CN111614964A - Non-additive steganography method for enhancing JPEG image block boundary continuity - Google Patents
Non-additive steganography method for enhancing JPEG image block boundary continuity Download PDFInfo
- Publication number
- CN111614964A CN111614964A CN202010472722.2A CN202010472722A CN111614964A CN 111614964 A CN111614964 A CN 111614964A CN 202010472722 A CN202010472722 A CN 202010472722A CN 111614964 A CN111614964 A CN 111614964A
- Authority
- CN
- China
- Prior art keywords
- image
- carrier
- carrier sub
- updating
- distortion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/12—Selection from among a plurality of transforms or standards, e.g. selection between discrete cosine transform [DCT] and sub-band transform or selection between H.263 and H.264
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/134—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
- H04N19/154—Measured or subjectively estimated visual quality after decoding, e.g. measurement of distortion
Abstract
The invention discloses a non-additive steganography method for enhancing the continuity of the boundary of a JPEG image block, which adopts multi-round embedding, updates the carrier and distortion of the next round after each round of embedding, compensates the damage of embedding to the continuity of the block boundary by updating a part of the carrier without embedding information, and prevents the damage caused by the next round of embedding by updating the distortion, so that the carrier and the distortion are updated to maintain the continuity of the boundary of a space domain block; experimental results show that the method can better maintain the continuity of the boundary of the space domain block and further improve the detection resistance of steganography.
Description
Technical Field
The invention relates to the technical field of steganography, in particular to a non-additive steganography method for enhancing the continuity of JPEG image block boundaries.
Background
Steganography is a technology of covert communication, and aims to realize covert communication by using digital multimedia (such as images) as a carrier to cover secret information. At present, the mainstream adaptive steganography technology is to reasonably define an additive distortion function based on image texture and further utilize a minimized distortion steganography code STC to achieve high security. However, due to the correlation between natural image elements, non-additive distortion functions are more suitable for steganography requirements. At present, a principle of defining non-additive distortion is provided for each of spatial domain images and DCT domain images, the first principle is independently proposed by Li et al and Denmark et al, and the principle is called as a direction consistency principle (SMD), which indicates that the anti-detection performance of adjacent pixels in the homodromous modification in the steganography process is higher. However, the principle is not applicable to JPEG images, and as JPEG images become mainstream media of social networks, requirements for steganography of JPEG images are more and more vigorous, and then Li et al propose a "block boundary consistency principle (BBC)" for JPEG images by studying the correlation of coefficients at the same position of adjacent DCT blocks, wherein the purpose of the principle is to improve the anti-detection performance by maintaining the continuity of space block boundaries in the steganography process.
Although the BBC principle has some effect, Li et al only consider the influence of DCT coefficients at the same position in adjacent blocks on the boundary of a spatial block, which is not sufficient, because changing one DCT coefficient may affect 64 pixels, and a plurality of DCT coefficients may be changed in the same block during steganography, and thus, the anti-detection performance still needs to be improved.
Disclosure of Invention
The invention aims to provide a non-additive steganography method for enhancing the continuity of JPEG image block boundaries, which can better maintain the continuity of space domain block boundaries in the steganography process so as to improve the detection resistance of steganography
The purpose of the invention is realized by the following technical scheme:
a non-additive steganography method for enhancing the continuity of JPEG image block boundaries comprises the following steps:
dividing the carrier image into N non-coincident carrier sub-images, dividing the message to be embedded into N equal parts, and embedding each divided message into one carrier sub-image one by one in a zigzag scanning mode;
at the initial moment, k is 1, embedding a first section of information into a first carrier sub-image by using initially calculated distortion, updating the spatial domain pixel of a second carrier sub-image according to the spatial domain difference matrix corresponding to the obtained first carrier sub-image, updating the second carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
embedding the kth section of information into the updated kth carrier sub-image by using the distortion updated at the previous moment at the moment that k is more than 1 and less than N, updating the spatial domain pixel of the (k + 1) th carrier sub-image according to the spatial domain difference matrix corresponding to the obtained kth carrier sub-image, updating the (k + 1) th carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
and when k is equal to N, embedding the nth segment of message into the updated nth carrier sub-image by using the distortion updated at the last moment to obtain the nth carrier sub-image, and forming a final carrier image by the N carrier sub-images.
According to the technical scheme provided by the invention, multiple rounds of embedding are adopted, the carrier and distortion of the next round are updated after each round of embedding, the damage of embedding to the block boundary continuity is compensated by updating a part of carriers without embedded messages, and the damage caused by the next round of embedding is prevented by updating the distortion, so that the carrier and the distortion are updated to maintain the continuity of the space domain block boundary; experimental results show that the method can better maintain the continuity of the boundary of the space domain block and further improve the detection resistance of steganography.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a flowchart of a non-additive steganography method for enhancing the continuity of boundaries of JPEG image blocks according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating message embedding according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a modification of the spatial domain block boundary according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a first experimental result provided by an embodiment of the present invention;
fig. 5 is a schematic diagram of a second experimental result provided in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a non-additive steganography method for enhancing the continuity of JPEG image block boundaries, which comprises the following steps:
dividing the carrier image into N non-coincident carrier sub-images, dividing the message to be embedded into N equal parts, and embedding each divided message into one carrier sub-image one by one in a zigzag scanning mode;
at the initial moment, k is 1, embedding a first section of information into a first carrier sub-image by using initially calculated distortion, updating the spatial domain pixel of a second carrier sub-image according to the spatial domain difference matrix corresponding to the obtained first carrier sub-image, updating the second carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
embedding the kth section of information into the updated kth carrier sub-image by using the distortion updated at the previous moment at the moment that k is more than 1 and less than N, updating the spatial domain pixel of the (k + 1) th carrier sub-image according to the spatial domain difference matrix corresponding to the obtained kth carrier sub-image, updating the (k + 1) th carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
and when k is equal to N, embedding the nth segment of message into the updated nth carrier sub-image by using the distortion updated at the last moment to obtain the nth carrier sub-image, and forming a final carrier image by the N carrier sub-images.
According to the scheme of the embodiment of the invention, multiple rounds of embedding are adopted, and the carrier and distortion of the next round are updated after each round of embedding, the damage of embedding to the block boundary continuity is compensated by updating a part of carriers without embedded messages, and the damage caused by the next round of embedding is prevented by updating the distortion, so that the carrier and the distortion are updated to maintain the spatial block boundary continuity. Experimental results show that the scheme can better maintain the continuity of the boundary of the airspace block and further improve the detection resistance of steganography.
For ease of understanding, the above-described scheme is further described below.
The JPEG image non-additive steganography method provided by the embodiment of the invention can be called BBC + +; the scheme can better maintain the continuity of the space block boundary in the steganography process, and the basic flow is shown in figure 1. In the embodiment of the present invention, N-4 is taken as an example for introduction, and fig. 2 is a sample of divided carrier sub-images, where C represents a carrier image, and C represents a carrier image(a,b)The modification of the spatial block boundaries is illustrated in fig. 3, part (a) of fig. 3 is "1013. jpg" in bossbase1.0.1, the quality factor QF is 75, part (b) of fig. 3 is a part of part (a) of size 128 ×, part (c) to part (e) of fig. 3 are spatial modifications obtained using different methods at an embedding rate of 0.5bpnzac, where white and black represent points modified and white represents modification points in the block boundaries with the same modification direction, experimental results are illustrated in fig. 4 and 5, experimental results are illustrated in the image library of bossbase1.0.1, with different embedding rates of 0.1-0.5 bpnzac, with different base distortion and different base distortion, and with different implicit analysis of dcr error detection characteristics under different GFR and gfrd-ward, and with different underlying analysis of error detection ratesIt can be seen that at different embedding rates, different base distortions and nonuniformitiesUnder the condition of the same quality factor, the BBC + + based method can improve the safety of the existing steganography, which shows that the steganography safety performance of the scheme is superior to that of a distortion-based steganography scheme and a BBC-based steganography scheme.
The specific process of the scheme is as follows:
inspired by CMD strategy, dividing the JPEG-format carrier image into four non-coincident carrier sub-images, and defining the space domain pixel set corresponding to the carrier sub-images asThe carrier sub-image is represented as:
wherein the content of the first and second substances,for elements in the carrier sub-image, (a, b) specify the position of the 8 × 8DCT block, (k, l) specify the element position within the DCT block, m, n ∈ {1, 2 }; to round down the symbol, n1And n2Respectively the number of rows and columns of the image.
At the same time, the message is also quartered, and the message is sequentially embedded into four sub-images in a zigzag scanning manner, as shown in fig. 2, the sequence of embedding the four segments of message into the sub-images of the carrier is
In the embedding process, the carrier is updated to make up the continuity of the spatial block boundary first, and then the distortion is updated to prevent the continuity from being damaged.
In an embodiment of the invention, the first carrier sub-image is denotedFirst embedding the message into the carrier sub-picture with an initially calculated distortion (obtained by calculating the distortion of each DCT coefficient)The carrier C is modified into a secret S, and the corresponding airspace carrier X is modified into a Y; calculating the difference matrix D of the space domain as Y-X and then updatingThe pixel of (a):
wherein the content of the first and second substances,is (1+2 w) in a space carrier X1,2+2w2) Element at position 8 × 8 in row i, column v in the DCT block, likewiseThe elements in the difference matrix D (superscript as DCT block position, subscript as element position within DCT block),representing the divided second carrier sub-pictureOf the spatial-domain set of pixels of (a),i.e. carrier sub-imagesA corresponding space domain carrier is arranged in the space domain,v ∈ {1, 8}, wherein the left arrow is an update symbol, the arrow points to the update result, and the update is finishedThen, the corresponding un-integer DCT coefficient U is obtained through two-dimensional DCT inverse change and quantization table, thereby updating the second carrier sub-image For the updated spatial domain vector to transform into the elements in the un-rounded frequency domain vector U, round is the rounding function.
And after updating the carrier, updating the corresponding distortion according to the DCT coefficient which is not rounded. And (3) under the enlightenment of the side information, regarding the DCT coefficient which is not rounded as a side information, and defining the rounding error as:
the corresponding distortion is updated as follows:
wherein the content of the first and second substances,anda distortion of +1 and-1 respectively,in order to be the initial distortion,the elements in the secret sub-images are marked with DCT block positions, the subscripts are the element positions in the DCT blocks, sign (x) is a sign function, and the distortion updating mode is suitable for all the secret sub-images.
Thereafter, a second segment of the message is embedded in a second carrier sub-picture using the updated distortionThen, recalculating the spatial domain difference matrix D, and updating according to the following formulaThe pixel of (a):
DCT coefficients and a third carrier sub-imageThe distortion update of (2) is the same as previously described. Embedding a message into a third carrier sub-picture using the updated distortionThereafter, four carrier sub-images are updatedSpatial pixel setThe pixel of (2).
Due to the fact thatSince the image was the last one to be embedded, the positions adjacent to the four corners of each 8 × 8DCT block in the sub-image (i.e., in the other sub-images) were previously embedded and modified, and thus updated, as follows:
for i, j ∈ {2, 3, …, 7}, the update is as follows:
for i, j ∈ {1, 8}, the update is as follows:
wherein, x and d are elements in the spatial carrier and the difference matrix respectively, the upper mark is the position of the DCT block, and the lower mark is the position of the element in the DCT block.
In a manner similar to that described above,updating carrier sub-images by non-rounded DCT coefficients after updatingUpdating the corresponding distortion, and embedding the fourth segment message into the updated carrier sub-image according to the updated distortionAnd obtaining a corresponding fourth secret-carrying subimage.
Finally, the secret-carrying image is formed by all secret-carrying subimages.
Through the above description of the embodiments, it is clear to those skilled in the art that the above embodiments can be implemented by software, and can also be implemented by software plus a necessary general hardware platform. With this understanding, the technical solutions of the embodiments can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (5)
1. A non-additive steganography method for enhancing the continuity of JPEG image block boundaries comprises the following steps:
dividing the carrier image into N non-coincident carrier sub-images, dividing the message to be embedded into N equal parts, and embedding each divided message into one carrier sub-image one by one in a zigzag scanning mode;
at the initial moment, k is 1, embedding a first section of information into a first carrier sub-image by using initially calculated distortion, updating the spatial domain pixel of a second carrier sub-image according to the spatial domain difference matrix corresponding to the obtained first carrier sub-image, updating the second carrier sub-image by combining the DCT coefficient which is not rounded, and then updating the distortion according to the DCT coefficient which is not rounded;
embedding the kth message into the updated kth carrier sub-image by using the distortion updated at the previous moment at the moment that 1< k < N, updating the spatial domain pixel of the (k + 1) th carrier sub-image according to the spatial domain difference matrix corresponding to the obtained kth carrier sub-image, updating the (k + 1) th carrier sub-image by combining the non-rounded DCT coefficient, and then updating the distortion according to the non-rounded DCT coefficient;
and when k is equal to N, embedding the nth segment of message into the updated nth carrier sub-image by using the distortion updated at the last moment to obtain the nth carrier sub-image, and forming a final carrier image by the N carrier sub-images.
2. The non-additive steganography method for enhancing the boundary continuity of a JPEG image block, as recited in claim 1, wherein dividing the carrier image into N non-coincident carrier sub-images comprises:
dividing JPEG-format carrier image into fourNon-coincident carrier sub-images, and defining the spatial pixel set corresponding to the carrier sub-images asThe carrier sub-image is represented as:
wherein the content of the first and second substances,for elements in the carrier sub-image, (a, b) specify the position of the 8 × 8DCT block, (k, l) specify the element position within the DCT block, m, n ∈ {1, 2 }; to round down the symbol, n1And n2Respectively the number of rows and columns of the image.
3. The non-additive steganography method for enhancing the boundary continuity of a JPEG image block as claimed in claim 1 or 2, wherein the first carrier sub-image is marked as
First embedding a message into a carrier sub-picture with an initial distortionIn (3), the corresponding airspace carrier X is modified into Y; calculating the difference matrix D of the space domain as Y-X and then updatingThe pixel of (a):
wherein the content of the first and second substances,representing the divided second carrier sub-pictureSpatial pixel set, i.e. carrier sub-imageCorresponding airspace vector, v ∈ {1, 8 };is (1+2 w) in a space carrier X1,2+2w2) Element at position 8 × 8 in row i, column v in the DCT block, likewiseThe left arrow is an updating symbol, and the arrow points to an updating result;
is updated completelyThen, the corresponding non-integer DCT coefficient is obtained through two-dimensional DCT inverse change and quantization table, thereby updating the second carrier sub-image
Wherein the content of the first and second substances, to round down the symbol, n1And n2Respectively the number of rows and the number of columns of the image,for the updated spatial domain vector to transform into the elements in the un-rounded frequency domain vector U, round is the rounding function.
4. The method as claimed in claim 3, wherein the non-rounded DCT coefficients are considered as a side information, and the rounding error is defined as:
the corresponding distortion is updated as follows:
5. The non-additive steganography method for enhancing the boundary continuity of a JPEG image block as claimed in claim 3, wherein when N is 4, for a fourth carrier sub-imageUpdating the corresponding spatial pixel set in the following mannerThe pixel of (1):
for i, j ∈ {2, 3, …, 7}, the update is as follows:
for i, j ∈ {1, 8}, the update is as follows:
wherein the content of the first and second substances, to round down the symbol, n1And n2The number of rows and columns of the image are respectively, x and d are elements in a space domain carrier and a difference matrix respectively, the upper mark is the position of a DCT block, and the lower mark is the position of the element in the DCT block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010472722.2A CN111614964B (en) | 2020-05-29 | 2020-05-29 | Non-additive steganography method for enhancing JPEG image block boundary continuity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010472722.2A CN111614964B (en) | 2020-05-29 | 2020-05-29 | Non-additive steganography method for enhancing JPEG image block boundary continuity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111614964A true CN111614964A (en) | 2020-09-01 |
CN111614964B CN111614964B (en) | 2021-08-13 |
Family
ID=72205521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010472722.2A Active CN111614964B (en) | 2020-05-29 | 2020-05-29 | Non-additive steganography method for enhancing JPEG image block boundary continuity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111614964B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113436054A (en) * | 2021-06-28 | 2021-09-24 | 合肥高维数据技术有限公司 | Super-resolution network-based image side information estimation steganography method and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936956A (en) * | 2006-09-19 | 2007-03-28 | 北京邮电大学 | Recessive writing detection method in the light of DCT zone LSB recessive writing |
JP2008079013A (en) * | 2006-09-21 | 2008-04-03 | Canon Inc | Image processing apparatus and method |
CN102014239A (en) * | 2009-09-08 | 2011-04-13 | 周岩 | High-capacity steganographic method based on JPEG (Joint Photographic Experts Group) digital image |
CN103345767A (en) * | 2013-07-02 | 2013-10-09 | 中国科学技术大学 | High-safety JPEG image steganography method |
CN107908969A (en) * | 2017-11-21 | 2018-04-13 | 中山大学 | A kind of adaptive steganography method of jpeg image based on Spatial characteristic |
CN110009547A (en) * | 2019-03-15 | 2019-07-12 | 中山大学 | A kind of JPEG asymmetrical digital image latent writing method |
CN110728613A (en) * | 2019-09-18 | 2020-01-24 | 武汉大学 | Non-additive distortion JPEG image steganography method based on blocking effect |
CN111161124A (en) * | 2019-12-30 | 2020-05-15 | 福建师范大学福清分校 | Image steganography method of reference matrix model based on mean square error evaluation |
-
2020
- 2020-05-29 CN CN202010472722.2A patent/CN111614964B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1936956A (en) * | 2006-09-19 | 2007-03-28 | 北京邮电大学 | Recessive writing detection method in the light of DCT zone LSB recessive writing |
JP2008079013A (en) * | 2006-09-21 | 2008-04-03 | Canon Inc | Image processing apparatus and method |
CN102014239A (en) * | 2009-09-08 | 2011-04-13 | 周岩 | High-capacity steganographic method based on JPEG (Joint Photographic Experts Group) digital image |
CN103345767A (en) * | 2013-07-02 | 2013-10-09 | 中国科学技术大学 | High-safety JPEG image steganography method |
CN107908969A (en) * | 2017-11-21 | 2018-04-13 | 中山大学 | A kind of adaptive steganography method of jpeg image based on Spatial characteristic |
CN110009547A (en) * | 2019-03-15 | 2019-07-12 | 中山大学 | A kind of JPEG asymmetrical digital image latent writing method |
CN110728613A (en) * | 2019-09-18 | 2020-01-24 | 武汉大学 | Non-additive distortion JPEG image steganography method based on blocking effect |
CN111161124A (en) * | 2019-12-30 | 2020-05-15 | 福建师范大学福清分校 | Image steganography method of reference matrix model based on mean square error evaluation |
Non-Patent Citations (1)
Title |
---|
程森: "基于DCT系数大小关系的自适应JPEG隐写", 《武汉大学学报(理学版)》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113436054A (en) * | 2021-06-28 | 2021-09-24 | 合肥高维数据技术有限公司 | Super-resolution network-based image side information estimation steganography method and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111614964B (en) | 2021-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chang et al. | Effective use of spatial and spectral correlations for color filter array demosaicking | |
Wang et al. | Non-additive cost functions for color image steganography based on inter-channel correlations and differences | |
CN110232650B (en) | Color image watermark embedding method, detection method and system | |
Wang et al. | BBC++: Enhanced block boundary continuity on defining non-additive distortion for JPEG steganography | |
CN105469353B (en) | The embedding grammar and device and extracting method and device of watermarking images | |
CN109102454B (en) | Color QR code digital blind watermarking method integrating fast Fourier transform | |
Lin et al. | Generative adversarial network-based frame extrapolation for video coding | |
CN109636716A (en) | A kind of image super-resolution rebuilding method based on wavelet coefficient study | |
CN111614964B (en) | Non-additive steganography method for enhancing JPEG image block boundary continuity | |
Yang et al. | Efficient reversible data hiding algorithm based on gradient-based edge direction prediction | |
CN110362964A (en) | A kind of high capacity reversible information concealing method based on more histogram modifications | |
CN101415119B (en) | Device and method for compressing image data | |
Kamal et al. | Boosting up the data hiding rate through multi cycle embedment process | |
CN110533569B (en) | Watermark processing method based on quadratic difference expansion | |
US20090161975A1 (en) | Image reducing apparatus and reduced image generating method | |
CN111065000B (en) | Video watermark processing method, device and storage medium | |
CN109361926B (en) | Lossless reversible information hiding method for H.264/AVC video visual quality | |
Naheed et al. | Lossless data hiding using optimized interpolation error expansion | |
CN108616757B (en) | Video watermark embedding and extracting method capable of extracting watermark after copying | |
CN107292803B (en) | Reversible robust digital image watermarking method according with human eye observation rule | |
CN112911298B (en) | HEVC video dual-compression detection method and system based on boundary effect | |
CN1396769A (en) | Compression method and system for moving image information | |
CN111062851A (en) | Image steganography method for resisting statistical detection and scaling attack | |
Naheed et al. | Intelligent reversible digital watermarking technique using interpolation errors | |
CN114363622B (en) | Reversible data steganography method and system based on pixel correlation prediction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |