CN103761702B - Image hiding and authentication method based on secret sharing - Google Patents
Image hiding and authentication method based on secret sharing Download PDFInfo
- Publication number
- CN103761702B CN103761702B CN201410009363.1A CN201410009363A CN103761702B CN 103761702 B CN103761702 B CN 103761702B CN 201410009363 A CN201410009363 A CN 201410009363A CN 103761702 B CN103761702 B CN 103761702B
- Authority
- CN
- China
- Prior art keywords
- image
- secret
- block
- vector
- prime
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.
Description
Technical field
The invention belongs to Secret Image Sharing technical field, be specifically related to a kind of image concealing based on privacy share and recognize
Card method.
Background technology
Information hiding, as an important technology of information security cybertimes, has become one of information security the most
New study hotspot.Information Hiding Techniques is that by certain mode, a certain secret information is hidden in media information disclosed in another
In, transmit secret information by the transmission of public information.The purpose of this technology is that the existence of hiding secret information, makes
Obtain any third party in addition to communicating pair all without perceiving the existence of secret information, thus provide into one for Digital Media
The protection of step.Additionally, the authenticity and integrity of digital picture also becomes the emphasis of multi-media information security, image authentication is just
It it is the important technology differentiating and detecting image's authenticity and integrity.
But, a certain secret information is hidden in single open media information by traditional information concealing method, and by list
Individual is managed, and once this manager either intentionally or unintentionally distorts or damage media information, and secret will be lost, to this, base
Method of Steganography in privacy share can solve this problem well.This method by former Secret Image according to certain
Computing splits into n shadow vector (non-correlation between each element in vector), and is hidden in by these shadow vectors and selects in advance
In n the carrier image selected, form n camouflage test and be distributed to different participant's management, only collecting k therein
(k≤n) individual or more camouflage test can recover the information of former Secret Image, and just cannot less than k camouflage test
Recover any information of former Secret Image.Can either prevent right from excessively concentrating by this technology, Secret Image can be strengthened again
Safety and integrity.Additionally, before reconstruct secret information, the verity of the camouflage test being provided participants is recognized
Card is also very important, because can the verity of camouflage test directly decide secret information and be successfully recovered.
2004, Lin and Tsai proposed image concealing based on privacy share and certificate scheme first, and the program utilizes
Shamir (Secret Image is divided into n shadow vector, and element value each in shadow vector is passed through LSB by k, n) threshold technique
The mode that (Least Significant Bit) substitutes is hidden in carrier image, and the parity bits by 1 is real simultaneously
The authentication capability of existing image.But the weakness of this scheme maximum is: the secret information of reconstruct can produce certain distortion.It
After, Yang et al. is improved on the basis of this, overcomes the weakness of this scheme, and further increases recognizing of image
Card ability.2008, Chang and Hsieh used Chinese remainder theorem to strengthen the authentication capability of image, the puppet simultaneously obtained
Dress image is higher than the quality of the camouflage test in front scheme.But, though these schemes are in authentication capability and camouflage test matter
Improve in amount, but they still exist two problems: in (1) shadow vector, each element is by the most hidden
Ensconce in each carrier image block, when element number is less than the number of carrier image block in the shadow vector that need to embed, carry
Body image portion piecemeal does not just have the embedding of secret information, therefore, embeds the part of secret information and do not embed in camouflage test
The statistical property of the part of secret information has difference clearly, and this difference can cause the attention of assailant, thus reduces
The safety of secret information.(2) scheme before all uses LSB substitution method to hide secret information, and this method is held very much
Easily detected the existence of embedding information by steganalysis such as RS analysis etc., and the length of embedding information can be judged exactly, this
Also certain potential safety hazard is brought to scheme.
Summary of the invention
It is an object of the present invention to provide a kind of image concealing based on privacy share and authentication method, can be efficiently against existing
The shortcoming that technology exists.
The present invention is achieved in that and it is characterized in that by privacy share and Information hiding and image authentication and secret letter
Breath recovers two parts composition.
