[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105389517A - Method for hiding secret information in images - Google Patents

Method for hiding secret information in images Download PDF

Info

Publication number
CN105389517A
CN105389517A CN201510965256.0A CN201510965256A CN105389517A CN 105389517 A CN105389517 A CN 105389517A CN 201510965256 A CN201510965256 A CN 201510965256A CN 105389517 A CN105389517 A CN 105389517A
Authority
CN
China
Prior art keywords
secret information
carrier
image
transmit leg
eigenmatrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510965256.0A
Other languages
Chinese (zh)
Other versions
CN105389517B (en
Inventor
杨世勇
孙森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Narong Electronic Communication Co Ltd
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201510965256.0A priority Critical patent/CN105389517B/en
Publication of CN105389517A publication Critical patent/CN105389517A/en
Application granted granted Critical
Publication of CN105389517B publication Critical patent/CN105389517B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a method for hiding secret information in images, and mainly aims to solve the problem that consideration cannot be given to both robustness and security in the prior art. The method comprises the following steps: 1) a sender selects carrier images from a carrier image library via a shared key, conducts block segmentation on the selected carrier images, and selects a pseudorandom number generator for each block, so as to acquire the probability distribution of candidate hiding carriers; 2) the sender creates a characteristic matrix of the carrier images; 3) the sender acquires a final characteristic matrix set and the key space size; 4) the sender hides the secret information in carriers via the final characteristic matrix set and the key space size; 5) the sender sends an obtained carrier set in which the secret information is embedded to a receiver; and 6) the receiver acquires the secret information. The method can improve the security of a hiding system while guaranteeing the robustness of the hiding system, and can be used for changing the hiding position of the secret information in an image in real time when the contents of the image are changed.

Description

Image is utilized to carry out the hiding method of secret information
Technical field
The invention belongs to field of information security technology, particularly a kind ofly hide secret method in the picture, be used in picture material when changing, change secret information stowed position in the picture in real time.
Background technology
The international and domestic scientific and technical literature hidden about image secret information has a lot, in these documents, and the main consideration way in spatial domain and the way of transform domain.Concealing technology wherein based on spatial domain mainly adopts least significant bit (LSB) LSB algorithm.Transmit leg, before transmission information, is replaced the least significant bit (LSB) of carrier image pixel one by one, thus secret information is hidden in carrier image with the bit of scale-of-two secret information.The hidden capacity of spatial information (si) concealing technology is large, but it is difficult to attack such as opposing filtering, compression etc., and institute is inadequate robust in this way.
Information Hiding Techniques based on transform domain mainly adopts different conversion, transfers in the amendment to coefficient in transform domain to the amendment of pixel data.Conventional conversion comprises: discrete cosine transform, wavelet transform DWT, discrete Fourier transform (DFT) DFT.Principle of operation is, transmit leg, before transmission information, carries out piecemeal to carrier image, and chooses suitable piecemeal and convert, and such as, DCT, then embeds secret information in the middle of coefficient after the conversion.Then, the piecemeal after changing is carried out inverse transformation, obtains the carrier comprising secret information.The hidden capacity of transform domain information concealing technology is not high, but possesses strong robustness, can effectively resist the attack such as filtering, compression.
As seen from the above description, existing hiding way mainly considers hiding not sentience and robustness, does not relate to security.This will make assailant can be obtained the key of system by the security of breaking through system, and then obtains the message hidden, and now the strong robustness of system is lost its meaning existed.And show according to current research data, can simultaneously compatible robustness and security really blanking method not yet propose.
Therefore, while the robustness improving the system of hiding, can take into account security again, be prior art urgent problem.
Summary of the invention
The object of the invention is to the deficiency existed for above-mentioned prior art, propose a kind of image that utilizes and carry out the hiding method of secret information.With while taking into account hiding system robustness, improve its security.
Technical scheme of the present invention is achieved in that
One. know-why:
In order to solve the safety issue in Information Hiding Techniques, gordian technique of the present invention sets up the eigenmatrix set A of carrier image.
The foundation of carrier image eigenmatrix set refers to the distribution describing carrier data with matrix.The distribution of carrier data refers to the distribution of image pixel or the distribution of image block.Compared by the average distributed with carrier data, constantly divide raw data, the data of the cloth that makes to secure satisfactory grades occupy more element in a matrix, on the contrary, then occupy less element.So only by eigenmatrix just can very directly demonstrate different secret information under different choice with the corresponding relation of carrier.Meanwhile, in eigenmatrix, in every a line, non-vanishing unit have and only has one, and position with element non-vanishing in a line in different matrix is mutually orthogonal.Therefore, eigenmatrix set A not only make the selection of carrier follow himself distribution and also can corresponding relation between scramble itself and secret information.The security of the system of hiding can be expressed as: Security=I (A, k), wherein I represents the feature in carrier image, and k represents shared key.
In order to realize the robustness of hiding system, when embedding secret information, obtain transformable insert depth α according to carrier content.
Insert depth α is mainly realized by the variance calculating relevant position local data.When the variance of local data is larger, illustrate that the change of data is larger, image local pixel is comparatively disperseed, and can embed more information, then can only embed the information of small amount on the contrary.The robustness of the system of hiding can be expressed as Robust=I (α, λ), and wherein, I represents the feature in carrier image, and λ represents drawing coefficient, is used for controlling overall embedding effect.
Two. symbol and abbreviation
K is shared key;
T is threshold value when choosing carrier;
C sfor candidate hides collection of vectors;
N is the space size that candidate hides collection of vectors;
P c={ p 1, p 2..., p i..., p nit is the probability distribution of carrier;
A={A 1, A 2..., A j..., A mit is eigenmatrix set;
| K| is key space size;
M is the space size of secret information;
δ is probability distribution P cthe amendment variable of middle element;
A '={ A 1', A 2' ..., A j' ..., A m' be final eigenmatrix set;
X=(x 1, x 2... x j..., x m) be secret information;
for hiding secret information x jcarrier;
α jfor carrier insert depth;
λ is drawing coefficient;
S jfor hiding secret information x jafter carrier;
S={s 1, s 2..., s j..., s mfor embedding the collection of vectors after secret information;
X ' is the secret information estimated from the collection of vectors S after embedding secret information.
Three. performing step:
According to above-mentioned principle, performing step of the present invention comprises as follows:
(1) transmit leg utilizes shared key k from carrier image storehouse, choose carrier image to carry out block comminute, and selects pseudorandom number generator to each block, using key k as initial seed, obtains candidate and hides support C sprobability distribution P c={ p 1, p 2..., p i..., p n, p iprobability distribution P cin i-th element, i=1 ..., n, n are that candidate hides collection of vectors C sspace size;
(2) eigenmatrix of transmit leg creating plasmid image:
(2a) transmit leg initialization feature set of matrices A={A 1, A 2..., A j..., A mand key space size | K|, is set to sky, simultaneously by key space size by each matrix in eigenmatrix set A | and K| is set to zero, performs (2b), wherein A ja jth matrix in representation feature set of matrices A, j=1 ..., m;
(2b) transmit leg judges probability distribution P celement whether be zero entirely: if be zero entirely, do not change eigenmatrix set A and key space size | K|, perform end, obtain final eigenmatrix set A ', the space values size of this A ' equals the space values size m of secret information, the numerical values recited of the middle row of A ' equals key space numerical values recited | and the numerical values recited of K| ', A ' middle row equals candidate and hides collection of vectors C sspace values size n; Otherwise, perform (2c);
(2c) transmit leg is to probability distribution P cin element arrange according to order from big to small, namely perform (2d), wherein represent the rear P of sequence cin i-th element, σ irepresent subscript, i=1 ..., n;
(2d) transmit leg amendment sequence posterior probability distribution P cfront m element, make all the other elements do not change, and perform (2e), wherein amended probability distribution P cin element, the numerical values recited of m is identical with the space size of secret information, and 1≤m < n, and δ is probability distribution P cthe amendment variable of middle element;
(2e) return (2b) and rejudge amended probability distribution P c, revise each eigenmatrix A in eigenmatrix set A simultaneously j, make A j=A j+ δ e t, and key space is increased to | K|=|K|+m, wherein e representation unit row vector, t represents that e intermediate value is the coordinate of the element of 1, t=((z+j) modm)+1, z, j=1 ..., m; ;
(3) transmit leg obtains final eigenmatrix set A '={ A 1', A 2' ..., A j' ..., A m' and key space size | K| ', wherein A j' represent the jth eigenmatrix of A ' in final eigenmatrix set, | K| ' represents final key space size;
(4) transmit leg utilizes final eigenmatrix set A ' and key space size | and secret information is hidden in carrier by K| ':
(4a) transmit leg utilizes secret information X=(x 1, x 2... x j..., x m) from eigenmatrix set A ' choose and secret information x jcorresponding matrix A j', wherein x jrepresent the jth element in secret information X, j=1 ..., m;
(4b) transmit leg utilizes A j' choose A with key k jthe carrier that the element column of ' (k, i) ≠ 0 is corresponding as hiding secret information x jcarrier, wherein A j' (k, i) representing matrix A jthe element that ' middle row k i-th arranges, i=1 ..., n, j=1 ..., m, carrier that candidate hides collection of vectors C sin an element,
(4c) transmit leg calculates selected carrier variance definition secret information insert depth α j, j=1 ..., m;
(4d) transmit leg utilizes insert depth α j, secret information is embedded in corresponding carrier data, and the main additivity data modification mode that adopts embeds secret information, wherein s jrepresent and hide secret information x jafter carrier;
(5) transmit leg is by the collection of vectors S={s after the embedding secret information of acquisition 1, s 2..., s j..., s msend to take over party;
(6) take over party obtains secret information:
(6a) the secret information X ' in the collection of vectors S after take over party adopts filtering mode to estimate embedding secret information;
(6b) take over party according to the secret information X ' estimated utilize final eigenmatrix set A ', obtain the corresponding relation estimated between secret information X ' and hiding carrier;
(6c) take over party is according to the corresponding relation between the estimation secret information X ' obtained and hiding carrier, carries out reciprocal permutation obtain real secret information X to estimation secret information X '.
The present invention compared with prior art has the following advantages:
The first, security is high.
In the present invention, the random selecting of secret information embedded and the random selecting of carrier are independently, carry out respectively, for assailant, according to single impersonation attack, two-way random selecting obviously than unidirectional random selecting secret information or the unidirectional difficulty choosing carrier larger, thus the security of system is higher.
The second, promote and extend range of application
The present invention realizes carrying out in the picture by corresponding relation between eigenmatrix scramble carrier and secret information the way that secret information hides, and when when carrier and secret information, one of them changes, corresponding relation therebetween also changes.Therefore, in actual application, the present invention is not only applicable to hiding of single image, and is applicable to hiding of multiple image, has more extensibility.
3rd, compatible good
The present invention introduces transformable insert depth α and controls secret information embedding in the picture, insert depth α can change along with the change of view data, thus the embedding of secret information is also changed with the change of view data, finally reach the good compatibility of robustness and not sentience.
Accompanying drawing explanation
Fig. 1 is overall flow figure of the present invention;
Fig. 2 is the sub-process figure of transmit leg creating plasmid image characteristic matrix in the present invention;
Fig. 3 is the sub-process figure that in the present invention, transmit leg embeds secret information;
Fig. 4 is the sub-process figure that in the present invention, take over party extracts secret information.
Embodiment
Embodiment of the present invention are further illustrated below by the drawings and specific embodiments.
With reference to Fig. 1, the present invention is that performing step is as follows:
Step 1, the probability distribution of transmit leg determination carrier.
(1a) transmit leg utilizes shared key k to choose carrier image from carrier image storehouse;
(1b) transmit leg is divided into the carrier image chosen the fritter of 8 × 8, and calculates the fuzzy value of each fritter;
(1b1) ambiguity in definition set degree of membership is as follows:
u ( p , q ) = 1 1 + | d ( p , q ) - d &prime; | / N ,
Wherein, d (p, q) is image (p, q) pixel value at place, d ' is the normalized value of image (p, q) place pixel, p, q=1 ..., 8, N is constant, and its value will ensure that the codomain scope of u (p, q) is between 0.5 to 1, i.e. 0.5≤u (d (p, q))≤1;
(1b2) fuzzy value defining image (p, q) position pixel on the basis of fuzzy set degree of membership is as follows:
H(p,q)=-(u(p,q))log 2(u(p,q))-(1-u(p,q))log 2(1-u(p,q)),
(1b3) fuzzy value of fritter is defined according to the fuzzy value H (p, q) of image (p, q) position pixel as follows:
R ( p 0 , q 0 ) = 1 a &times; a &Sigma; k = - ( a - 1 ) / 2 ( a - 1 ) / 2 &Sigma; l = - ( a - 1 ) / 2 ( a - 1 ) / 2 H ( p 0 + k , q 0 + l ) ,
Wherein, p 0represent the horizontal ordinate of fritter central point, q 0represent the ordinate of fritter central point, a represents the length of fritter, and a=8, k are the variablees controlling the movement of fritter central point horizontal ordinate, and l is the variable controlling the movement of fritter central point ordinate, k = - ( a - 1 ) 2 , ... , ( a - 1 ) 2 , l = - ( a - 1 ) 2 , ... , ( a - 1 ) 2 , k &NotEqual; l ;
(1c) fuzzy value of each fritter and given threshold value T compare by transmit leg: if fuzzy value is more than or equal to threshold value T, then fritter corresponding for this fuzzy value is joined candidate and hide collection of vectors C sin; Otherwise, abandon, until calculated all image blocks;
(1d) transmit leg hides collection of vectors C to candidate sin each fritter select pseudorandom number generator, using key k as initial seed, obtain candidate hide support C sprobability distribution P c={ p 1, p 2..., p i..., p n, p iprobability distribution P cin i-th element, i=1 ..., n, n are that candidate hides collection of vectors C sspace size.
Step 2, the eigenmatrix of transmit leg creating plasmid.
With reference to Fig. 2, being implemented as follows of this step:
(2a) transmit leg initialization feature set of matrices A={A 1, A 2..., A j..., A mand key space size | K|, is set to sky, simultaneously by key space size by each matrix in eigenmatrix set A | and K| is set to zero, performs (2b), wherein A ja jth matrix in representation feature set of matrices A, j=1 ..., m;
(2b) transmit leg judges probability distribution P celement whether be zero entirely: if be zero entirely, then do not change eigenmatrix set A and key space size | K|, perform end, obtain final eigenmatrix set A ', the space values size of this A ' equals the space values size m of secret information, the numerical values recited of the middle row of A ' equals key space numerical values recited | and the numerical values recited of K| ', A ' middle row equals candidate and hides collection of vectors C sspace values size n; Otherwise, perform (2c);
(2c) transmit leg is to probability distribution P cin element arrange according to order from big to small, namely perform (2d), wherein represent the rear P of sequence cin i-th element, σ irepresent subscript, i=1 ..., n;
(2d) transmit leg amendment sequence posterior probability distribution P cfront m element, make all the other elements do not change, and perform (2e), wherein amended probability distribution P cin element, the numerical values recited of m is identical with the space size of secret information, and 1≤m < n, and δ is probability distribution P cthe amendment variable of middle element;
(2e) return (2b) and rejudge amended probability distribution P c, revise each eigenmatrix A in eigenmatrix set A simultaneously j, make A j=A j+ δ e t, and key space is increased to | K|=|K|+m, wherein e representation unit row vector, t represents that e intermediate value is the coordinate of the element of 1, t=((z+j) modm)+1, z, j=1 ..., m, z ≠ j;
Step 3, transmit leg obtains final eigenmatrix set A '={ A 1', A 2' ..., A j' ..., A m' and key space size | K| ', wherein A j' represent the jth eigenmatrix of A ' in final eigenmatrix set, | K| ' represents final key space size.
Step 4, transmit leg utilizes final eigenmatrix set A ' and key space size | and secret information is hidden in carrier by K| '.
With reference to Fig. 3, the specific implementation of this step is as follows:
(4a) transmit leg utilizes secret information X=(x 1, x 2... x j..., x m) from eigenmatrix set A ' choose and secret information x jcorresponding matrix A j', wherein x jrepresent the jth element in secret information X, j=1 ..., m;
(4b) transmit leg utilizes A j' choose A with key k jthe carrier that the element column of ' (k, i) ≠ 0 is corresponding as hiding secret information x jcarrier, wherein A j' (k, i) representing matrix A jthe element that ' middle row k i-th arranges, i=1 ..., n, j=1 ..., m, carrier that candidate hides collection of vectors C sin an element,
(4c) transmit leg is according to selected carrier variance calculate the insert depth α of secret information j:
(4c1) calculate the average of carrier data, formula is as follows:
d &OverBar; = 1 ( 2 &Delta; + 1 ) 2 &Sigma; k &prime; = 1 2 &Delta; + 1 &Sigma; l &prime; = 1 2 &Delta; + 1 d ( k &prime; , l &prime; ) ,
Wherein, Δ represents the control variable of moving step length, and k ' is the variable controlling the movement of carrier data horizontal ordinate, and l ' is the variable controlling the movement of carrier data ordinate, k '=1 ..., (2 Δ+1), l '=1, ..., (2 Δ+1), k ' ≠ l ';
(4c2) average is utilized the variance of definition carrier data is as follows:
&sigma; ( u , v ) = 1 ( 2 &Delta; + 1 ) 2 &Sigma; e = u - &Delta; u + &Delta; &Sigma; f = v - &Delta; v + &Delta; ( d ( u + e , v + f ) - d &OverBar; ) 2 ,
Wherein, u represents the horizontal ordinate of carrier center point, v represents the ordinate of carrier center point, and e is the variable controlling the movement of carrier center point horizontal ordinate, and f is the variable controlling the movement of carrier data ordinate, e=(u-Δ), ...., (u+ Δ), f=(v-Δ), ..., (v+ Δ);
(4c3) the insert depth α of carrier image piecemeal is defined according to the variances sigma (u, v) of carrier data jas follows:
α j=λσ(u,v),
Wherein, λ represents drawing coefficient;
(4d) transmit leg utilizes insert depth α j, secret information is embedded in corresponding carrier data, and the main additivity data modification mode that adopts embeds secret information, wherein s jrepresent and hide secret information x jafter carrier.
Step 5, transmit leg is by the collection of vectors S={s after the embedding secret information of acquisition 1, s 2..., s j..., s msend to take over party.
Step 6, take over party obtains secret information.
With reference to Fig. 4, the specific implementation of this step is as follows:
(6a) the secret information X ' in the collection of vectors S after take over party adopts filtering mode to estimate embedding secret information;
(6b) take over party according to the secret information X ' estimated utilize final eigenmatrix set A ', obtain the corresponding relation estimated between secret information X ' and hiding carrier;
(6c) take over party is according to the corresponding relation between the estimation secret information X ' obtained and hiding carrier, carries out reciprocal permutation obtain real secret information X to estimation secret information X '.
More than describing is only example of the present invention, does not form any limitation of the invention.Obviously for those skilled in the art; after having understood content of the present invention and principle; all may when not deviating from the principle of the invention, structure; carry out the various correction in form and details and change, but these corrections based on inventive concept and change are still within claims of the present invention.

Claims (4)

1. utilize image to carry out the hiding method of secret information, comprising:
(1) transmit leg utilizes shared key k from carrier image storehouse, choose carrier image to carry out block comminute, and selects pseudorandom number generator to each block, using key k as initial seed, obtains candidate and hides support C sprobability distribution P c={ p 1, p 2..., p i..., p n, p iprobability distribution P cin i-th element, i=1 ..., n, n are that candidate hides collection of vectors C sspace size;
(2) eigenmatrix of transmit leg creating plasmid image:
(2a) transmit leg initialization feature set of matrices A={A 1, A 2..., A j..., A mand key space size | K|, is set to sky, simultaneously by key space size by each matrix in eigenmatrix set A | and K| is set to zero, performs (2b), wherein A ja jth matrix in representation feature set of matrices A, j=1 ..., m;
(2b) transmit leg judges probability distribution P celement whether be zero entirely: if be zero entirely, do not change eigenmatrix set A and key space size | K|, perform end, obtain final eigenmatrix set A ', the space values size of this A ' equals the space values size m of secret information, the numerical values recited of the middle row of A ' equals key space numerical values recited | and the numerical values recited of K| ', A ' middle row equals candidate and hides collection of vectors C sspace values size n; Otherwise, perform (2c);
(2c) transmit leg is to probability distribution P cin element arrange according to order from big to small, namely , perform (2d), wherein represent the rear P of sequence cin i-th element, σ irepresent subscript, i=1 ..., n;
(2d) transmit leg amendment sequence posterior probability distribution P cfront m element, make all the other elements do not change, and perform (2e), wherein amended probability distribution P cin element, the numerical values recited of m is identical with the space size of secret information, and 1≤m < n, and δ is probability distribution P cthe amendment variable of middle element;
(2e) return (2b) and rejudge amended probability distribution P c, revise each eigenmatrix A in eigenmatrix set A simultaneously j, make A j=A j+ δ e t, and key space is increased to | K|=|K|+m, wherein e representation unit row vector, t represents that e intermediate value is the coordinate of the element of 1, t=((z+j) modm)+1, z, j=1 ..., m;
(3) transmit leg obtain final eigenmatrix set A '=A ' 1, A ' 2..., A ' j..., A ' mand key space size | K| ',
Wherein A ' jrepresent the jth eigenmatrix of A ' in final eigenmatrix set, | K| ' represents final key space size;
(4) transmit leg utilizes final eigenmatrix set A ' and key space size | and secret information is hidden in carrier by K| ':
(4a) transmit leg utilizes secret information X=(x 1, x 2... x j..., x m) from eigenmatrix set A ' choose and secret information x jcorresponding matrix A ' j, wherein x jrepresent the jth element in secret information X, j=1 ..., m;
(4b) transmit leg utilizes A ' ja ' is chosen with key k jthe carrier that the element column of (k, i) ≠ 0 is corresponding as hiding secret information x jcarrier, wherein A ' j(k, i) representing matrix A ' jthe element that middle row k i-th arranges, i=1 ..., n, j=1 ..., m, carrier that candidate hides collection of vectors C sin an element,
(4c) transmit leg calculates selected carrier variance definition secret information insert depth α j, j=1 ..., m;
(4d) transmit leg utilizes insert depth α j, secret information is embedded in corresponding carrier data, and the main additivity data modification mode that adopts embeds secret information, wherein s jrepresent and hide secret information x jafter carrier;
(5) transmit leg is by the collection of vectors S={s after the embedding secret information of acquisition 1, s 2..., s j..., s msend to take over party;
(6) take over party obtains secret information:
(6a) the secret information X ' in the collection of vectors S after take over party adopts filtering mode to estimate embedding secret information;
(6b) take over party according to the secret information X ' estimated utilize final eigenmatrix set A ', obtain the corresponding relation estimated between secret information X ' and hiding carrier;
(6c) take over party is according to the corresponding relation between the estimation secret information X ' obtained and hiding carrier, carries out reciprocal permutation obtain real secret information X to estimation secret information X '.
2. the method utilizing image to carry out secret information to hide according to claim 1, it is characterized in that, step carries out block comminute to carrier image in (1), be first carrier image is divided into 8 × 8 fritter, and calculate the fuzzy value of each fritter; Again fuzzy value and given threshold value T are compared: if fuzzy value is more than or equal to threshold value T, then fritter corresponding for this fuzzy value is joined candidate and hide collection of vectors C sin; Otherwise, abandon, until calculated all image blocks.
3. method of carrier image being carried out to block comminute according to claim 2, is characterized in that, calculates the fuzzy value of each fritter, carries out as follows:
First, ambiguity in definition set degree of membership is as follows:
u ( p , q ) = 1 1 + | d ( p , q ) - d &prime; | / N ,
Wherein, d (p, q) is image (p, q) pixel value at place, d ' is the normalized value of image (p, q) place pixel, p, q=1 ..., 8, N is constant, and its value will ensure that the codomain scope of u (p, q) is between 0.5 to 1, i.e. 0.5≤u (d (p, q))≤1;
Secondly, the fuzzy value that the basis of fuzzy set degree of membership defines image (p, q) position pixel is as follows:
H(p,q)=-(u(p,q))log 2(u(p,q))-(1-u(p,q))log 2(1-u(p,q)),
Finally, the fuzzy value of fritter is defined according to the fuzzy value H (p, q) of image (p, q) position pixel as follows:
R ( p 0 , q 0 ) = 1 a &times; a &Sigma; k = - ( a - 1 ) / 2 ( a - 1 ) / 2 &Sigma; l = - ( a - 1 ) / 2 ( a - 1 ) / 2 H ( p 0 + k , q 0 + l ) ,
Wherein, p 0represent the horizontal ordinate of fritter central point, q 0represent the ordinate of fritter central point, a represents the length of fritter, and a=8, k are the variablees controlling the movement of fritter central point horizontal ordinate, and l is the variable controlling the movement of fritter central point ordinate, k = - ( a - 1 ) 2 , ... , ( a - 1 ) 2 , l = - ( a - 1 ) 2 , ... , ( a - 1 ) 2 , k &NotEqual; l .
4. the image that utilizes according to claim 1 carries out the hiding method of secret information, it is characterized in that step 4c) the middle insert depth α calculating carrier j, carry out as follows:
First calculate the average of carrier data, formula is as follows:
d &OverBar; = 1 ( 2 &Delta; + 1 ) 2 &Sigma; k &prime; = 1 2 &Delta; + 1 &Sigma; l &prime; = 1 2 &Delta; + 1 d ( k &prime; , l &prime; ) ,
Wherein, Δ represents the control variable of moving step length, and k ' is the variable controlling the movement of carrier data horizontal ordinate, and l ' is the variable controlling the movement of carrier data ordinate, k '=1 ..., (2 Δ+1), l '=1 ..., (2 Δ+1);
Secondly, average is utilized the variance of definition carrier data is as follows:
&sigma; ( u , v ) = 1 ( 2 &Delta; + 1 ) 2 &Sigma; e = u - &Delta; u + &Delta; &Sigma; f = v - &Delta; v + &Delta; ( d ( u + e , v + f ) - d &OverBar; ) 2 ,
Wherein, u represents the horizontal ordinate of carrier center point, v represents the ordinate of carrier center point, and e is the variable controlling the movement of carrier center point horizontal ordinate, and f is the variable controlling the movement of carrier data ordinate, e=(u-Δ), ...., (u+ Δ), f=(v-Δ), ..., (v+ Δ);
Finally, the insert depth α of carrier image piecemeal is defined according to the variances sigma (u, v) of carrier data jas follows:
α j=λσ(u,v).
Wherein, λ represents drawing coefficient.
CN201510965256.0A 2015-12-21 2015-12-21 The method hidden using image progress secret information Active CN105389517B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510965256.0A CN105389517B (en) 2015-12-21 2015-12-21 The method hidden using image progress secret information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510965256.0A CN105389517B (en) 2015-12-21 2015-12-21 The method hidden using image progress secret information

Publications (2)

Publication Number Publication Date
CN105389517A true CN105389517A (en) 2016-03-09
CN105389517B CN105389517B (en) 2018-04-17

Family

ID=55421793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510965256.0A Active CN105389517B (en) 2015-12-21 2015-12-21 The method hidden using image progress secret information

Country Status (1)

Country Link
CN (1) CN105389517B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107784286A (en) * 2017-10-27 2018-03-09 济南大学 Palm grain identification method based on contention code and bloom wave filters
CN108282469A (en) * 2018-01-04 2018-07-13 暨南大学 Support the steganography method extracted based on attribute information
CN108595975A (en) * 2018-05-07 2018-09-28 南京信息工程大学 A kind of carrier-free information concealing method based on the retrieval of nearly multiimage
CN110086606A (en) * 2019-02-28 2019-08-02 南京信息工程大学 A kind of black white image Multiparty quantum secret sharing method based on quantum mechanical
CN112884632A (en) * 2021-02-25 2021-06-01 安徽师范大学 High-load image steganography method based on reconstruction matrix
CN114782563A (en) * 2022-05-26 2022-07-22 中国人民解放军国防科技大学 Secret image sharing method and system for JPEG image
CN115131253A (en) * 2022-05-26 2022-09-30 中国人民解放军国防科技大学 Secret image sharing method and system for resisting JPEG recompression

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122385A (en) * 2011-02-28 2011-07-13 北京工业大学 Digital watermark method capable of simultaneously resisting various attacks

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122385A (en) * 2011-02-28 2011-07-13 北京工业大学 Digital watermark method capable of simultaneously resisting various attacks

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHRISTIAN CACHIN: "An information-theoretic model for steganography", 《INFORMATION AND COMPUTATION》 *
J LLNER ETC: "Modeling the security of steganographic systems", 《LECTURE NOTES IN COMPUTER SCIENCE》 *
杨世勇 等: "一种新的基于图像内容特征的顽健水印", 《通信学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107784286A (en) * 2017-10-27 2018-03-09 济南大学 Palm grain identification method based on contention code and bloom wave filters
CN108282469A (en) * 2018-01-04 2018-07-13 暨南大学 Support the steganography method extracted based on attribute information
CN108282469B (en) * 2018-01-04 2020-09-04 暨南大学 Steganography method supporting attribute information extraction
CN108595975A (en) * 2018-05-07 2018-09-28 南京信息工程大学 A kind of carrier-free information concealing method based on the retrieval of nearly multiimage
CN110086606A (en) * 2019-02-28 2019-08-02 南京信息工程大学 A kind of black white image Multiparty quantum secret sharing method based on quantum mechanical
CN110086606B (en) * 2019-02-28 2021-12-14 南京信息工程大学 Quantum mechanism-based multi-party secret sharing method for black and white images
CN112884632A (en) * 2021-02-25 2021-06-01 安徽师范大学 High-load image steganography method based on reconstruction matrix
CN112884632B (en) * 2021-02-25 2023-08-29 安徽师范大学 High-load image steganography method based on reconstruction matrix
CN114782563A (en) * 2022-05-26 2022-07-22 中国人民解放军国防科技大学 Secret image sharing method and system for JPEG image
CN115131253A (en) * 2022-05-26 2022-09-30 中国人民解放军国防科技大学 Secret image sharing method and system for resisting JPEG recompression

Also Published As

Publication number Publication date
CN105389517B (en) 2018-04-17

Similar Documents

Publication Publication Date Title
CN105389517A (en) Method for hiding secret information in images
Lin et al. Invertible secret image sharing with steganography
CN102880998B (en) The extracting method of watermarking images
Kumar et al. Image transformation technique using steganography methods using LWT technique
CN103413269A (en) Image steganography method and secret information extraction method
CN101990081B (en) Method for protecting copyright of virtual viewpoint image
CN104053074B (en) Video watermarking method based on depth image and Otsu segmentation
CN102938841B (en) Method for hiding information in bearing image, image quality evaluation method and information transmission method
CN107895340A (en) The null tone domain color digital image blind watermark method that a kind of fusion QR is decomposed
CN103955880A (en) DWT-SVD robust blind watermark method based on Zernike moments
CN101009757A (en) A digital watermark embedding and extraction algorithm for space domain and small wave domain double sub-set
CN107274333B (en) Spatial domain color image blind watermarking method fusing singular value decomposition
CN103020496A (en) Digital watermark encryption realization method
CN102880997B (en) Method for embedding watermark image
CN101833745A (en) Method for detecting embedding and extracting of multiple binary embedded watermarks of digital image
CN106339978A (en) Color digital image watermark embedding and extracting method based on compressed sensing
CN103927711A (en) Robust digital watermark algorithm based on OFDM-CDMA
Subhedar et al. Performance evaluation of image steganography based on cover selection and contourlet transform
Lin Reversible data-hiding for progressive image transmission
Yang Robust Watermarking Scheme Based on Radius Weight Mean and Feature‐Embedding Technique
CN109544434A (en) CWT-QIM digital blind watermark algorithm for RAW format-pattern
Park et al. Integrity verification of secret information in image steganography
Geetha et al. Image steganography by variable embedding and multiple edge detection using canny operator
Garg et al. Block-based reversible data hiding using histogram shifting and modulus operator for digital images
CN105719226A (en) Non-overlapping block and frequency band equivalent fusion combined watermark embedding and extracting methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191122

Address after: 710075 2506, building a, yipinmei Road, Gaoxin Road, Zhangba Street office, high tech Zone, Xi'an City, Shaanxi Province

Patentee after: Xi'an narong Electronic Communication Co., Ltd

Address before: Xi'an City, Shaanxi province Taibai Road 710071 No. 2

Patentee before: Xi'an University of Electronic Science and Technology

TR01 Transfer of patent right