CN101582157B - Adaptive spatial steganographic method based on adjacent pixel difference - Google Patents

Adaptive spatial steganographic method based on adjacent pixel difference Download PDF

Info

Publication number
CN101582157B
CN101582157B CN200910037649XA CN200910037649A CN101582157B CN 101582157 B CN101582157 B CN 101582157B CN 200910037649X A CN200910037649X A CN 200910037649XA CN 200910037649 A CN200910037649 A CN 200910037649A CN 101582157 B CN101582157 B CN 101582157B
Authority
CN
China
Prior art keywords
image
embedding
unit
prime
secret information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910037649XA
Other languages
Chinese (zh)
Other versions
CN101582157A (en
Inventor
骆伟祺
黄方军
黄继武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CN200910037649XA priority Critical patent/CN101582157B/en
Publication of CN101582157A publication Critical patent/CN101582157A/en
Application granted granted Critical
Publication of CN101582157B publication Critical patent/CN101582157B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides an adaptive spatial steganographic method based on adjacent pixel difference. The method comprises the following two steps: embedding secret information and extracting the secret information. The method takes three continuous adjacent pixels in an image as an embedding unit and reaches the goal of hiding information by changing the value of the middle pixel in each unit. During information embedding, a steganographic algorithm always mains the size relationship of each pixel in the embedding unit, and adaptively adjusts the capacity of embedding information through a parameter according to the content of the image. Experiments show that the adaptive spatial steganographic method has higher safety and adaptive ability compared with the prior steganographic method based on pixel difference. Therefore, the adaptive spatial steganographic method has great practical significance to application fields such as covert communication and the like.

Description

A kind of self-adapting airspace steganography method based on neighbor difference
Technical field
The invention belongs to multi-media information security, the secret communication field.Be specifically related to a kind of can the embedding and the high spatial domain steganography method of security performance according to the image content information self-adaptation.
Background technology
Along with digital multimedia, the constantly universal and development of network technology mutually, the information steganography Study on Technology also receives the attention of scientific research personnel and mechanism of the military etc. gradually.At present, the steganography method of DID can be divided into latent the writing with frequency field is latent in spatial domain and writes two kinds.
Based on latent the writing of PVD (Pixel-Value Differencing) is a kind of typical spatial domain steganography method.Its main thought is to confirm to embed what of secret information according to the difference of image neighbor: regional many embeddings information that neighbor difference is big, difference is little then to embed less.Though the steganography method based on PVD has certain adaptivity, see that from the method for present announcement the right embedding capacity of each neighbor still depends on an artificial preset parameter, and does not rely on picture material itself; And, even these methods are that the information embedding has also been carried out in 0 zone at the pixel differences, mean promptly that also the smooth region of image also is used for hiding of information, latently like this write afterwards that visual quality for images can reduce.The more important thing is, tend to destroy the magnitude relationship between neighbor in the image based on the PVD method at present,, can make that like this its security performance reduces greatly through a large amount of description of tests.
Summary of the invention
The present invention is directed to defectives such as existing method adaptive ability is poor, security performance is bad, design a spatial domain steganography method that adaptive ability is strong and safe, transmit with the secret that realizes information.
In order to realize the foregoing invention purpose, the technical scheme of employing is following:
A kind of self-adapting airspace steganography method based on neighbor difference comprises the embedding of secret information and extracts two steps, and the embedding of said information comprises following substep: the rotation of (11) image block; (12) view data is reset and is divided into groups; (13) the embedding capacity of estimated image; (14) revising embedding unit intermediate pixel realization information embeds; (15) image heavily rotates the embedding with threshold value T.
The concrete grammar of said step (11) image block rotation is: at first testing image I (establish its size for M * N) is decomposed into the square of zero lap Bz * Bz size, be made as Blk (j), require Bz=3k, k ∈ N, j=1,2..., S, S = [ M Bz ] [ N Bz ] Total number of presentation video piecemeal.Utilize first key to generate S angle at random then, wherein the set of the value of angle is [0,90,180,270], utilizes the angle that generates that each piecemeal in the image is turned clockwise;
Said step (12) view data is reset with the concrete grammar that divides into groups: the image that obtains in the step (11) is carried out the rearrangement of Zigzag by the order of row major, obtain a row vector.And should be divided into the vector zero lap 1 * 3 the size the embedding unit.Simultaneously, two algorithm parameter T of initialization and k, wherein T reflects the difference between adjacent two pixels, and k reflects that the maximum of single pixel embeds bit number;
The concrete grammar of the embedding capacity of said step (13) estimated image is: embed unit [g for each i, g I+1, g I+2], calculate d 1=g I+1-g i, d 2=g I+2-g I+1, the pixel g in the middle of limiting by following four kinds of situation then I+1Variable scope
Situation 1:g I+1<g iAnd g I+1<g I+2
if|d 1|>T?and|d 2|>T
range g ′ i + 1 = [ 0 , . . . , min ( g i - T - 1 , g i + 2 - T - 1 ) ]
if|d 1|>T?and|d 2|≤T
range g ′ i + 1 = [ max ( g i + 2 - T , 0 ) , . . . , min ( g i - T - 1 , g i + 2 - 1 ) ]
if|d 1|≤T?and|d 2|>T
range g ′ i + 1 = [ max ( g i - T , 0 ) , . . . , min ( g i + 2 - T - 1 , g i - 1 ) ]
Situation 2:g I+1>g iAnd g I+1>g I+2
if|d 1|>T?and|d 2|>T
range g ′ i + 1 = [ max ( g i + T + 1 , g i + 2 + T + 1 ) , . . . , 255 ]
if|d 1|>T?and|d 2|≤T
range g ′ i + 1 = [ max ( g i + T + 1 , g i + 2 + 1 ) , . . . , min ( g i + 2 + T , 255 ) ]
if|d 1|≤T?and|d 2|>T
range g ′ i + 1 = [ max ( g i + 2 + T + 1 , g i + 1 ) , . . . , min ( g i + T , 255 ) ]
Situation 3:g i>=g I+1>=g I+2
if|d 1|>T?and|d 2|>T
range g ′ i + 1 = [ g i + 2 + T + 1 , . . . , g i - T - 1 ]
if|d 1|>T?and|d 2|≤T
range g ′ i + 1 = [ g i + 2 , . . . , min ( g i + 2 + T , g i - T - 1 ) ]
if|d 1|≤T?and|d 2|>T
range g ′ i + 1 = [ max ( g i + 2 + T + 1 , g i - T ) , . . . , g i ]
Situation 4:g i≤g I+1≤g I+2
if|d 1|>T?and|d 2|>T
range g ′ i + 1 = [ g i + T + 1 , . . . , g i + 2 - T - 1 ]
if|d 1|>T?and|d 2|≤T
range g ′ i + 1 = [ max ( g i + 2 - T , g i + T + 1 ) , . . . , g i + 2 ]
if|d 1|≤T?and|d 2|>T
range g ′ i + 1 = [ g i , . . . , min ( g i + 2 - T - 1 , g i + T ) ]
Calculate then Wherein
Figure G200910037649XD000311
The expression set
Figure G200910037649XD000312
Element number, if n>0, then expression embeds unit [g i, g I+1, g I+2] the embedding capacity be the n bit; All embed the embedding total volume of unit among the statistical picture I, if this capacity greater than to embed the length of scale-of-two secret information M, then change step (14); Otherwise T is reduced to T-1 with parameter; Change the embedding capacity that step (13) reappraises image, if T reduces to 0, then presentation video I does not have the given secret information M of enough space embeddings.
Theoretical proof: as middle pixel g I+1In the zone
Figure G200910037649XD000313
During middle the variation, g i, g I+1, g I+2Remain unchanged with the magnitude relationship of T.As embed preceding g i≤g I+1≤g I+2, | g I+1-g i|>T has g after then embedding equally i≤g ' I+1≤g I+2, | g ' I+1-g i|>T, as long as g ′ i + 1 ∈ Range g ′ i + 1 . In addition, can see the zone from above formula Scope be not rely on original g I+1Value, it only depends on g i, g I+2With parameter T.Therefore; In the leaching process of secret information, can obtain identical zone thus guaranteeing correct extraction goes out secret information.
Said step (14) revise to embed the concrete grammar that intermediate pixel realization information in unit embeds: each of the order traversing graph picture that generates according to second key embeds unit, as to [g i, g I+1, g I+2] realize embedding the intermediate pixel variable scope of at first confirming according to step (13)
Figure G200910037649XD00044
And embeddable information capacity n, order is extracted the n Bit data and is transferred decimal number b to from secret information M, changes g by following formula I+1Be g ' I+1Realize embedding:
g ′ i + 1 = arg min e { | e - g i + 1 | | | e - g i | ≡ b ( mod 2 n ) , e ∈ range g ′ i + 1 }
Repeating this step all is embedded into until all secret informations;
The concrete grammar that said step (15) image heavily rotates with the embedding of threshold value T is: each image block that will pass through after step (14) is handled according to first key is rotated counterclockwise; And with the parameter T of step (13) be embedded into one preset, be not used in the image-region that secret information embeds, generate the latent back image of writing.
The extraction of said secret information comprises following substep: the rotation of (21) image block; (22) view data is reset and is divided into groups; (23) extraction respectively embeds the unit secret information.
Said step (21) image block rotation and step (22) view data reset with the concrete grammar that divides into groups and secret information embedding step (11), (12) in corresponding way be consistent;
Said step (23) is specific as follows to the extraction operation of secret information: at first go out parameter T from the preset region extraction of image, respectively embed the unit according to second key sequence traversal then, all be extracted until all secret informations.If pending unit is [g i, g ' I+1, g I+2], if | g ' I+1-g i|≤T and | g I+2-g ' I+1|≤T, then skip to the next unit that embeds, calculate intermediate pixel g ' otherwise embed step (13) by information I+1Variation range
Figure G200910037649XD00051
And calculate
Figure G200910037649XD00052
Obtain the embedded quantity n of this embedding unit, through calculating b ≡ | g ' I+1-g i| (mod2 n) obtain being embedded in the decimal representation of this unit secret information, transfer b to secret information that binary number obtains the n bit at last.
The present invention has mainly utilized the magnitude relationship between continuous three pixels in the image, and realizes the embedding of secret information through the pixel value in the middle of changing.Can realize the embedding of secret information according to the content-adaptive of image ground own; And in telescopiny, can keep the big or small ordering relation between the original pixel of image as far as possible; Make that latent imperceptibility and the security of writing the back image is all higher, thereby the secret of information is transmitted the crucial effect of playing.
Description of drawings
Fig. 1 is embedding, the extraction schematic flow sheet of secret information of the present invention, and wherein (a) embeds process flow diagram for information, (b) is the information extraction process flow diagram;
Fig. 2 does not have repetition piecemeal and the piecemeal synoptic diagram that turns clockwise at random for image;
Fig. 3 image is reset synoptic diagram with row major order Zigzag;
Fig. 4 image is reset the back and is embedded the unit packet synoptic diagram;
Fig. 5 embeds in the unit four kinds of magnitude relationship synoptic diagram of three pixels and parameter T;
Fig. 6 image does not have the repetition piecemeal and piecemeal is rotated counterclockwise synoptic diagram at random;
Fig. 7 is under different steganography methods, and the latent difference synoptic diagram of writing back image and original image: wherein (a) is original test pattern; (b) for adopting the present invention; (c) for adopting Original PVD method; (d) for adopting the IPVD method; (e) for adopting the PVD-LSB method; (f) for adopting the Adaptive-Edge method;
Fig. 8 is for contrasting Adaptive-Edge and the present invention visual effect at smooth region: (a) be to utilize the latent contour map of writing the back regional area of Adaptive-Edge method; (b) be to utilize contour map of the present invention;
Fig. 9 is under difference embedding capacity, the latent difference synoptic diagram of writing back image and original image: wherein (a) is 5%bpp; (b) be 10%bpp; (c) be 20%bpp; (d) be 30%bpp.
Embodiment
Below in conjunction with accompanying drawing the present invention is further described.
Shown in Figure 1 is the algorithm flow synoptic diagram of the embedding and the extraction of secret information of the present invention.
Wherein the telescopiny of secret information comprises step: the rotation of (11) image block; (12) view data is reset and is divided into groups; (13) the embedding capacity of estimated image; (14) revising embedding unit intermediate pixel realization information embeds; (15) image heavily rotates the embedding with threshold value T.
Each step specifies as follows:
(11) image block rotation
Suppose that image to be detected is I, its size is M * N.As shown in Figure 2, at first I is decomposed into the regional Bz * Bz of zero lap (setting Bz=6) fritter Blk (j), j = 1,2 , . . . , [ M Bz ] [ N Bz ] , Utilize a key key1 to generate then Individual angle at random, the span of angle are 0,90,180 and 270, respectively each fritter are carried out the CW rotation.
(12) view data is reset and is divided into groups
As shown in Figure 3, the image after handling through step (11) is carried out Zigzag with row major order reset, obtain a row vector.And as shown in Figure 4, with its nothing be decomposed into non-overlapping 1 * 3 the size the embedding unit.Initiation parameter T and k set T=32, k=4.In step (15), need be embedded into the latent a certain predeterminable area (or in pixel) of writing the back image to T, because T=32=2 5, so this auxiliary information only needs the data volume of 5 bits, the method for embedding can be utilized methods such as simple LSB substitutes.
(13) the embedding capacity of estimated image
To each embedding unit of image, like [g i, g I+1, g I+2], estimate its embeddable capacity.Because embedding principle of the present invention is: only change pixel g I+1Size, and require g i, g I+1, g I+2And the magnitude relationship between the parameter T remains unchanged before and after embedding secret information.For this reason, as shown in Figure 5, reach and the T relation according to 4 kinds of size orders between these three pixels, obtained intermediate pixel g I+1But region of variation
Figure G200910037649XD00071
Then through calculating
Figure G200910037649XD00072
The embedding capacity that obtains this embedding unit is the n bit, adds up total embedding capacity that all embedding unit obtain image, if this capacity greater than the secret information M that will embed, then change step (14) and carry out the embedding of secret information; Otherwise regulate parameter T=T-1, more embedded space in the release graphics picture changes total embedding capacity that (13) reappraise image again.If T reduces to 0, then key diagram looks like not have enough space embedding secret information M;
(14) revising embedding unit intermediate pixel realization information embeds
According to the embedding unit of key key2 order traversing graph picture, embed the embedding that unit neutral element size realizes secret information through changing.Embed the unit for each, like [g i, g I+1, g I+2], at first confirm the variable scope of intermediate pixel according to the embedding step (13) of summary of the invention secret information
Figure G200910037649XD00073
And embeddable bit number n, order is extracted the n Bit data and is transferred decimal number b to from secret information M then, presses following formula then to g I+1Make amendment:
g ′ i + 1 = arg min e { | e - g i + 1 | | | e - g i | ≡ b ( mod 2 n ) , e ∈ range g ′ i + 1 }
Repeating (14) all is embedded into until all secret informations;
(15) image heavily rotates the embedding with threshold value T
Each piecemeal Blk (j) that will pass through according to key key1 in the image of step (14) is rotated, and is wherein consistent in the angle of rotation and the image block pre-service, but in the opposite direction, like Fig. 2 and shown in Figure 6.And with step (13) estimated image embed the parameter T that obtains in the capacity step be embedded into one preset, be not used in the image-region that secret information embeds, generate the image after latent the writing.
The extraction of secret information of the present invention comprises step: the piecemeal rotation of (21) image; (22) rearrangement of view data and grouping; (33) extract the secret information that embeds the unit.
The wherein rearrangement and the grouping of the piecemeal of step (21) image rotation and (22) view data is consistent with operating accordingly in the embedding step (11) of secret information and the step (12).
(23) extract the secret information that embeds the unit
At first extract parameter T, travel through in proper order according to key key2 then and respectively embed the unit, all be extracted until all secret informations from the latent back image predeterminable area of writing.If pending unit is [g i, g ' I+1, g I+2], if | g ' I+1-g i|≤T and | g I+2-g ' I+1|≤T, explain that this unit does not have to hide Info, skip to and nextly embed the unit, embed step (13) calculating intermediate pixel g ' otherwise at first press secret information I+1Variation range
Figure G200910037649XD00081
And embedding capacity
Figure G200910037649XD00082
Through calculating b ≡ | g ' I+1-g i| (mod2 n), obtain the decimal representation b of n position secret information, transfer b to the binary number bit stream at last and obtain embedding unit [g i, g ' I+1, g I+2] secret information.
To combine concrete experimental data that the present invention is done analysis explanation further below:
I. image collection:
In the present embodiment, utilized totally 3855 width of cloth natural images to do test, wherein image library comprises:
[NRCS]: 1543 width of cloth sizes are: 512 * 768 and 768 * 512
NRCS?Photo?Gallery(2005):http://photogallery.nrcs.usda.gov/
[UCID]: 1338 width of cloth sizes are: 384 * 512 and 512 * 384
G.Schaefer,M.Stich,Ucid:an?uncompressed?color?image?database,in:Proceedings?of?SPIE?Electronic?Imaging,Storage?and?Retrieval?Methods?andApplications?for?Multimedia,Vol.5307,2003,pp.472-480。
And the size of taking voluntarily is 640 * 480 image 974 width of cloth.
Above all images all transfers gray level image to.
II. typical steganography method based on PVD:
【Original?PVD】:D.C.Wu,W.H.Tsai,A?steganographic?method?for?images?bypixel-value?differencing,Pattern?Recogniton?Lett.24(2003)1613-1626.
【IPVD】:X.Zhang,S.Wang,Vulnerability?of?pixel-value?differencing?steganography?to?histogram?analysis?and?modification?for?enhanced?security,PatternRecogniton?Lett.25(2004)331-339.
【PVD-LSB】:H.C.Wu,N.I.Wu,C.S.Tsai,M.S.Hwang,Imagesteganographic?scheme?based?on?pixel-value?differencing?and?LSB?replacementmethods,Proceeding?of?IEE?Inst.Elect.Eng.,Vis.Images?Signal?Process.152(5)(2005)611-615.
【Adaptive-Edge】:C.H.Yang,C.Y.Weng,S.J.Wang,H.M.Sun,Adaptivedata?hiding?in?edge?areas?of?images?with?spatial?LSB?domain?systems,IEEE?Trans.on?Information?Forensics?and?Security?3(3)(2008)488-497.
III. typical universal steganalysis characteristic:
【Shi78-D】:Y.Shi,G.Xuan,D.Zou,J.Gao,C.Yang,Z.Zhang,P.Chai,W.Chen,C.Chen,Image?steganalysis?based?on?moments?of?characteristic?functionsusing?wavelet?decomposition,prediction-error?image,and?neural?network,in:IEEEInt.Conf.?on?Multimedia?and?Expo,2005.
【Farid72-D】:H.Farid,Detecting?hidden?messages?using?higher-orderstatistical?models,in:IEEE?Int.Conf.on?Image?Processing,Vol.2,2002,pp.II905-908.
【Moulin156-D?】:Y.Wang,P.Moulin,Optimized?feature?extraction?forlearning-based?image?steganalysis,IEEE?Trans.on?Information?Forensics?andSecurity?2(1)(2007)31-45.
【Li110-D】:B.Li,J.Huang,Y.Q.Shi,Textural?features?based?universalsteganalysis,in:Proceedings?of?the?SPIE?on?Security,Forensics,Steganography?andWatermarking?of?Multimedia,Vol.6819,2008,p.681912.
Subjective visual quality do is analyzed:
Shown in Figure 7 is to utilize different steganography methods, latent back image and the original image difference synoptic diagram write that obtains.Wherein, picture white representes that variation has taken place the pixel value size that embeds back image correspondence position.Can see that the present invention only embeds on the borderline region of image, thereby can keep the original most smooth region pixel value of image constant; Other location revision based on the PVD method then is each zone that is randomly dispersed in image.Even the difference between the image neighbor is 0, these methods have also been carried out the information embedding.But because the visual characteristic of human eye: the modification to the borderline region of image is insensitive, and is then responsive relatively to the change in image smoothing zone.Therefore, subjective vision of the present invention can be better than original method.
Shown in Figure 8 is to utilize tradition based on the latent contour map of writing the regional area of back image of PVD method (Adaptive-Edge) and the inventive method, can see that the present invention can keep the flatness in original zone.
Adaptive ability is analyzed:
Shown in Figure 9 is image is respectively at 5%bpp (bit per pixel), 10%bpp, and under 20%bpp and the 30%bpp embedding capacity, the latent synoptic diagram of writing difference between back image and the original image.Can see: main embedded location of the present invention is all on the border of image; And the inventive method can be according to the embedding capacity; Utilize the boundary information of image adaptively; As under the 5%bpp situation, only embed between neighbor pixel centering, and keep peaceful skating area, other border (neighbor difference is less than T) domain information constant greater than T=32; When the embedding capacity increases, like 10%bpp, 20%bpp, 30%bpp, the value of parameter T can reduce (being respectively T=22,8,4) thereupon, means promptly that also more boundary information is utilized in the image.Through experiment showed, that this adaptive characteristic can increase the visual effect and the security thereof of image.
Safety Analysis:
Utilize various PVD steganography methods to generate the hidden image of different embedding capacity, 5%bppm is arranged, 10%bpp, 20%bpp and 30%bpp respectively.For each situation, wherein half the data are as training set, and second half data are as test set.Choosing of characteristic of division utilized four kinds of typical general steganalysis methods, sorter then to adopt FLD (Fisher Linear Discriminate), and following table 1 has been listed the verification and measurement ratio under the various situation.Can see that verification and measurement ratio of the present invention is compared the reduction that has near 20% with other PVD method, that is to say that security of the present invention is better.
Table 1
Figure DEST_PATH_GA20172182200910037649X01D00011

Claims (4)

1. the self-adapting airspace steganography method based on neighbor difference comprises the embedding of secret information and two steps of extraction of secret information, it is characterized in that the embedding of said secret information comprises following substep:
(11) image is carried out piecemeal, and each image block is carried out the clockwise angle rotation at random according to the angle that first key generates;
(12) postrotational image is arranged as a row vector by row major order; And this vector is divided into the embedding unit of 1 * 3 size in zero lap zone; Two parameter T of initialization and k, wherein T reflects the difference between adjacent two pixels, and k reflects the maximum bit number that embeds of single pixel;
(13) the embedding capacity of estimated image embeds unit [g to each i, g I+1, g I+2], at first according to intermediate pixel g I+1And the difference of former and later two pixels and and parameter T between relation, confirm g I+1Transformable scope
Figure FSB00000510306100011
Pass through then
Figure FSB00000510306100012
Obtain embedding unit [g with parameter k i, g I+1, g I+2] embedding capacity n, if the total volume that image respectively embeds the unit is then revised parameter T less than the capacity that will embed secret information M, and estimated image capacity again, otherwise carry out next step;
(14) each of the order traversing graph picture that generates according to second key embeds unit, and pending unit is [g i, g I+1, g I+2], confirm wherein according to step (13) method between the variable scope of pixel
Figure FSB00000510306100013
And embeddable information capacity n, order is extracted the n Bit data and is transferred decimal number b to from secret information M then, changes g by following formula I+1Be g ' I+1Realize embedding:
g ′ i + 1 = arg min e { | e - g i + 1 | | | e - g i | ≡ b ( mod 2 n ) , e ∈ range g ′ i + 1 }
Repeating this step all is embedded into until all secret informations;
(15) angle that generates according to first key is rotated counterclockwise each image block, and step (13) is estimated that the parameter T that obtains is embedded in the image-region preset, that be not used in the secret information embedding, generates the image that conceals after writing;
The image block concrete operations of said step (11) are: the image block Blk (j) that at first is decomposed into the gray level image I of M * N size zero lap Bz * Bz size; Bz=3k; K ∈ N; J=1; 2...S, total number of
Figure FSB00000510306100021
presentation video piece wherein;
Said step (13) confirms to embed unit [g i, g I+1, g I+2] method that embeds capacity is: calculate Wherein
Figure FSB00000510306100023
The expression set
Figure FSB00000510306100024
Element number, if n>0, then expression embeds unit [g i, g I+1, g I+2] the embedding capacity be the n bit;
Said step (13) parameter modification and image volume revaluation method are: statistical picture respectively embeds total embedding capacity of unit; If this capacity greater than to embed the length of scale-of-two secret information M; Then change step (14), otherwise parameter T is reduced to T-1, change the embedding capacity that step (13) reappraises image; If T reduces to 0, then presentation video I does not have the given secret information M of enough space embeddings;
The extraction of said secret information comprises following substep:
(21) image is carried out piecemeal, each image block is done clockwise angle rotation at random according to the angle that first key generates;
(22) image is arranged with row major order obtained a row vector, and this row vector is divided into the embedding unit of 1 * 3 size in zero lap zone;
(23) extract parameter T from the latent predeterminable area of writing the back image, the order that generates according to second key then travels through and extracts the secret information that respectively embeds the unit, all is extracted until all secret informations.
2. self-adapting airspace steganography method according to claim 1 is characterized in that the anglec of rotation at random that is generated by first key of said step (11), and its span is [0 90 180 270].
3. self-adapting airspace steganography method according to claim 1 is characterized in that said step (13) confirms intermediate pixel g I+1Transformable scope
Figure FSB00000510306100025
Calculate according to following four kinds of situation:
Situation 1:g I+1<g iAnd g I+1<g I+2
If | d 1|>T and | d 2|>T
range g ′ i + 1 = [ 0 , . . . , min ( g i - T - 1 , g i + 2 - T - 1 ) ]
If | d 1|>T and | d 2|≤T
range g ′ i + 1 = [ max ( g i + 2 - T , 0 ) , . . . , min ( g i - T - 1 , g i + 2 - 1 ) ]
If | d 1|≤T and | d 2|>T
range g ′ i + 1 = [ max ( g i - T , 0 ) , . . . , min ( g i + 2 - T - 1 , g i - 1 ) ]
Situation 2:g I+1>g iAnd g I+1>g I+2
If | d 1|>T and | d 2|>T
range g ′ i + 1 = [ max ( g i + T + 1 , g i + 2 + T + 1 ) , . . . , 255 ]
If | d 1|>T and | d 2|≤T
range g ′ i + 1 = [ max ( g i + T + 1 , g i + 2 + 1 ) , . . . , min ( g i + 2 + T , 255 ) ]
If | d 1|≤T and | d 2|>T
range g ′ i + 1 = [ max ( g i + 2 + T + 1 , g i + 1 ) , . . . , min ( g i + T , 255 ) ]
Situation 3:g i>=g I+1>=g I+2
If | d 1|>T and | d 2|>T
range g ′ i + 1 = [ g i + 2 + T + 1 , . . . , g i - T - 1 ]
If | d 1|>T and | d 2|≤T
range g ′ i + 1 = [ g i + 2 , . . . , min ( g i + 2 + T , g i - T - 1 ) ]
If | d 1|≤T and | d 2|>T
range g ′ i + 1 = [ max ( g i + 2 + T + 1 , g i - T ) , . . . , g i ]
Situation 4:g i≤g I+1≤g I+2
If | d 1|>T and | d 2|>T
range g ′ i + 1 = [ g i + T + 1 , . . . , g i + 2 - T - 1 ]
If | d 1|>T and | d 2|≤T
range g ′ i + 1 = [ max ( g i + 2 - T , g i + T + 1 ) , . . . , g i + 2 ]
If | d 1|≤T and | d 2|>T
range g ′ i + 1 = [ g i , . . . , min ( g i + 2 - T - 1 , g i + T ) ]
Wherein, d 1=g I+1-g i, d 2=g I+2-g I+1
4. self-adapting airspace steganography method according to claim 1 is characterized in that said step (23) is specific as follows to the extraction operation that embeds secret information in the unit:
If the embedding unit [g of information to be extracted i, g ' I+1, g I+2], if | g ' I+1-g i|≤T and | g I+2-g ' I+1|≤T then skip to next embedding unit, otherwise (13) calculates intermediate pixel g ' at first set by step I+1Variation range Calculate then
Figure FSB00000510306100045
Obtain g ' I+1Embedded quantity be n, calculate b ≡ again | g ' I+1-g i| (mod2 n), obtain the decimal representation b of n position secret information, transfer b to binary number at last and obtain embedding unit [g i, g ' I+1, g I+2] secret information.
CN200910037649XA 2009-03-06 2009-03-06 Adaptive spatial steganographic method based on adjacent pixel difference Expired - Fee Related CN101582157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910037649XA CN101582157B (en) 2009-03-06 2009-03-06 Adaptive spatial steganographic method based on adjacent pixel difference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910037649XA CN101582157B (en) 2009-03-06 2009-03-06 Adaptive spatial steganographic method based on adjacent pixel difference

Publications (2)

Publication Number Publication Date
CN101582157A CN101582157A (en) 2009-11-18
CN101582157B true CN101582157B (en) 2012-06-06

Family

ID=41364293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910037649XA Expired - Fee Related CN101582157B (en) 2009-03-06 2009-03-06 Adaptive spatial steganographic method based on adjacent pixel difference

Country Status (1)

Country Link
CN (1) CN101582157B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2559028A (en) * 2016-12-03 2018-07-25 Zensar Tech Limited A computer implemented system and method for steganography

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220455B (en) * 2012-01-19 2017-05-24 公立大学法人会津大学 Apparatus and method for hiding secret information, and secret information restoring device and method
CN102905134B (en) * 2012-10-22 2015-06-03 山东省计算中心 Adaptive video digital steganography method
CN104202500B (en) * 2014-07-23 2017-07-28 西安空间无线电技术研究所 A kind of controllable high content information of carrier quality hides transmission method
CN104484851B (en) * 2014-12-23 2017-10-03 西华大学 The method that the image information of adaptive high power capacity is hidden
CN104537601B (en) * 2014-12-23 2017-12-08 中山大学 A kind of gray level image spatial domain steganography method based on nine grids
CN105894437A (en) * 2016-03-31 2016-08-24 柳州城市职业学院 Steganography algorithm based on Markov chain
CN106169189B (en) * 2016-06-24 2019-08-27 中国科学院信息工程研究所 STC coding method based on embedded quantity bilayer Optimal Ratio
CN106791265B (en) * 2016-11-11 2019-06-11 陕西师范大学 A kind of insertion of improvement EMD Image Steganographic and extracting method based on no weight vector
CN107105324B (en) * 2017-03-31 2020-10-16 武汉斗鱼网络科技有限公司 Method and client for protecting bullet screen information
CN109934760B (en) * 2019-01-29 2023-04-07 深圳大学 Adaptive steganography method, system and device for spatial domain image
CN109874015B (en) * 2019-03-04 2021-08-20 武汉轻工大学 Video steganography method with variable bit number, user equipment, storage medium and device
CN110211039B (en) * 2019-04-29 2021-03-23 西安电子科技大学 Image processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2559028A (en) * 2016-12-03 2018-07-25 Zensar Tech Limited A computer implemented system and method for steganography

Also Published As

Publication number Publication date
CN101582157A (en) 2009-11-18

Similar Documents

Publication Publication Date Title
CN101582157B (en) Adaptive spatial steganographic method based on adjacent pixel difference
Li et al. A steganographic method based upon JPEG and particle swarm optimization algorithm
CN105761199B (en) A kind of Robust Color Image water mark method based on combination fields
CN108648134B (en) Spatial domain color digital image blind watermarking method fusing discrete wavelet transform
Tian et al. An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection
CN104168484A (en) Video watermarking method based on visual attention mechanism
CN109102454B (en) Color QR code digital blind watermarking method integrating fast Fourier transform
Mahajan et al. Adaptive steganography: a survey of recent statistical aware steganography techniques
CN104053074A (en) Video watermarking method based on depth image and Otsu segmentation
CN105512999A (en) Dual-transform color image holographic watermarking method
CN106204410B (en) A kind of novel digital watermark method decomposed based on matrix Schur
CN102223561B (en) Blind watermark embedding and extracting method of stereoscopic video image
KR101135472B1 (en) Reversible watermark inserting, extracting and original contents restoring methods using difference histogram
CN115482142A (en) Dark watermark adding method, extracting method, system, storage medium and terminal
CN103366332B (en) A kind of image watermark method based on depth information
CN116579908B (en) Method and device for implanting encrypted hidden information into image
Dharwadkar et al. Watermarking scheme for color images using wavelet transform based texture properties and secret sharing
CN106157233B (en) A kind of good digital water mark method decomposed based on matrix Schur
Chen et al. A wavelet-based image watermarking scheme for stereoscopic video frames
Khan An efficient neural network based algorithm of steganography for image
Venugopala et al. Evaluation of video watermarking algorithms on mobile device
Leng et al. High payload data hiding based on just noticeable distortion profile and LSB substitution
Bánoci et al. 2D-Spread spectrum watermark framework for multimedia copyright protection
Xu et al. Estimation of MB steganography based on least square method
Hernández et al. Robust watermarking based on histogram modification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120606

Termination date: 20130306