I. privacy share and Information hiding, comprise the following steps:
The first step, reads in Secret Image SE of a width h × g, and wherein, h represents the line number of Secret Image SE, and g represents secret
The columns of image SE;
Second step, uses formula (1) that Secret Image SE is converted to difference image DIFF={diffij};
Wherein, i represents the i-th row, and j represents that jth arranges;
3rd step, does Huffman encoding to difference image DIFF, the bit sequence y after being encoded, and records coding code
Table;
3 bits every in sequences y are divided into one group by the 4th step, and will often to organize bits switch be decimal number as sharing
Coefficient, obtains coefficient vector d, and in note d, element number is M;
5th step, by privacy share multinomial, produces n shadow to be concealed vectorial:
(1). from vector d, order chooses k the element not having the to share shared coefficient as formula (2),
fi(x)=(a0+a1x+a2x2+…+ak-1xk-1)mod23, i=1,2 ..., l (2)
Wherein a0,a1,…,ak-1Being k shared coefficient, l is the total number of element in each shadow vector, l=" M/k]
(rounding up);
(2). take x=1,2 ..., n, calculate f respectivelyi(1),fi(2),…,fi(n), and it is respectively added to n in order
Row vector S(1),S(2),…,S(n)In (S(1),S(2),…,S(n)Initial value is empty);
S(1)={ fi(1)},S(2)={ fi(2)},…,S(n)={ fi(n) }, i=1,2 ..., l (3)
(3). repeat step (1)-(2), until all elements is processed complete in d, S(1),S(2),…,S(n)Treat hidden for n
The shadow vector hidden;
6th step, chooses n width landscape or character image as carrier image C(j), j=1,2 ..., a n and key K;
7th step, uses formula (4) and (5) that key K is shared as n sub-key K1,…,Kj,…,Kn:
Q (x)=K+a1x+a2x2+…+ak-1xk-1 (4)
K1=q (1), K2=q (2) ..., Kn=q (n) (5)
Wherein a1,…,ak-1It is k-1 the integer randomly selected;
8th step, embeds carrier image according to matrix coder is theoretical by shadow vector to be concealed, and step is as follows:
(1). by carrier image C(j)Be divided into non-overlapping copies 1 × 3 block of pixels, and each pixel value in block is used it
8bit binary representation, as shown in Figure 1;
(2). determine S by following steps(j)In each element at carrier image C(j)In be randomly-embedded position:
A) carrier image C is set(j)In the sum of all pieces be L, then:
In t block of every continuous print, i.e. randomly choose a block as embedded block;
B) sub-key K is usedjProduce Random number sequence
C) formula (7) is utilized to determine S(j)In i-th(j)Individual element is at carrier image C(j)In embedded location:
(3). by S(j)In i-th(j)Individual value is converted to binary bit sequence { s1s2s3, then according to shown in Fig. 2, extract public affairs
Hidden unit { the m of embedded location determined by formula (7)1,m2,m3,m4,m5,m6,m7};
(4). setBy the relation shown in table 1, can be by bit sequence by most amendment 1bit
{s1s2s3It is embedded into this hidden unit { m1,m2,m3,m4,m5,m6,m7In };
Table 1
(5). repeat step (2)-(4), until S(j)In all elements be all hidden in carrier image block;
9th step, calculates the certification bit p of each piece in carrier image by formula (8)1,p2, and embed it in Fig. 2
In relevant position;
In formula,It is with sub-key KjHash function, TH(j)Certification bit p is removed in each piece1,p2And it is hidden
Hide unit { m1,m2,m3,m4,m5,m6,m7Remaining 15bit sequence outside },Mark for block;
Tenth step, is converted to the binary representation (as shown in Figure 2) of each pixel in the carrier image after embedding information
Decimal number, forms camouflage testAnd by n camouflage testAnd corresponding sub-key KjMeet at n different participation
Person's keeping;
II. image authentication and secret information recover, and at least k or k above participant are in the secret recovery process,
Secret information just can be resumed.Comprise the following steps:
The first step, the camouflage test that the participants recovered that are in the secret provide them to be heldAnd it is sub accordingly
Key Kj;
Second step, divides camouflage testFor the block of pixels of the 1 × 3 of non-overlapping copies, and each pixel value in block is used
Its 8bit binary representation;
3rd step, it is achieved verification process:
(1). extract the certification bit p on corresponding certification position in camouflage test block1,p2;
(2). use formula (8) to calculate the certification bit of camouflage test blockAnd compare p1WithAnd p2WithWhether
Equal, if equal, then camouflage test block is not tampered with, if unequal, then this camouflage test block is tampered, and camouflage test does not leads to
Cross certification, it is impossible to for the recovery of secret information;
(3). repeat step (1) and (2) and all complete certification until in camouflage test all of piece;
4th step, the extraction (the step for of only could being participated in by the camouflage test of certification) of shadow vector:
(1). use sub-key K that participant providesjProduce Random number sequence
(2). utilize formula (7) to determine in shadow vector i-th(j)Individual element is at camouflage testIn embedded location, and carry
Take the hidden unit { m ' of embedded block on this position1,m′2,m′3,m′4,m′5,m′6, m '7};
(3). use formula (9) to calculate the bit sequence { s of this element1s2s3, and it is converted into decimal number, remember successively
Record is at vectorIn;
(4). repeat (2)-(3), until all of element is all extracted in shadow vector;
5th step, it is assumed that by the quantity of the camouflage test of certification more than or equal to k, respectively these camouflage test are entered
The operation of above-mentioned 4th step of row, extracts the shadow vector embedded;
6th step, collects at least k shadow vector, by the shared coefficient of Lagrange interpolation polynomial recovery, and successively
Being stored in vector d ', vector d ' have recorded the shared coefficient after recovery;
7th step, is converted to binary bit sequence by middle for vector d ' element, uses pre-recorded coding code table, completes
Decoding sequence is also converted to matrix and represents by Hafman decoding, obtains difference image;
8th step, recovers former Secret Image by the inverse process of difference.
