CN113744112B - Symmetrical information hiding method based on carrier randomness - Google Patents

Symmetrical information hiding method based on carrier randomness Download PDF

Info

Publication number
CN113744112B
CN113744112B CN202111045289.5A CN202111045289A CN113744112B CN 113744112 B CN113744112 B CN 113744112B CN 202111045289 A CN202111045289 A CN 202111045289A CN 113744112 B CN113744112 B CN 113744112B
Authority
CN
China
Prior art keywords
key
gray
carrier
value
map
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111045289.5A
Other languages
Chinese (zh)
Other versions
CN113744112A (en
Inventor
任方
于明宇
修海燕
杨腾飞
魏雅娟
郝艳莉
田聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Posts and Telecommunications
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN202111045289.5A priority Critical patent/CN113744112B/en
Publication of CN113744112A publication Critical patent/CN113744112A/en
Application granted granted Critical
Publication of CN113744112B publication Critical patent/CN113744112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0203Image watermarking whereby the image with embedded watermark is reverted to the original condition before embedding, e.g. lossless, distortion-free or invertible watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Processing (AREA)

Abstract

The application discloses a symmetric information hiding method based on carrier randomness, which relates to the technical field of information hiding, and generates a secret key according to the statistical characteristics of the lowest bit surface of a gray image by utilizing the natural randomness of the lowest bit surface of a carrier, so that the secret key randomness is ensured and meanwhile certain robustness is achieved; the application randomizes and disguises secret information based on the randomness of the carrier, acquires key information from the carrier, and improves the security of steganography.

Description

Symmetrical information hiding method based on carrier randomness
Technical Field
The application relates to the technical field of information hiding, in particular to a symmetrical information hiding method based on carrier randomness.
Background
The application of information hiding technology is more and more widespread nowadays, and the main purpose of most steganography algorithms is to improve the embedding capacity and reduce the distortion, so that the security of the method is not high. In 2001 Toby Sharp first proposed the idea of using keys in information hiding technology, improving steganography security. In the subsequent time, the method for using the password for information hiding basically takes over the thought of Sharp, and an encryption key is additionally arranged outside the carrier, but the method does not fully combine the password technology and the information hiding algorithm.
Aiming at the problems existing in the prior art, the application provides a symmetric information hiding method based on carrier randomness, which performs randomisation camouflage on secret information based on carrier randomness, acquires key information from a carrier, and improves the security of steganography.
Disclosure of Invention
The application aims to provide a symmetric information hiding method based on carrier randomness, which is used for randomizing and disguising secret information based on carrier randomness, acquiring key information from a carrier and improving the security of steganography.
The application provides a symmetrical information hiding method based on carrier randomness, which comprises the following steps:
extracting a gray level map Co of a key carrier, converting the lowest bit plane of the gray level map Co into a binary sequence, dividing the binary sequence into m groups, wherein each group comprises an odd number of binary bits, taking 0 as a key value if the number of 0 in the group is greater than the number of 1, taking 1 as the key value if the number of 0 in the group is less than the number of 1, and combining a plurality of key values according to the sequence of m groups;
encrypting a plaintext message Me by adopting a key K to obtain a ciphertext Ci;
obtaining a histogram of a gray level map Co, and translating a point between a peak point and a zero point in the histogram upwards or downwards to obtain a blank gray level value added with one or subtracted from the original gray level value;
and analyzing the value corresponding to each bit in the ciphertext Ci, if the corresponding value is 0, keeping the gray value corresponding to the ciphertext Ci unchanged, and if the corresponding value is 1, changing the corresponding gray value into a null gray value, and comprehensively analyzing the gray value to obtain the hidden camouflage object St in the gray map state.
Further, the method further comprises the following steps:
and sending the disguised object St to a receiver, extracting the ciphertext Ci from the gray value and the null gray value by the receiver, translating and recovering the histogram to obtain a gray map Co of the key carrier, extracting a key K from the gray map Co, and decrypting by using the key K to obtain a plaintext message Me.
Further, the step of converting the lowest bit plane of the gray scale map Co into a binary sequence is as follows:
converting the gray level map of the key carrier into a matrix of n x n;
and extracting the preparation key according to the n-by-n matrix, and converting the preparation key into a binary sequence according to rows.
Further, the method for extracting the preparation key comprises the following steps:
using the n matrix of gray map with formulaThe preliminary key is output.
Further, the step of obtaining the lowest bit plane of the gray scale map Co includes:
obtaining a digital matrix of the gray map Co by using an imread function in matlab;
and performing modular two operation on each numerical value in the numerical matrix to obtain the lowest bit plane.
The application has the following beneficial effects and advantages:
the symmetric information hiding method based on the carrier randomness utilizes the natural randomness of the lowest bit surface of the carrier to generate the secret key according to the statistical characteristics of the lowest bit surface of the gray image, ensures the secret key randomness and has certain robustness, and the secret key is introduced to enhance the security of secret information; the application randomizes and disguises secret information based on the randomness of the carrier, acquires key information from the carrier, and improves the security of steganography.
Drawings
FIG. 1 is a flow chart of randomized camouflage steganography provided by an embodiment of the present application;
FIG. 2 is a flow chart of randomized camouflage extraction according to an embodiment of the present application;
fig. 3 is a comparison chart of a reversible information hiding carrier image and a camouflage object histogram according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application, taken in conjunction with the accompanying drawings, will clearly and completely describe the embodiments of the present application, and it is evident that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
Referring to fig. 1-3, the application provides a symmetric information hiding method based on carrier randomness, which comprises the following steps:
extracting a gray level map Co of a key carrier, converting the lowest bit plane of the gray level map Co into a binary sequence, dividing the binary sequence into m groups, wherein each group comprises odd binary bits, taking 0 as a key value if the number of 0 in the group is greater than 1, taking 1 as a key value if the number of 0 in the group is less than 1, combining a plurality of key values according to the sequence of m groups to obtain a key K, and converting the key K into a conversion formula of the binary sequence, wherein the conversion formula of the conversion formula is that
Encrypting a plaintext message Me by adopting a key K to obtain a ciphertext Ci;
obtaining a histogram of a gray level map Co, and translating a point between a peak point and a zero point in the histogram upwards or downwards to obtain a blank gray level value added with one or subtracted from the original gray level value;
and analyzing the value corresponding to each bit in the ciphertext Ci, if the corresponding value is 0, keeping the gray value corresponding to the ciphertext Ci unchanged, and if the corresponding value is 1, changing the corresponding gray value into a null gray value, and comprehensively analyzing the gray value to obtain the hidden camouflage object St in the gray map state.
Wherein, the lowest bit plane of the gray scale map Co refers to that each pixel of the 256-level gray scale map is represented by an eight-bit binary system, and the last bit of the eight-bit binary system is the lowest bit plane, so that the extraction of the lowest bit plane is equivalent to the extraction of the last bit of the eight-bit binary system of each pixel point of the picture. The step of obtaining the lowest bit plane of the gray map Co comprises the following steps:
obtaining a digital matrix of the gray map Co by using an imread function in matlab;
and performing modular two operation on each numerical value in the numerical matrix to obtain the lowest bit plane.
The key carrier is a carrier picture for information hiding, which is called as a key carrier, for the following reasons:
a. the key carrier is a carrier to be used for information hiding.
b. The key that encrypts the plaintext information is also derived from the carrier and is therefore called the key carrier.
Example 1
Referring to fig. 2, a disguised object St is transmitted to a receiver, the receiver extracts a ciphertext Ci from a gray value h and a null gray value (h+1 or h-1), and translates a recovery histogram to obtain a gray map Co of a key carrier, extracts a key K from the gray map Co, and decrypts the plaintext message Me using the key K.
Example 2
The step of extracting the key K by the binary sequence is as follows:
converting the gray level map of the key carrier into a matrix of n x n;
extracting a preparation key according to the n-by-n matrix, and converting the preparation key into a binary sequence according to rows;
dividing the binary sequence into m groups, each group containing an odd number of binary bits;
by passing throughA key is generated, the key being k=k1, K2, … Km.
The method for extracting the preparation key comprises the following steps:
using the n matrix of gray map with formulaThe preliminary key is output.
Wherein the odd group refers to writing the lowest bit plane into binary sequences and then grouping every odd binary sequence into one group, so that the odd group is called an odd group. Each odd group generates a 1bit key. The key K is a set of Ki, which refers to the key of the ith bit, and K refers to a set of overall keys of K1, K2,.
The foregoing disclosure is merely illustrative of some embodiments of the application, but the embodiments are not limited thereto and variations within the scope of the application will be apparent to those skilled in the art.

Claims (5)

1. The symmetrical information hiding method based on carrier randomness is characterized by comprising the following steps:
extracting a gray level map Co of a key carrier, converting the lowest bit plane of the gray level map Co into a binary sequence, dividing the binary sequence into m groups, wherein each group comprises an odd number of binary bits, taking 0 as a key value if the number of 0 in the group is greater than the number of 1, taking 1 as the key value if the number of 0 in the group is less than the number of 1, and combining a plurality of key values according to the sequence of m groups;
encrypting a plaintext message Me by adopting a key K to obtain a ciphertext Ci;
obtaining a histogram of a gray level map Co, and translating a point between a peak point and a zero point in the histogram upwards or downwards to obtain a blank gray level value added with one or subtracted from the original gray level value;
and analyzing the value corresponding to each bit in the ciphertext Ci, if the corresponding value is 0, keeping the gray value corresponding to the ciphertext Ci unchanged, and if the corresponding value is 1, changing the corresponding gray value into a null gray value, and comprehensively analyzing the gray value to obtain the hidden camouflage object St in the gray map state.
2. The method for hiding symmetric information based on carrier randomness of claim 1, further comprising:
and sending the disguised object St to a receiver, extracting the ciphertext Ci from the gray value and the null gray value by the receiver, translating and recovering the histogram to obtain a gray map Co of the key carrier, extracting a key K from the gray map Co, and decrypting by using the key K to obtain a plaintext message Me.
3. The method for hiding symmetric information based on carrier randomness as claimed in claim 1, wherein the step of converting the lowest bit plane of said gray map Co into a binary sequence is as follows:
converting the gray level map of the key carrier into a matrix of n x n;
and extracting the preparation key according to the n-by-n matrix, and converting the preparation key into a binary sequence according to rows.
4. A symmetric information hiding method based on carrier randomness as claimed in claim 3, wherein said method for extracting the preliminary key is:
using the n matrix of gray map with formulaThe preliminary key is output.
5. The method for hiding symmetric information based on carrier randomness as claimed in claim 1, wherein the step of obtaining the lowest bit plane of said gray map Co is:
obtaining a digital matrix of the gray map Co by using an imread function in matlab;
and performing modular two operation on each numerical value in the numerical matrix to obtain the lowest bit plane.
CN202111045289.5A 2021-09-07 2021-09-07 Symmetrical information hiding method based on carrier randomness Active CN113744112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111045289.5A CN113744112B (en) 2021-09-07 2021-09-07 Symmetrical information hiding method based on carrier randomness

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111045289.5A CN113744112B (en) 2021-09-07 2021-09-07 Symmetrical information hiding method based on carrier randomness

Publications (2)

Publication Number Publication Date
CN113744112A CN113744112A (en) 2021-12-03
CN113744112B true CN113744112B (en) 2023-12-12

Family

ID=78736717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111045289.5A Active CN113744112B (en) 2021-09-07 2021-09-07 Symmetrical information hiding method based on carrier randomness

Country Status (1)

Country Link
CN (1) CN113744112B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115567329B (en) * 2022-12-06 2023-02-28 互丰科技(北京)有限公司 Data security encryption method for network information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452569A (en) * 2008-12-05 2009-06-10 江南大学 Processing method of image latent writing based on auxiliary pixel
WO2016205700A1 (en) * 2015-06-19 2016-12-22 Amazon Technologies, Inc. Steganographic depth images
CN109617682A (en) * 2018-12-12 2019-04-12 北京邮电大学 A kind of ciphertext domain reversible information hidden method based on histogram left and right sidesing shifting

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7415155B2 (en) * 2003-05-06 2008-08-19 New Jersey Institute Of Technology Methods and apparatus for reversible data hiding through histogram modification

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452569A (en) * 2008-12-05 2009-06-10 江南大学 Processing method of image latent writing based on auxiliary pixel
WO2016205700A1 (en) * 2015-06-19 2016-12-22 Amazon Technologies, Inc. Steganographic depth images
CN109617682A (en) * 2018-12-12 2019-04-12 北京邮电大学 A kind of ciphertext domain reversible information hidden method based on histogram left and right sidesing shifting

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于图像分割和随机LSB的信息隐藏算法;高华玲;;现代计算机(专业版)(15);全文 *
基于海绵函数的快速伪随机序列生成方法;赵磊;郑东;任方;;计算机应用研究(01);全文 *

Also Published As

Publication number Publication date
CN113744112A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
CN108566500B (en) Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism
CN109660696B (en) New image encryption method
Hussein et al. Secure message embedding in audio
Sethi et al. A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography
Jose et al. A separable reversible data hiding in encrypted image with improved performance
CN110677236B (en) OFDM encryption method based on composite chaotic system and XOR operation
CN103473733A (en) Image encryption algorithm based on DNA encoding and chaotic mapping
WO2014075469A1 (en) Method and device for information hiding
Abdulzahra et al. Combining cryptography and steganography for data hiding in images
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN111970507A (en) Reversible data hiding method of ciphertext domain image based on pixel difference coding
CN113744112B (en) Symmetrical information hiding method based on carrier randomness
Yahaya et al. Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography
Debnath et al. An advanced image encryption standard providing dual security: Encryption using hill cipher & RGB image steganography
CN114401351B (en) Image encryption and decryption method based on two-dimensional fractional order chaotic mapping
CN108305298B (en) Image recoverable information hiding method based on Sudoku matrix index
Banupriya et al. Video steganography using LSB algorithm for security application
CN116016795A (en) Image encryption method based on variable step length extraction random number and improved ZigZag conversion
CN111400731B (en) Quantum image encryption method based on DNACNot
CN115883744A (en) Watermark method, device and storage medium based on fractional order chaotic mapping
Moon et al. Innovative data security model using forensic audio video steganography for improving hidden data security and robustness
CN107590369B (en) Homomorphic encrypted domain reversible information hiding method based on code division multiplexing and value expansion
Tiwari et al. A Robust Method for Image Steganography based on chaos theory
Akhtar et al. An improved module based substitution steganography method
CN113852456A (en) Image encryption system based on Matlab chaotic mapping and feature extraction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant