CN103442156A - Image steganography and secret information extraction method based on intelligent mobile terminal - Google Patents

Image steganography and secret information extraction method based on intelligent mobile terminal Download PDF

Info

Publication number
CN103442156A
CN103442156A CN2013103634131A CN201310363413A CN103442156A CN 103442156 A CN103442156 A CN 103442156A CN 2013103634131 A CN2013103634131 A CN 2013103634131A CN 201310363413 A CN201310363413 A CN 201310363413A CN 103442156 A CN103442156 A CN 103442156A
Authority
CN
China
Prior art keywords
prime
secret information
image
embedding
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103634131A
Other languages
Chinese (zh)
Inventor
杨任尔
郑紫微
周福成
马澄洪
金涛
杨虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo University
Original Assignee
Ningbo University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo University filed Critical Ningbo University
Priority to CN2013103634131A priority Critical patent/CN103442156A/en
Publication of CN103442156A publication Critical patent/CN103442156A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to an image steganography and secret information extraction method based on an intelligent mobile terminal. The intelligent mobile terminal comprises a secret information embedder, a secret information extractor and a multimedia message transmitter, and images are selected by the intelligent mobile terminal for different use purposes. If secret information needs to be embedded, original pictures are selected. If the secret information needs to be extracted, encrypted pictures are selected. The selected original pictures are uploaded into the secret information embedder for the secret information embedding operation, and the encrypted pictures are uploaded into the secret information extractor for the secret information extraction operation. If the current operation is the secret information embedding operation, the encrypted pictures embedded with the secret information are uploaded into the multimedia message transmitter, and are sent to a receiver in a multimedia message mode. Compared with the prior art, the image steganography and secret information extraction method has the advantages that the functions of secret information embedding, multimedia message sending and secret information extraction are achieved in the intelligent mobile terminal, system safety is enhanced, and meanwhile multimedia message sending efficiency is improved.

Description

The image latent writing of movement-based intelligent terminal and secret information extracting method
Technical field
The present invention relates to a kind of image latent writing method and secret information extracting method of movement-based intelligent terminal.
Background technology
Along with the arriving in mobile Internet epoch, the mobile intelligent terminal that Android, iOS and Windows Phone8 be representative of take is widely used.By using mobile intelligent terminal, people every day is transmission of information each other, has become the essential instrument all be unable to do without in people's study, work and life.Multimedia message service in the mobile message business, enriched the mode exchanged between people, also facilitated a lot of cellphone subscribers simultaneously.Along with the development of 3G network, data communication becomes trend of the times, and multimedia message becomes users' first-selection as the representative of data communication.Utilize MMS, the user can transmit the more multimedia messages of horn of plenty of content each other, as picture, Voice & Video information etc.Multimedia message, as one of information mutually exchanged between the user, generally is considered as privacy information, or even the privacy information of need to be keep secret, therefore, in transmitting procedure, does not wish by other people intercepting.For this problem, some technology of protection mobile terminal multimedia message information are suggested successively.Wherein cryptological technique and Steganography are considered to two best solutions, but both are different to the principle of information protection.Cryptological technique, by MMS content is encrypted, becomes by it purpose that a string unrecognizable mess code reaches protection information, and this technology easily causes stealer's attention, excites stealer's the desire that cracks.Steganography is that secret information is hidden in the multimedia message accessory of common transmission, avoids causing the person's of stealing secret information attention by the fact of hidden secret information communication; By contrast, Steganography is a better solution.
Utilize mobile intelligent terminal can transmit the carrier files such as text, image, Voice & Video, and wherein for steganography method outbalance and the key of image file.So far, the image latent writing method based on desktop PC is by more research and application, and rarely found for the steganography method of mobile intelligent terminal of new generation.Therefore, for current demand, the image latent writing art research based on mobile intelligent terminal of new generation has broad prospects.
With desktop, PC compares, mobile intelligent terminal has the limited characteristics of limitation, software and hardware resources of volume space, directly existing image latent writing method is used on mobile intelligent terminal, will be made the image latent writing inefficiency of mobile intelligent terminal, bring not good user to experience.
Summary of the invention
Technical problem to be solved by this invention is that a kind of image latent writing method and secret information extracting method of movement-based intelligent terminal are provided for above-mentioned prior art, the method can realize secret information embedding, multimedia message transmission and secret information abstraction function in mobile intelligent terminal, strengthen security of system, improved the multimedia message transmitting efficiency simultaneously.
The present invention solves the problems of the technologies described above adopted technical scheme: a kind of image latent writing of movement-based intelligent terminal and secret information extracting method, it is characterized in that: described mobile intelligent terminal comprises secret information embedded device, secret information extractor and multimedia message transmitter, and the image latent writing of mobile intelligent terminal and secret information extracting method comprise the steps:
1, at first for different uses, select image, embed secret information if need, select original image, extract secret information if need, select to carry close picture;
2, then import the original image of selection into the secret information embedded device and carry out the secret information embedding operation, will carry close picture and import the secret information extractor into and carry out secret information and extract operation;
If 3 current operations are the secret information embedding operation, import the close picture that carries after the embedding secret information into the multimedia message transmitter, will carry close picture by the mode of multimedia message and send to the recipient;
In above-mentioned steps 2, the process that the secret information embedded device carries out embedding operation to secret information comprises: following steps:
(1), adopt the zigzag scan mode, with order from top to bottom, by size, be N 1* N 2the Pixel Information of two-dimentional original image I be converted to one group of continuous nonoverlapping one dimension pixel value data, two adjacent pixel values are one group, and by each group pixel value W imean W iin a pair of (x for pixel value i, y i) mean 0≤i≤N 1* N 2/ 2, then by d i=| x i-y i|, calculate the difference of every pair of pixel value;
(2), transfer secret information S to decimal integer q;
(3) d, (1) calculated ivalue is divided into four interval T j, j=1,2,3,4, T wherein 1interval range be [0,15], T 1width be 16, embedding parameter is 3, the embedding system system of use is 25; T 2interval range be [16,47], T 2width be 32, embedding parameter is 4, the embedding system system of use is 41; T 3interval range be [48,111], T 3width be 64, embedding parameter is 5, the embedding system system of use is 61; T 4interval range be [112,255], T 4width be 144, embedding parameter is 6, the embedding system system of use is 85; The d calculated according to (1) ivalue, obtain d iaffiliated scope T j, according to T j, obtain the embedding parameter of this pixel groups, then utilize formula B (d i)=2k 2+ 2k+1 obtains the embedded system system B (d that this pixel groups region is used i), wherein k is embedding parameter; ;
(4), by formula
Figure BDA00003688730900021
calculate
Figure BDA00003688730900022
utilize the DE method to incite somebody to action
Figure BDA00003688730900023
be embedded into pixel to (x i, y i) in, year close pixel after being embedded is to (x i', y i'), establish d i' for carrying close pixel after embedding to (x i', y i') difference, i.e. d i'=| x i'-y i' |, the DE method is a rhombus coded image steganography method (Diamond Encoding for raising EMD method embedded quantity herein, the vehicle economy method), the EMD method is a kind of image latent writing method (Exploiting Modification Direction is called for short the EMD method) of revising direction of utilizing;
(5), check whether overflow, if x i' or y i' not in the scope of [0,255], to carrying close pixel to (x i', y i') adjusted, otherwise jump to (7); To carrying close pixel to (x i', y i') mode adjusted is:
Define a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ , y i ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ + y i ′ ′ ) mod B ( d i ) = S B ( d i ) And d i=d i" coordinate (the x of condition i", y i"), wherein k is embedding parameter, k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i"=| x i" y i" |,
Figure BDA00003688730900032
0≤x i", y i"≤255, then by x i" assignment is to x i, y i" assignment is to y ieven, x i=x i", y i=y i";
(6), on (5) basis, to carrying close pixel to (x i', y i') carry out the interval inspection, if d i'=| x i'-y i' | not at d i=| x i-y i| in, equally need to be to carrying close pixel to (x i', y i') adjusted, otherwise jump to (7); To carrying close pixel to (x i', y i') mode adjusted selects option A or option b:
Option A: according to d i=| x i-y i|, in (3), the mode of definition is determined the system system B (d of the embedding of using i), define equally a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ ′ , y i ′ ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ ′ + y i ′ ′ ′ ) mod B ( d i ) = S B ( d i ) And d i=d i" coordinate (the x of ' condition i" ', y i" '), wherein k is embedding parameter, and k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i" '=| x ithe y of " '- i" ' |,
Figure BDA00003688730900033
0≤x i" ', y i" '≤255, then by x i" ' assignment is to x i, y i" ' assignment is to y ieven, x i=x i" ', y i=y i" ';
Option b: according to d i'=| x i'-y i' |, in (3), the mode of definition is determined the system system B (d of the embedding of using i'), define equally a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ ′ ′ , y i ′ ′ ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ ′ ′ + y i ′ ′ ′ ′ ) mod B ( d i ′ ) = S B ( d i ′ ) And d i=d icoordinate (the x of " " condition i" ", y i" "), wherein k is embedding parameter, k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i" "=| x i" "-y i" " |, 0≤x i" ", y i" "≤255, then by x i" " assignment is to x i, y i" " assignment is to y ieven, x i=x i" ", y i=y i" ";
(7), will
Figure BDA00003688730900042
assignment is to q, and then repeating step (3)~(6) are until q=0 obtains carrying close image;
In described step 2, the process that the secret information extractor extracts operation to secret information comprises:
(a), adopt the zigzag scan mode, with order from top to bottom, by size, be N 1* N 2two dimension carry close image I ' Pixel Information be converted to one group of continuous nonoverlapping one dimension pixel value data, two adjacent pixel values are one group, and by each group pixel value W i' mean W i' in a pair of (x for pixel value i', y i') mean 0≤i≤N 1* N 2/ 2;
(b) according to d i'=| x i'-y i' |, calculate the difference d of every pair of pixel value i'; By the d calculated i' value is divided into four interval T j', j=1,2,3,4, T wherein 1' interval range be [0,15], T 1' width be 16, embedding parameter is 3, the embedding system system of use is 25; T 2' interval range be [16,47], T 2' width be 32, embedding parameter is 4, the embedding system system of use is 41; T 3' interval range be [48,111], T 3' width be 64, embedding parameter is 5, the embedding system system of use is 61; T 4' interval range be [112,255], T 4' width be 144, embedding parameter is 6, the embedding system system of use is 85; The d calculated according to (1) i' value, obtain d i' affiliated scope T j', according to T j', obtain the embedding parameter of this pixel groups, then utilize formula B (d i')=2k 2+ 2k+1 obtains the embedded system system B (d that this pixel groups is used i'), wherein k is embedding parameter;
(c), utilize the DE method, at B (d i') extract secret data in system
Figure BDA00003688730900043
the DE method is a rhombus coded image steganography method (Diamond Encoding for raising EMD method embedded quantity herein, the vehicle economy method), the EMD method is a kind of image latent writing method (Exploiting Modification Direction is called for short the EMD method) of revising direction of utilizing;
(d), repeat (b)~(c), until that all secret datas are extracted is complete;
(e), will
Figure BDA00003688730900044
information transfers decimal integer to, then transfers binary data information to, the secret information S that obtains extracting.
In described step (6), according to following mode, select to select option A or option b to carrying close pixel to (x i', y i') adjusted:
Calculate X A = log 2 B ( d i ) ( x i - x i ′ ′ ′ ) 2 + ( y i - y i ′ ′ ′ ) 2 ;
Calculate X B = log 2 B ( d i ′ ) ( x i - x i ′ ′ ′ ′ ) 2 + ( y i - y i ′ ′ ′ ′ ) 2 ;
Then compare X aand X bsize, if X aselect option A to carrying close pixel to (x greatly, i', y i') adjusted, if X bselect option b to carrying close pixel to (x greatly, i', y i') adjusted, if X a=X b, select option A or option b to carrying close pixel to (x i', y i') adjusted and all can.
Described secret information embedded device comprises following components:
Image is selected module: be connected with photograph album storehouse or the folder management device of mobile intelligent terminal, for selecting original image, and result passed to the image type identification module;
The image type identification module: according to the head and tail sign of raw image files, the type of judgement original image, and get rid of the picture format of not supporting, import acquired results into digital picture hidden writing module;
Secret information load-on module: need for loading the secret information embedded, and import acquired results into encrypting module;
Encrypting module: the secret information embedded is encrypted, and the key during by encryption is preserved, and during for deciphering, and the encrypting traffic of gained is passed to the hidden writing module of digital picture;
The hidden writing module of digital picture: the secret information after encrypting is embedded in original image;
Image generation module: generate and carry close image, and be stored to specified folder.
Described secret information extractor comprises:
Image is selected module: be connected with photograph album storehouse or the folder management device of mobile intelligent terminal, carry secret image for selecting, and result is passed to the image type identification module;
The image type identification module: according to the head and tail sign that carries secret image file, the type of secret image is carried in judgement, and gets rid of the picture format of not supporting, imports acquired results into digital picture hidden writing module;
Secret information extraction module: extract the secret information after encryption from carry close image, and import acquired results into deciphering module;
Deciphering module: the key recovery of preserving while utilizing encrypting module to be encrypted goes out the original secret information of transmitting terminal, and preserves secret information according to the document form of transmitting terminal.
Described multimedia message transmitter comprises following components:
Network service detection module: judge whether the user has arranged the multimedia message access point and opened the wap data connection;
Data conversion module: MMS content is converted to the PDU data;
The multimedia message data link module: by Transaction Service service, judgement multimedia message Link State, and creation state is returned to sending module;
Sending module: utilize http protocol, to multimedia message server, send multimedia message data package;
Database module: by with database module, realizing alternately reading of multimedia message and write operation.
Compared with prior art, the invention has the advantages that: the present invention has realized realizing secret information embedding, multimedia message transmission and secret information abstraction function in mobile intelligent terminal, has strengthened security of system, has improved the multimedia message transmitting efficiency simultaneously; Steganography method provided by the invention can significantly improve the embedding capacity of carrier image, and effective control chart image distortion; Secret information provided by the invention carries out embedding operation and has certain fail safe, can resist the steganalysis ability such as RS attack; Secret information provided by the invention carries out embedding grammar can operation efficiently on mobile intelligent terminal main flow software and hardware platform.
The accompanying drawing explanation
Fig. 1 comprises in mobile intelligent terminal in the embodiment of the present invention to image latent writing and secret information to extract relevant module connection layout.
The structure chart that Fig. 2 is secret information embedded device in the embodiment of the present invention;
The structure chart that Fig. 3 is secret information extractor in the embodiment of the present invention;
The structure chart that Fig. 4 is multimedia message transmitter in the embodiment of the present invention;
Fig. 5 is image latent writing method flow diagram in the embodiment of the present invention.
Fig. 6 is image extraction method flow chart in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, embodiment is described in further detail the present invention.
The invention provides a kind of image latent writing and secret information extracting method of movement-based intelligent terminal, described mobile intelligent terminal comprises secret information embedded device, secret information extractor and multimedia message transmitter, shown in Figure 1.For the user that mobile intelligent terminal has been had experiences, secret information embedded device, secret information extractor and multimedia message transmitter all provide friendly interface be configured and show.
Described secret information embedded device comprises following components, shown in Figure 2:
Image is selected module: be connected with photograph album storehouse or the folder management device of mobile intelligent terminal, for selecting original image, and result passed to the image type identification module;
The image type identification module: according to the head and tail sign of raw image files, the type of judgement original image, and get rid of the picture format of not supporting, import acquired results into digital picture hidden writing module;
Secret information load-on module: need for loading the secret information embedded, and import acquired results into encrypting module;
Encrypting module: the secret information embedded is encrypted, and the key during by encryption is preserved, and during for deciphering, and the encrypting traffic of gained is passed to the hidden writing module of digital picture, and the encryption method of using in the present embodiment is aes algorithm;
The hidden writing module of digital picture: the secret information after encrypting is embedded in original image;
Image generation module: generate and carry close image, and be stored to specified folder.
Described secret information extractor comprises following components, shown in Figure 3:
Image is selected module: be connected with photograph album storehouse or the folder management device of mobile intelligent terminal, carry secret image for selecting, and result is passed to the image type identification module;
The image type identification module: according to the head and tail sign that carries secret image file, the type of secret image is carried in judgement, and gets rid of the picture format of not supporting, imports acquired results into digital picture hidden writing module;
Secret information extraction module: extract the secret information after encryption from carry close image, and import acquired results into deciphering module;
Deciphering module: the key recovery of preserving while utilizing encrypting module to be encrypted goes out the original secret information of transmitting terminal, and preserves secret information according to the document form of transmitting terminal.
Described multimedia message transmitter comprises following components, shown in Figure 4:
Network service detection module: judge whether the user has arranged the multimedia message access point and opened the wap data connection;
Data conversion module: the sending and receiving process of multimedia message is all the form transmission with the PDU data, and this module is converted to the PDU data by MMS content;
The multimedia message data link module: by Transaction Service service, judgement multimedia message Link State, and creation state is returned to sending module;
Sending module: utilize http protocol, to multimedia message server, send multimedia message data package;
Database module: by with database module, realizing alternately reading of multimedia message and write operation.
In the embodiment of the present invention, the image latent writing of mobile intelligent terminal and secret information extracting method comprise the steps:
1, at first for different uses, select picture, embed secret information if need, select original image, extract secret information if need, select to carry close picture;
2, then import the original image of selection into the secret information embedded device and carry out the secret information embedding operation, will carry close picture and import the secret information extractor into and carry out secret information and extract operation;
If 3 current operations are the secret information embedding operation, import the close picture that carries after the embedding secret information into the multimedia message transmitter, will carry close picture by the mode of multimedia message and send to the recipient;
In above-mentioned steps 2, the process that the secret information embedded device carries out embedding operation to secret information comprises: following steps, shown in Figure 5:
(1), adopt the zigzag scan mode, with order from top to bottom, by size, be N 1* N 2the Pixel Information of two-dimentional original image I be converted to one group of continuous nonoverlapping one dimension pixel value data, two adjacent pixel values are one group, and by each group pixel value W imean W iin a pair of (x for pixel value i, y i) mean 0≤i≤N 1* N 2/ 2, then by d i=| x i-y i|, calculate the difference of every pair of pixel value;
(2), transfer secret information S to decimal integer q;
(3) d, (1) calculated ivalue is divided into four interval T j, j=1,2,3,4, T wherein 1interval range be [0,15], T 1width be 16, embedding parameter is 3, the embedding system system of use is 25; T 2interval range be [16,47], T 2width be 32, embedding parameter is 4, the embedding system system of use is 41; T 3interval range be [48,111], T 3width be 64, embedding parameter is 5, the embedding system system of use is 61; T 4interval range be [112,255], T 4width be 144, embedding parameter is 6, the embedding system system of use is 85; The d calculated according to (1) ivalue, obtain d iaffiliated scope T j, according to T j, obtain the embedding parameter of this pixel groups, then utilize formula B (d i)=2k 2+ 2k+1 obtains the embedded system system B (d that this pixel groups region is used i), wherein k is embedding parameter;
(4), by formula
Figure BDA00003688730900081
calculate
Figure BDA00003688730900082
utilize the DE method to incite somebody to action be embedded into pixel to (x i, y i) in, year close pixel after being embedded is to (x i', y i'), establish d i' for carrying close pixel after embedding to (x i', y i') difference, i.e. d i'=| x i'-y i' |, the DE method is a rhombus coded image steganography method (Diamond Encoding for raising EMD method embedded quantity herein, the vehicle economy method), the EMD method is a kind of image latent writing method (Exploiting Modification Direction is called for short the EMD method) of revising direction of utilizing;
(5), check whether overflow, if x i' or y i' not in the scope of [0,255], to carrying close pixel to (x i', y i') adjusted, otherwise jump to (7); To carrying close pixel to (x i', y i') mode adjusted is:
Define a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ , y i ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ + y i ′ ′ ) mod B ( d i ) = S B ( d i ) And d i=d i" coordinate (the x of condition i", y i"), wherein k is embedding parameter, k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|,
Figure BDA00003688730900085
0≤x i", y i"≤255, then by x i" assignment is to x i, y i" assignment is to y ieven, x i=x i", y i=y i";
(6), on (5) basis, to carrying close pixel to (x i', y i') carry out the interval inspection, if d i'=| x i'-y i' | not at d i=| x i-y i| in, equally need to be to carrying close pixel to (x i', y i') adjusted, otherwise jump to (7); To carrying close pixel to (x i', y i') mode adjusted selects option A or option b:
Option A: according to d i=| x i-y i|, in (3), the mode of definition is determined the system system B (d of the embedding of using i), define equally a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ ′ , y i ′ ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ ′ + y i ′ ′ ′ ) mod B ( d i ) = S B ( d i ) And d i=d i" coordinate (the x of ' condition i" ', y i" '), wherein k is embedding parameter, and k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i" '=| x ithe y of " '- i" ' |,
Figure BDA00003688730900094
0≤x i" ', y i" '≤255, then by x i" ' assignment is to x i, y i" ' assignment is to y ieven, x i=x i" ', y i=y i" ';
Option b: according to d i'=| x i'-y i' |, in (3), the mode of definition is determined the system system B (d of the embedding of using i'), define equally a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ ′ ′ , y i ′ ′ ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ ′ ′ + y i ′ ′ ′ ′ ) mod B ( d i ′ ) = S B ( d i ′ ) And d i=d icoordinate (the x of " " condition i" ", y i" "), wherein k is embedding parameter, k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i" "=| x i" "-y i" " |,
Figure BDA00003688730900096
0≤x i" ", y i" "≤255, then by x i" " assignment is to x i, y i" " assignment is to y ieven, x i=x i" ", y i=y i" ";
(7), will assignment is to q, and then repeating step (3)~(6) are until q=0 obtains carrying close image;
In above-mentioned steps (6), according to following mode, select to select option A or option b to carrying close pixel to (x i', y i') adjusted:
Calculate X A = log 2 B ( d i ) ( x i - x i ′ ′ ′ ) 2 + ( y i - y i ′ ′ ′ ) 2 ;
Calculate X B = log 2 B ( d i ′ ) ( x i - x i ′ ′ ′ ′ ) 2 + ( y i - y i ′ ′ ′ ′ ) 2 ;
Then compare X aand X bsize, if X aselect option A to carrying close pixel to (x greatly, i', y i') adjusted, if X bselect option b to carrying close pixel to (x greatly, i', y i') adjusted, if X a=X b, select option A or option b to carrying close pixel to (x i', y i') adjusted and all can;
In described step 2, the process that the secret information extractor extracts operation to secret information comprises, shown in Figure 6:
(a), adopt the zigzag scan mode, with order from top to bottom, by size, be N 1* N 2two dimension carry close image I ' Pixel Information be converted to one group of continuous nonoverlapping one dimension pixel value data, two adjacent pixel values are one group, and by each group pixel value W i' mean W i' in a pair of (x for pixel value i', y i') mean 0≤i≤N 1* N 2/ 2;
(b) according to d i'=| x i'-y i' |, calculate the difference d of every pair of pixel value i'; By the d calculated i' value is divided into four interval T j', j=1,2,3,4, T wherein 1' interval range be [0,15], T 1' width be 16, embedding parameter is 3, the embedding system system of use is 25; T 2' interval range be [16,47], T 2' width be 32, embedding parameter is 4, the embedding system system of use is 41; T 3' interval range be [48,111], T 3' width be 64, embedding parameter is 5, the embedding system system of use is 61; T 4' interval range be [112,255], T 4' width be 144, embedding parameter is 6, the embedding system system of use is 85; The d calculated according to (1) i' value, obtain d i' affiliated scope T j', according to T j', obtain the embedding parameter of this pixel groups, then utilize formula B (d i')=2k 2+ 2k+1 obtains the embedded system system B (d that this pixel groups is used i'), wherein k is embedding parameter;
(c), utilize the DE method, at B (d i') extract secret data in system
Figure BDA00003688730900101
the DE method is a rhombus coded image steganography method (Diamond Encoding for raising EMD method embedded quantity herein, the vehicle economy method), the EMD method is a kind of image latent writing method (Exploiting Modification Direction is called for short the EMD method) of revising direction of utilizing;
(d), repeat (b)~(c), until that all secret datas are extracted is complete;
(e), will information transfers decimal integer to, then transfers binary data information to, the secret information S that obtains extracting.

Claims (5)

1. the image latent writing of a movement-based intelligent terminal and secret information extracting method, it is characterized in that: described mobile intelligent terminal comprises secret information embedded device, secret information extractor and multimedia message transmitter, and image latent writing and the information extracting method of mobile intelligent terminal comprise the steps:
1, at first for different uses, select picture, embed secret information if need, select original image, extract secret information if need, select to carry close picture;
2, then import the original image of selection into the secret information embedded device and carry out the secret information embedding operation, will carry close picture and import the secret information extractor into and carry out secret information and extract operation;
If 3 current operations are the secret information embedding operation, import the close picture that carries after the embedding secret information into the multimedia message transmitter, will carry close picture by the mode of multimedia message and send to the recipient;
In above-mentioned steps 2, the process that the secret information embedded device carries out embedding operation to secret information comprises: following steps:
(1), adopt the zigzag scan mode, with order from top to bottom, by size, be N 1* N 2the Pixel Information of two-dimentional original image I be converted to one group of continuous nonoverlapping one dimension pixel value data, two adjacent pixel values are one group, and by each group pixel value W imean W iin a pair of (x for pixel value i, y i) mean 0≤i≤N 1* N 2/ 2, then by d i=| x i-y i|, calculate the difference of every pair of pixel value;
(2), transfer secret information S to decimal integer q;
(3) d, (1) calculated ivalue is divided into four interval T j, j=1,2,3,4, T wherein 1interval range be [0,15], T 1width be 16, embedding parameter is 3, the embedding system system of use is 25; T 2interval range be [16,47], T 2width be 32, embedding parameter is 4, the embedding system system of use is 41; T 3interval range be [48,111], T 3width be 64, embedding parameter is 5, the embedding system system of use is 61; T 4interval range be [112,255], T 4width be 144, embedding parameter is 6, the embedding system system of use is 85; The d calculated according to (1) ivalue, obtain d iaffiliated scope T j, according to T j, obtain the embedding parameter of this pixel groups, then utilize formula B (d i)=2k 2+ 2k+1 obtains the embedded system system B (d that this pixel groups region is used i), wherein k is embedding parameter;
(4), by formula
Figure FDA00003688730800011
calculate
Figure FDA00003688730800012
utilize the DE method to incite somebody to action
Figure FDA00003688730800013
be embedded into pixel to (x i, y i) in, year close pixel after being embedded is to (x i', y i'), establish d i' for carrying close pixel after embedding to (x i', y i') difference, i.e. d i'=| x i'-y i' |, the DE method is a rhombus coded image steganography method (Diamond Encoding for raising EMD method embedded quantity herein, the vehicle economy method), the EMD method is a kind of image latent writing method (Exploiting Modification Direction is called for short the EMD method) of revising direction of utilizing;
(5), check whether overflow, if x i' or y i' not in the scope of [0,255], to carrying close pixel to (x i', y i') adjusted, otherwise jump to (7); To carrying close pixel to (x i', y i') mode adjusted is:
Define a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ , y i ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ + y i ′ ′ ) mod B ( d i ) = S B ( d i ) And d i=d i" coordinate (the x of condition i", y i"), wherein k is embedding parameter, k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i"=| x i" y i" |, 0≤x i", y i"≤255, then by x i" assignment is to x i, y i" assignment is to y ieven, x i=x i", y i=y i";
(6), on (5) basis, to carrying close pixel to (x i', y i') carry out the interval inspection, if d i'=| x i'-y i' | not at d i=| x i-y i| in, equally need to be to carrying close pixel to (x i', y i') adjusted, otherwise jump to (7); To carrying close pixel to (x i', y i') mode adjusted selects option A or option b:
Option A: according to d i=| x i-y i|, in (3), the mode of definition is determined the system system B (d of the embedding of using i), define equally a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ ′ , y i ′ ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ ′ + y i ′ ′ ′ ) mod B ( d i ) = S B ( d i ) And d i=d i" coordinate (the x of ' condition i" ', y i" '), wherein k is embedding parameter, and k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i" '=| x ithe y of " '- i" ' |,
Figure FDA00003688730800024
0≤x i" ', y i" '≤255, then by x i" ' assignment is to x i, y i" ' assignment is to y ieven, x i=x i" ', y i=y i" ';
Option b: according to d i'=| x i'-y i' |, in (3), the mode of definition is determined the system system B (d of the embedding of using i'), define equally a square area Ψ r, size is 2R+1, and sets R=3k, by calculating, finds satisfied f ( x i ′ ′ ′ ′ , y i ′ ′ ′ ′ ) = ( ( 2 k + 1 ) x i ′ ′ ′ ′ + y i ′ ′ ′ ′ ) mod B ( d i ′ ) = S B ( d i ′ ) And d i=d icoordinate (the x of " " condition i" ", y i" "), wherein k is embedding parameter, k is by original image (x i, y i) determine d by the mode of definition in (3) i=| x i-y i|, d i" "=| x i" "-y i" " |,
Figure FDA00003688730800032
0≤x i" ", y i" "≤255, then by x i" " assignment is to x i, y i" " assignment is to y ieven, x i=x i" ", y i=y i" ";
(7), will
Figure FDA00003688730800033
assignment is to q, and then repeating step (3)~(6) are until q=0 obtains carrying close image;
In described step 2, the process that the secret information extractor extracts operation to secret information comprises:
(a), adopt the zigzag scan mode, with order from top to bottom, by size, be N 1* N 2two dimension carry close image I ' Pixel Information be converted to one group of continuous nonoverlapping one dimension pixel value data, two adjacent pixel values are one group, and by each group pixel value W i' mean W i' in a pair of (x for pixel value i', y i') mean 0≤i≤N 1* N 2/ 2;
(b) according to d i'=| x i'-y i' |, calculate the difference d of every pair of pixel value i'; By the d calculated i' value is divided into four interval T j', j=1,2,3,4, T wherein 1' interval range be [0,15], T 1' width be 16, embedding parameter is 3, the embedding system system of use is 25; T 2' interval range be [16,47], T 2' width be 32, embedding parameter is 4, the embedding system system of use is 41; T 3' interval range be [48,111], T 3' width be 64, embedding parameter is 5, the embedding system system of use is 61; T 4' interval range be [112,255], T 4' width be 144, embedding parameter is 6, the embedding system system of use is 85; The d calculated according to (1) i' value, obtain d i' affiliated scope T j', according to T j', obtain the embedding parameter of this pixel groups, then utilize formula B (d i')=2k 2+ 2k+1 obtains the embedded system system B (d that this pixel groups is used i');
(c), utilize the DE method, at B (d i') extract secret data in system
Figure FDA00003688730800034
the DE method is a rhombus coded image steganography method (Diamond Encoding for raising EMD method embedded quantity herein, the vehicle economy method), the EMD method is a kind of image latent writing method (Exploiting Modification Direction is called for short the EMD method) of revising direction of utilizing;
(d), repeat (b)~(c), until that all secret datas are extracted is complete;
(e), will
Figure FDA00003688730800043
information transfers decimal integer to, then transfers binary data information to, the secret information S that obtains extracting.
2. the image latent writing of movement-based intelligent terminal according to claim 1 and secret information extracting method, is characterized in that: in described step (6), according to following mode, select to select option A or option b to carrying close pixel to (x i', y i') adjusted:
Calculate X A = log 2 B ( d i ) ( x i - x i ′ ′ ′ ) 2 + ( y i - y i ′ ′ ′ ) 2 ;
Calculate X B = log 2 B ( d i ′ ) ( x i - x i ′ ′ ′ ′ ) 2 + ( y i - y i ′ ′ ′ ′ ) 2 ;
Then compare X aand X bsize, if X aselect option A to carrying close pixel to (x greatly, i', y i') adjusted, if X bselect option b to carrying close pixel to (x greatly, i', y i') adjusted, if X a=X b, select option A or option b to carrying close pixel to (x i', y i') adjusted and all can.
3. the image latent writing of movement-based intelligent terminal according to claim 1 and 2 and secret information extracting method, it is characterized in that: described secret information embedded device comprises following components:
Image is selected module, with photograph album storehouse or the folder management device of mobile intelligent terminal, is connected, and for selecting original image, and result is passed to the image type identification module;
The image type identification module, according to the head and tail sign of raw image files, the type of judgement original image, and get rid of the picture format of not supporting, import acquired results into digital picture hidden writing module;
The secret information load-on module, need for loading the secret information embedded, and import acquired results into encrypting module;
Encrypting module, be encrypted the secret information embedded, and the key during by encryption is preserved, and during for deciphering, and the encrypting traffic of gained passed to the hidden writing module of digital picture;
The hidden writing module of digital picture, be embedded into the secret information after encrypting in original image;
The image generation module, generate and carry close image, and be stored to specified folder.
4. the image latent writing of movement-based intelligent terminal according to claim 3 and secret information extracting method, it is characterized in that: described secret information extractor comprises:
Image is selected module, with photograph album storehouse or the folder management device of mobile intelligent terminal, is connected, and carries secret image for selecting, and result is passed to the image type identification module;
The image type identification module, according to the head and tail sign that carries secret image file, the type of secret image is carried in judgement, and gets rid of the picture format of not supporting, imports acquired results into digital picture hidden writing module;
The secret information extraction module extracts the secret information after encryption, and imports acquired results into deciphering module from carry close image;
Deciphering module, the key recovery of preserving while utilizing encrypting module to be encrypted goes out the original secret information of transmitting terminal, and preserves secret information according to the document form of transmitting terminal.
5. the image latent writing of movement-based intelligent terminal according to claim 3 and secret information extracting method, it is characterized in that: described multimedia message transmitter comprises following components:
The network service detection module, judge whether the user has arranged the multimedia message access point and opened the wap data connection;
Data conversion module, be converted to the PDU data by MMS content;
The multimedia message data link module, by Transaction Service service, judgement multimedia message Link State, and creation state is returned to sending module;
Sending module, utilize http protocol, to multimedia message server, sends multimedia message data package;
Database module, by realizing alternately reading of multimedia message and write operation with database module.
CN2013103634131A 2013-08-20 2013-08-20 Image steganography and secret information extraction method based on intelligent mobile terminal Pending CN103442156A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103634131A CN103442156A (en) 2013-08-20 2013-08-20 Image steganography and secret information extraction method based on intelligent mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103634131A CN103442156A (en) 2013-08-20 2013-08-20 Image steganography and secret information extraction method based on intelligent mobile terminal

Publications (1)

Publication Number Publication Date
CN103442156A true CN103442156A (en) 2013-12-11

Family

ID=49695818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103634131A Pending CN103442156A (en) 2013-08-20 2013-08-20 Image steganography and secret information extraction method based on intelligent mobile terminal

Country Status (1)

Country Link
CN (1) CN103442156A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052658A (en) * 2014-07-05 2014-09-17 中国科学技术大学 Privacy protection system and method based on social network
CN104125547A (en) * 2014-07-18 2014-10-29 北京奇虎科技有限公司 Short message processing method and device
CN104765986A (en) * 2015-03-05 2015-07-08 中国科学院信息工程研究所 Steganography-based code protecting and restoring method
CN106664407A (en) * 2014-09-19 2017-05-10 英特尔公司 Parallel encoding for wireless displays
CN107092816A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of Android application programs reinforcement means
CN107146191A (en) * 2017-04-28 2017-09-08 西安空间无线电技术研究所 A kind of efficient information hidden method for introducing auxiliary pixel
CN108416726A (en) * 2018-03-20 2018-08-17 宁波大学 A kind of digital picture steganography method keeping pixel frequency balance
CN108632138A (en) * 2018-03-29 2018-10-09 东华大学 A kind of commodity network safety communicating method based on image latent writing art
CN111709867A (en) * 2020-06-10 2020-09-25 四川大学 Novel full convolution network-based equal modulus vector decomposition image encryption analysis method
CN113239852A (en) * 2021-05-27 2021-08-10 支付宝(杭州)信息技术有限公司 Privacy image processing method, device and equipment based on privacy protection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765066A (en) * 2008-12-24 2010-06-30 广东电子工业研究院有限公司 Secret information transmission method based on multimedia message on intelligent mobile communication terminal
CN102164366A (en) * 2011-01-30 2011-08-24 广西师范大学 Message-hidden mobile phone information safety communication method based on JPEG (joint photographic experts group) image

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765066A (en) * 2008-12-24 2010-06-30 广东电子工业研究院有限公司 Secret information transmission method based on multimedia message on intelligent mobile communication terminal
CN102164366A (en) * 2011-01-30 2011-08-24 广西师范大学 Message-hidden mobile phone information safety communication method based on JPEG (joint photographic experts group) image

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周福成,杨任尔,何加铭: "一种基于像素差和菱形编码的图像隐写方法", 《无线电通信技术》 *
杨畅: "一种基于彩信的保密通信方法", 《科技创新与应用》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052658A (en) * 2014-07-05 2014-09-17 中国科学技术大学 Privacy protection system and method based on social network
CN104052658B (en) * 2014-07-05 2017-10-03 中国科学技术大学 A kind of intimacy protection system and method based on social networks
CN104125547A (en) * 2014-07-18 2014-10-29 北京奇虎科技有限公司 Short message processing method and device
CN104125547B (en) * 2014-07-18 2017-12-15 北京奇虎科技有限公司 Handle the method and short message processing device of short message
CN106664407A (en) * 2014-09-19 2017-05-10 英特尔公司 Parallel encoding for wireless displays
CN106664407B (en) * 2014-09-19 2020-04-28 英特尔公司 Method, system, apparatus and readable medium for parallel encoding and decoding of wireless display
CN104765986B (en) * 2015-03-05 2018-01-09 中国科学院信息工程研究所 A kind of code protection and restoring method based on Steganography
CN104765986A (en) * 2015-03-05 2015-07-08 中国科学院信息工程研究所 Steganography-based code protecting and restoring method
CN107092816A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of Android application programs reinforcement means
CN107092816B (en) * 2017-02-27 2020-07-28 广东工业大学 Android application program reinforcing method
CN107146191A (en) * 2017-04-28 2017-09-08 西安空间无线电技术研究所 A kind of efficient information hidden method for introducing auxiliary pixel
CN108416726A (en) * 2018-03-20 2018-08-17 宁波大学 A kind of digital picture steganography method keeping pixel frequency balance
CN108632138A (en) * 2018-03-29 2018-10-09 东华大学 A kind of commodity network safety communicating method based on image latent writing art
CN111709867A (en) * 2020-06-10 2020-09-25 四川大学 Novel full convolution network-based equal modulus vector decomposition image encryption analysis method
CN111709867B (en) * 2020-06-10 2022-11-25 四川大学 Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method
CN113239852A (en) * 2021-05-27 2021-08-10 支付宝(杭州)信息技术有限公司 Privacy image processing method, device and equipment based on privacy protection
CN113239852B (en) * 2021-05-27 2022-06-07 支付宝(杭州)信息技术有限公司 Privacy image processing method, device and equipment based on privacy protection

Similar Documents

Publication Publication Date Title
CN103442156A (en) Image steganography and secret information extraction method based on intelligent mobile terminal
Mazurczyk et al. Steganography in modern smartphones and mitigation techniques
CN104602238B (en) A kind of wireless network connecting method, device and system
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN105426709A (en) JPEG image information hiding based private information communication method and system
Moon et al. Data security using data hiding
CN110505049A (en) A kind of text information transmission method, apparatus and system
CN103685255A (en) File encryption method based on two-dimension code scanning
CN104580242A (en) Web page evidence preservation method and device
CN102857514B (en) HTTP (hyper text transport protocol) based secret information hidden-transmission method
CN101872420A (en) Encrypted writing signing mobile terminal
WO2012094861A1 (en) Intelligent terminal, receiving end, and method for performing countersigning using intelligent terminal
CN103037336A (en) Short message transmission method of two-dimensional code
CN109816077A (en) A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN105306200A (en) Method and device for encrypting network account password
CN112134687A (en) Information encryption and decryption method based on two-dimensional code
CN103731654B (en) A kind of information insertion system and information extracting system using 2D/3D video
CN107169914A (en) A kind of cipher-text information generation method for image latent writing
CN201063641Y (en) High safety encryption/decryption device including human information
CN201674561U (en) Mobile terminal for manual signing capable of being encrypted
CN201623859U (en) System for encrypting short messages through mobile phone terminal
CN101162995B (en) Communication system and communication method of chaos safety information internet transmission
CN100455087C (en) Signature message generation apparatus of mobile communication terminal and generation method thereof
CN103617589A (en) Information hiding method based on local histogram
CN107169913A (en) A kind of digital picture steganography method based on the optimal key of search

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131211