CN106101715B - A kind of image based on Information hiding processes by demand method - Google Patents
A kind of image based on Information hiding processes by demand method Download PDFInfo
- Publication number
- CN106101715B CN106101715B CN201610607285.4A CN201610607285A CN106101715B CN 106101715 B CN106101715 B CN 106101715B CN 201610607285 A CN201610607285 A CN 201610607285A CN 106101715 B CN106101715 B CN 106101715B
- Authority
- CN
- China
- Prior art keywords
- image
- information
- obtains
- data
- carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0053—Embedding of the watermark in the coding stream, possibly without decoding; Embedding of the watermark in the compressed domain
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Method is processed by demand based on Information hiding the invention proposes a kind of, is mainly used for hided transmission and secure storage.The present invention is not that secret information is embedded in original image using Information Hiding Techniques, but other image related with error image is generated as new support, some compression information of abstract image itself are hidden transmission in new support, and carrier seems there is certain association with original image.This method is based on Information hiding and is handled, and can obtain the image of required credit rating in advance, accomplish that carrier image discloses, but without open original image, level security is strong, hides and is essentially different with routine information.The present invention can increase image transmitting safety, or enhancing secret protection ability.
Description
Technical field
The present invention relates to a kind of method of data communication, in particular to a kind of image side of processing by demand based on Information hiding
Method belongs to communication (such as data communication technology) field.
Background technique
The problem of current society is the society of information, and the safety problem of information is at being increasingly urgent to, Information hiding (number
According to hide) be information security an important branch, secret information is embedded into carrier using the visual redundancy of the mankind, from
And achieve the purpose that safe transmission secret information.
The digital image that people obtain at present has reached tens billion of scales, plays in national economy, daily life important
Effect, at present in image transmitting and storage general information encryption method, but make others that can not know the content of image itself,
But after others sees image encryption, feel important, can decode, not decoding will destroy, and be unfavorable for the safety of image instead.One
As information concealing method, be hiding some secret informations in the picture, be aware or unaware that others can not in image and contain
Secret information, so that there is certain level security, but the safety of carrier image itself not can guarantee.
Summary of the invention
Technical problem solved by the present invention is overcoming the deficiencies of the prior art and provide a kind of image based on Information hiding
Process by demand method, after this method is handled, image seem to can be high-quality image, poor quality image or do not have
According to good image, the data of transmission can according to need after receiving end is handled restores true data, plays the effect of camouflage.
There is secrecy, anti-intercepting and capturing, jamproof effect in message transmitting procedure.
The technical scheme is that a kind of image based on Information hiding processes by demand method, steps are as follows:
1) image A1 to be transmitted is compressed, compression ratio R1 is greater than some value R0, and R0 >=32 obtain compressed number
According to D1, to the image B1 that is restored after data D1 decompression, until image A1 and restore the Y-PSNR PSNR of image B1 >=
20dB;
2) image A=x*A1+y*B1 is generated, wherein x+y=1;Image A is compressed again, compression ratio R2, R2 >=2,
Compressed data D is obtained, obtains the recovery image B of image A after decompressing to data D;
3) image A subtracted image B is used, image E is obtained, inverible transform is carried out to image E, obtains new image E1;
4) using new images E1 as carrier image, secret information F is obtained after above-mentioned data D, compression ratio R, x and y are encrypted,
It is nondestructively hidden into carrier image E1 using information concealing method, obtains stego-image E2;
5) it is transmitted to containing close image E2;
6) receiving end carries out solving hiding processing to received stego-image E2: first extracting secret information F, obtains after decryption
Data D, compression ratio R, x and y obtain the recovery image B of image A after decompressing to data D;
7) the carrier image E1 for solving hiding processing, being restored is carried out to containing close image E2;
8) the carrier image E1 restored is added with the image B of recovery, obtains image A2, the recovery image as original image A1
A;
Compressed that specific step is as follows in step 1) to former image A1 to be transmitted:
Select JPEG2000 compression method compressed greatly, compression multiple R1 is tested since R0, until R1=80~
120。
Inverible transform is carried out to image E in step 3), the mode for obtaining new image E1 is as follows: scramble is carried out to image E,
Obtain new image E1.
Inverible transform is carried out to image E in step 3), the mode for obtaining new image E1 is as follows: arranging image E
Arrangement, obtain new image E1.
The x and y needs to select according to image quality level, and mode is as follows:
X=1, y=0, A=A1, A are high quality graphic;
X=0, y=1, A=B1, A are gross image;
X=1/2, y=1/2, A=x*A1+y*B1, A are mean quality image;
X>0.5, y<0.5, A=x*A1+y*B1, A are the medium above quality image;
X > 0.5, y > 0.5, A=x*A1+y*B1, A are low middling quality image.
The beneficial effect of the present invention compared with prior art is:
Processing by demand transmission is exactly to have added one layer of protection to the data transmission of picture system, and image is become and is really schemed
As having relationship but relationship little image again, carry out the hided transmission of information, do not expose image true content or as needed therefore
It anticipates and exposes the content of image, and oneself can correctly restore original image in receiving end.
The present invention has these points substantive different and progress compared with current background technique:
(1) current Information Hiding Techniques are in the picture transmitted Information hiding, the diagram seem it is ostensible,
Others is known that true picture information.Treated Covered image as carrier, is hidden transmission, the diagram by the present invention
It seem ostensible, but others is difficult to know true picture information;
(2) the present invention relates to the contents of a kind of image data to be transmitted to stash, not with the degree of association that has converted
High image data form transmission, data volume do not increase, others seems and (receive) to can be the image of poor quality, even
The image being broken, to screen the transmission of true picture;
(4) proposed by the invention to process by demand the picture quality that method obtains and control in advance, what is needed with regard to hidden
The image for transmitting what rank is covered, but does not transmit the image directly, there are confidentiality and anti-intercepting and capturing;
(5) technical solution of the present invention is unique, has information disguising, and restorability is hidden better than current transform domain information
Method;
(6) present invention breaks routine, carries out the compression of big compression ratio to original image first, obtains image B1, which exists
It is not worth under normal conditions, because of PSNR relatively low (20dB is more, 30dB or less), subjective quality is poor, therefore the mesh that is out of use
The preceding compression method multiple R1 that compression of images is big, generally higher than 32 times, such as 100 times;But in the present invention in this way be can
With, produce unexpected effect.
Detailed description of the invention
Fig. 1 is test lena image, wherein Fig. 1 a representative image A1, Fig. 1 b representative image A (x=y=0.5), Fig. 1 c
Representative image A (x=1, y=0), Fig. 1 d representative image A (x=0, y=1), Fig. 1 e write on one's behalf image B1 (x=1, y=0, R0=
100), Fig. 1 f representative image B1 (x=0, y=1).
Specific embodiment
Information Hiding Techniques have been applied to terrestrial information network, also have been used to spacecraft and all kinds of satellite data transmission systems
In Technology design demonstration, broader applications will be being obtained from now on.
The present invention is not embedded in secret information in newly generated carrier image (not being original image) using Information Hiding Techniques,
But it is embedded in the quality information of original image, transmission is hidden in new support, the recovery PSNR of receiving end energy high quality meets
It is required that carrier image, do not need to transmit original image.
This method is based on Information hiding and carries out new support Information hiding, can obtain the image of required credit rating in advance, do
It is disclosed to carrier image, but without open original image, level security is strong, hides and is essentially different with routine information.
In order to verify performance of the invention, used first in emulation experiment in UGR standard testing image library 1 width size for
512 × 512 8 bit grayscale image data (Fig. 1) are used as image A1, carry out processing by demand experiment using the present invention.
1) image A1 to be transmitted is compressed, compression ratio R1 is greater than some value R0, R0 since 32, after obtaining compression
Data D1, to being restored image B1 after D1 decompression, until image A1 and the Y-PSNR PSNR for restoring image B1 are full
Foot requires: at least 20dB;
2) image A=x*A1+y*B1 is generated, wherein x+y=1;Image A is compressed again, compression ratio R2, R2 >=2,
Compressed data D is obtained, obtains the recovery image B of image A after decompressing to data D;
3) image A subtracted image B is used, image E is obtained, inverible transform is carried out to image E, obtains new image E1;
4) using new images E1 as carrier image, secret information F is obtained after above-mentioned data D, compression ratio R, x and y are encrypted,
It is nondestructively hidden into carrier image E1 using information concealing method, obtains stego-image E2;
5) it is transmitted to containing close image E2;
6) receiving end carries out solving hiding processing to received stego-image E2: first extracting secret information F, obtains after decryption
Data D, compression ratio R, x and y obtain the recovery image B of image A after decompressing to data D;
7) the carrier image E1 for solving hiding processing, being restored is carried out to containing close image E2;
8) the carrier image E1 restored is added with the image B of recovery, obtains image A2, the recovery image as original image A1
A;
Former image A1 to be transmitted is compressed in step 1), compression ratio R is greater than some value R0, and steps are as follows:
JPEG2000 compression method is selected to be compressed greatly, compression multiple R1 is tested since R0, until a R1=100 times of left side
It is right: R1=80~120.
Inverible transform is carried out to image E in step 3), the mode for obtaining new image E1 is as follows:
Mode 1: scramble is carried out to image E, obtains new image E1;
Mode 2: the arrangement arranged image E obtains new image E1.
X and y needs to select according to image quality level, and mode is as follows:
X=1, y=0, A=A1, A are high quality graphic;
X=0, y=1, A=B1, A are gross image;
X=1/2, y=1/2, A=x*A1+y*B1, A are mean quality image;
X>0.5, y<0.5, A=x*A1+y*B1, A are the medium above quality image;
X > 0.5, y > 0.5, A=x*A1+y*B1, A are low middling quality image.
Test image used and partial results as shown in figure 1 and table 1, table 1 is the Y-PSNR PSNR of image A1 and A
Table 1
Information concealing method has been applied in image transmitting and all kinds of Data transfer systems demonstration, but is typically all in original image
Middle carry out Information hiding, original image is disclosed, if can accomplish that image is disclosed without divulging a secret, or even can mislead enemy, fascination
Enemy mixes the spurious with the genuine, then hiding information is then more with practical value in the picture.The present invention provides a kind of based on Information hiding
Method is processed by demand, there is extraordinary recovery picture quality, while this method implementation complexity is little, passes through the innovation of method
The benefit in hardware realization is obtained, thus it is more with practical value in spacecraft Data transfer system, it is used for anti-interference secrecy, is prevented
Individual privacy, business privacy leakage.
Image information safety data transmission technology has been applied, and will obtain broader applications from now on.It is same with this
When, demand of the user to image data secret protection is also more more and more urgent.
The present invention is to solve the problems, such as image data transmission safe and secret and the new method that proposes.The present invention can be directed to
Image data carries out on-demand processing, obtains the carrier image data of new camouflage, which carries out transimission and storage and be not required to
Safety is wanted, the real information that will not leak original image has been intercepted and captured by enemy, and obtained picture quality is able to satisfy user and needs
Want, additionally have the characteristics that the low equal practicabilities of hardware realization complexity, thus ground application system, space application system,
All there is practical value in information network.
The content that description in the present invention is not described in detail belongs to the well-known technique of those skilled in the art.
Claims (4)
1. a kind of image based on Information hiding processes by demand method, it is characterised in that steps are as follows:
1) image A1 to be transmitted is compressed, JPEG2000 compression method is selected to be compressed greatly, compression multiple R1 is from R0
Start to test, until R1=80~120, obtain compressed data D1, to the image B1 that is restored after data D1 decompression, directly
To Y-PSNR PSNR >=20dB of image A1 and recovery image B1;The compression ratio R1 is greater than some value R0, and R0 >=32;
2) image A=x*A1+y*B1 is generated, wherein x+y=1;Image A is compressed again, compression ratio R2, R2 >=2 obtain
Compressed data D obtains the recovery image B of image A after decompressing to data D;
3) image A subtracted image B is used, image E is obtained, inverible transform is carried out to image E, obtains new image E1;
4) it using new images E1 as carrier image, secret information F is obtained after above-mentioned data D, compression ratio R, x and y encryption, utilizes
Information concealing method is nondestructively hidden into carrier image E1, obtains stego-image E2;
5) it is transmitted to containing close image E2;
6) receiving end carries out solving hiding processing to received stego-image E2: first extracting secret information F, obtains data after decryption
D, compression ratio R, x and y obtains the recovery image B of image A after decompressing to data D;
7) the carrier image E1 for solving hiding processing, being restored is carried out to containing close image E2;
8) the carrier image E1 restored is added with the image B of recovery, obtains image A2, the recovery image B1 as original image A1.
2. a kind of image based on Information hiding according to claim 1 processes by demand method, it is characterised in that: step 3)
In inverible transform is carried out to image E, the mode for obtaining new image E1 is as follows: carrying out scramble to image E, obtains new image
E1。
3. a kind of image based on Information hiding according to claim 1 processes by demand method, it is characterised in that: step 3)
In inverible transform is carried out to image E, the mode for obtaining new image E1 is as follows: the arrangement arranged image E obtains new
Image E1.
4. a kind of image based on Information hiding according to claim 1 processes by demand method, it is characterised in that: the x
It needs to select according to image quality level with y, mode is as follows:
X=1, y=0, A=A1, A are high quality graphic;
X=0, y=1, A=B1, A are gross image;
X=1/2, y=1/2, A=x*A1+y*B1, A are mean quality image;
X>0.5, y<0.5, A=x*A1+y*B1, A are the medium above quality image;
X > 0.5, y > 0.5, A=x*A1+y*B1, A are low middling quality image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610607285.4A CN106101715B (en) | 2016-07-28 | 2016-07-28 | A kind of image based on Information hiding processes by demand method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610607285.4A CN106101715B (en) | 2016-07-28 | 2016-07-28 | A kind of image based on Information hiding processes by demand method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106101715A CN106101715A (en) | 2016-11-09 |
CN106101715B true CN106101715B (en) | 2019-01-25 |
Family
ID=57479212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610607285.4A Active CN106101715B (en) | 2016-07-28 | 2016-07-28 | A kind of image based on Information hiding processes by demand method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106101715B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108629749B (en) * | 2018-04-26 | 2021-10-01 | 西安空间无线电技术研究所 | Method for combining image compression and hiding |
CN114598529A (en) * | 2022-03-09 | 2022-06-07 | 东北大学 | Image information hiding method fusing encryption |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065967A (en) * | 2014-05-30 | 2014-09-24 | 西安空间无线电技术研究所 | Satellite data transmission method based on image information hiding |
CN105025195A (en) * | 2015-06-30 | 2015-11-04 | 西安空间无线电技术研究所 | Real-hidden and fake-display satellite data transmission method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7373513B2 (en) * | 1998-09-25 | 2008-05-13 | Digimarc Corporation | Transmarking of multimedia signals |
-
2016
- 2016-07-28 CN CN201610607285.4A patent/CN106101715B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065967A (en) * | 2014-05-30 | 2014-09-24 | 西安空间无线电技术研究所 | Satellite data transmission method based on image information hiding |
CN105025195A (en) * | 2015-06-30 | 2015-11-04 | 西安空间无线电技术研究所 | Real-hidden and fake-display satellite data transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN106101715A (en) | 2016-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing | |
Xiong et al. | An integer wavelet transform based scheme for reversible data hiding in encrypted images | |
Alsafasfeh et al. | Image encryption based on the general approach for multiple chaotic systems. | |
Zheng et al. | Lossless data hiding algorithm for encrypted images with high capacity | |
CN109547663B (en) | Improved LSB image steganography method combined with cryptography | |
CN106023053A (en) | High-capacity file encrypted steganography and extraction method based on JPEG images | |
CN106101715B (en) | A kind of image based on Information hiding processes by demand method | |
CN103973937A (en) | Information hiding method based on wireless multimedia sensor network | |
CN109547797A (en) | A kind of separable encrypted domain information concealing method | |
Chen et al. | Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase | |
Ren | A novel raster map exchange scheme based on visual cryptography | |
Wang et al. | Progressive secret image sharing scheme using meaningful shadows | |
CN102523452A (en) | Method for conversion, compression and transmission of images | |
CN115131253B (en) | Secret image sharing method and system for resisting JPEG recompression | |
Mohamed et al. | Hybrid DCT-DWT watermarking and IDEA encryption of internet contents | |
Jin et al. | A reversible data hiding algorithm based on secret sharing | |
Chen et al. | Optical information authentication via compressed sensing and double random phase encoding | |
CN114782563B (en) | Secret image sharing method and system for JPEG image | |
CN105025195B (en) | A kind of camouflage satellite data transmission method | |
Panneerselvam et al. | Improving the security of video embedding using the cfp-spe method | |
Li et al. | High‐Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing | |
Danti et al. | Secured data hiding of invariant sized secrete image based on discrete and hybrid wavelet transform | |
Fathimal et al. | New fool proof examination system through color visual cryptography and signature authentication. | |
CN111353133B (en) | Image processing method, device and readable storage medium | |
Liu et al. | Multiple images encryption and authentication using cascaded phase encoding with random sparse constraint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |