CN107809644A - A kind of encryption area image reversible data concealing method of double-encryption - Google Patents

A kind of encryption area image reversible data concealing method of double-encryption Download PDF

Info

Publication number
CN107809644A
CN107809644A CN201711011109.5A CN201711011109A CN107809644A CN 107809644 A CN107809644 A CN 107809644A CN 201711011109 A CN201711011109 A CN 201711011109A CN 107809644 A CN107809644 A CN 107809644A
Authority
CN
China
Prior art keywords
cur
image block
secret information
value
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711011109.5A
Other languages
Chinese (zh)
Other versions
CN107809644B (en
Inventor
徐达文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo University of Technology
Original Assignee
Ningbo University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo University of Technology filed Critical Ningbo University of Technology
Priority to CN201711011109.5A priority Critical patent/CN107809644B/en
Publication of CN107809644A publication Critical patent/CN107809644A/en
Application granted granted Critical
Publication of CN107809644B publication Critical patent/CN107809644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of encryption area image reversible data concealing method of double-encryption, and it includes image encryption, encryption area image hiding reversible data, the extraction of concealed data and original image Distortionless three parts;Double-encryption mechanism is used in image encryption part, enhances security;Secret information can be embedded in directly in the image of encryption, even if image watermarking person does not know original image content, also picture material safety and privacy leakage problem can be efficiently solved, and it is embedded in the expansion that will not also cause view data without complicated agreement, encryption and data between image encryption person and secret information insertion person;It is practical, if only image watermarking key, hiding secret information can be directly extracted in ciphertext area image;If only encryption key, it can directly decrypt and obtain approximate original image;If having image watermarking key and encryption key, it can guarantee that after the hiding secret information of extraction, original image can be recovered without distortions.