Advantages of the present invention and good effect thereof be:
(1) in shadow vector, each element is embedded in carrier image block by uniformly random, which ensure that carrier after embedding
The statistical property of image does not have obvious difference, improves the safety of secret information;
(2) mode that present invention employs matrix coder embeds shadow vector in image block, overcomes in conventional scheme
Employing LSB alternative method is prone to detected shortcoming, reduces the risk that the person of being hacked suspects.
(3) use matrix coder theoretical, hidden the quantity of information of 3 bits by the amendment amount of 1 bit, further increase
The picture quality of camouflage test.
(4) present invention has a higher authentication capability, any all can not be passed through certification, more by the premeditated camouflage test distorted
The recovery of the information that can not be in the secret, further ensures the safety of secret information.
Accompanying drawing explanation
The carrier image partitioned organization figure of Fig. 1 present invention, wherein X, V, W represent three pixels in block, { x respectively1,x2,
x3,x4,x5,x6,x7,x8It is 8 binary representations of pixel X, { v1,v2,v3,v4,v5,v6,v7,v8It is that 8 two of pixel V enter
Tabulation is shown, { w1,w2,w3,w4,w5,w6,w7,w8It is 8 binary representations of pixel W;
The hidden unit of Fig. 2 embedded block and the scattergram of certification bit, wherein,Represent in block the information that embeds respectively
Three pixels, { m1,m2,m3,m4,m5,m6,m7It is hidden unit, p1,p2For certification bit.
Detailed description of the invention
We select Matlab7.0 as software platform, the design of programming realization the present invention program.Implementation process is chosen
The standard testing image " Jet " of 256 × 256 as Secret Image, the standard testing image " Lena " of 4 512 × 512,
" Peppers ", " Baboon ", " Elaine " as carrier image, Selecting All Parameters k=3, n=4 in secret sharing.
It is a feature of the present invention that it is to be recovered two parts by privacy share and Information hiding with image authentication and secret information
Composition.Concrete operation step is:
I. privacy share and Information hiding, comprise the following steps:
The first step, reads in the standard testing image " Jet " of 256 × 256 as Secret Image SE;
Second step, uses formula (1) that Secret Image SE is converted to difference image DIFF={diffij};
3rd step, does Huffman encoding to difference image DIFF, the bit sequence y after being encoded, and records coding code
Table;
3 bits every in sequences y are divided into one group by the 4th step, and will often to organize bits switch be decimal number as sharing
Coefficient, obtains coefficient vector d, then draws element number M=116556 in d by experiment;
5th step, by privacy share multinomial, produces 4 shadows to be concealed vectorial:
(1). from vector d, order chooses 3 elements not having to share shared coefficient as formula (2),
fi(x)=(a0+a1x+a2x2)mod23, i=1,2 ..., l (2)
Wherein a0,a1,a2It is 3 shared coefficients, total number l=38852 of element in shadow vector;
(2). take x=1,2,3,4, calculate f respectivelyi(1),fi(2),fi(3),fi(4) 4, and in order it are respectively added to
Individual row vector S(1),S(2),S(3),S(4)In (S(1),S(2),S(3),S(4)Initial value is empty);
S(1)={ fi(1)},S(2)={ fi(2)},S(3)={ fi(3)},S(4)={ fi(4) }, i=1,2 ..., l (3)
(3). repeat step (1)-(2), until all elements is processed complete in d, S(1),S(2),S(3),S(4)It is 4 and treats hidden
The shadow vector hidden;
6th step, chooses 4 width carrier images " Lena ", " Peppers ", " Baboon ", " Elaine ", and a key K
=214 (value of K can randomly select);
7th step, uses formula (4) and (5) that key K is shared as 4 sub-key K1,K2,K3,K4:
Q (x)=214+7625x+5435x2 (4)
K1=q (1)=13274, K2=q (2)=37204, K3=q (3)=72004, K4=q (4)=117674 (5)
Wherein, in formula (4), coefficient 7625 and 5435 is the integer randomly selected;
8th step, embeds carrier image by shadow vector to be concealed, with shadow vector S according to matrix coder is theoretical(1)Embedding
As a example by entering carrier image " Lena ", step is as follows:
. carrier image " Lena " is divided into non-overlapping copies 1 × 3 block of pixels, and by each pixel value in block
With its 8bit binary representation, as shown in Figure 1;
(2). determine S by following steps(1)In each element in carrier image " Lena ", be randomly-embedded position:
A) calculating the sum of all pieces in carrier image " Lena " is L=87040, then:
I.e. in 2 blocks of every continuous print, randomly choose a block as embedded block;
B) sub-key K is used1=13274 generation Random number sequences 10790,13885,24583 ... };
C) formula (7) is utilized to determine S(1)In the 1st value (i.e. i(1)=1) embedded location in carrier image " Lena " is
Loc (1)=2, both second block was chosen as embedded block:
(3). by S(1)In the 1st value 2 be converted to binary bit sequence { s1s2s3}={ 010}, and according to shown in Fig. 2, carry
Take the hidden unit { m on second block of carrier image1,m2,m3,m4,m5,m6,m7}={ 0001101};
(4). calculateBy the relation shown in table 1, by the m in amendment hidden unit4Will
{ 010} is embedded into hidden unit { m to bit sequence1,m2,m3,m4,m5,m6,m7In }, after embedding, hidden unit is revised as { m '1,
m′2,m′3,m′4,m′5, m '6,m′7}={ 0000101};
Table 1
(5). repeat step (2)-(4), until S(1)In all elements be all hidden in carrier image " Lena ";
9th step, calculates the certification bit p of each piece in carrier image by formula (8)1,p2, and embed it in Fig. 2
In relevant position:
In formula,It is with sub-key K1Hash function, TH(1)Certification bit p is removed in each piece1,p2And it is hidden
Hide unit { m1,m2,m3,m4,m5,m6,m7Remaining 15bit sequence outside },Mark for block;
Tenth step, is converted to the binary representation (as shown in Figure 2) of each pixel in the carrier image after embedding information
Decimal number, forms camouflage testAccording to same method by S(2),S(3),S(4)It is respectively embedded in carrier image
In " Peppers ", " Baboon ", " Elaine ", and formed 4 camouflage test and corresponding sub-key are met at 4
Different participant's keepings.
II. image authentication and secret information recover, and at least the participant of 3 or more than 3 is in the secret recovery process,
Secret information just can be resumed.Comprise the following steps:
The first step, the camouflage test that the participants recovered that are in the secret provide them to be heldAnd it is sub accordingly
Key Kj;
Second step, divides camouflage testFor the block of pixels of the 1 × 3 of non-overlapping copies, and each pixel value in block is used
Its 8bit binary representation;
3rd step, it is achieved verification process (as a example by the first width camouflage test " Lena "):
(1). extract the certification bit p on corresponding certification position in first block of pixels1=1, p2=1;
(2). use formula (8) to calculate the certification bit of this blockAndThis camouflage test block
By certification;
(3). repeat step (1) and (2) until in camouflage test all of piece all by certification, then camouflage test is not usurped
Change, otherwise camouflage test authentification failure, it is impossible to be in the secret Information recovering.
4th step, the extraction (the step for of only could being participated in by the camouflage test of certification) of shadow vector:
(1). use sub-key K that participant provides1=13274 generation Random number sequences 10790,13885,
24583,…};
(2). utilize formula (7) to determine shadow vector S(1)In first element embedding position in camouflage test " Lena "
Put, and extract embedded block on this position hidden unit { m '1,m′2,m′3,m′4,m′5,m′6,m′7}={ 0000101};
(3). use formula (9) to calculate the bit sequence s of this element1=0, s2=1, s3=0, and it is converted into decimal scale
Several 2, it is sequentially recorded in vectorIn:
(4). repeat (2)-(3), until all of element is all extracted in shadow vector;
5th step, it is assumed that by the quantity of the camouflage test of certification more than or equal to 3, respectively these camouflage test are entered
The above-mentioned FOUR EASY STEPS of row, extracts the shadow vector embedded;
6th step, collects at least 3 shadow vectors, by the shared coefficient of Lagrange interpolation polynomial recovery, and successively
It is stored in vector d ';
7th step, is converted to binary bit sequence by middle for vector d ' element, uses pre-recorded coding code table, completes
Decoding sequence is also converted to matrix and represents by Hafman decoding, obtains difference image;
8th step, recovers former Secret Image by the inverse process of difference;
In order to the present invention superiority compared with other schemes is described, we arrange lower to this at identical experiment condition and parameter
Scheme of the invention and other schemes have done emulation experiment.Experimental result is as shown in table 2.
Table 2
Other the scheme from table 2 it can be seen that compare, our scheme is in hiding secret information and the mistake of certification bit
Cheng Zhong, the average amendment amount to pixel each in carrier image is minimum, and this also implies that the solution of the present invention is in camouflage
Image can obtain better image quality.Meanwhile, the PSNR value of the 4 width camouflage test be given in table 2 also demonstrates this point.
In terms of authentication capability, the scheme of the scheme of Lin and Tsai and Yang et al. is more weak, and the scheme of Chang and Hsieh is relatively
The authentication capability of the present invention program is slightly higher, but their scheme have employed the certification position of 4bit, reduces to a certain extent
The visual quality of camouflage test, and the solution of the present invention is only with the certification position of 2bit, it is also possible to obtain well certification energy
Power, makes again the visual quality of camouflage test be substantially improved simultaneously.
Claims (1)
1. an image concealing based on privacy share and authentication method, it is characterised in that be by privacy share and Information hiding with
Image authentication and secret information recover two parts composition, and concrete operation step is as follows:
I. privacy share and Information hiding, comprise the following steps:
The first step, reads in Secret Image SE of a width h × g, and wherein, h represents the line number of Secret Image SE, and g represents Secret Image
The columns of SE;
Second step, uses formula (1) that Secret Image SE is converted to difference image DIFF={diffij};
Wherein, i represents the i-th row, and j represents that jth arranges;
3rd step, does Huffman encoding to difference image DIFF, the bit sequence y after being encoded, and records coding code table;
3 bits every in sequences y are divided into one group by the 4th step, and will often organize bits switch be decimal number as shared coefficient,
Obtaining coefficient vector d, in note d, element number is M;
5th step, by privacy share multinomial, produces n shadow to be concealed vectorial:
(1). from vector d, order chooses k the element not having the to share shared coefficient as formula (2),
fi(x)=(a0+a1x+a2x2+…+ak-1xk-1)mod23, i=1,2 ..., l (2)
Wherein a0,a1,…,ak-1Being k shared coefficient, l is the total number of element in each shadow vector,
(2). take x=1,2 ..., n, calculate f respectivelyi(1),fi(2),…,fi(n), and be respectively added in order n row to
Amount S(1),S(2),…,S(n)In, wherein S(1),S(2),…,S(n)Initial value is empty;
S(1)={ fi(1)},S(2)={ fi(2)},…,S(n)={ fi(n) }, i=1,2 ..., l (3)
(3). repeat step (1)-(2), until all elements is processed complete in d, S(1),S(2),…,S(n)To be concealed for n
Shadow vector;
6th step, chooses n width landscape or character image as carrier image C(j), j=1,2 ..., a n and key K;
7th step, uses formula (4) and (5) that key K is shared as n sub-key K1,…,Kj,…,Kn:
Q (x)=K+a1x+a2x2+…+ak-1xk-1 (4)
K1=q (1), K2=q (2) ..., Kn=q (n) (5)
Wherein a1,…,ak-1It is k-1 the integer randomly selected;
8th step, embeds carrier image according to matrix coder is theoretical by shadow vector to be concealed, and step is as follows:
(1). by carrier image C(j)Be divided into non-overlapping copies 1 × 3 block of pixels, and by its 8bit of each pixel value in block
Binary representation;
(2). determine S by following steps(j)In each element at carrier image C(j)In be randomly-embedded position:
A) carrier image C is set(j)In the sum of all pieces be L, then:
In t block of every continuous print, i.e. randomly choose a block as embedded block;
B) sub-key K is usedjProduce Random number sequence
C) formula (7) is utilized to determine S(j)In i-th(j)Individual element is at carrier image C(j)In embedded location:
(3). by S(j)In i-th(j)Individual value is converted to binary bit sequence { s1s2s3, and extract embedding determined by formula (7)
Hidden unit { the m of position1,m2,m3,m4,m5,m6,m7};
(4). setBy the relation shown in table 1, can be by bit sequence by most amendment 1bit
{s1s2s3It is embedded into this hidden unit { m1,m2,m3,m4,m5,m6,m7In };
Table 1
(5). repeat step (2)-(4), until S(j)In all elements be all hidden in carrier image block;
9th step, calculates the certification bit p of each piece in carrier image by formula (8)1,p2, and embed it in corresponding positions
Put;
In formula,It is with sub-key KjHash function, TH(j)Certification bit p is removed in each piece1,p2And hide single
Unit { m1,m2,m3,m4,m5,m6,m7Remaining 15bit sequence outside },Mark for block;
Tenth step, is converted to decimal number by the binary representation of each pixel in the carrier image after embedding information, forms puppet
Dress imageAnd by n camouflage testAnd corresponding sub-key KjMeet at n different participants keeping;
II. image authentication and secret information recover, and at least k or k above participant are in the secret recovery process, secret
Information just can be resumed, and comprises the following steps:
The first step, the camouflage test that the participants recovered that are in the secret provide them to be heldAnd corresponding sub-key
Kj;
Second step, divides camouflage testFor the block of pixels of the 1 × 3 of non-overlapping copies, and each pixel value in block is used it
8bit binary representation;
3rd step, it is achieved verification process:
(1). extract the certification bit p on corresponding certification position in camouflage test block1,p2;
(2). use formula (8) to calculate the certification bit of camouflage test blockAnd compare p1WithAnd p2WithIt is the most equal,
If equal, then camouflage test block is not tampered with, if unequal, then this camouflage test block is tampered, and camouflage test is not by recognizing
Card, it is impossible to for the recovery of secret information;
(3). repeat step (1) and (2) and all complete certification until in camouflage test all of piece;
4th step, the extraction of shadow vector, the step for of only could being participated in by the camouflage test of certification:
(1). use sub-key K that participant providesjProduce Random number sequence
(2). utilize formula (7) to determine in shadow vector i-th(j)Individual element is at camouflage testIn embedded location, and extract should
Hidden unit { the m ' of embedded block on position1,m′2,m′3,m′4,m′5,m′6,m′7};
(3). use formula (9) to calculate the bit sequence { s of this element1s2s3, and it is converted into decimal number, it is sequentially recorded in
VectorIn;
(4). repeat (2)-(3), until all of element is all extracted in shadow vector;
5th step, it is assumed that by the quantity of the camouflage test of certification more than or equal to k, respectively these camouflage test are carried out on
State the operation of the 4th step, extract the shadow vector embedded;
6th step, collects at least k shadow vector, recovers to share coefficient by Lagrange interpolation polynomial, and be sequentially stored into
In vector d ', vector d ' have recorded the shared coefficient after recovery;
7th step, is converted to binary bit sequence by middle for vector d ' element, uses pre-recorded coding code table, completes Hough
Decoding sequence is also converted to matrix and represents by graceful decoding, obtains difference image;
8th step, recovers former Secret Image by the inverse process of difference.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410009363.1A CN103761702B (en) | 2014-01-09 | 2014-01-09 | Image hiding and authentication method based on secret sharing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410009363.1A CN103761702B (en) | 2014-01-09 | 2014-01-09 | Image hiding and authentication method based on secret sharing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103761702A CN103761702A (en) | 2014-04-30 |
CN103761702B true CN103761702B (en) | 2017-01-11 |
Family
ID=50528935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410009363.1A Active CN103761702B (en) | 2014-01-09 | 2014-01-09 | Image hiding and authentication method based on secret sharing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103761702B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107786330A (en) * | 2017-09-26 | 2018-03-09 | 陈彦丰 | For the method, apparatus of privacy sharing, computer-readable storage medium and electronic equipment |
CN111444521B (en) * | 2020-02-21 | 2023-09-01 | 成都信息工程大学 | Image secret sharing method based on threshold increase and digital signature system |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105897409B (en) * | 2014-05-13 | 2019-05-10 | 无锡科技职业学院 | A method of the management of the key based on crypto chip |
CN104244016B (en) * | 2014-08-12 | 2018-04-10 | 中山大学 | A kind of H264 video contents altering detecting method |
CN104751400B (en) * | 2015-01-16 | 2018-04-17 | 西安电子科技大学 | Secret image share method based on the insertion of pixel-map matrix |
CN104835107B (en) * | 2015-05-12 | 2019-05-03 | 陕西师范大学 | Digital image covering and reconstructing method based on segmentation sequences |
CN105279728B (en) * | 2015-10-08 | 2019-04-09 | 宁波大学 | Pretreated intelligent mobile terminal image latent writing method is encrypted based on secret information |
CN105590297B (en) * | 2015-12-10 | 2019-01-22 | 陕西师范大学 | Based on GF (27) significant (K, the N) image point of finite field and double authentication deposits reconstructing method |
CN105634732B (en) * | 2016-01-21 | 2018-06-19 | 中国人民武装警察部队工程大学 | A kind of more bit reversible information hidden methods of ciphertext domain |
CN105872305B (en) * | 2016-04-13 | 2018-06-05 | 宁波工程学院 | A kind of completely separable encryption area image reversible data concealing method |
CN106530368B (en) * | 2016-10-28 | 2019-06-11 | 陕西师范大学 | A kind of progressive secret image sharing of prime field multi-threshold and reconstructing method |
CN106683053B (en) * | 2016-10-28 | 2019-10-08 | 陕西师范大学 | A kind of GF (26) the progressive secret image sharing of finite field multi-threshold and reconstructing method |
CN106791265B (en) * | 2016-11-11 | 2019-06-11 | 陕西师范大学 | A kind of insertion of improvement EMD Image Steganographic and extracting method based on no weight vector |
CN106980791B (en) * | 2017-03-30 | 2020-07-10 | 上海海洋大学 | Secret sharing method for extended weighting threshold ocean remote sensing image in cloud environment |
CN107133905A (en) * | 2017-04-27 | 2017-09-05 | 齐鲁工业大学 | It is a kind of that positioning figure reversible information hidden method is exempted from based on code division multiplexing |
CN108600574A (en) * | 2018-04-20 | 2018-09-28 | 大连理工大学 | Secret sharing method based on Faster R-CNN ' s |
CN109711121B (en) * | 2018-12-27 | 2021-03-12 | 清华大学 | Text steganography method and device based on Markov model and Huffman coding |
CN110136045B (en) * | 2019-04-18 | 2022-12-20 | 电子科技大学 | Method for hiding and recovering based on mutual scrambling of two images |
CN110111477B (en) * | 2019-04-23 | 2021-09-14 | 湖北工业大学 | Lottery information anti-counterfeiting authentication method and system based on information hiding |
CN110390623B (en) * | 2019-07-19 | 2023-03-24 | 成都信息工程大学 | Secret sharing-based image media security authentication recovery method |
CN110602349B (en) * | 2019-08-27 | 2021-07-02 | 成都信息工程大学 | Method for security protection of associated image content |
CN110995954B (en) * | 2019-10-11 | 2022-10-04 | 中国平安财产保险股份有限公司 | Method and device for detecting picture steganography, computer equipment and storage medium |
CN110766597B (en) * | 2019-10-22 | 2023-07-07 | 合肥高维数据技术有限公司 | Picture camouflage method and device, electronic equipment and storage medium |
CN111541652B (en) * | 2020-04-02 | 2022-05-20 | 杭州电子科技大学 | System for improving security of secret information keeping and transmission |
CN111723346B (en) * | 2020-06-09 | 2023-05-02 | 绍兴聚量数据技术有限公司 | Visual secret sharing method based on 'bamboo joint worm' reference matrix authentication |
CN113032807B (en) * | 2021-03-25 | 2022-07-01 | 绍兴图信物联科技有限公司 | Authenticatable (2,3) secret image sharing method and device based on mixed fractal matrix |
CN113312604B (en) * | 2021-05-31 | 2023-05-09 | 南京信息工程大学 | Distributed secret image sharing method with public reconstruction based on blockchain authentication |
CN113141254B (en) * | 2021-06-22 | 2021-09-24 | 成都信息工程大学 | High-adaptability secret image sharing method |
CN113422770B (en) * | 2021-06-22 | 2022-05-24 | 成都信息工程大学 | Secret image anti-attack splitting method based on (k, n) threshold |
CN114979402B (en) * | 2022-03-25 | 2023-03-21 | 西安电子科技大学 | Shared image storage method based on matrix coding embedding |
CN114782563B (en) * | 2022-05-26 | 2023-07-14 | 中国人民解放军国防科技大学 | Secret image sharing method and system for JPEG image |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Method for secretly sharing and restoring digital image |
CN103037223A (en) * | 2012-12-14 | 2013-04-10 | 太原科技大学 | Secret image share method based on block compressed sensing |
CN103414839A (en) * | 2013-07-25 | 2013-11-27 | 太原科技大学 | Graded-and-grouped secret image sharing method |
-
2014
- 2014-01-09 CN CN201410009363.1A patent/CN103761702B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102426690A (en) * | 2011-07-30 | 2012-04-25 | 成都信息工程学院 | Method for secretly sharing and restoring digital image |
CN103037223A (en) * | 2012-12-14 | 2013-04-10 | 太原科技大学 | Secret image share method based on block compressed sensing |
CN103414839A (en) * | 2013-07-25 | 2013-11-27 | 太原科技大学 | Graded-and-grouped secret image sharing method |
Non-Patent Citations (3)
Title |
---|
《Secret Image Sharing Scheme with Flexible Adjustment Shadow Images》;Li Liu,Anhong Wang,Wenjie Liu et al.;《2012 International Conference on Computing,Measurement,Control and Sensor Network》;20120831;第29-32页 * |
《一种可压缩的(r,n)门限秘密图像共享方案》;刘艳芳,余梅生;《计算机工程与应用》;20061231(第33期);第43-45页 * |
《一种适用于彩色图像的秘密共享方案》;刘丽 等;《太原科技大学学报》;20121231;第33卷(第6期);第411-413页 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107786330A (en) * | 2017-09-26 | 2018-03-09 | 陈彦丰 | For the method, apparatus of privacy sharing, computer-readable storage medium and electronic equipment |
CN111444521B (en) * | 2020-02-21 | 2023-09-01 | 成都信息工程大学 | Image secret sharing method based on threshold increase and digital signature system |
Also Published As
Publication number | Publication date |
---|---|
CN103761702A (en) | 2014-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103761702B (en) | Image hiding and authentication method based on secret sharing | |
CN105825257B (en) | Information hiding and hiding information extracting method and system based on two-dimensional bar code | |
Chang et al. | A watermarking-based image ownership and tampering authentication scheme | |
CN105634732B (en) | A kind of more bit reversible information hidden methods of ciphertext domain | |
CN108537049B (en) | Adaptive steganography algorithm based on binary image | |
CN104200424B (en) | Difference conversion based (K, N) meaningful image sharing and recovering method | |
CN107742272A (en) | A kind of semi-fragile watermarks method for positioning and recovering based on distorted image | |
Anand et al. | Joint watermarking-encryption-ECC for patient record security in wavelet domain | |
CN105303075B (en) | Adaptive Text Watermarking method based on PDF format | |
Whitelam et al. | Securing multimodal biometric data through watermarking and steganography | |
CN105590297B (en) | Based on GF (27) significant (K, the N) image point of finite field and double authentication deposits reconstructing method | |
CN105760722A (en) | Watermark embedding electronic signature generation method and platform | |
CN104881838B (en) | One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method | |
CN107846530A (en) | Digital watermarking algorithm | |
Al-Rahal et al. | HIGH LEVEL SECURITY BASED STEGANORAPHY IN IMAGE AND AUDIO FILES. | |
CN105306778A (en) | Security watermark algorithm combining cryptography | |
CN104036531B (en) | Information hiding method based on vector quantization and bintree | |
CN101141466B (en) | Document authentication method based on interweaving watermark and biological characteristic | |
CN104463767B (en) | Visible encryption and decryption method with image disguising function and tampering identification function | |
Kim | A new public-key authentication watermarking for binary document images resistant to parity attacks | |
CN105912894B (en) | A method of it is anti-fake that passport NO. being used for E-seal printed text | |
Purushothaman et al. | An improved secret sharing using xor-based visual cryptography | |
CN104702814B (en) | (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods | |
Shukla | Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map | |
Sudha et al. | Randomly tampered image detection and self-recovery for a text document using Shamir secret sharing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |