CN106101715B - A kind of image based on Information hiding processes by demand method - Google Patents

A kind of image based on Information hiding processes by demand method Download PDF

Info

Publication number
CN106101715B
CN106101715B CN201610607285.4A CN201610607285A CN106101715B CN 106101715 B CN106101715 B CN 106101715B CN 201610607285 A CN201610607285 A CN 201610607285A CN 106101715 B CN106101715 B CN 106101715B
Authority
CN
China
Prior art keywords
image
information
obtains
data
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610607285.4A
Other languages
Chinese (zh)
Other versions
CN106101715A (en
Inventor
周诠
王鹏
魏佳圆
呼延烺
刘娟妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Institute of Space Radio Technology
Original Assignee
Xian Institute of Space Radio Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Institute of Space Radio Technology filed Critical Xian Institute of Space Radio Technology
Priority to CN201610607285.4A priority Critical patent/CN106101715B/en
Publication of CN106101715A publication Critical patent/CN106101715A/en
Application granted granted Critical
Publication of CN106101715B publication Critical patent/CN106101715B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0053Embedding of the watermark in the coding stream, possibly without decoding; Embedding of the watermark in the compressed domain

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

Method is processed by demand based on Information hiding the invention proposes a kind of, is mainly used for hided transmission and secure storage.The present invention is not that secret information is embedded in original image using Information Hiding Techniques, but other image related with error image is generated as new support, some compression information of abstract image itself are hidden transmission in new support, and carrier seems there is certain association with original image.This method is based on Information hiding and is handled, and can obtain the image of required credit rating in advance, accomplish that carrier image discloses, but without open original image, level security is strong, hides and is essentially different with routine information.The present invention can increase image transmitting safety, or enhancing secret protection ability.

Description

A kind of image based on Information hiding processes by demand method
Technical field
The present invention relates to a kind of method of data communication, in particular to a kind of image side of processing by demand based on Information hiding Method belongs to communication (such as data communication technology) field.
Background technique
The problem of current society is the society of information, and the safety problem of information is at being increasingly urgent to, Information hiding (number According to hide) be information security an important branch, secret information is embedded into carrier using the visual redundancy of the mankind, from And achieve the purpose that safe transmission secret information.
The digital image that people obtain at present has reached tens billion of scales, plays in national economy, daily life important Effect, at present in image transmitting and storage general information encryption method, but make others that can not know the content of image itself, But after others sees image encryption, feel important, can decode, not decoding will destroy, and be unfavorable for the safety of image instead.One As information concealing method, be hiding some secret informations in the picture, be aware or unaware that others can not in image and contain Secret information, so that there is certain level security, but the safety of carrier image itself not can guarantee.
Summary of the invention
Technical problem solved by the present invention is overcoming the deficiencies of the prior art and provide a kind of image based on Information hiding Process by demand method, after this method is handled, image seem to can be high-quality image, poor quality image or do not have According to good image, the data of transmission can according to need after receiving end is handled restores true data, plays the effect of camouflage. There is secrecy, anti-intercepting and capturing, jamproof effect in message transmitting procedure.
The technical scheme is that a kind of image based on Information hiding processes by demand method, steps are as follows:
1) image A1 to be transmitted is compressed, compression ratio R1 is greater than some value R0, and R0 >=32 obtain compressed number According to D1, to the image B1 that is restored after data D1 decompression, until image A1 and restore the Y-PSNR PSNR of image B1 >= 20dB;
2) image A=x*A1+y*B1 is generated, wherein x+y=1;Image A is compressed again, compression ratio R2, R2 >=2, Compressed data D is obtained, obtains the recovery image B of image A after decompressing to data D;
3) image A subtracted image B is used, image E is obtained, inverible transform is carried out to image E, obtains new image E1;
4) using new images E1 as carrier image, secret information F is obtained after above-mentioned data D, compression ratio R, x and y are encrypted, It is nondestructively hidden into carrier image E1 using information concealing method, obtains stego-image E2;
5) it is transmitted to containing close image E2;
6) receiving end carries out solving hiding processing to received stego-image E2: first extracting secret information F, obtains after decryption Data D, compression ratio R, x and y obtain the recovery image B of image A after decompressing to data D;
7) the carrier image E1 for solving hiding processing, being restored is carried out to containing close image E2;
8) the carrier image E1 restored is added with the image B of recovery, obtains image A2, the recovery image as original image A1 A;
Compressed that specific step is as follows in step 1) to former image A1 to be transmitted:
Select JPEG2000 compression method compressed greatly, compression multiple R1 is tested since R0, until R1=80~ 120。
Inverible transform is carried out to image E in step 3), the mode for obtaining new image E1 is as follows: scramble is carried out to image E, Obtain new image E1.
Inverible transform is carried out to image E in step 3), the mode for obtaining new image E1 is as follows: arranging image E Arrangement, obtain new image E1.
The x and y needs to select according to image quality level, and mode is as follows:
X=1, y=0, A=A1, A are high quality graphic;
X=0, y=1, A=B1, A are gross image;
X=1/2, y=1/2, A=x*A1+y*B1, A are mean quality image;
X>0.5, y<0.5, A=x*A1+y*B1, A are the medium above quality image;
X > 0.5, y > 0.5, A=x*A1+y*B1, A are low middling quality image.
The beneficial effect of the present invention compared with prior art is:
Processing by demand transmission is exactly to have added one layer of protection to the data transmission of picture system, and image is become and is really schemed As having relationship but relationship little image again, carry out the hided transmission of information, do not expose image true content or as needed therefore It anticipates and exposes the content of image, and oneself can correctly restore original image in receiving end.
The present invention has these points substantive different and progress compared with current background technique:
(1) current Information Hiding Techniques are in the picture transmitted Information hiding, the diagram seem it is ostensible, Others is known that true picture information.Treated Covered image as carrier, is hidden transmission, the diagram by the present invention It seem ostensible, but others is difficult to know true picture information;
(2) the present invention relates to the contents of a kind of image data to be transmitted to stash, not with the degree of association that has converted High image data form transmission, data volume do not increase, others seems and (receive) to can be the image of poor quality, even The image being broken, to screen the transmission of true picture;
(4) proposed by the invention to process by demand the picture quality that method obtains and control in advance, what is needed with regard to hidden The image for transmitting what rank is covered, but does not transmit the image directly, there are confidentiality and anti-intercepting and capturing;
(5) technical solution of the present invention is unique, has information disguising, and restorability is hidden better than current transform domain information Method;
(6) present invention breaks routine, carries out the compression of big compression ratio to original image first, obtains image B1, which exists It is not worth under normal conditions, because of PSNR relatively low (20dB is more, 30dB or less), subjective quality is poor, therefore the mesh that is out of use The preceding compression method multiple R1 that compression of images is big, generally higher than 32 times, such as 100 times;But in the present invention in this way be can With, produce unexpected effect.
Detailed description of the invention
Fig. 1 is test lena image, wherein Fig. 1 a representative image A1, Fig. 1 b representative image A (x=y=0.5), Fig. 1 c Representative image A (x=1, y=0), Fig. 1 d representative image A (x=0, y=1), Fig. 1 e write on one's behalf image B1 (x=1, y=0, R0= 100), Fig. 1 f representative image B1 (x=0, y=1).
Specific embodiment
Information Hiding Techniques have been applied to terrestrial information network, also have been used to spacecraft and all kinds of satellite data transmission systems In Technology design demonstration, broader applications will be being obtained from now on.
The present invention is not embedded in secret information in newly generated carrier image (not being original image) using Information Hiding Techniques, But it is embedded in the quality information of original image, transmission is hidden in new support, the recovery PSNR of receiving end energy high quality meets It is required that carrier image, do not need to transmit original image.
This method is based on Information hiding and carries out new support Information hiding, can obtain the image of required credit rating in advance, do It is disclosed to carrier image, but without open original image, level security is strong, hides and is essentially different with routine information.
In order to verify performance of the invention, used first in emulation experiment in UGR standard testing image library 1 width size for 512 × 512 8 bit grayscale image data (Fig. 1) are used as image A1, carry out processing by demand experiment using the present invention.
1) image A1 to be transmitted is compressed, compression ratio R1 is greater than some value R0, R0 since 32, after obtaining compression Data D1, to being restored image B1 after D1 decompression, until image A1 and the Y-PSNR PSNR for restoring image B1 are full Foot requires: at least 20dB;
2) image A=x*A1+y*B1 is generated, wherein x+y=1;Image A is compressed again, compression ratio R2, R2 >=2, Compressed data D is obtained, obtains the recovery image B of image A after decompressing to data D;
3) image A subtracted image B is used, image E is obtained, inverible transform is carried out to image E, obtains new image E1;
4) using new images E1 as carrier image, secret information F is obtained after above-mentioned data D, compression ratio R, x and y are encrypted, It is nondestructively hidden into carrier image E1 using information concealing method, obtains stego-image E2;
5) it is transmitted to containing close image E2;
6) receiving end carries out solving hiding processing to received stego-image E2: first extracting secret information F, obtains after decryption Data D, compression ratio R, x and y obtain the recovery image B of image A after decompressing to data D;
7) the carrier image E1 for solving hiding processing, being restored is carried out to containing close image E2;
8) the carrier image E1 restored is added with the image B of recovery, obtains image A2, the recovery image as original image A1 A;
Former image A1 to be transmitted is compressed in step 1), compression ratio R is greater than some value R0, and steps are as follows:
JPEG2000 compression method is selected to be compressed greatly, compression multiple R1 is tested since R0, until a R1=100 times of left side It is right: R1=80~120.
Inverible transform is carried out to image E in step 3), the mode for obtaining new image E1 is as follows:
Mode 1: scramble is carried out to image E, obtains new image E1;
Mode 2: the arrangement arranged image E obtains new image E1.
X and y needs to select according to image quality level, and mode is as follows:
X=1, y=0, A=A1, A are high quality graphic;
X=0, y=1, A=B1, A are gross image;
X=1/2, y=1/2, A=x*A1+y*B1, A are mean quality image;
X>0.5, y<0.5, A=x*A1+y*B1, A are the medium above quality image;
X > 0.5, y > 0.5, A=x*A1+y*B1, A are low middling quality image.
Test image used and partial results as shown in figure 1 and table 1, table 1 is the Y-PSNR PSNR of image A1 and A
Table 1
Information concealing method has been applied in image transmitting and all kinds of Data transfer systems demonstration, but is typically all in original image Middle carry out Information hiding, original image is disclosed, if can accomplish that image is disclosed without divulging a secret, or even can mislead enemy, fascination Enemy mixes the spurious with the genuine, then hiding information is then more with practical value in the picture.The present invention provides a kind of based on Information hiding Method is processed by demand, there is extraordinary recovery picture quality, while this method implementation complexity is little, passes through the innovation of method The benefit in hardware realization is obtained, thus it is more with practical value in spacecraft Data transfer system, it is used for anti-interference secrecy, is prevented Individual privacy, business privacy leakage.
Image information safety data transmission technology has been applied, and will obtain broader applications from now on.It is same with this When, demand of the user to image data secret protection is also more more and more urgent.
The present invention is to solve the problems, such as image data transmission safe and secret and the new method that proposes.The present invention can be directed to Image data carries out on-demand processing, obtains the carrier image data of new camouflage, which carries out transimission and storage and be not required to Safety is wanted, the real information that will not leak original image has been intercepted and captured by enemy, and obtained picture quality is able to satisfy user and needs Want, additionally have the characteristics that the low equal practicabilities of hardware realization complexity, thus ground application system, space application system, All there is practical value in information network.
The content that description in the present invention is not described in detail belongs to the well-known technique of those skilled in the art.

Claims (4)

1. a kind of image based on Information hiding processes by demand method, it is characterised in that steps are as follows:
1) image A1 to be transmitted is compressed, JPEG2000 compression method is selected to be compressed greatly, compression multiple R1 is from R0 Start to test, until R1=80~120, obtain compressed data D1, to the image B1 that is restored after data D1 decompression, directly To Y-PSNR PSNR >=20dB of image A1 and recovery image B1;The compression ratio R1 is greater than some value R0, and R0 >=32;
2) image A=x*A1+y*B1 is generated, wherein x+y=1;Image A is compressed again, compression ratio R2, R2 >=2 obtain Compressed data D obtains the recovery image B of image A after decompressing to data D;
3) image A subtracted image B is used, image E is obtained, inverible transform is carried out to image E, obtains new image E1;
4) it using new images E1 as carrier image, secret information F is obtained after above-mentioned data D, compression ratio R, x and y encryption, utilizes Information concealing method is nondestructively hidden into carrier image E1, obtains stego-image E2;
5) it is transmitted to containing close image E2;
6) receiving end carries out solving hiding processing to received stego-image E2: first extracting secret information F, obtains data after decryption D, compression ratio R, x and y obtains the recovery image B of image A after decompressing to data D;
7) the carrier image E1 for solving hiding processing, being restored is carried out to containing close image E2;
8) the carrier image E1 restored is added with the image B of recovery, obtains image A2, the recovery image B1 as original image A1.
2. a kind of image based on Information hiding according to claim 1 processes by demand method, it is characterised in that: step 3) In inverible transform is carried out to image E, the mode for obtaining new image E1 is as follows: carrying out scramble to image E, obtains new image E1。
3. a kind of image based on Information hiding according to claim 1 processes by demand method, it is characterised in that: step 3) In inverible transform is carried out to image E, the mode for obtaining new image E1 is as follows: the arrangement arranged image E obtains new Image E1.
4. a kind of image based on Information hiding according to claim 1 processes by demand method, it is characterised in that: the x It needs to select according to image quality level with y, mode is as follows:
X=1, y=0, A=A1, A are high quality graphic;
X=0, y=1, A=B1, A are gross image;
X=1/2, y=1/2, A=x*A1+y*B1, A are mean quality image;
X>0.5, y<0.5, A=x*A1+y*B1, A are the medium above quality image;
X > 0.5, y > 0.5, A=x*A1+y*B1, A are low middling quality image.
CN201610607285.4A 2016-07-28 2016-07-28 A kind of image based on Information hiding processes by demand method Active CN106101715B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610607285.4A CN106101715B (en) 2016-07-28 2016-07-28 A kind of image based on Information hiding processes by demand method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610607285.4A CN106101715B (en) 2016-07-28 2016-07-28 A kind of image based on Information hiding processes by demand method

Publications (2)

Publication Number Publication Date
CN106101715A CN106101715A (en) 2016-11-09
CN106101715B true CN106101715B (en) 2019-01-25

Family

ID=57479212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610607285.4A Active CN106101715B (en) 2016-07-28 2016-07-28 A kind of image based on Information hiding processes by demand method

Country Status (1)

Country Link
CN (1) CN106101715B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108629749B (en) * 2018-04-26 2021-10-01 西安空间无线电技术研究所 Method for combining image compression and hiding
CN114598529A (en) * 2022-03-09 2022-06-07 东北大学 Image information hiding method fusing encryption

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065967A (en) * 2014-05-30 2014-09-24 西安空间无线电技术研究所 Satellite data transmission method based on image information hiding
CN105025195A (en) * 2015-06-30 2015-11-04 西安空间无线电技术研究所 Real-hidden and fake-display satellite data transmission method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7373513B2 (en) * 1998-09-25 2008-05-13 Digimarc Corporation Transmarking of multimedia signals

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065967A (en) * 2014-05-30 2014-09-24 西安空间无线电技术研究所 Satellite data transmission method based on image information hiding
CN105025195A (en) * 2015-06-30 2015-11-04 西安空间无线电技术研究所 Real-hidden and fake-display satellite data transmission method

Also Published As

Publication number Publication date
CN106101715A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
Li et al. Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing
Xiong et al. An integer wavelet transform based scheme for reversible data hiding in encrypted images
Alsafasfeh et al. Image encryption based on the general approach for multiple chaotic systems.
Zheng et al. Lossless data hiding algorithm for encrypted images with high capacity
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN106023053A (en) High-capacity file encrypted steganography and extraction method based on JPEG images
CN106101715B (en) A kind of image based on Information hiding processes by demand method
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
CN109547797A (en) A kind of separable encrypted domain information concealing method
Chen et al. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase
Ren A novel raster map exchange scheme based on visual cryptography
Wang et al. Progressive secret image sharing scheme using meaningful shadows
CN102523452A (en) Method for conversion, compression and transmission of images
CN115131253B (en) Secret image sharing method and system for resisting JPEG recompression
Mohamed et al. Hybrid DCT-DWT watermarking and IDEA encryption of internet contents
Jin et al. A reversible data hiding algorithm based on secret sharing
Chen et al. Optical information authentication via compressed sensing and double random phase encoding
CN114782563B (en) Secret image sharing method and system for JPEG image
CN105025195B (en) A kind of camouflage satellite data transmission method
Panneerselvam et al. Improving the security of video embedding using the cfp-spe method
Li et al. High‐Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing
Danti et al. Secured data hiding of invariant sized secrete image based on discrete and hybrid wavelet transform
Fathimal et al. New fool proof examination system through color visual cryptography and signature authentication.
CN111353133B (en) Image processing method, device and readable storage medium
Liu et al. Multiple images encryption and authentication using cascaded phase encoding with random sparse constraint

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant