CN111614964A - Non-additive steganography method for enhancing JPEG image block boundary continuity - Google Patents

Non-additive steganography method for enhancing JPEG image block boundary continuity Download PDF

Info

Publication number
CN111614964A
CN111614964A CN202010472722.2A CN202010472722A CN111614964A CN 111614964 A CN111614964 A CN 111614964A CN 202010472722 A CN202010472722 A CN 202010472722A CN 111614964 A CN111614964 A CN 111614964A
Authority
CN
China
Prior art keywords
image
carrier
carrier sub
updating
distortion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010472722.2A
Other languages
Chinese (zh)
Other versions
CN111614964B (en
Inventor
张卫明
俞能海
王垚飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN202010472722.2A priority Critical patent/CN111614964B/en
Publication of CN111614964A publication Critical patent/CN111614964A/en
Application granted granted Critical
Publication of CN111614964B publication Critical patent/CN111614964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/12Selection from among a plurality of transforms or standards, e.g. selection between discrete cosine transform [DCT] and sub-band transform or selection between H.263 and H.264
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/154Measured or subjectively estimated visual quality after decoding, e.g. measurement of distortion

Abstract

The invention discloses a non-additive steganography method for enhancing the continuity of the boundary of a JPEG image block, which adopts multi-round embedding, updates the carrier and distortion of the next round after each round of embedding, compensates the damage of embedding to the continuity of the block boundary by updating a part of the carrier without embedding information, and prevents the damage caused by the next round of embedding by updating the distortion, so that the carrier and the distortion are updated to maintain the continuity of the boundary of a space domain block; experimental results show that the method can better maintain the continuity of the boundary of the space domain block and further improve the detection resistance of steganography.

Description

Non-additive steganography method for enhancing JPEG image block boundary continuity
Technical Field
The invention relates to the technical field of steganography, in particular to a non-additive steganography method for enhancing the continuity of JPEG image block boundaries.
Background
Steganography is a technology of covert communication, and aims to realize covert communication by using digital multimedia (such as images) as a carrier to cover secret information. At present, the mainstream adaptive steganography technology is to reasonably define an additive distortion function based on image texture and further utilize a minimized distortion steganography code STC to achieve high security. However, due to the correlation between natural image elements, non-additive distortion functions are more suitable for steganography requirements. At present, a principle of defining non-additive distortion is provided for each of spatial domain images and DCT domain images, the first principle is independently proposed by Li et al and Denmark et al, and the principle is called as a direction consistency principle (SMD), which indicates that the anti-detection performance of adjacent pixels in the homodromous modification in the steganography process is higher. However, the principle is not applicable to JPEG images, and as JPEG images become mainstream media of social networks, requirements for steganography of JPEG images are more and more vigorous, and then Li et al propose a "block boundary consistency principle (BBC)" for JPEG images by studying the correlation of coefficients at the same position of adjacent DCT blocks, wherein the purpose of the principle is to improve the anti-detection performance by maintaining the continuity of space block boundaries in the steganography process.
Although the BBC principle has some effect, Li et al only consider the influence of DCT coefficients at the same position in adjacent blocks on the boundary of a spatial block, which is not sufficient, because changing one DCT coefficient may affect 64 pixels, and a plurality of DCT coefficients may be changed in the same block during steganography, and thus, the anti-detection performance still needs to be improved.
Disclosure of Invention
The invention aims to provide a non-additive steganography method for enhancing the continuity of JPEG image block boundaries, which can better maintain the continuity of space domain block boundaries in the steganography process so as to improve the detection resistance of steganography
The purpose of the invention is realized by the following technical scheme:
a non-additive steganography method for enhancing the continuity of JPEG image block boundaries comprises the following steps:
dividing the carrier image into N non-coincident carrier sub-images, dividing the message to be embedded into N equal parts, and embedding each divided message into one carrier sub-image one by one in a zigzag scanning mode;
at the initial moment, k is 1, embedding a first section of information into a first carrier sub-image by using initially calculated distortion, updating the spatial domain pixel of a second carrier sub-image according to the spatial domain difference matrix corresponding to the obtained first carrier sub-image, updating the second carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
embedding the kth section of information into the updated kth carrier sub-image by using the distortion updated at the previous moment at the moment that k is more than 1 and less than N, updating the spatial domain pixel of the (k + 1) th carrier sub-image according to the spatial domain difference matrix corresponding to the obtained kth carrier sub-image, updating the (k + 1) th carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
and when k is equal to N, embedding the nth segment of message into the updated nth carrier sub-image by using the distortion updated at the last moment to obtain the nth carrier sub-image, and forming a final carrier image by the N carrier sub-images.
According to the technical scheme provided by the invention, multiple rounds of embedding are adopted, the carrier and distortion of the next round are updated after each round of embedding, the damage of embedding to the block boundary continuity is compensated by updating a part of carriers without embedded messages, and the damage caused by the next round of embedding is prevented by updating the distortion, so that the carrier and the distortion are updated to maintain the continuity of the space domain block boundary; experimental results show that the method can better maintain the continuity of the boundary of the space domain block and further improve the detection resistance of steganography.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a flowchart of a non-additive steganography method for enhancing the continuity of boundaries of JPEG image blocks according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating message embedding according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a modification of the spatial domain block boundary according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a first experimental result provided by an embodiment of the present invention;
fig. 5 is a schematic diagram of a second experimental result provided in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a non-additive steganography method for enhancing the continuity of JPEG image block boundaries, which comprises the following steps:
dividing the carrier image into N non-coincident carrier sub-images, dividing the message to be embedded into N equal parts, and embedding each divided message into one carrier sub-image one by one in a zigzag scanning mode;
at the initial moment, k is 1, embedding a first section of information into a first carrier sub-image by using initially calculated distortion, updating the spatial domain pixel of a second carrier sub-image according to the spatial domain difference matrix corresponding to the obtained first carrier sub-image, updating the second carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
embedding the kth section of information into the updated kth carrier sub-image by using the distortion updated at the previous moment at the moment that k is more than 1 and less than N, updating the spatial domain pixel of the (k + 1) th carrier sub-image according to the spatial domain difference matrix corresponding to the obtained kth carrier sub-image, updating the (k + 1) th carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
and when k is equal to N, embedding the nth segment of message into the updated nth carrier sub-image by using the distortion updated at the last moment to obtain the nth carrier sub-image, and forming a final carrier image by the N carrier sub-images.
According to the scheme of the embodiment of the invention, multiple rounds of embedding are adopted, and the carrier and distortion of the next round are updated after each round of embedding, the damage of embedding to the block boundary continuity is compensated by updating a part of carriers without embedded messages, and the damage caused by the next round of embedding is prevented by updating the distortion, so that the carrier and the distortion are updated to maintain the spatial block boundary continuity. Experimental results show that the scheme can better maintain the continuity of the boundary of the airspace block and further improve the detection resistance of steganography.
For ease of understanding, the above-described scheme is further described below.
The JPEG image non-additive steganography method provided by the embodiment of the invention can be called BBC + +; the scheme can better maintain the continuity of the space block boundary in the steganography process, and the basic flow is shown in figure 1. In the embodiment of the present invention, N-4 is taken as an example for introduction, and fig. 2 is a sample of divided carrier sub-images, where C represents a carrier image, and C represents a carrier image(a,b)The modification of the spatial block boundaries is illustrated in fig. 3, part (a) of fig. 3 is "1013. jpg" in bossbase1.0.1, the quality factor QF is 75, part (b) of fig. 3 is a part of part (a) of size 128 ×, part (c) to part (e) of fig. 3 are spatial modifications obtained using different methods at an embedding rate of 0.5bpnzac, where white and black represent points modified and white represents modification points in the block boundaries with the same modification direction, experimental results are illustrated in fig. 4 and 5, experimental results are illustrated in the image library of bossbase1.0.1, with different embedding rates of 0.1-0.5 bpnzac, with different base distortion and different base distortion, and with different implicit analysis of dcr error detection characteristics under different GFR and gfrd-ward, and with different underlying analysis of error detection rates
Figure BDA0002514849450000041
It can be seen that at different embedding rates, different base distortions and nonuniformitiesUnder the condition of the same quality factor, the BBC + + based method can improve the safety of the existing steganography, which shows that the steganography safety performance of the scheme is superior to that of a distortion-based steganography scheme and a BBC-based steganography scheme.
The specific process of the scheme is as follows:
inspired by CMD strategy, dividing the JPEG-format carrier image into four non-coincident carrier sub-images, and defining the space domain pixel set corresponding to the carrier sub-images as
Figure BDA0002514849450000042
The carrier sub-image is represented as:
Figure BDA0002514849450000043
wherein the content of the first and second substances,
Figure BDA0002514849450000044
for elements in the carrier sub-image, (a, b) specify the position of the 8 × 8DCT block, (k, l) specify the element position within the DCT block, m, n ∈ {1, 2 };
Figure BDA0002514849450000045
Figure BDA0002514849450000046
Figure BDA0002514849450000047
to round down the symbol, n1And n2Respectively the number of rows and columns of the image.
At the same time, the message is also quartered, and the message is sequentially embedded into four sub-images in a zigzag scanning manner, as shown in fig. 2, the sequence of embedding the four segments of message into the sub-images of the carrier is
Figure BDA0002514849450000048
In the embedding process, the carrier is updated to make up the continuity of the spatial block boundary first, and then the distortion is updated to prevent the continuity from being damaged.
In an embodiment of the invention, the first carrier sub-image is denoted
Figure BDA0002514849450000049
First embedding the message into the carrier sub-picture with an initially calculated distortion (obtained by calculating the distortion of each DCT coefficient)
Figure BDA00025148494500000410
The carrier C is modified into a secret S, and the corresponding airspace carrier X is modified into a Y; calculating the difference matrix D of the space domain as Y-X and then updating
Figure BDA00025148494500000411
The pixel of (a):
Figure BDA00025148494500000412
wherein the content of the first and second substances,
Figure BDA00025148494500000413
is (1+2 w) in a space carrier X1,2+2w2) Element at position 8 × 8 in row i, column v in the DCT block, likewise
Figure BDA00025148494500000414
The elements in the difference matrix D (superscript as DCT block position, subscript as element position within DCT block),
Figure BDA00025148494500000415
representing the divided second carrier sub-picture
Figure BDA00025148494500000416
Of the spatial-domain set of pixels of (a),
Figure BDA00025148494500000417
i.e. carrier sub-images
Figure BDA00025148494500000418
A corresponding space domain carrier is arranged in the space domain,v ∈ {1, 8}, wherein the left arrow is an update symbol, the arrow points to the update result, and the update is finished
Figure BDA00025148494500000419
Then, the corresponding un-integer DCT coefficient U is obtained through two-dimensional DCT inverse change and quantization table, thereby updating the second carrier sub-image
Figure BDA0002514849450000051
Figure BDA0002514849450000052
Figure BDA0002514849450000053
For the updated spatial domain vector to transform into the elements in the un-rounded frequency domain vector U, round is the rounding function.
And after updating the carrier, updating the corresponding distortion according to the DCT coefficient which is not rounded. And (3) under the enlightenment of the side information, regarding the DCT coefficient which is not rounded as a side information, and defining the rounding error as:
Figure BDA0002514849450000054
the corresponding distortion is updated as follows:
Figure BDA0002514849450000055
wherein the content of the first and second substances,
Figure BDA0002514849450000056
and
Figure BDA0002514849450000057
a distortion of +1 and-1 respectively,
Figure BDA0002514849450000058
in order to be the initial distortion,
Figure BDA0002514849450000059
the elements in the secret sub-images are marked with DCT block positions, the subscripts are the element positions in the DCT blocks, sign (x) is a sign function, and the distortion updating mode is suitable for all the secret sub-images.
Thereafter, a second segment of the message is embedded in a second carrier sub-picture using the updated distortion
Figure BDA00025148494500000510
Then, recalculating the spatial domain difference matrix D, and updating according to the following formula
Figure BDA00025148494500000511
The pixel of (a):
Figure BDA00025148494500000512
DCT coefficients and a third carrier sub-image
Figure BDA00025148494500000513
The distortion update of (2) is the same as previously described. Embedding a message into a third carrier sub-picture using the updated distortion
Figure BDA00025148494500000514
Thereafter, four carrier sub-images are updated
Figure BDA00025148494500000515
Spatial pixel set
Figure BDA00025148494500000516
The pixel of (2).
Due to the fact that
Figure BDA00025148494500000517
Since the image was the last one to be embedded, the positions adjacent to the four corners of each 8 × 8DCT block in the sub-image (i.e., in the other sub-images) were previously embedded and modified, and thus updated, as follows:
for i, j ∈ {2, 3, …, 7}, the update is as follows:
Figure BDA00025148494500000518
for i, j ∈ {1, 8}, the update is as follows:
Figure BDA00025148494500000519
wherein, x and d are elements in the spatial carrier and the difference matrix respectively, the upper mark is the position of the DCT block, and the lower mark is the position of the element in the DCT block.
In a manner similar to that described above,
Figure BDA0002514849450000061
updating carrier sub-images by non-rounded DCT coefficients after updating
Figure BDA0002514849450000062
Updating the corresponding distortion, and embedding the fourth segment message into the updated carrier sub-image according to the updated distortion
Figure BDA0002514849450000063
And obtaining a corresponding fourth secret-carrying subimage.
Finally, the secret-carrying image is formed by all secret-carrying subimages.
Through the above description of the embodiments, it is clear to those skilled in the art that the above embodiments can be implemented by software, and can also be implemented by software plus a necessary general hardware platform. With this understanding, the technical solutions of the embodiments can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (5)

1. A non-additive steganography method for enhancing the continuity of JPEG image block boundaries comprises the following steps:
dividing the carrier image into N non-coincident carrier sub-images, dividing the message to be embedded into N equal parts, and embedding each divided message into one carrier sub-image one by one in a zigzag scanning mode;
at the initial moment, k is 1, embedding a first section of information into a first carrier sub-image by using initially calculated distortion, updating the spatial domain pixel of a second carrier sub-image according to the spatial domain difference matrix corresponding to the obtained first carrier sub-image, updating the second carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
embedding the kth message into the updated kth carrier sub-image by using the distortion updated at the previous moment at the moment that 1< k < N, updating the spatial domain pixel of the (k + 1) th carrier sub-image according to the spatial domain difference matrix corresponding to the obtained kth carrier sub-image, updating the (k + 1) th carrier sub-image by combining the non-rounded DCT coefficient, and then updating the distortion according to the non-rounded DCT coefficient;
and when k is equal to N, embedding the nth segment of message into the updated nth carrier sub-image by using the distortion updated at the last moment to obtain the nth carrier sub-image, and forming a final carrier image by the N carrier sub-images.
2. The non-additive steganography method for enhancing the boundary continuity of a JPEG image block, as recited in claim 1, wherein dividing the carrier image into N non-coincident carrier sub-images comprises:
dividing JPEG-format carrier image into fourNon-coincident carrier sub-images, and defining the spatial pixel set corresponding to the carrier sub-images as
Figure FDA0002514849440000016
The carrier sub-image is represented as:
Figure FDA0002514849440000011
wherein the content of the first and second substances,
Figure FDA0002514849440000017
for elements in the carrier sub-image, (a, b) specify the position of the 8 × 8DCT block, (k, l) specify the element position within the DCT block, m, n ∈ {1, 2 };
Figure FDA0002514849440000012
Figure FDA0002514849440000013
Figure FDA0002514849440000014
to round down the symbol, n1And n2Respectively the number of rows and columns of the image.
3. The non-additive steganography method for enhancing the boundary continuity of a JPEG image block as claimed in claim 1 or 2, wherein the first carrier sub-image is marked as
Figure FDA0002514849440000018
First embedding a message into a carrier sub-picture with an initial distortion
Figure FDA0002514849440000019
In (3), the corresponding airspace carrier X is modified into Y; calculating the difference matrix D of the space domain as Y-X and then updating
Figure FDA00025148494400000110
The pixel of (a):
Figure FDA0002514849440000015
wherein the content of the first and second substances,
Figure FDA00025148494400000111
representing the divided second carrier sub-picture
Figure FDA00025148494400000112
Spatial pixel set, i.e. carrier sub-image
Figure FDA0002514849440000029
Corresponding airspace vector, v ∈ {1, 8 };
Figure FDA00025148494400000210
is (1+2 w) in a space carrier X1,2+2w2) Element at position 8 × 8 in row i, column v in the DCT block, likewise
Figure FDA00025148494400000211
The left arrow is an updating symbol, and the arrow points to an updating result;
is updated completely
Figure FDA00025148494400000212
Then, the corresponding non-integer DCT coefficient is obtained through two-dimensional DCT inverse change and quantization table, thereby updating the second carrier sub-image
Figure FDA00025148494400000213
Figure FDA0002514849440000021
Wherein the content of the first and second substances,
Figure FDA0002514849440000022
Figure FDA0002514849440000023
to round down the symbol, n1And n2Respectively the number of rows and the number of columns of the image,
Figure FDA00025148494400000214
for the updated spatial domain vector to transform into the elements in the un-rounded frequency domain vector U, round is the rounding function.
4. The method as claimed in claim 3, wherein the non-rounded DCT coefficients are considered as a side information, and the rounding error is defined as:
Figure FDA0002514849440000024
the corresponding distortion is updated as follows:
Figure FDA0002514849440000025
Figure FDA0002514849440000026
wherein the content of the first and second substances,
Figure FDA00025148494400000215
and
Figure FDA00025148494400000216
a distortion of +1 and-1 respectively,
Figure FDA00025148494400000217
in order to be the initial distortion,
Figure FDA00025148494400000218
sign (x) is a sign function for elements in the secret sub-image.
5. The non-additive steganography method for enhancing the boundary continuity of a JPEG image block as claimed in claim 3, wherein when N is 4, for a fourth carrier sub-image
Figure FDA00025148494400000219
Updating the corresponding spatial pixel set in the following manner
Figure FDA00025148494400000220
The pixel of (1):
for i, j ∈ {2, 3, …, 7}, the update is as follows:
Figure FDA0002514849440000027
for i, j ∈ {1, 8}, the update is as follows:
Figure FDA0002514849440000028
wherein the content of the first and second substances,
Figure FDA0002514849440000031
Figure FDA0002514849440000032
to round down the symbol, n1And n2The number of rows and columns of the image are respectively, x and d are elements in a space domain carrier and a difference matrix respectively, the upper mark is the position of a DCT block, and the lower mark is the position of the element in the DCT block.
CN202010472722.2A 2020-05-29 2020-05-29 Non-additive steganography method for enhancing JPEG image block boundary continuity Active CN111614964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010472722.2A CN111614964B (en) 2020-05-29 2020-05-29 Non-additive steganography method for enhancing JPEG image block boundary continuity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010472722.2A CN111614964B (en) 2020-05-29 2020-05-29 Non-additive steganography method for enhancing JPEG image block boundary continuity

Publications (2)

Publication Number Publication Date
CN111614964A true CN111614964A (en) 2020-09-01
CN111614964B CN111614964B (en) 2021-08-13

Family

ID=72205521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010472722.2A Active CN111614964B (en) 2020-05-29 2020-05-29 Non-additive steganography method for enhancing JPEG image block boundary continuity

Country Status (1)

Country Link
CN (1) CN111614964B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113436054A (en) * 2021-06-28 2021-09-24 合肥高维数据技术有限公司 Super-resolution network-based image side information estimation steganography method and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936956A (en) * 2006-09-19 2007-03-28 北京邮电大学 Recessive writing detection method in the light of DCT zone LSB recessive writing
JP2008079013A (en) * 2006-09-21 2008-04-03 Canon Inc Image processing apparatus and method
CN102014239A (en) * 2009-09-08 2011-04-13 周岩 High-capacity steganographic method based on JPEG (Joint Photographic Experts Group) digital image
CN103345767A (en) * 2013-07-02 2013-10-09 中国科学技术大学 High-safety JPEG image steganography method
CN107908969A (en) * 2017-11-21 2018-04-13 中山大学 A kind of adaptive steganography method of jpeg image based on Spatial characteristic
CN110009547A (en) * 2019-03-15 2019-07-12 中山大学 A kind of JPEG asymmetrical digital image latent writing method
CN110728613A (en) * 2019-09-18 2020-01-24 武汉大学 Non-additive distortion JPEG image steganography method based on blocking effect
CN111161124A (en) * 2019-12-30 2020-05-15 福建师范大学福清分校 Image steganography method of reference matrix model based on mean square error evaluation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1936956A (en) * 2006-09-19 2007-03-28 北京邮电大学 Recessive writing detection method in the light of DCT zone LSB recessive writing
JP2008079013A (en) * 2006-09-21 2008-04-03 Canon Inc Image processing apparatus and method
CN102014239A (en) * 2009-09-08 2011-04-13 周岩 High-capacity steganographic method based on JPEG (Joint Photographic Experts Group) digital image
CN103345767A (en) * 2013-07-02 2013-10-09 中国科学技术大学 High-safety JPEG image steganography method
CN107908969A (en) * 2017-11-21 2018-04-13 中山大学 A kind of adaptive steganography method of jpeg image based on Spatial characteristic
CN110009547A (en) * 2019-03-15 2019-07-12 中山大学 A kind of JPEG asymmetrical digital image latent writing method
CN110728613A (en) * 2019-09-18 2020-01-24 武汉大学 Non-additive distortion JPEG image steganography method based on blocking effect
CN111161124A (en) * 2019-12-30 2020-05-15 福建师范大学福清分校 Image steganography method of reference matrix model based on mean square error evaluation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
程森: "基于DCT系数大小关系的自适应JPEG隐写", 《武汉大学学报(理学版)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113436054A (en) * 2021-06-28 2021-09-24 合肥高维数据技术有限公司 Super-resolution network-based image side information estimation steganography method and storage medium

Also Published As

Publication number Publication date
CN111614964B (en) 2021-08-13

Similar Documents

Publication Publication Date Title
Chang et al. Effective use of spatial and spectral correlations for color filter array demosaicking
Wang et al. Non-additive cost functions for color image steganography based on inter-channel correlations and differences
CN110232650B (en) Color image watermark embedding method, detection method and system
Wang et al. BBC++: Enhanced block boundary continuity on defining non-additive distortion for JPEG steganography
CN105469353B (en) The embedding grammar and device and extracting method and device of watermarking images
CN109102454B (en) Color QR code digital blind watermarking method integrating fast Fourier transform
Lin et al. Generative adversarial network-based frame extrapolation for video coding
CN109636716A (en) A kind of image super-resolution rebuilding method based on wavelet coefficient study
CN111614964B (en) Non-additive steganography method for enhancing JPEG image block boundary continuity
Yang et al. Efficient reversible data hiding algorithm based on gradient-based edge direction prediction
CN110362964A (en) A kind of high capacity reversible information concealing method based on more histogram modifications
CN101415119B (en) Device and method for compressing image data
Kamal et al. Boosting up the data hiding rate through multi cycle embedment process
CN110533569B (en) Watermark processing method based on quadratic difference expansion
US20090161975A1 (en) Image reducing apparatus and reduced image generating method
CN111065000B (en) Video watermark processing method, device and storage medium
CN109361926B (en) Lossless reversible information hiding method for H.264/AVC video visual quality
Naheed et al. Lossless data hiding using optimized interpolation error expansion
CN108616757B (en) Video watermark embedding and extracting method capable of extracting watermark after copying
CN107292803B (en) Reversible robust digital image watermarking method according with human eye observation rule
CN112911298B (en) HEVC video dual-compression detection method and system based on boundary effect
CN1396769A (en) Compression method and system for moving image information
CN111062851A (en) Image steganography method for resisting statistical detection and scaling attack
Naheed et al. Intelligent reversible digital watermarking technique using interpolation errors
CN114363622B (en) Reversible data steganography method and system based on pixel correlation prediction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant