CN100352256C - Sequential picture enciphering method based on blind source separation - Google Patents

Sequential picture enciphering method based on blind source separation Download PDF

Info

Publication number
CN100352256C
CN100352256C CNB2005100467378A CN200510046737A CN100352256C CN 100352256 C CN100352256 C CN 100352256C CN B2005100467378 A CNB2005100467378 A CN B2005100467378A CN 200510046737 A CN200510046737 A CN 200510046737A CN 100352256 C CN100352256 C CN 100352256C
Authority
CN
China
Prior art keywords
sequence
image
blind source
several
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100467378A
Other languages
Chinese (zh)
Other versions
CN1710930A (en
Inventor
林秋华
党杰
殷福亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CNB2005100467378A priority Critical patent/CN100352256C/en
Publication of CN1710930A publication Critical patent/CN1710930A/en
Application granted granted Critical
Publication of CN100352256C publication Critical patent/CN100352256C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to a sequence image encrypting method based on blind source separation, which belongs to the technical field of information security. The present invention discloses a sequence character extracting method and a sequence characteristic embedding method for encrypting a plurality of sequence images, which are based on the blind source separation. In the encryption, the sequence characteristic extracting method extracts the characteristics displaying the sequence of plaintext images and carries out sequence arrangement. Same character extraction and sequence arrangement are carried out to decrypted images so as to restore the original sequence. In the encryption, the sequence characteristic embedding method uses the existing digital watermarking technology for embedding sequence characteristics in the plaintext images. In the decryption, the sequence restoration is completed by the extraction of the sequence characteristics and the sequence arrangement. The present invention has the effects and the benefits that a high security image encrypting method based on the blind source separation is provided, a plurality of non-sequential images can be encrypted, and a plurality of sequential images can also be encrypted. The present invention can form high security software and hardware products of image encryption. The present invention is widely used for the purpose of guaranteeing the image data security in the network communication of military, political, economic and cultural fields, etc.

Description

A kind of sequential picture enciphering method that separates based on blind source
Technical field
The invention belongs to field of information security technology, relate to the confidentiality of view data, specially refer to the sequential picture enciphering method that separates based on blind source.
Background technology
View data safety is an important content of information security field.For ensureing view data safety, must before image transmission or storage, encrypt image.The conventional images encryption method is to calculate and goes up safety but not unconditional security.Along with improving constantly of computer computation ability, calculate the encryption method that goes up safety at present and can not guarantee its fail safe from now on.For this reason, utilize a mathematics difficult problem to ensure the thought of its fail safe according to many encryption methods, we once used blind source and separate and owe to decide a difficult problem and proposed blind source separate picture encryption method, and its theory diagram as shown in Figure 1.Because used key image is independent mutually, and identical with plaintext image equal and opposite in direction number, the necessary condition that encryption method has satisfied unconditional security is separated in blind source.If key image randomness is good, this method can be similar to the high encryption strength that reaches unconditional security.And when the blind source separation of application encryption method was encrypted multiple image simultaneously, blind mixed process can make encrypted image safer.Yet, since blind source separation hypothesis each source signal and hybrid matrix all unknown, its order of recovering source signal has uncertainty.That is to say that P width of cloth decrypted image is compared with P width of cloth plaintext image among Fig. 1, has irregular variation on order.Therefore, blind source shown in Figure 1 is separated encryption method and only is suitable for encrypting the multiple image that out-of-order requires, and can not encrypt several sequential pictures, as the order picture etc.
Summary of the invention
The objective of the invention is to propose a kind of sequential picture enciphering method that separates based on blind source, solve the problem that blind source separate picture encryption method can not be encrypted several sequential pictures.
Technical solution of the present invention is, the ordinal characteristics by extracting image expressly or embed ordinal characteristics to the plaintext image and realize that blind source separates the order recovery of decrypted image realizes principle as shown in Figure 2.In fact, why the order that restoring signal is separated in blind source has uncertainty, is because it has supposed prioris such as source signal and Distribution Statistics thereof are known nothing.Yet when the order information of known source signal and when being used, this problem just is readily solved.For example, obtain the expressly ordinal characteristics of image easily in the image encryption process, these prioris can be used to recover image sequence when deciphering.In like manner, embedding ordinal characteristics when encrypting in the plaintext image, to recover the order of decrypted image also be feasible.In the present invention, ordinal characteristics embeds based at present ripe digital watermark technology, watermarkedly not only can not influence picture quality, and has robustness preferably.
The present invention has provided the order recovery method of two kinds of decrypted image:
(1) ordinal characteristics extraction method
Realize principle as shown in Figure 3.Extract the effectively feature and the ordering of token image order during encryption,, decrypted image is carried out same feature extraction and ordering, can recover its order as the positive and negative average frequency etc. of crossing of view data.
(2) ordinal characteristics embedding inlay technique
Realize principle as shown in Figure 4.Adopt digital watermark technology in the plaintext image, to embed ordinal characteristics during encryption, extract this feature during deciphering and ordering just can be finished order recovery.Compare with the plaintext image data amount, the data volume that is used for order recovery seldom.These data both can send with enciphered data, also can send with key data.
Effect and benefit that the present invention reached be, the high level security image encryption method that separates based on blind source is provided, and can encrypt several out-of-order images, also can encrypt several sequential pictures.The present invention can form the image encryption software and hardware product of high level security, is widely used in and ensures view data safety in the network service in each field such as military affairs, politics, economy, culture.
Description of drawings
Fig. 1 is a blind source separate picture encryption method theory diagram.
Fig. 2 is a kind of sequential picture enciphering method theory diagram that separates based on blind source of the present invention.
Fig. 3 is an ordinal characteristics extraction method theory diagram of the present invention.
Fig. 4 is an ordinal characteristics embedding inlay technique theory diagram of the present invention.
Embodiment
Below in conjunction with technical scheme and accompanying drawing, be described in detail specific embodiments of the invention.
Embodiment 1: encrypt based on several sequential pictures that separate in blind source---the ordinal characteristics extraction method
Be provided with expressly sequential picture s of the P width of cloth 1-s PP width of cloth key image s N1-s NPBy with I 0Randomizer generation for seed key.At first, application order feature extraction method is extracted expressly sequential picture s of this P width of cloth 1-s POrdinal characteristics and ordering, as the positive and negative average frequency etc. of crossing of view data.Then, with this P width of cloth plaintext sequential picture s 1-s PSend into blind source and separate and owe to decide the Hybrid Encryption link, decide under the effect of Hybrid Encryption matrix owing, with P width of cloth key image s N1-s NPMix, obtain the encrypted image x that the P width of cloth is used for dangerous Channel Transmission 1-x PSimultaneously, seed key I 0Transfer to the recipient by safe lane.At receiving terminal, P width of cloth key image s N1-s NPBy seed key I 0Initialization randomizer and producing once more.With P width of cloth encrypted image x 1-x PWith P width of cloth key image s N1-s NPCarry out blind source after the combination and separate deciphering, obtain the uncertain decrypted image u of P width of cloth order 1-u PUse the ordinal characteristics extraction method identical and extract u with encrypting end 1-u POrdinal characteristics and the ordering, just can obtain and original plaintext image s 1-s PThe P width of cloth deciphering sequential picture that order is identical
Figure C20051004673700051
Embodiment 2: encrypt based on several sequential pictures that separate in blind source---the ordinal characteristics embedding inlay technique
Be provided with expressly sequential picture s of the P width of cloth 1-s PP width of cloth key image s N1-s NPBy with I 0Randomizer generation for seed key.At first, adopt existing digital watermark technology to this P width of cloth plaintext sequential picture s 1-s PThe middle ordinal characteristics that embeds as binary sequence coding, random sequence etc., has obtained embedding the P width of cloth plaintext sequential picture s of ordinal characteristics 1'-s P'.Then, with this P width of cloth image s 1'-s P' sending into blind source separates and owes to decide the Hybrid Encryption link, decide under the effect of Hybrid Encryption matrix owing, with P width of cloth key image s N1-s NPMix, obtain the encrypted image x that the P width of cloth is used for dangerous Channel Transmission 1-x PSimultaneously, seed key I 0Transfer to the recipient by safe lane.At receiving terminal, by seed key I 0The initialization randomizer produces P width of cloth key image s once more N1-s NPWith family width of cloth encrypted image x 1-x PWith P width of cloth key image s N1-s NPCarry out blind source after the combination and separate deciphering, obtain the uncertain decrypted image u of order that the P width of cloth contains ordinal characteristics 1'-u P'.Use with encryption end corresponding digital watermark extracting technology and extract u 1'-u PThe ordinal characteristics of ' middle embedding and ordering just can obtain and original plaintext image s 1-s PThe P width of cloth deciphering sequential picture that order is identical
Figure C20051004673700052

Claims (2)

1. several sequential picture enciphering methods that separate based on blind source, it is characterized in that, when encrypting, elder generation's application order feature extraction method is expressly extracted positive and negative ordinal characteristics and ordering of crossing the average frequency the sequential picture from several, again these plaintext images are sent into the separation of blind source and owe to decide the Hybrid Encryption link, obtain several encrypted images; At receiving terminal, separate decrypted image for the uncertain blind source of several orders, use the ordinal characteristics extraction method identical earlier and therefrom extract the ordinal characteristics of each decrypted image with encrypting end, again according to extract several expressly the order of image sequence features the ordinal characteristics of decrypted image is sorted, just obtain several deciphering sequential pictures identical with the original plaintext image sequence.
2. several sequential picture enciphering methods that separate based on blind source, it is characterized in that, when encrypting, use the ordinal characteristics and the ordering of existing digital watermark technology embedding random sequence in several plaintext sequential pictures earlier, the plaintext image that again these has been embedded ordinal characteristics is sent into blind source and is separated and owe to decide the Hybrid Encryption link, obtains several encrypted images; At receiving terminal, separate decrypted image for the uncertain blind source of several orders, use the digital watermarking extractive technique identical earlier and therefrom extract embedded ordinal characteristics with encrypting end, again according to several expressly the order of the embedded ordinal characteristics of images the ordinal characteristics of decrypted image is sorted, just obtain several deciphering sequential pictures identical with the original plaintext image sequence.
CNB2005100467378A 2005-06-20 2005-06-20 Sequential picture enciphering method based on blind source separation Expired - Fee Related CN100352256C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100467378A CN100352256C (en) 2005-06-20 2005-06-20 Sequential picture enciphering method based on blind source separation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100467378A CN100352256C (en) 2005-06-20 2005-06-20 Sequential picture enciphering method based on blind source separation

Publications (2)

Publication Number Publication Date
CN1710930A CN1710930A (en) 2005-12-21
CN100352256C true CN100352256C (en) 2007-11-28

Family

ID=35707099

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100467378A Expired - Fee Related CN100352256C (en) 2005-06-20 2005-06-20 Sequential picture enciphering method based on blind source separation

Country Status (1)

Country Link
CN (1) CN100352256C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414841B (en) * 2013-07-29 2016-04-27 西北工业大学 Gray system theory is utilized to determine the image encryption decryption method that ICA exports
CN104267094A (en) * 2014-09-23 2015-01-07 江南大学 Pulsed magnetic flux leakage response signal separation method of ferromagnetic component

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0690361A (en) * 1992-09-09 1994-03-29 Ricoh Co Ltd Encoding/decoding method
JPH09252397A (en) * 1996-03-15 1997-09-22 Tateba Syst Kk Method for imbeding information relating to copyright such as signature of authro of image and copying device imbeding the copyright information to the image
EP1492329A2 (en) * 2003-06-26 2004-12-29 Konica Minolta Business Technologies, Inc. Data encrypting device, data decoding device, image data storing device and image forming apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0690361A (en) * 1992-09-09 1994-03-29 Ricoh Co Ltd Encoding/decoding method
JPH09252397A (en) * 1996-03-15 1997-09-22 Tateba Syst Kk Method for imbeding information relating to copyright such as signature of authro of image and copying device imbeding the copyright information to the image
EP1492329A2 (en) * 2003-06-26 2004-12-29 Konica Minolta Business Technologies, Inc. Data encrypting device, data decoding device, image data storing device and image forming apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
盲源分离自适应算法的统一形式 林秋华,殷福亮.大连理工大学学报,第42卷第4期 2002 *

Also Published As

Publication number Publication date
CN1710930A (en) 2005-12-21

Similar Documents

Publication Publication Date Title
CN113194213B (en) PNG image information hiding and recovering method based on secret sharing and chaotic mapping
CN103136718A (en) Anti-geometric-transformation practical color image digital watermark technology
Prema et al. Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application
CN103268588A (en) Encrypted domain lossless reversible information concealing method based on carrier image check code
CN109889687B (en) JPEG image bit stream encryption method based on alternating current statistical characteristic change
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
CN114567711A (en) Large-capacity encrypted image information hiding method based on block capacity label
Thakur et al. Hiding secret image in video
CN100352256C (en) Sequential picture enciphering method based on blind source separation
Purushothaman et al. An improved secret sharing using xor-based visual cryptography
Shi et al. A technique of improved steganography text based on chaos and BPCS
Zhu et al. An image authentication technology based on digital watermarking
Sunar et al. A fast approach to encrypt and decrypt of video streams for secure channel transmission
CN103533457B (en) Multimedia digital watermark embedding and separation method and device
Prasanna et al. A novel approach for secret data transfer using image steganography and visual cryptography
Prema et al. An enhanced security algorithm for wireless application using RSA and genetic approach
Bandyopadhyay et al. A method for public key method of steganography
CN109495670A (en) A kind of format compatible encipher-decipher method of colour jpeg image
Venugopala et al. Evaluation of video watermarking algorithms on mobile device
CN115278266B (en) Method for embedding, transmitting and extracting secret information in digital image
Fan et al. A BTC-compressed domain information hiding method based on histogram modification and visual cryptography
Anju et al. A Survey On Steganographic Methods Used in Information Hiding
Gupta et al. AHybrid APPROACH FOR ENSURING SECURITY IN DATA COMMUNICATION
Toosizadeh et al. A hybrid steganography algorithm based on chaos & BPCS
Gandhi et al. An Adaptive Data Hiding Scheme for Domain Based Secret Data in Random Order to Increase Steganography Using IWT

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20071128

Termination date: 20100620