganography detection feature and the structural steganography detection feature are combined to serve as steganography detection features, steganography detection is carried out through an integrated classifier, and the steganography detection method remarkably reduces the detection error rate of image self-adaptive steganography.
Owner:NAT UNIV OF DEFENSE TECH

Image steganography method and system based on generative steganography confrontation

The invention discloses an image steganography method and system based on generative steganography confrontation, and the method comprises the steps: constructing a generative steganography confrontation model which comprises a generative network, a steganography device, a discrimination network and a steganalysis network, enabling the generative network to convert an original image into a carrier image, enabling the steganography device to embed a secret image into the carrier image, and obtaining a secret-carrying image, wherein the discrimination network judges the authenticity of the carrier image, and the steganalysis network judges whether the secret carrying image contains secret image information; respectively constructing loss functions of the generative network, the discrimination network and the steganalysis network according to judgment results of the discrimination network and the steganalysis network, and performing adversarial training on the generative network, the discrimination network and the steganalysis network according to the loss functions of the generative network, the discrimination network and the steganalysis network to obtain a trained generative steganalysis adversarial model; and obtaining a steganographic image corresponding to the original image based on the trained generative steganographic adversarial model. A carrier image with high visual quality is generated, and the security of carrier image information hiding is improved.
Owner:QILU UNIV OF TECH

Improved EMD image steganography embedding and extraction methods based on weight vector prevention

The invention provides improved EMD image steganography embedding and extraction methods based on weight vector prevention. The improved EMD image steganography extraction method comprises: a carrier image is scanned to form a one-dimensional element sequence; on the basis of combination of a user secret key with chaotic mapping, the secret embedding element number and the maximum adjusted secret embedding element number are designated randomly and a secret information combination number and a secret embedding adjusting table are generated; according to the secret embedding element number and the secret information combination number, a carrier element and a binary-system secret information bit are intercepted from a carrier element sequence and a binary system secret information sequence; and then table row adjustment is carried out on scrambled secret embedding elements mapped by the secret information bit to adjust the intercepted carrier element, thereby realizing secret information bit embedding. Compared with the existing EMD method, the provided methods have the following beneficial effects: the maximum embedding capacity can be realized on the premise that the equal embedded visual quality is kept, so that a problem of capacity restriction caused weight vector setting can be solved; and with an embedded extraction link associated with the carrier and the secret key, security of the embedded information can be enhanced.
Owner:SHAANXI NORMAL UNIV

Image adaptive steganalysis system and method based on saliency detection

The invention belongs to the technical field of image processing, and particularly discloses an image adaptive steganalysis system based on saliency detection, which comprises a saliency detection module, a region screening module and a discriminator module. The invention also discloses an analysis method, which specifically comprises the following steps of: firstly, inputting an image detected tobe wrong by the discriminator module into the saliency detection module to form a saliency map; extracting a saliency map meeting requirements by the region screening module, and performing image fusion on the saliency map and a corresponding original image to form a saliency fusion map; and finally, replacing the saliency map which does not meet the requirements with the original image, combining the original image and the saliency fusion map to form an updated data set, and inputting the updated data set into the discriminator module for training to enable the discriminator to perform targeted feature learning on an area with relatively high overlap ratio with the steganography area. According to the method, the saliency detection technology is utilized to guide the steganalysis model to pay more attention to the characteristics of the image steganography area, so that the training effect and the detection accuracy of the model are improved.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

High-embedding-capacity video steganography method and system based on time sequence residual convolution modeling

The invention relates to a high-embedding-capacity video steganography method and system based on time sequence residual convolution modeling. The method comprises the following steps: marking a reference frame and a residual frame of a secret video, simultaneously processing the reference frame and the residual frame by adopting a Y-shaped convolutional neural network to hide secret information and output a carrier video frame, and synthesizing the carrier video frame into a carrier video; and recovering secret information in the carrier video by adopting a Y-type convolutional neural network. Compared with a convolutional neural network-based image steganography algorithm which is directly applied to video steganography, the video steganography method has the advantages that the sparsityof a residual error between continuous frames is explored, two Y-type convolutional neural network structures are adopted, different endpoint processing is adopted for video frames with different properties, and part of convolutional layer parameters are shared at the same time. One video can be hidden in the other video with the same length, the hidden information amount can reach 24 bpp and ismuch larger than that of a traditional method, and the problem that the traditional method cannot be applied to high-embedding-capacity video steganography is solved to a great extent.
Owner:PEKING UNIV +1

Image steganography method and device, electronic device and medium

ActiveCN111131658AMake full use of the gradient valuePictoral communicationSteganalysisAlgorithm
The invention provides an image steganography method and device, an electronic device and a medium. The method comprises the steps of S1, generating a first distortion cost graph through a carrier image; generating a first secret-carrying image according to the steganography information and the first distortion cost graph by adopting a differentiable embedding method; s2, inputting the first secret-loaded image into a steganalysis network model, and performing back propagation to obtain a first gradient of a first distortion cost graph; s3, updating the first distortion cost graph according tothe first gradient to obtain a second distortion cost graph, and obtaining a second secret-carrying image according to the second distortion cost graph; and S4, repeating the steps S2-S3, updating the Nth distortion cost graph according to the Nth gradient, obtaining an (N + 1) th distortion cost graph, obtaining an (N + 1) th secret-carrying image according to the (N + 1) th distortion cost graph, the (N + 1) th secret-carrying image being a final secret-carrying image capable of spoofing network detection, and N is greater than or equal to 5. Through the image steganography method providedby the invention, the problem of low anti-detection capability of the secret-carrying image can be solved.
Owner:UNIV OF SCI & TECH OF CHINA +1

Image steganography method and system for automatically learning distortion based on GAN network structure

The invention discloses an image steganography method and system for automatically learning distortion based on a GAN network structure, and the method comprises the steps: inputting an enhanced carrier image into a preset improved U-Net network, sequentially generating an initial pixel change probability graph and an initial secret-containing image, inputting the initial secret-containing image into a discrimination network, and obtaining a discrimination result, calculating the loss of the discrimination network according to the discrimination result, calculating a total loss function of the generative network according to the discrimination result and the current steganography capacity, optimizing the generative adversarial network by taking minimization of the loss function as a target, when the loss is reduced and kept stable, considering that the training is ended, extracting the generative network from the generative adversarial network after the training is ended, and inputting a to-be-transmitted original image into the generative network to obtain a pixel change probability, calculating embedded distortion corresponding to the pixel change probability, and coding the secret information and the to-be-transmitted original image by adopting a syndrome matrix coding technology according to the embedded distortion to obtain a steganographic image corresponding to the original image.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Intelligent mobile terminal image steganography method based on secret information encryption pretreatment

The invention relates to an intelligent mobile terminal image steganography method based on secret information encryption pretreatment: enabling an intelligent mobile terminal to select an external image after noise filtering as an original carrier image, carrying out the statistics of occurrence probability of characters in embedded secrete information, carrying out the reordering of all characters according to the occurrence probability of characters, and obtaining a new character string; enabling the characters, which are found in the new character string and has the lowest occurrence probability, to be combined and added to form a new node, enabling the new node to serve as a body and to participate the reordering with other non-combined characters, obtaining a final Huffman binary tree, a Huffman code table and coding information data of secrete information; carrying out the reordering of coding information data through an IP displacement table, and obtaining displacement coding information data; recording LSB data flows of all pixels of a carrier image, and the number of pixels with different bits in secret information; and obtaining an encrypted carrier image with embedded secret information through subtracting one from or adding one to the pixels.
Owner:NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products