Description

A kind of encryption area image reversible data concealing method of double-encryption
Technical field
The present invention relates to a kind of image reversible data hiding technique, more particularly, to a kind of encryption area image of double-encryption Reversible data concealing method.
Background technology
Under cloud computing platform, the supplier of content of multimedia need not be storage person and processor simultaneously.In this Working mould In formula, user data is largely in " out of control " state.Ensure one of best approach of multi-medium data security just It is that multimedia is encrypted.User is encrypted first before sensitive content is uploaded, all processing in high in the clouds and meter Calculate and all carried out in ciphertext domain, and result is supplied to user, user can obtain clear data by decryption side.Such as Medical institutions, the obligation of protection patients' privacy is born, but their data-handling capacity is weaker, to reach preferably medical treatment effect Fruit or scientific research level, third party's (cloud computing center) that they need commission and have stronger data-handling capacity are realized at data Reason, and it is immoral directly to give data to third party, and do not allowed by law, they can be by the number after encryption According to sending to third party, them are returned to after the completion of third party's processing.
In many application scenarios, it is attached that the cloud service managers of some no decrypted rights need to be embedded in some in encryption vector Add message, such as mark or authentication data, works source-information, owner's identity information, for managing and authenticated encryption image Data.Meanwhile in some important application scenarios, such as medical diagnosis, court's certification, military image, remote sensing images and fingerprint image The Sensitive Domains such as picture generally require accurately recover former hosted information after additional message is extracted.It is for example, hidden for protection patient Private, the information such as medical image are encrypted, data base administration person can be embedded in the privacy of patient in corresponding encrypted image Information and authentication information.If the embedded additional message in sensitive image data, need in advance to sensitive image data deciphering, this Mean that in the whole life cycle of sensitive image data, at least part of time be with existing for plaintext version, this Sample can bring about serious privacy concern.In addition, in order to not influence to diagnose, the doctor of mandate wishes decrypting and extracting additional letter After breath, original image content can be recovered completely.Encrypted domain reversible data hiding technique may insure image watermarking, and person is not understanding On the premise of close, the insertion of data is directly carried out to encrypted image and extraction operates, can help solve safety of image and privacy The worry of leakage.Existing encrypted domain reversible data hiding technique can be divided into three classes:The first kind is sought after image is encrypted Data embedded space is looked for, this kind of universal embedding capacity of method is relatively low, and data extraction error can occur;Second class is image encryption Preceding reserved data embedded space, this kind of method embedding capacity is big and distortion is low, but shortcoming be image encryption person and data insertion person Between need complexity agreement;3rd class is to realize ciphertext area image hiding reversible data using homomorphic cryptography, but homomorphism adds It is close to easily cause ciphertext data expansion.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of encryption area image hiding reversible data side of double-encryption Method, it can carry out secret information insertion in area image is encrypted, without multiple between image encryption person and secret information insertion person Miscellaneous agreement, and embedding capacity is big, will not cause to be embedded in the encryption area image generation data expansion after secret information;Receiving terminal energy Enough directly decryption obtain approximate original image or can directly extract secret information or can ensure extracting secret Original image can be recovered after information without distortions.
Technical scheme is used by the present invention solves above-mentioned technical problem:A kind of encryption area image of double-encryption is reversible Data-hiding method, it is characterised in that extracted including image encryption, encryption area image hiding reversible data, concealed data and original Image lossless recovers three parts;Wherein,
The processing procedure of described image encryption part is:
1. the width and height that _ 1, set original image to be encrypted correspond to W and H, if W × H can be whole by g × g Remove, be then divided into original image to be encryptedThe size of individual non-overlapping copies is g × g image block;If W × H can not be divided exactly by g × g, then be divided into original image to be encryptedThe size of individual non-overlapping copies is g × g image block, and the right of original image to be encrypted and lower section size are not also served as into image block for g × g block, It is sharedIndividual image block;Wherein, g value is 2 or 3, symbolTo round symbol, symbol downwardsFor Round up symbol;
1. _ 2, set a first key key1;Then join first key key1 as the input of random () function Number, random () function is set to produce first random sequence;Wherein, the length of the first random sequence is more than original to be encrypted The total number of the image block included in beginning image, the value of each element in the first random sequence is the integer in [0,255];
1. m-th of image block currently pending in original image to be encrypted _ 3, is defined as current image block, ought Preceding j-th of the element definition taken out from the first random sequence is currentElement;Wherein, m and j is positive integer, m and j just Initial value is 1, and 1≤m≤M, M represent the total number of the image block included in original image to be encrypted, and 1≤j≤J, J represent the The length of one random sequence;
1. _ 4, each pixel in current image block is encrypted using currentElement, in current image block The process that ith pixel point is encrypted is:By the pixel value of ith pixel point and the value of currentElement in current image block To 256 modulus after addition, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1≤i ≤Icur, IcurRepresent the total number of pixel included in current image block;
1. _ 5, making m=m+1, and make j=j+1, using next pending image block in original image to be encrypted as Current image block, using next element taken out from the first random sequence as currentElement, be then back to step 1. _ 4 after It is continuous to perform, until all image blocks in original image to be encrypted are disposed, obtain one-time pad encryption image;Wherein, m=m+ "=" in 1 and j=j+1 is assignment;
1. _ 6, counting the total number for the image block that the size included in one-time pad encryption image is g × g, it is designated as Count;And set a second key key2;Then using the second key key2 as the input parameter of random () function, make Random () function produces second random sequence;Wherein, the length of the second random sequence is Count, the second random sequence In the value of each element be the integer in [0, Count], the value of all elements in the second random sequence do not repeat and in Machine is distributed;
1. _ 7, the image block that all sizes in one-time pad encryption image are g × g is carried out using the second random sequence Scramble, the double-encryption process of original image is so far completed, obtain the encryption area image of double-encryption;It is above-mentioned, first key Key1 and the second key key2 is encryption key;
The processing procedure of described encryption area image hiding reversible data part is:
2. _ 1, the encryption area image of double-encryption is divided intoThe size of individual non-overlapping copies is g × g Image block;Wherein, symbolTo round symbol downwards;
A the 3rd key key3 is set as image watermarking key;Then using the 3rd key key3 as random () letter Several input parameters, random () function is set to produce the 3rd random sequence;Recycle each member in the 3rd random sequence The value of element corresponds to every secret information bit in original secret information and carries out XOR encryption, obtains the hidden of XOR encryption Secret information, as secret information to be embedded;Wherein, the length of the 3rd random sequence is more than or equal to the length of original secret information Degree, and the value of each element in the 3rd random sequence is 0 or 1;
2. the m' image block currently pending in the encryption area image of double-encryption _ 2, is defined as present image Block;Wherein, m' is positive integer, and m' initial value is 1,
2. _ 3, calculate the respective pixel value of the non-central pixels of g × g-1 in current image block and central pixel point The difference of pixel value is to the values of 256 modulus, by the pixel value and center pixel of s-th of non-central pixel in current image block The difference of the pixel value of point is designated as f to the value of 256 moduluscur(s), fcur(s)=(hcur(s)-hcur,center)mod 256;Its In, s is positive integer, and s initial value is 1,1≤s≤g × g-1, hcur(s) s-th of non-central picture in current image block is represented The pixel value of vegetarian refreshments, hcur,centerThe pixel value of the central pixel point in current image block is represented, if the size of current image block Size is 2 × 2, then specifying any one pixel in current image block, rest of pixels point is as non-as central pixel point Central pixel point, mod are modulus symbol;
2. _ 4, according to step 2. _ 3 in g × g-1 value being calculated, determine the secret information insertion of current image block Region, it is designated as Zcur, Zcur=[Tp,Tp+β]∪[Tn-β,Tn];Wherein, symbol " ∪ " is union operation symbol, Tp=0, Tn= 255, β represent regulatory factor, and β value is the integer more than or equal to 0;
2. _ 5, for step 2. _ 3 in g × g-1 value being calculated, be handled as follows:2. _ 3 fallen into a trap for step Obtained fcur(s), if fcur(s) it is more than Tp+ β, then correct fcur(s), process is:Make f'cur(s)=fcur(s)+(β+1), F is made againcur(s)=f'cur(s);If fcur(s) it is less than Tn- β, then correct fcur(s), process is:Make f'cur(s)=fcur(s)-(β + 1), then f is madecur(s)=f'cur(s);If fcur(s)∈Zcur, then f is keptcur(s) it is constant;Wherein, f'cur(s) in be introduced into Between variable, fcur(s)=f'cur(s) "=" in is assignment;
2. secret information bit insertion, specific mistake _ 6, are carried out to g × g-1 non-central pixels in current image block Cheng Wei:For s-th of non-central pixel in current image block, if by step 2. _ 5 in g × g-1 value determining S-th of value fcur(s) meet:fcur(s)∈[Tn-β,Tn], then when secret information bit to be embedded is " 0 ", make f "cur(s) =fcur(s)-(Tn-fcur(s)), then to hcur(s) it is modified to complete the insertion of secret information bit, process is:Order h'cur(s)=(f "cur(s)+hcur,center) mod 256, then make hcur(s)=h'cur(s);When secret information bit to be embedded For " 1 " when, make f "cur(s)=fcur(s)-(Tn-fcur(s)) -1, then to hcur(s) it is modified to complete secret information ratio Special insertion, process are:Make h'cur(s)=(f "cur(s)+hcur,center) mod 256, then make hcur(s)=h'cur(s);If through S-th of value f in the g × g-1 value determined in crossing step 2. _ 5cur(s) meet:fcur(s)∈[Tp,Tp+ β], then when to be embedded Secret information bit when being " 0 ", make f "cur(s)=fcur(s)+(fcur(s)-Tp), then to hcur(s) it is modified with complete Into the insertion of secret information bit, process is:Make h'cur(s)=(f "cur(s)+hcur,center) mod 256, then make hcur(s)= h'cur(s);When secret information bit to be embedded is " 1 ", f "cur(s)=fcur(s)+(fcur(s)-Tp)+1, then to hcur (s) it is modified to complete the insertion of secret information bit, process is:Make h'cur(s)=(f "cur(s)+hcur,center)mod 256, then make hcur(s)=h'cur(s);Wherein, f "curAnd h' (s)cur(s) be introducing intermediate variable, hcur(s)=h'cur (s) "=" in is assignment;
2. _ 7, make m'=m'+1, then using double-encryption encryption area image in next pending image block as Current image block, return again to step and 2. _ 3 continue executing with, until in each image block in the encryption area image of double-encryption Each non-central pixel is embedded with secret information bit, obtains the encryption area image containing secret information;Wherein, in m'=m'+1 "=" be assignment;
There are three kinds of situations described concealed data extraction and original image Distortionless part:
The first situation is that receiving terminal only has encryption key, and only the encryption area image containing secret information is decrypted, had Body process is:
3. the width and height of _ 1_1, encryption area image containing secret information correspond to W and H, if W × H can by g × G is divided exactly, then is divided into the encryption area image containing secret informationThe size of individual non-overlapping copies is g × g image Block;If W × H can not be divided exactly by g × g, the encryption area image containing secret information is divided intoIt is individual mutually not Overlapping size is g × g image block, and by the right of the encryption area image containing secret information and lower section size not Image block is also served as g × g block, is sharedIndividual image block;Wherein, g value is 2 or 3, symbolFor to Under round symbol, symbolFor the symbol that rounds up;
3. _ 1_2, the input parameter using the second key key2 as random () function, random () function is set to produce one Individual 5th random sequence;Wherein, the length of the 5th random sequence is Count, and the value of each element in the 5th random sequence is Integer in [0, Count], the value of all elements in the 5th random sequence do not repeat and are in random distribution;
3. _ 1_3, using the 5th random sequence it is g × g to all sizes in the encryption area image containing secret information Image block carry out scramble, obtain the encryption area image after scramble;
3. _ 1_4, the input parameter using first key key1 as random () function, random () function is set to produce one Individual 4th random sequence;Wherein, the length of the 4th random sequence is more than the image block included in the encryption area image after removing scramble Total number, the value of each element in the 4th random sequence is the integer in [0,255];
3. _ 1_5, m-th of image block currently pending in the encryption area image after scramble will be gone to be defined as present image Block, it is currentElement by j-th of the element definition currently taken out from the 4th random sequence;Wherein, m and j is positive integer, m Initial value with j is 1, and 1≤m≤M, M represent to go in the encryption area image after scramble the total number of the image block included, 1≤j ≤ J, J represent the length of the 4th random sequence;
3. _ 1_6, using currentElement each pixel in current image block is decrypted, in current image block The process that is decrypted of ith pixel point be:By the pixel value of the ith pixel point in current image block and currentElement Value subtract each other after to 256 modulus, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1 ≤i≤Icur, IcurRepresent the total number of pixel included in current image block;
3. _ 1_7, making m=m+1, and j=j+1 is made, next pending image in the encryption area image after scramble will be removed Block, using next element taken out from the 4th random sequence as currentElement, is then back to step as current image block 3. _ 1_6 is continued executing with, until all image blocks in the encryption area image after removing scramble are disposed, image decryption is completed Process, obtain the decryption area image containing secret information;Wherein, "=" in m=m+1 and j=j+1 is assignment;
Second of situation is that receiving terminal only has image watermarking key, only the encryption area image containing secret information is carried out concealed Information extraction, detailed process are:
3. the width and height of _ 2_1, encryption area image containing secret information correspond to W and H, by containing secret information plus Close area image is divided intoThe size of individual non-overlapping copies is g × g image block;Wherein, symbolFor to Under round symbol;
Input parameter using the 3rd key key3 as random () function, random () function is set to produce one the 6th Random sequence;Wherein, the value of each element in the 6th random sequence is 0 or 1;
3. _ 2_2, the m' image block currently pending in the encryption area image containing secret information be defined as currently scheming As block;Wherein, m' is positive integer, and m' initial value is 1,
3. _ 2_3, calculate the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block Pixel value difference to the values of 256 modulus, by the pixel value of s-th of non-central pixel in current image block and middle imago The difference of the pixel value of vegetarian refreshments is designated as to the value of 256 modulus Its In, s is positive integer, and s initial value is 1,1≤s≤g × g-1,Represent s-th of non-central picture in current image block The pixel value of vegetarian refreshments,The pixel value of the central pixel point in current image block is represented, if the size of current image block is big Small is 2 × 2, then specifies any one pixel in current image block as central pixel point, and rest of pixels point is as in non- Imago vegetarian refreshments, mod are modulus symbol;
3. _ 2_4, according to step 3. _ 2_3 in g × g-1 value being calculated, determine the secret information of current image block Region is extracted, is designated as Wherein, symbol " ∪ " accords with for union operation Number,
3. _ 2_5, secret information bit extraction is carried out to g × g-1 non-central pixels in current image block, specifically Process is:For s-th of non-central pixel in current image block, if by step 3. _ 2_3 is calculatedIt is full Foot:Then whenDuring equal to 0, the secret information bit for extracting to obtain is " 0 ", WhenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";If by step 3. _ 2_3 is calculatedMeet:Then whenDuring equal to 0, obtained secret information ratio is extracted Specially for " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";
3. _ 2_6, m'=m'+1 is made, then by next pending image block in the encryption area image containing secret information As current image block, return again to step 3. _ 2_3 continues executing with, until from each in the encryption area image containing secret information Secret information bit is extracted in each non-central pixel in image block, extraction obtains secret information;Wherein, m'=m'+1 In "=" be assignment;
It is 3. _ 2_7, hidden to every in the obtained secret information of extraction using the value of each element in the 6th random sequence Secret information bit, which corresponds, carries out XOR decryption, obtains the secret information of XOR decryption, the final secret obtained as extraction Information;
The third situation is that the existing image watermarking key of receiving terminal has encryption key again, first to the encrypted domain containing secret information Image carry out secret information extraction, after to secret information extract after encryption area image be decrypted, detailed process is:
3. the width and height of _ 3_1, encryption area image containing secret information correspond to W and H, by containing secret information plus Close area image is divided intoThe size of individual non-overlapping copies is g × g image block;Wherein, symbolFor to Under round symbol;
Input parameter using the 3rd key key3 as random () function, random () function is set to produce one the 6th Random sequence;Wherein, the value of each element in the 6th random sequence is 0 or 1;
3. _ 3_2, the m' image block currently pending in the encryption area image containing secret information be defined as currently scheming As block;Wherein, m' is positive integer, and m' initial value is 1,
3. _ 3_3, calculate the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block Pixel value difference to the values of 256 modulus, by the pixel value of s-th of non-central pixel in current image block and middle imago The difference of the pixel value of vegetarian refreshments is designated as to the value of 256 modulus Its In, s is positive integer, and s initial value is 1,1≤s≤g × g-1,Represent s-th of non-central picture in current image block The pixel value of vegetarian refreshments,The pixel value of the central pixel point in current image block is represented, if the size of current image block is big Small is 2 × 2, then specifies any one pixel in current image block as central pixel point, and rest of pixels point is as in non- Imago vegetarian refreshments, mod are modulus symbol;
3. _ 3_4, according to step 3. _ 3_3 in g × g-1 value being calculated, determine the secret information of current image block Region is extracted, is designated as Wherein, symbol " ∪ " accords with for union operation Number,
3. _ 3_5, secret information bit extraction is carried out to g × g-1 non-central pixels in current image block, specifically Process is:For s-th of non-central pixel in current image block, if by step 3. _ 3_3 is calculatedIt is full Foot:Then whenDuring equal to 0, the secret information bit for extracting to obtain is " 0 ", WhenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";If by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, obtained secret information ratio is extracted Specially for " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";
3. _ 3_6, carrying out recovery operation to g × g-1 non-central pixels in current image block, detailed process is:It is right S-th of non-central pixel in current image block, if by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, order WhenDuring equal to 1, orderIf by step 3. _ 3_3 count ObtainMeet:Then whenDuring equal to 0, orderWhenDuring equal to 0, order If by step 3. _ 3_3 is calculatedMeet:Then makeIf by step 3. _ 3_3 is calculatedMeet:Then makeWherein, symbolTo round symbol downwards, WithIn "=" be assignment;
3. _ 3_7, m'=m'+1 is made, then by next pending image block in the encryption area image containing secret information As current image block, return again to step 3. _ 3_3 continues executing with, until from each in the encryption area image containing secret information Secret information bit is extracted in each non-central pixel in image block, obtains the encrypted domain figure after secret information extraction Picture, and extract and obtain secret information;Wherein, "=" in m'=m'+1 is assignment;
It is 3. _ 3_8, hidden to every in the obtained secret information of extraction using the value of each element in the 6th random sequence Secret information bit, which corresponds, carries out XOR decryption, obtains the secret information of XOR decryption, the final secret obtained as extraction Information;
3. the width and height of the encryption area image after the extraction of _ 3_9, secret information correspond to W and H, if W × H can Divided exactly by g × g, then the encryption area image after secret information is extracted is divided intoThe size of individual non-overlapping copies is g × g image block;If W × H can not be divided exactly by g × g, the encryption area image after secret information is extracted is divided intoThe size of individual non-overlapping copies is g × g image block, and the encryption area image after secret information is extracted Right and lower section size are not that g × g block also serves as image block, are sharedIndividual image block;Wherein, g value For 2 or 3, symbolTo round symbol, symbol downwardsFor the symbol that rounds up;
3. _ 3_10, the input parameter using the second key key2 as random () function, produce random () function One the 5th random sequence;Wherein, the length of the 5th random sequence is Count, the value of each element in the 5th random sequence For the integer in [0, Count], the value of all elements in the 5th random sequence does not repeat and is in random distribution;
3. _ 3_11, using the 5th random sequence to secret information extract after encryption area image in all sizes Scramble is carried out for g × g image block, obtains the encryption area image after scramble;
3. _ 3_12, the input parameter using first key key1 as random () function, produce random () function One the 4th random sequence;Wherein, the value of each element in the 4th random sequence is the integer in [0,255];
3. _ 3_13, m-th of image block currently pending in the encryption area image after scramble will be gone to be defined as present image Block, it is currentElement by j-th of the element definition currently taken out from the 4th random sequence;Wherein, m and j is positive integer, m Initial value with j is 1, and 1≤m≤M, M represent to go in the encryption area image after scramble the total number of the image block included, 1≤j ≤ J, J represent the length of the 4th random sequence;
3. _ 3_14, using currentElement each pixel in current image block is decrypted, in current image block The process that is decrypted of ith pixel point be:By the pixel value of the ith pixel point in current image block and currentElement Value subtract each other after to 256 modulus, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1 ≤i≤Icur, IcurRepresent the total number of pixel included in current image block;
3. _ 3_15, making m=m+1, and j=j+1 is made, next pending figure in the encryption area image after scramble will be removed Picture block, using next element taken out from the 4th random sequence as currentElement, is then back to step as current image block Suddenly 3. _ 3_14 is continued executing with, until all image blocks in the encryption area image after removing scramble are disposed, completes image decryption Process, obtain secret information extraction after decryption area image;Wherein, "=" in m=m+1 and j=j+1 is assignment.
Compared with prior art, the advantage of the invention is that:
1) the inventive method uses double-encryption mechanism in image encryption part, i.e., first divides the image into image block, After the pixel value of each pixel in each image block is added with the value of an element in the random sequence for encrypting To 256 modulus;Then line shuffle is entered to all image blocks after encryption, double-encryption enhances the security of the inventive method.
2) the inventive method can be embedded in secret information directly in the image of encryption, even if image watermarking person does not know original Beginning picture material, it is possibility to have effect ground solves the problems, such as picture material safety and privacy leakage, and image encryption person and concealed letter Without complicated agreement between breath insertion person, and embedding capacity is big, and encryption is embedded in data will not also cause the swollen of view data It is swollen.
3) the inventive method is practical, can be directly in ciphertext area image if receiving terminal has image watermarking key The hiding secret information of extraction;If receiving terminal has encryption key, it can directly decrypt and obtain approximate original image;If connect Receiving end has image watermarking key and encryption key simultaneously, then can ensure after the hiding secret information of extraction, can be without distortions Recover original image.
Brief description of the drawings
Fig. 1 a are the schematic diagram that β values are 0 time shift 1;
Fig. 1 b are the schematic diagram that β values are 1 time shift 2;
Fig. 2 realizes block diagram for the totality of image encryption and encryption area image hiding reversible data;
Fig. 3 is that receiving terminal only has encryption key, and only the encryption area image containing secret information is decrypted;And receiving terminal was both There is image watermarking key to have encryption key again, first to containing secret information encryption area image carry out secret information extraction, after to hidden The totality that encryption area image after secret information extraction is decrypted realizes block diagram.
Embodiment
The present invention is described in further detail below in conjunction with accompanying drawing embodiment.
Embodiment one:
A kind of encryption area image reversible data concealing method for double-encryption that the present embodiment proposes, it includes image and added Close, encryption area image hiding reversible data, the extraction of concealed data and original image Distortionless three parts;Wherein,
As shown in Fig. 2 the processing procedure of image encryption part is:
1. the width and height that _ 1, set original image to be encrypted correspond to W and H, if W × H can be whole by g × g Remove, be then divided into original image to be encryptedThe size of individual non-overlapping copies is g × g image block;If W × H can not be divided exactly by g × g, then be divided into original image to be encryptedThe size of individual non-overlapping copies is g × g image block, and the right of original image to be encrypted and lower section size are not also served as into image block for g × g block, It is sharedIndividual image block;Wherein, g value is 2 or 3, symbolTo round symbol, symbol downwardsFor Round up symbol.
1. _ 2, set a first key key1;Then join first key key1 as the input of random () function Number, random () function is set to produce first random sequence;Wherein, first key is a text, the first random sequence Length is more than the total number of image block included in original image to be encrypted, and the value of each element in the first random sequence is [0,255] integer in.
1. m-th of image block currently pending in original image to be encrypted _ 3, is defined as current image block, ought Preceding j-th of the element definition taken out from the first random sequence is currentElement;Wherein, m and j is positive integer, m and j just Initial value is 1, and 1≤m≤M, M represent the total number of the image block included in original image to be encrypted, 1. _ 1 can according to step Know,Or1≤j≤J, J represent the length of the first random sequence, J >=M.
1. _ 4, each pixel in current image block is encrypted using currentElement, in current image block The process that ith pixel point is encrypted is:By the pixel value of ith pixel point and the value of currentElement in current image block To 256 modulus after addition, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1≤i ≤Icur, IcurRepresent the total number of pixel included in current image block, the I if g=2curValue be 4 or 2 or 1, if g=3 Then IcurValue be 9 or 6 or 4 or 3 or 2 or 1.
1. _ 5, making m=m+1, and make j=j+1, using next pending image block in original image to be encrypted as Current image block, using next element taken out from the first random sequence as currentElement, be then back to step 1. _ 4 after It is continuous to perform, until all image blocks in original image to be encrypted are disposed, obtain one-time pad encryption image;Wherein, m=m+ "=" in 1 and j=j+1 is assignment.
1. _ 6, counting the total number for the image block that the size included in one-time pad encryption image is g × g, it is designated as Count, according to step 1. _ 1 it can be seen from,OrAnd set second key key2;Then the input parameter using the second key key2 as random () function, random () function is made to produce one second Random sequence;Wherein, the second key is the text that another is differed with first key, and the length of the second random sequence is Count, the value of each element in the second random sequence are the integer in [0, Count], all members in the second random sequence The value of element does not repeat and is in random distribution.
1. _ 7, the image block that all sizes in one-time pad encryption image are g × g is carried out using the second random sequence Scramble, the double-encryption process of original image is so far completed, obtain the encryption area image of double-encryption;It is above-mentioned, first key Key1 and the second key key2 is encryption key.
As shown in Fig. 2 the processing procedure of encryption area image hiding reversible data part is:
2. _ 1, the encryption area image of double-encryption is divided intoThe size of individual non-overlapping copies is g × g Image block;Wherein, symbolTo round symbol downwards.
A the 3rd key key3 is set as image watermarking key;Then using the 3rd key key3 as random () letter Several input parameters, random () function is set to produce the 3rd random sequence;Recycle each member in the 3rd random sequence The value of element corresponds to every secret information bit in original secret information and carries out XOR encryption, obtains the hidden of XOR encryption Secret information, as secret information to be embedded;Wherein, the 3rd key differs for another with first key and the second key Text, the length of the 3rd random sequence are more than or equal to the length of original secret information, and each member in the 3rd random sequence The value of element is 0 or 1.
2. the m' image block currently pending in the encryption area image of double-encryption _ 2, is defined as present image Block;Wherein, m' is positive integer, and m' initial value is 1,
2. _ 3, calculate the respective pixel value of the non-central pixels of g × g-1 in current image block and central pixel point The difference of pixel value is to the values of 256 modulus, by the pixel value and center pixel of s-th of non-central pixel in current image block The difference of the pixel value of point is designated as f to the value of 256 moduluscur(s), fcur(s)=(hcur(s)-hcur,center)mod 256;Its In, s is positive integer, and s initial value is 1,1≤s≤g × g-1, hcur(s) s-th of non-central picture in current image block is represented The pixel value of vegetarian refreshments, hcur,centerThe pixel value of the central pixel point in current image block is represented, if the size of current image block Size is 2 × 2, then specifying any one pixel in current image block, rest of pixels point is as non-as central pixel point Central pixel point, mod are modulus symbol.
2. _ 4, according to step 2. _ 3 in g × g-1 value being calculated, determine the secret information insertion of current image block Region, it is designated as Zcur, Zcur=[Tp,Tp+β]∪[Tn-β,Tn];Wherein, symbol " ∪ " is union operation symbol, Tp=0, Tn= 255, β represent regulatory factor, and β value is the integer more than or equal to 0, and β value is bigger, can lift embedding capacity, but together When can be embedded in image after secret information distortion it is bigger, therefore generally can use β is 0 or 1 or 2.
2. _ 5, for step 2. _ 3 in g × g-1 value being calculated, be handled as follows:2. _ 3 fallen into a trap for step Obtained fcur(s), if fcur(s) it is more than Tp+ β, then correct fcur(s), process is:Make f'cur(s)=fcur(s)+(β+1), F is made againcur(s)=f'cur(s);If fcur(s) it is less than Tn- β, then correct fcur(s), process is:Make f'cur(s)=fcur(s)-(β + 1), then f is madecur(s)=f'cur(s);If fcur(s)∈Zcur, then f is keptcur(s) it is constant;Wherein, f'cur(s) in be introduced into Between variable, fcur(s)=f'cur(s) "=" in is assignment;The actual process for displacement of the step, Fig. 1 a give β and taken It is worth the schematic diagram for 0 time shift 1;Fig. 1 b give the schematic diagram that β values are 1 time shift 2.
2. secret information bit insertion, specific mistake _ 6, are carried out to g × g-1 non-central pixels in current image block Cheng Wei:For s-th of non-central pixel in current image block, if by step 2. _ 5 in g × g-1 value determining S-th of value fcur(s) meet:fcur(s)∈[Tn-β,Tn], then when secret information bit to be embedded is " 0 ", make f "cur(s) =fcur(s)-(Tn-fcur(s)), then to hcur(s) it is modified to complete the insertion of secret information bit, process is:Order h'cur(s)=(f "cur(s)+hcur,center) mod 256, then make hcur(s)=h'cur(s);When secret information bit to be embedded For " 1 " when, make f "cur(s)=fcur(s)-(Tn-fcur(s)) -1, then to hcur(s) it is modified to complete secret information ratio Special insertion, process are:Make h'cur(s)=(f "cur(s)+hcur,center) mod 256, then make hcur(s)=h'cur(s);If through S-th of value f in the g × g-1 value determined in crossing step 2. _ 5cur(s) meet:fcur(s)∈[Tp,Tp+ β], then when to be embedded Secret information bit when being " 0 ", make f "cur(s)=fcur(s)+(fcur(s)-Tp), then to hcur(s) it is modified with complete Into the insertion of secret information bit, process is:Make h'cur(s)=(f "cur(s)+hcur,center) mod 256, then make hcur(s)= h'cur(s);When secret information bit to be embedded is " 1 ", f "cur(s)=fcur(s)+(fcur(s)-Tp)+1, then to hcur (s) it is modified to complete the insertion of secret information bit, process is:Make h'cur(s)=(f "cur(s)+hcur,center)mod 256, then make hcur(s)=h'cur(s);Wherein, f "curAnd h' (s)cur(s) be introducing intermediate variable, hcur(s)=h'cur (s) "=" in is assignment.
2. _ 7, make m'=m'+1, then using double-encryption encryption area image in next pending image block as Current image block, return again to step and 2. _ 3 continue executing with, until in each image block in the encryption area image of double-encryption Each non-central pixel is embedded with secret information bit, obtains the encryption area image containing secret information;Wherein, in m'=m'+1 "=" be assignment.
As shown in figure 3, concealed data extraction and original image Distortionless part, the first situation is that receiving terminal only adds Key, only the encryption area image containing secret information is decrypted, detailed process is:
3. the width and height of _ 1_1, encryption area image containing secret information correspond to W and H, if W × H can by g × G is divided exactly, then is divided into the encryption area image containing secret informationThe size of individual non-overlapping copies is g × g image Block;If W × H can not be divided exactly by g × g, the encryption area image containing secret information is divided intoIt is individual mutually not Overlapping size is g × g image block, and by the right of the encryption area image containing secret information and lower section size not Image block is also served as g × g block, is sharedIndividual image block;Wherein, g value is 2 or 3, symbolFor to Under round symbol, symbolFor the symbol that rounds up.
3. _ 1_2, the input parameter using the second key key2 as random () function, random () function is set to produce one Individual 5th random sequence;Wherein, the length of the 5th random sequence is Count, and the value of each element in the 5th random sequence is Integer in [0, Count], the value of all elements in the 5th random sequence do not repeat and are in random distribution;Due to key phase Together, therefore the 5th random sequence is identical with the second random sequence.
3. _ 1_3, using the 5th random sequence it is g × g to all sizes in the encryption area image containing secret information Image block carry out scramble, obtain the encryption area image after scramble.
3. _ 1_4, the input parameter using first key key1 as random () function, random () function is set to produce one Individual 4th random sequence;Wherein, the length of the 4th random sequence is more than the image block included in the encryption area image after removing scramble Total number, the value of each element in the 4th random sequence is the integer in [0,255];Because key is identical, therefore the 4th Random sequence is identical with the first random sequence.
3. _ 1_5, m-th of image block currently pending in the encryption area image after scramble will be gone to be defined as present image Block, it is currentElement by j-th of the element definition currently taken out from the 4th random sequence;Wherein, m and j is positive integer, m Initial value with j is 1, and 1≤m≤M, M represent to go in the encryption area image after scramble the total number of the image block included, according to Step 1. _ 1 understand,Or1≤j≤J, J represent the length of the 4th random sequence, J >=M.
3. _ 1_6, using currentElement each pixel in current image block is decrypted, in current image block The process that is decrypted of ith pixel point be:By the pixel value of the ith pixel point in current image block and currentElement Value subtract each other after to 256 modulus, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1 ≤i≤Icur, IcurRepresent the total number of pixel included in current image block, the I if g=2curValue be 4 or 2 or 1, if g =3 IcurValue be 9 or 6 or 4 or 3 or 2 or 1.
3. _ 1_7, making m=m+1, and j=j+1 is made, next pending image in the encryption area image after scramble will be removed Block, using next element taken out from the 4th random sequence as currentElement, is then back to step as current image block 3. _ 1_6 is continued executing with, until all image blocks in the encryption area image after removing scramble are disposed, image decryption is completed Process, obtain the decryption area image containing secret information;Wherein, "=" in m=m+1 and j=j+1 is assignment.
Embodiment two:
A kind of encryption area image reversible data concealing method for double-encryption that the present embodiment proposes, its image encryption part With image encryption part of the encryption area image hiding reversible data part with embodiment one and encryption area image hiding reversible data Part is identical, the difference is that only concealed data extraction and original image Distortionless part, in the present embodiment receiving terminal Only image watermarking key, only carries out secret information extraction to the encryption area image containing secret information, and detailed process is:
3. the width and height of _ 2_1, encryption area image containing secret information correspond to W and H, by containing secret information plus Close area image is divided intoThe size of individual non-overlapping copies is g × g image block;Wherein, symbolFor to Under round symbol.
Input parameter using the 3rd key key3 as random () function, random () function is set to produce one the 6th Random sequence;Wherein, the value of each element in the 6th random sequence is 0 or 1.
3. _ 2_2, the m' image block currently pending in the encryption area image containing secret information be defined as currently scheming As block;Wherein, m' is positive integer, and m' initial value is 1,
3. _ 2_3, calculate the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block Pixel value difference to the values of 256 modulus, by the pixel value of s-th of non-central pixel in current image block and middle imago The difference of the pixel value of vegetarian refreshments is designated as to the value of 256 modulus Its In, s is positive integer, and s initial value is 1,1≤s≤g × g-1,Represent s-th of non-central picture in current image block The pixel value of vegetarian refreshments,The pixel value of the central pixel point in current image block is represented, if the size of current image block is big Small is 2 × 2, then specifies any one pixel in current image block as central pixel point, and rest of pixels point is as in non- Imago vegetarian refreshments, mod are modulus symbol.
3. _ 2_4, according to step 3. _ 2_3 in g × g-1 value being calculated, determine the secret information of current image block Region is extracted, is designated as Wherein, symbol " ∪ " accords with for union operation Number,
3. _ 2_5, secret information bit extraction is carried out to g × g-1 non-central pixels in current image block, specifically Process is:For s-th of non-central pixel in current image block, if by step 3. _ 2_3 is calculatedIt is full Foot:Then whenDuring equal to 0, the secret information bit for extracting to obtain is " 0 ", WhenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";If by step 3. _ 2_3 is calculatedMeet:Then whenDuring equal to 0, obtained secret information ratio is extracted Specially for " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ".
3. _ 2_6, m'=m'+1 is made, then by next pending image block in the encryption area image containing secret information As current image block, return again to step 3. _ 2_3 continues executing with, until from each in the encryption area image containing secret information Secret information bit is extracted in each non-central pixel in image block, extraction obtains secret information;Wherein, m'=m'+1 In "=" be assignment.
It is 3. _ 2_7, hidden to every in the obtained secret information of extraction using the value of each element in the 6th random sequence Secret information bit, which corresponds, carries out XOR decryption, obtains the secret information of XOR decryption, the final secret obtained as extraction Information.
Embodiment three:
A kind of encryption area image reversible data concealing method for double-encryption that the present embodiment proposes, its image encryption part Image encryption part and encryption area image with encryption area image hiding reversible data part and embodiment one or embodiment two can Reverse data hidden parts are identical, concealed data extraction and original image Distortionless part the difference is that only, in this implementation In example, as shown in figure 3, the existing image watermarking key of receiving terminal has encryption key, first to the encryption area image containing secret information again Carry out secret information extraction, after to secret information extract after encryption area image be decrypted, detailed process is:
3. the width and height of _ 3_1, encryption area image containing secret information correspond to W and H, by containing secret information plus Close area image is divided intoThe size of individual non-overlapping copies is g × g image block;Wherein, symbolFor to Under round symbol.
Input parameter using the 3rd key key3 as random () function, random () function is set to produce one the 6th Random sequence;Wherein, the value of each element in the 6th random sequence is 0 or 1.
3. _ 3_2, the m' image block currently pending in the encryption area image containing secret information be defined as currently scheming As block;Wherein, m' is positive integer, and m' initial value is 1,
3. _ 3_3, calculate the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block Pixel value difference to the values of 256 modulus, by the pixel value of s-th of non-central pixel in current image block and middle imago The difference of the pixel value of vegetarian refreshments is designated as to the value of 256 modulus Its In, s is positive integer, and s initial value is 1,1≤s≤g × g-1,Represent s-th of non-central pixel in current image block The pixel value of point,The pixel value of the central pixel point in current image block is represented, if the size of current image block For 2 × 2, then specifying any one pixel in current image block, rest of pixels point is as non-central as central pixel point Pixel, mod are modulus symbol.
3. _ 3_4, according to step 3. _ 3_3 in g × g-1 value being calculated, determine the secret information of current image block Region is extracted, is designated as Wherein, symbol " ∪ " accords with for union operation Number,
3. _ 3_5, secret information bit extraction is carried out to g × g-1 non-central pixels in current image block, specifically Process is:For s-th of non-central pixel in current image block, if by step 3. _ 3_3 is calculatedIt is full Foot:Then whenDuring equal to 0, the secret information bit for extracting to obtain is " 0 ", WhenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";If by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, obtained secret information ratio is extracted Specially for " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ".
3. _ 3_6, carrying out recovery operation to g × g-1 non-central pixels in current image block, detailed process is:It is right S-th of non-central pixel in current image block, if by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, order WhenDuring equal to 1, orderIf by step 3. _ 3_3 count ObtainMeet:Then whenDuring equal to 0, orderWhenDuring equal to 0, order If by step 3. _ 3_3 is calculatedMeet:Then makeIf by step 3. _ 3_3 is calculatedMeet:Then makeWherein, symbolTo round symbol downwards, WithIn "=" be assignment.
3. _ 3_7, m'=m'+1 is made, then by next pending image block in the encryption area image containing secret information As current image block, return again to step 3. _ 3_3 continues executing with, until from each in the encryption area image containing secret information Secret information bit is extracted in each non-central pixel in image block, obtains the encrypted domain figure after secret information extraction Picture, and extract and obtain secret information;Wherein, "=" in m'=m'+1 is assignment.
It is 3. _ 3_8, hidden to every in the obtained secret information of extraction using the value of each element in the 6th random sequence Secret information bit, which corresponds, carries out XOR decryption, obtains the secret information of XOR decryption, the final secret obtained as extraction Information.
3. the width and height of the encryption area image after the extraction of _ 3_9, secret information correspond to W and H, if W × H can Divided exactly by g × g, then the encryption area image after secret information is extracted is divided intoThe size of individual non-overlapping copies is g × g image block;If W × H can not be divided exactly by g × g, the encryption area image after secret information is extracted is divided intoThe size of individual non-overlapping copies is g × g image block, and the encryption area image after secret information is extracted Right and lower section size are not that g × g block also serves as image block, are sharedIndividual image block;Wherein, g value For 2 or 3, symbolTo round symbol, symbol downwardsFor the symbol that rounds up.
3. _ 3_10, the input parameter using the second key key2 as random () function, produce random () function One the 5th random sequence;Wherein, the length of the 5th random sequence is Count, the value of each element in the 5th random sequence For the integer in [0, Count], the value of all elements in the 5th random sequence does not repeat and is in random distribution;Due to key phase Together, therefore the 5th random sequence is identical with the second random sequence.
3. _ 3_11, using the 5th random sequence to secret information extract after encryption area image in all sizes Scramble is carried out for g × g image block, obtains the encryption area image after scramble.
3. _ 3_12, the input parameter using first key key1 as random () function, produce random () function One the 4th random sequence;Wherein, the value of each element in the 4th random sequence is the integer in [0,255];Due to key It is identical, therefore the 4th random sequence is identical with the first random sequence.
3. _ 3_13, m-th of image block currently pending in the encryption area image after scramble will be gone to be defined as present image Block, it is currentElement by j-th of the element definition currently taken out from the 4th random sequence;Wherein, m and j is positive integer, m Initial value with j is 1, and 1≤m≤M, M represent to go in the encryption area image after scramble the total number of the image block included,Or1≤j≤J, J represent the length of the 4th random sequence, J >=M.
3. _ 3_14, using currentElement each pixel in current image block is decrypted, in current image block The process that is decrypted of ith pixel point be:By the pixel value of the ith pixel point in current image block and currentElement Value subtract each other after to 256 modulus, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1 ≤i≤Icur, IcurRepresent the total number of pixel included in current image block, the I if g=2curValue be 4 or 2 or 1, if g =3 IcurValue be 9 or 6 or 4 or 3 or 2 or 1.
3. _ 3_15, making m=m+1, and j=j+1 is made, next pending figure in the encryption area image after scramble will be removed Picture block, using next element taken out from the 4th random sequence as currentElement, is then back to step as current image block Suddenly 3. _ 3_14 is continued executing with, until all image blocks in the encryption area image after removing scramble are disposed, completes image decryption Process, obtain secret information extraction after decryption area image;Wherein, "=" in m=m+1 and j=j+1 is assignment.

Claims (1)

1. the encryption area image reversible data concealing method of a kind of double-encryption, it is characterised in that including image encryption, encrypted domain Image hiding reversible data, the extraction of concealed data and original image Distortionless three parts;Wherein,
The processing procedure of described image encryption part is:
1. the width and height that _ 1, set original image to be encrypted correspond to W and H, if W × H can be divided exactly by g × g, Original image to be encrypted is divided intoThe size of individual non-overlapping copies is g × g image block;If W × H can not It is enough to be divided exactly by g × g, then original image to be encrypted is divided intoThe size of individual non-overlapping copies is g × g's Image block, and the right of original image to be encrypted and lower section size are not also served as into image block for g × g block, shareIndividual image block;Wherein, g value is 2 or 3, symbolTo round symbol, symbol downwardsTo be upward Round symbol;
1. _ 2, set a first key key1;Then the input parameter using first key key1 as random () function, makes Random () function produces first random sequence;Wherein, the length of the first random sequence is more than original image to be encrypted In the total number of image block that includes, the value of each element in the first random sequence is the integer in [0,255];
1. m-th of image block currently pending in original image to be encrypted _ 3, is defined as current image block, will currently from J-th of the element definition taken out in first random sequence is currentElement;Wherein, m and j is the initial value of positive integer, m and j Be 1,1≤m≤M, M represent the total number of the image block included in original image to be encrypted, 1≤j≤J, J represent first with The length of machine sequence;
1. _ 4, each pixel in current image block is encrypted using currentElement, to i-th in current image block The process that pixel is encrypted is:The pixel value of ith pixel point in current image block is added with the value of currentElement Afterwards to 256 modulus, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1≤i≤ Icur, IcurRepresent the total number of pixel included in current image block;
1. _ 5, making m=m+1, and j=j+1 is made, using next pending image block in original image to be encrypted as current Image block, using next element taken out from the first random sequence as currentElement, it is then back to step and 1. _ 4 continues to hold OK, until all image blocks in original image to be encrypted are disposed, one-time pad encryption image is obtained;Wherein, m=m+1 and j "=" in=j+1 is assignment;
1. _ 6, counting the total number for the image block that the size included in one-time pad encryption image is g × g, Count is designated as;And Set a second key key2;Then the input parameter using the second key key2 as random () function, makes random () Function produces second random sequence;Wherein, the length of the second random sequence is Count, each in the second random sequence The value of element is the integer in [0, Count], and the value of all elements in the second random sequence does not repeat and is in random distribution;
1. _ 7, the image block that all sizes in one-time pad encryption image are g × g is put using the second random sequence Disorderly, the double-encryption process of original image is so far completed, obtains the encryption area image of double-encryption;It is above-mentioned, first key Key1 and the second key key2 is encryption key;
The processing procedure of described encryption area image hiding reversible data part is:
2. _ 1, the encryption area image of double-encryption is divided intoThe size of individual non-overlapping copies is g × g figure As block;Wherein, symbolTo round symbol downwards;
A the 3rd key key3 is set as image watermarking key;Then using the 3rd key key3 as random () function Input parameter, random () function is set to produce the 3rd random sequence;Recycle each element in the 3rd random sequence It is worth to correspond every secret information bit in original secret information and carries out XOR encryption, obtains the concealed letter of XOR encryption Breath, as secret information to be embedded;Wherein, the length of the 3rd random sequence is more than or equal to the length of original secret information, And the value of the 3rd each element in random sequence is 0 or 1;
2. the m' image block currently pending in the encryption area image of double-encryption _ 2, is defined as current image block;Its In, m' is positive integer, and m' initial value is 1,
2. _ 3, calculate the pixel of the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block The difference of value is to the values of 256 modulus, by the pixel value of s-th of non-central pixel in current image block and central pixel point The difference of pixel value is designated as f to the value of 256 moduluscur(s), fcur(s)=(hcur(s)-hcur,center)mod256;Wherein, s is Positive integer, s initial value is 1,1≤s≤g × g-1, hcur(s) s-th of non-central pixel in current image block is represented Pixel value, hcur,centerThe pixel value of the central pixel point in current image block is represented, if the size of current image block is 2 × 2, then specifying any one pixel in current image block, rest of pixels point is as non-central pixel as central pixel point Point, mod are modulus symbol;
2. _ 4, according to step 2. _ 3 in g × g-1 value being calculated, determine the secret information insertion region of current image block, It is designated as Zcur, Zcur=[Tp,Tp+β]∪[Tn-β,Tn];Wherein, symbol " ∪ " is union operation symbol, Tp=0, Tn=255, β table Show regulatory factor, β value is the integer more than or equal to 0;
2. _ 5, for step 2. _ 3 in g × g-1 value being calculated, be handled as follows:For step 2. _ 3 in calculate The f arrivedcur(s), if fcur(s) it is more than Tp+ β, then correct fcur(s), process is:Make f'cur(s)=fcur(s)+(β+1), then make fcur(s)=f'cur(s);If fcur(s) it is less than Tn- β, then correct fcur(s), process is:Make f'cur(s)=fcur(s)-(β+1), F is made againcur(s)=f'cur(s);If fcur(s)∈Zcur, then f is keptcur(s) it is constant;Wherein, f'cur(s) the middle anaplasia to be introduced into Amount, fcur(s)=f'cur(s) "=" in is assignment;
2. _ 6, carrying out secret information bit insertion to g × g-1 non-central pixels in current image block, detailed process is: For s-th of non-central pixel in current image block, if by step 2. _ 5 in s-th in g × g-1 value determining Value fcur(s) meet:fcur(s)∈[Tn-β,Tn], then when secret information bit to be embedded is " 0 ", make f "cur(s)=fcur (s)-(Tn-fcur(s)), then to hcur(s) it is modified to complete the insertion of secret information bit, process is:Make h'cur(s) =(f "cur(s)+hcur,center) mod256, then make hcur(s)=h'cur(s);When secret information bit to be embedded is " 1 ", Make f "cur(s)=fcur(s)-(Tn-fcur(s)) -1, then to hcur(s) it is modified to complete the insertion of secret information bit, Process is:Make h'cur(s)=(f "cur(s)+hcur,center) mod256, then make hcur(s)=h'cur(s);If by step 2. _ 5 S-th of value f in g × g-1 value of middle determinationcur(s) meet:fcur(s)∈[Tp,Tp+ β], then when secret information to be embedded When bit is " 0 ", f " is madecur(s)=fcur(s)+(fcur(s)-Tp), then to hcur(s) it is modified to complete secret information The insertion of bit, process are:Make h'cur(s)=(f "cur(s)+hcur,center) mod256, then make hcur(s)=h'cur(s);When When secret information bit to be embedded is " 1 ", f "cur(s)=fcur(s)+(fcur(s)-Tp)+1, then to hcur(s) repaiied Just to complete the insertion of secret information bit, process is:Make h'cur(s)=(f "cur(s)+hcur,center) mod256, then make hcur (s)=h'cur(s);Wherein, f "curAnd h' (s)cur(s) be introducing intermediate variable, hcur(s)=h'cur(s) "=" in For assignment;
2. m'=m'+1 _ 7, is made, then using next pending image block in the encryption area image of double-encryption as current Image block, return again to step and 2. _ 3 continue executing with, until each in each image block in the encryption area image of double-encryption Non-central pixel is embedded with secret information bit, obtains the encryption area image containing secret information;Wherein, in m'=m'+1 "=" is assignment;
There are three kinds of situations described concealed data extraction and original image Distortionless part:
The first situation is that receiving terminal only has encryption key, only the encryption area image containing secret information is decrypted, specific mistake Cheng Wei:
3. the width and height of _ 1_1, encryption area image containing secret information correspond to W and H, if W × H can be whole by g × g Remove, be then divided into the encryption area image containing secret informationThe size of individual non-overlapping copies is g × g image block; If W × H can not be divided exactly by g × g, the encryption area image containing secret information is divided intoIndividual non-overlapping copies Size be g × g image block, and be not g by the right of the encryption area image containing secret information and lower section size × g block also serves as image block, sharesIndividual image block;Wherein, g value is 2 or 3, symbolTo take downwards Integral symbol, symbolFor the symbol that rounds up;
3. _ 1_2, the input parameter using the second key key2 as random () function, random () function is set to produce one the Five random sequences;Wherein, the length of the 5th random sequence is Count, the value of each element in the 5th random sequence for [0, Count] in integer, the value of all elements in the 5th random sequence do not repeat and is in random distribution;
3. _ 1_3, the figure for being g × g to all sizes in the encryption area image containing secret information using the 5th random sequence As block carries out scramble, the encryption area image after scramble is obtained;
3. _ 1_4, the input parameter using first key key1 as random () function, random () function is set to produce one the Four random sequences;Wherein, the length of the 4th random sequence is total more than the image block included in the encryption area image after removing scramble Number, the value of each element in the 4th random sequence is the integer in [0,255];
3. _ 1_5, m-th of image block currently pending in the encryption area image after scramble will be gone to be defined as current image block, will J-th of the element definition currently taken out from the 4th random sequence is currentElement;Wherein, m and j is positive integer, m and j's Initial value is 1, and 1≤m≤M, M represent to go in the encryption area image after scramble the total number of the image block included, 1≤j≤J, J Represent the length of the 4th random sequence;
3. _ 1_6, using currentElement each pixel in current image block is decrypted, to i-th in current image block The process that individual pixel is decrypted is:By the value phase of the pixel value and currentElement of the ith pixel point in current image block To 256 modulus after subtracting, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1≤i≤ Icur, IcurRepresent the total number of pixel included in current image block;
3. _ 1_7, making m=m+1, and j=j+1 is made, next pending image block in area image of encrypting after scramble will be gone to make For current image block, using next element taken out from the 4th random sequence as currentElement, be then back to step 3. _ 1_ 6 continue executing with, until all image blocks in the encryption area image after removing scramble are disposed, complete the process of image decryption, Obtain the decryption area image containing secret information;Wherein, "=" in m=m+1 and j=j+1 is assignment;
Second of situation is that receiving terminal only has image watermarking key, only carries out secret information to the encryption area image containing secret information Extraction, detailed process are:
3. the width and height of _ 2_1, encryption area image containing secret information correspond to W and H, by the encrypted domain containing secret information Image is divided intoThe size of individual non-overlapping copies is g × g image block;Wherein, symbolTo be downward Round symbol;
Input parameter using the 3rd key key3 as random () function, make random () function produce one it is the 6th random Sequence;Wherein, the value of each element in the 6th random sequence is 0 or 1;
3. _ 2_2, the m' image block currently pending in the encryption area image containing secret information be defined as present image Block;Wherein, m' is positive integer, and m' initial value is 1,
3. _ 2_3, the picture for calculating the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block The difference of element value is to the values of 256 modulus, by the pixel value and central pixel point of s-th of non-central pixel in current image block The difference of pixel value the value of 256 modulus is designated as Wherein, s For positive integer, s initial value is 1,1≤s≤g × g-1,Represent s-th of non-central pixel in current image block Pixel value,The pixel value of the central pixel point in current image block is represented, if the size of current image block is 2 × 2, then specifying any one pixel in current image block, rest of pixels point is as non-central pixel as central pixel point Point, mod are modulus symbol;
3. _ 2_4, according to step 3. _ 2_3 in g × g-1 value being calculated, determine the secret information extraction of current image block Region, it is designated as Wherein, symbol " ∪ " is union operation symbol,
3. _ 2_5, secret information bit extraction, detailed process are carried out to g × g-1 non-central pixels in current image block For:For s-th of non-central pixel in current image block, if by step 3. _ 2_3 is calculatedMeet:Then whenDuring equal to 0, the secret information bit for extracting to obtain is " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";If by step 3. _ 2_3 is calculatedMeet:Then whenDuring equal to 0, obtained secret information ratio is extracted Specially for " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";
3. _ 2_6, make m'=m'+1, then using containing secret information encryption area image in next pending image block as Current image block, return again to step 3. _ 2_3 continues executing with, until from each image in the encryption area image containing secret information Secret information bit is extracted in each non-central pixel in block, extraction obtains secret information;Wherein, in m'=m'+1 "=" is assignment;
3. every secret in _ 2_7, the secret information obtained using the value of each element in the 6th random sequence to extraction is believed Cease bit and correspond progress XOR decryption, obtain the secret information of XOR decryption, the final secret information obtained as extraction;
The third situation is that the existing image watermarking key of receiving terminal has encryption key again, first to the encryption area image containing secret information Carry out secret information extraction, after to secret information extract after encryption area image be decrypted, detailed process is:
3. the width and height of _ 3_1, encryption area image containing secret information correspond to W and H, by the encrypted domain containing secret information Image is divided intoThe size of individual non-overlapping copies is g × g image block;Wherein, symbolTo take downwards Integral symbol;
Input parameter using the 3rd key key3 as random () function, make random () function produce one it is the 6th random Sequence;Wherein, the value of each element in the 6th random sequence is 0 or 1;
3. _ 3_2, the m' image block currently pending in the encryption area image containing secret information be defined as present image Block;Wherein, m' is positive integer, and m' initial value is 1,
3. _ 3_3, the picture for calculating the respective pixel value of the non-central pixels of g × g-1 and central pixel point in current image block The difference of element value is to the values of 256 modulus, by the pixel value and central pixel point of s-th of non-central pixel in current image block The difference of pixel value the value of 256 modulus is designated as Wherein, s For positive integer, s initial value is 1,1≤s≤g × g-1,Represent s-th of non-central pixel in current image block Pixel value,The pixel value of the central pixel point in current image block is represented, if the size of current image block is 2 × 2, then specifying any one pixel in current image block, rest of pixels point is as non-central pixel as central pixel point Point, mod are modulus symbol;
3. _ 3_4, according to step 3. _ 3_3 in g × g-1 value being calculated, determine the secret information extraction of current image block Region, it is designated as Wherein, symbol " ∪ " is union operation symbol,
3. _ 3_5, secret information bit extraction, detailed process are carried out to g × g-1 non-central pixels in current image block For:For s-th of non-central pixel in current image block, if by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, the secret information bit for extracting to obtain is " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";If by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, obtained secret information ratio is extracted Specially for " 0 ", whenDuring equal to 1, the secret information bit for extracting to obtain is " 1 ";
3. _ 3_6, carrying out recovery operation to g × g-1 non-central pixels in current image block, detailed process is:For working as S-th of non-central pixel in preceding image block, if by step 3. _ 3_3 is calculatedMeet:Then whenDuring equal to 0, order WhenDuring equal to 1, orderIf by step 3. _ 3_3 calculates ArriveMeet:Then whenDuring equal to 0, orderWhenDuring equal to 0, order If by step 3. _ 3_3 is calculatedMeet:Then makeIf by step 3. _ 3_3 is calculatedMeet:Then makeWherein, symbolTo round symbol downwards, WithIn "=" be assignment;
3. _ 3_7, make m'=m'+1, then using containing secret information encryption area image in next pending image block as Current image block, return again to step 3. _ 3_3 continues executing with, until from each image in the encryption area image containing secret information Secret information bit is extracted in each non-central pixel in block, obtains the encryption area image after secret information extraction, and Extraction obtains secret information;Wherein, "=" in m'=m'+1 is assignment;
3. every secret in _ 3_8, the secret information obtained using the value of each element in the 6th random sequence to extraction is believed Cease bit and correspond progress XOR decryption, obtain the secret information of XOR decryption, the final secret information obtained as extraction;
3. _ 3_9, secret information extraction after encryption area image width and highly correspond to W and H, if W × H can by g × G is divided exactly, then the encryption area image after secret information is extracted is divided intoThe size of individual non-overlapping copies is g × g's Image block;If W × H can not be divided exactly by g × g, the encryption area image after secret information is extracted is divided intoThe size of individual non-overlapping copies is g × g image block, and the encryption area image after secret information is extracted Right and lower section size are not that g × g block also serves as image block, are sharedIndividual image block;Wherein, g value For 2 or 3, symbolTo round symbol, symbol downwardsFor the symbol that rounds up;
3. _ 3_10, the input parameter using the second key key2 as random () function, random () function is set to produce one 5th random sequence;Wherein, the length of the 5th random sequence is Count, the value of each element in the 5th random sequence for [0, Count] in integer, the value of all elements in the 5th random sequence do not repeat and is in random distribution;
3. _ 3_11, using the 5th random sequence to secret information extract after encryption area image in all sizes for g × G image block carries out scramble, obtains the encryption area image after scramble;
3. _ 3_12, the input parameter using first key key1 as random () function, random () function is set to produce one 4th random sequence;Wherein, the value of each element in the 4th random sequence is the integer in [0,255];
3. _ 3_13, m-th of image block currently pending in the encryption area image after scramble will be gone to be defined as current image block, It is currentElement by j-th of the element definition currently taken out from the 4th random sequence;Wherein, m and j is positive integer, m and j Initial value be 1,1≤m≤M, M represent to go in the encryption area image after scramble the total number of the image block included, 1≤j≤ J, J represent the length of the 4th random sequence;
3. _ 3_14, using currentElement each pixel in current image block is decrypted, in current image block The process that i pixel is decrypted is:By the value phase of the pixel value and currentElement of the ith pixel point in current image block To 256 modulus after subtracting, the then pixel value using obtained value as the ith pixel point in current image block;Wherein, 1≤i≤ Icur, IcurRepresent the total number of pixel included in current image block;
3. _ 3_15, making m=m+1, and j=j+1 is made, next pending image block in the encryption area image after scramble will be removed As current image block, using next element taken out from the 4th random sequence as currentElement, be then back to step 3. _ 3_14 is continued executing with, until all image blocks in the encryption area image after removing scramble are disposed, completes the mistake of image decryption Journey, obtain the decryption area image after secret information extraction;Wherein, "=" in m=m+1 and j=j+1 is assignment.
CN201711011109.5A 2017-10-26 2017-10-26 A kind of encryption area image reversible data concealing method of double-encryption Active CN107809644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711011109.5A CN107809644B (en) 2017-10-26 2017-10-26 A kind of encryption area image reversible data concealing method of double-encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711011109.5A CN107809644B (en) 2017-10-26 2017-10-26 A kind of encryption area image reversible data concealing method of double-encryption

Publications (2)

Publication Number Publication Date
CN107809644A true CN107809644A (en) 2018-03-16
CN107809644B CN107809644B (en) 2019-08-20

Family

ID=61593073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711011109.5A Active CN107809644B (en) 2017-10-26 2017-10-26 A kind of encryption area image reversible data concealing method of double-encryption

Country Status (1)

Country Link
CN (1) CN107809644B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109348230A (en) * 2018-11-14 2019-02-15 宁波工程学院 A kind of ciphertext domain high capacity image reversible data concealing method
CN109635576A (en) * 2018-11-30 2019-04-16 哈尔滨工业大学(深圳) A kind of hiding data method and system in the picture
CN109803142A (en) * 2019-01-08 2019-05-24 宁波工程学院 A kind of encryption area image reversible data concealing method based on adjacency prediction
CN110809192A (en) * 2019-10-15 2020-02-18 华南理工大学 Video encryption method capable of carrying secret information
CN110958458A (en) * 2019-11-25 2020-04-03 李小平 Digital image encryption method and image decryption method based on modular inverse operation
WO2020119645A1 (en) * 2018-12-13 2020-06-18 中国科学院深圳先进技术研究院 Image encryption method and device, and image decryption method and device
CN111968023A (en) * 2020-07-03 2020-11-20 福建江夏学院 Double-image reversible data hiding algorithm based on EMD matrix
CN114172630A (en) * 2021-12-24 2022-03-11 湖南大学 Reversible information hiding method based on addition homomorphic encryption and multi-high-order embedding
CN116707803A (en) * 2023-08-07 2023-09-05 北京奇立软件技术有限公司 Private data crushing method based on data encryption

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
CN101520885A (en) * 2008-02-28 2009-09-02 富士通株式会社 Image decrypting apparatus, image encrypting apparatus, and image decrypting method
US7792377B2 (en) * 2007-04-25 2010-09-07 Huper Laboratories Co., Ltd. Method of image authentication and restoration
WO2012010947A1 (en) * 2010-07-19 2012-01-26 Instituto Nacional De Astrofisica, Optica Y Electronica Video watermarking method resistant to temporal desynchronization attacks
CN104038761A (en) * 2014-06-05 2014-09-10 宁波工程学院 Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping
US20160055607A1 (en) * 2014-08-20 2016-02-25 Verance Corporation Content management based on dither-like watermark embedding
CN105872305A (en) * 2016-04-13 2016-08-17 宁波工程学院 Full separable encryption domain image reversible data hiding method
CN105989253A (en) * 2015-03-06 2016-10-05 北京万方数据股份有限公司 Watermark embedding method as well as extraction method and apparatus
CN106251278A (en) * 2016-07-27 2016-12-21 廖琪男 A kind of image encryption territory based on histogram feature reversible information hidden method
CN106327414A (en) * 2016-08-16 2017-01-11 广东工业大学 Plaintext feature-based double-chaos image encryption method
CN107103631A (en) * 2017-04-17 2017-08-29 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US7792377B2 (en) * 2007-04-25 2010-09-07 Huper Laboratories Co., Ltd. Method of image authentication and restoration
CN101520885A (en) * 2008-02-28 2009-09-02 富士通株式会社 Image decrypting apparatus, image encrypting apparatus, and image decrypting method
WO2012010947A1 (en) * 2010-07-19 2012-01-26 Instituto Nacional De Astrofisica, Optica Y Electronica Video watermarking method resistant to temporal desynchronization attacks
CN104038761A (en) * 2014-06-05 2014-09-10 宁波工程学院 Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping
US20160055607A1 (en) * 2014-08-20 2016-02-25 Verance Corporation Content management based on dither-like watermark embedding
CN105989253A (en) * 2015-03-06 2016-10-05 北京万方数据股份有限公司 Watermark embedding method as well as extraction method and apparatus
CN105872305A (en) * 2016-04-13 2016-08-17 宁波工程学院 Full separable encryption domain image reversible data hiding method
CN106251278A (en) * 2016-07-27 2016-12-21 廖琪男 A kind of image encryption territory based on histogram feature reversible information hidden method
CN106327414A (en) * 2016-08-16 2017-01-11 广东工业大学 Plaintext feature-based double-chaos image encryption method
CN107103631A (en) * 2017-04-17 2017-08-29 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WANG RANGDING ET AL.: "Digital audio watermarking algorithm based on linear predictive coding in wavelet domain", 《PROCEEDINGS 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, 2004》 *
叶耀先等: "H.264/AVC视频可逆信息隐藏算法", 《宁波工程学院学报》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109348230A (en) * 2018-11-14 2019-02-15 宁波工程学院 A kind of ciphertext domain high capacity image reversible data concealing method
CN109348230B (en) * 2018-11-14 2020-12-01 宁波工程学院 Ciphertext domain high-capacity image reversible data hiding method
CN109635576B (en) * 2018-11-30 2023-03-21 哈尔滨工业大学(深圳) Method and system for hiding data in image
CN109635576A (en) * 2018-11-30 2019-04-16 哈尔滨工业大学(深圳) A kind of hiding data method and system in the picture
WO2020119645A1 (en) * 2018-12-13 2020-06-18 中国科学院深圳先进技术研究院 Image encryption method and device, and image decryption method and device
CN109803142A (en) * 2019-01-08 2019-05-24 宁波工程学院 A kind of encryption area image reversible data concealing method based on adjacency prediction
CN110809192A (en) * 2019-10-15 2020-02-18 华南理工大学 Video encryption method capable of carrying secret information
CN110958458A (en) * 2019-11-25 2020-04-03 李小平 Digital image encryption method and image decryption method based on modular inverse operation
CN111968023A (en) * 2020-07-03 2020-11-20 福建江夏学院 Double-image reversible data hiding algorithm based on EMD matrix
CN111968023B (en) * 2020-07-03 2022-05-24 福建江夏学院 Dual-image reversible data hiding method based on EMD matrix
CN114172630A (en) * 2021-12-24 2022-03-11 湖南大学 Reversible information hiding method based on addition homomorphic encryption and multi-high-order embedding
CN114172630B (en) * 2021-12-24 2024-05-17 湖南大学 Reversible information hiding method based on addition homomorphic encryption and multi-high-order embedding
CN116707803A (en) * 2023-08-07 2023-09-05 北京奇立软件技术有限公司 Private data crushing method based on data encryption
CN116707803B (en) * 2023-08-07 2023-10-31 北京奇立软件技术有限公司 Private data crushing method based on data encryption

Also Published As

Publication number Publication date
CN107809644B (en) 2019-08-20

Similar Documents

Publication Publication Date Title
CN107809644B (en) A kind of encryption area image reversible data concealing method of double-encryption
Yi et al. Separable and reversible data hiding in encrypted images using parametric binary tree labeling
CN105591750B (en) The generation method that signs electronically and system
Bouslimi et al. A joint encryption/watermarking system for verifying the reliability of medical images
CN111738238B (en) Face recognition method and device
Zhou et al. Authenticity and integrity of digital mammography images
CN109803142B (en) Encrypted domain image reversible data hiding method based on neighborhood prediction
CN108566500A (en) The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN104823203A (en) Biometric template security and key generation
CN105634732A (en) Ciphertext domain multi-bit reversible information hiding method
CN113160944B (en) Medical image sharing method based on blockchain
CN106709963A (en) Method and apparatus for verifying authenticity of image
CN107122681A (en) A kind of method of file encryption-decryption, relevant apparatus and system
CN105872305B (en) A kind of completely separable encryption area image reversible data concealing method
Pavithra et al. Developing security solutions for telemedicine applications: medical image encryption and watermarking
CN105337742A (en) LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN106941402A (en) A kind of reversible hidden method of homomorphism ciphertext domain
CN104463767B (en) Visible encryption and decryption method with image disguising function and tampering identification function
Deshmukh et al. Hash based least significant bit technique for video steganography
CN102413148B (en) Biological characteristic remote authentication method based on visual codes
Subhasri et al. Enhancing the security of dicom content using modified vigenere cipher
Chavan et al. Lossless tagged visual cryptography scheme using bit plane slicing for image processing
Sharma et al. A DWT based attack resistant video steganography
Khalifeh et al. Design and implementation of a steganography-based system that provides protection for breast cancer patient's data
CN110475040A (en) A kind of exchange password water mark method and system based on modular arithmetic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant