CN103761702B - Image hiding and authentication method based on secret sharing - Google Patents

Image hiding and authentication method based on secret sharing Download PDF

Info

Publication number
CN103761702B
CN103761702B CN201410009363.1A CN201410009363A CN103761702B CN 103761702 B CN103761702 B CN 103761702B CN 201410009363 A CN201410009363 A CN 201410009363A CN 103761702 B CN103761702 B CN 103761702B
Authority
CN
China
Prior art keywords
image
secret
block
vector
prime
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410009363.1A
Other languages
Chinese (zh)
Other versions
CN103761702A (en
Inventor
刘丽
王安红
刘世忠
李志宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiyuan University of Science and Technology
Original Assignee
Taiyuan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiyuan University of Science and Technology filed Critical Taiyuan University of Science and Technology
Priority to CN201410009363.1A priority Critical patent/CN103761702B/en
Publication of CN103761702A publication Critical patent/CN103761702A/en
Application granted granted Critical
Publication of CN103761702B publication Critical patent/CN103761702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.

Description

A kind of image concealing based on privacy share and authentication method
Technical field
The invention belongs to Secret Image Sharing technical field, be specifically related to a kind of image concealing based on privacy share and recognize Card method.
Background technology
Information hiding, as an important technology of information security cybertimes, has become one of information security the most New study hotspot.Information Hiding Techniques is that by certain mode, a certain secret information is hidden in media information disclosed in another In, transmit secret information by the transmission of public information.The purpose of this technology is that the existence of hiding secret information, makes Obtain any third party in addition to communicating pair all without perceiving the existence of secret information, thus provide into one for Digital Media The protection of step.Additionally, the authenticity and integrity of digital picture also becomes the emphasis of multi-media information security, image authentication is just It it is the important technology differentiating and detecting image's authenticity and integrity.
But, a certain secret information is hidden in single open media information by traditional information concealing method, and by list Individual is managed, and once this manager either intentionally or unintentionally distorts or damage media information, and secret will be lost, to this, base Method of Steganography in privacy share can solve this problem well.This method by former Secret Image according to certain Computing splits into n shadow vector (non-correlation between each element in vector), and is hidden in by these shadow vectors and selects in advance In n the carrier image selected, form n camouflage test and be distributed to different participant's management, only collecting k therein (k≤n) individual or more camouflage test can recover the information of former Secret Image, and just cannot less than k camouflage test Recover any information of former Secret Image.Can either prevent right from excessively concentrating by this technology, Secret Image can be strengthened again Safety and integrity.Additionally, before reconstruct secret information, the verity of the camouflage test being provided participants is recognized Card is also very important, because can the verity of camouflage test directly decide secret information and be successfully recovered.
2004, Lin and Tsai proposed image concealing based on privacy share and certificate scheme first, and the program utilizes Shamir (Secret Image is divided into n shadow vector, and element value each in shadow vector is passed through LSB by k, n) threshold technique The mode that (Least Significant Bit) substitutes is hidden in carrier image, and the parity bits by 1 is real simultaneously The authentication capability of existing image.But the weakness of this scheme maximum is: the secret information of reconstruct can produce certain distortion.It After, Yang et al. is improved on the basis of this, overcomes the weakness of this scheme, and further increases recognizing of image Card ability.2008, Chang and Hsieh used Chinese remainder theorem to strengthen the authentication capability of image, the puppet simultaneously obtained Dress image is higher than the quality of the camouflage test in front scheme.But, though these schemes are in authentication capability and camouflage test matter Improve in amount, but they still exist two problems: in (1) shadow vector, each element is by the most hidden Ensconce in each carrier image block, when element number is less than the number of carrier image block in the shadow vector that need to embed, carry Body image portion piecemeal does not just have the embedding of secret information, therefore, embeds the part of secret information and do not embed in camouflage test The statistical property of the part of secret information has difference clearly, and this difference can cause the attention of assailant, thus reduces The safety of secret information.(2) scheme before all uses LSB substitution method to hide secret information, and this method is held very much Easily detected the existence of embedding information by steganalysis such as RS analysis etc., and the length of embedding information can be judged exactly, this Also certain potential safety hazard is brought to scheme.
Summary of the invention
It is an object of the present invention to provide a kind of image concealing based on privacy share and authentication method, can be efficiently against existing The shortcoming that technology exists.
The present invention is achieved in that and it is characterized in that by privacy share and Information hiding and image authentication and secret letter Breath recovers two parts composition.
I. privacy share and Information hiding, comprise the following steps:
The first step, reads in Secret Image SE of a width h × g, and wherein, h represents the line number of Secret Image SE, and g represents secret The columns of image SE;
Second step, uses formula (1) that Secret Image SE is converted to difference image DIFF={diffij};
diff i j = se i j i f i = 0 a n d j = 0 se i j - se ( i - 1 ) j i f i ≠ 0 a n d j = 0 se i j - se i ( j - 1 ) o t h e r w i s e - - - ( 1 )
Wherein, i represents the i-th row, and j represents that jth arranges;
3rd step, does Huffman encoding to difference image DIFF, the bit sequence y after being encoded, and records coding code Table;
3 bits every in sequences y are divided into one group by the 4th step, and will often to organize bits switch be decimal number as sharing Coefficient, obtains coefficient vector d, and in note d, element number is M;
5th step, by privacy share multinomial, produces n shadow to be concealed vectorial:
(1). from vector d, order chooses k the element not having the to share shared coefficient as formula (2),
fi(x)=(a0+a1x+a2x2+…+ak-1xk-1)mod23, i=1,2 ..., l (2)
Wherein a0,a1,…,ak-1Being k shared coefficient, l is the total number of element in each shadow vector, l=" M/k] (rounding up);
(2). take x=1,2 ..., n, calculate f respectivelyi(1),fi(2),…,fi(n), and it is respectively added to n in order Row vector S(1),S(2),…,S(n)In (S(1),S(2),…,S(n)Initial value is empty);
S(1)={ fi(1)},S(2)={ fi(2)},…,S(n)={ fi(n) }, i=1,2 ..., l (3)
(3). repeat step (1)-(2), until all elements is processed complete in d, S(1),S(2),…,S(n)Treat hidden for n The shadow vector hidden;
6th step, chooses n width landscape or character image as carrier image C(j), j=1,2 ..., a n and key K;
7th step, uses formula (4) and (5) that key K is shared as n sub-key K1,…,Kj,…,Kn:
Q (x)=K+a1x+a2x2+…+ak-1xk-1 (4)
K1=q (1), K2=q (2) ..., Kn=q (n) (5)
Wherein a1,…,ak-1It is k-1 the integer randomly selected;
8th step, embeds carrier image according to matrix coder is theoretical by shadow vector to be concealed, and step is as follows:
(1). by carrier image C(j)Be divided into non-overlapping copies 1 × 3 block of pixels, and each pixel value in block is used it 8bit binary representation, as shown in Figure 1;
(2). determine S by following steps(j)In each element at carrier image C(j)In be randomly-embedded position:
A) carrier image C is set(j)In the sum of all pieces be L, then:
In t block of every continuous print, i.e. randomly choose a block as embedded block;
B) sub-key K is usedjProduce Random number sequence
C) formula (7) is utilized to determine S(j)In i-th(j)Individual element is at carrier image C(j)In embedded location:
(3). by S(j)In i-th(j)Individual value is converted to binary bit sequence { s1s2s3, then according to shown in Fig. 2, extract public affairs Hidden unit { the m of embedded location determined by formula (7)1,m2,m3,m4,m5,m6,m7};
(4). setBy the relation shown in table 1, can be by bit sequence by most amendment 1bit {s1s2s3It is embedded into this hidden unit { m1,m2,m3,m4,m5,m6,m7In };
Table 1
(5). repeat step (2)-(4), until S(j)In all elements be all hidden in carrier image block;
9th step, calculates the certification bit p of each piece in carrier image by formula (8)1,p2, and embed it in Fig. 2 In relevant position;
p 1 p 2 = X O R < H K j ( TH ( j ) | | B I D ( j ) ) > 2 - - - ( 8 )
In formula,It is with sub-key KjHash function, TH(j)Certification bit p is removed in each piece1,p2And it is hidden Hide unit { m1,m2,m3,m4,m5,m6,m7Remaining 15bit sequence outside },Mark for block;
Tenth step, is converted to the binary representation (as shown in Figure 2) of each pixel in the carrier image after embedding information Decimal number, forms camouflage testAnd by n camouflage testAnd corresponding sub-key KjMeet at n different participation Person's keeping;
II. image authentication and secret information recover, and at least k or k above participant are in the secret recovery process, Secret information just can be resumed.Comprise the following steps:
The first step, the camouflage test that the participants recovered that are in the secret provide them to be heldAnd it is sub accordingly Key Kj
Second step, divides camouflage testFor the block of pixels of the 1 × 3 of non-overlapping copies, and each pixel value in block is used Its 8bit binary representation;
3rd step, it is achieved verification process:
(1). extract the certification bit p on corresponding certification position in camouflage test block1,p2
(2). use formula (8) to calculate the certification bit of camouflage test blockAnd compare p1WithAnd p2WithWhether Equal, if equal, then camouflage test block is not tampered with, if unequal, then this camouflage test block is tampered, and camouflage test does not leads to Cross certification, it is impossible to for the recovery of secret information;
(3). repeat step (1) and (2) and all complete certification until in camouflage test all of piece;
4th step, the extraction (the step for of only could being participated in by the camouflage test of certification) of shadow vector:
(1). use sub-key K that participant providesjProduce Random number sequence
(2). utilize formula (7) to determine in shadow vector i-th(j)Individual element is at camouflage testIn embedded location, and carry Take the hidden unit { m ' of embedded block on this position1,m′2,m′3,m′4,m′5,m′6, m '7};
(3). use formula (9) to calculate the bit sequence { s of this element1s2s3, and it is converted into decimal number, remember successively Record is at vectorIn;
s 1 = m 1 &prime; &CirclePlus; m 3 &prime; &CirclePlus; m 5 &prime; &CirclePlus; m 7 &prime; s 2 = m 2 &prime; &CirclePlus; m 3 &prime; &CirclePlus; m 6 &prime; &CirclePlus; m 7 &prime; s 3 = m 4 &prime; &CirclePlus; m 5 &prime; &CirclePlus; m 6 &prime; &CirclePlus; m 7 &prime; - - - ( 9 )
(4). repeat (2)-(3), until all of element is all extracted in shadow vector;
5th step, it is assumed that by the quantity of the camouflage test of certification more than or equal to k, respectively these camouflage test are entered The operation of above-mentioned 4th step of row, extracts the shadow vector embedded;
6th step, collects at least k shadow vector, by the shared coefficient of Lagrange interpolation polynomial recovery, and successively Being stored in vector d ', vector d ' have recorded the shared coefficient after recovery;
7th step, is converted to binary bit sequence by middle for vector d ' element, uses pre-recorded coding code table, completes Decoding sequence is also converted to matrix and represents by Hafman decoding, obtains difference image;
8th step, recovers former Secret Image by the inverse process of difference.
Advantages of the present invention and good effect thereof be:
(1) in shadow vector, each element is embedded in carrier image block by uniformly random, which ensure that carrier after embedding The statistical property of image does not have obvious difference, improves the safety of secret information;
(2) mode that present invention employs matrix coder embeds shadow vector in image block, overcomes in conventional scheme Employing LSB alternative method is prone to detected shortcoming, reduces the risk that the person of being hacked suspects.
(3) use matrix coder theoretical, hidden the quantity of information of 3 bits by the amendment amount of 1 bit, further increase The picture quality of camouflage test.
(4) present invention has a higher authentication capability, any all can not be passed through certification, more by the premeditated camouflage test distorted The recovery of the information that can not be in the secret, further ensures the safety of secret information.
Accompanying drawing explanation
The carrier image partitioned organization figure of Fig. 1 present invention, wherein X, V, W represent three pixels in block, { x respectively1,x2, x3,x4,x5,x6,x7,x8It is 8 binary representations of pixel X, { v1,v2,v3,v4,v5,v6,v7,v8It is that 8 two of pixel V enter Tabulation is shown, { w1,w2,w3,w4,w5,w6,w7,w8It is 8 binary representations of pixel W;
The hidden unit of Fig. 2 embedded block and the scattergram of certification bit, wherein,Represent in block the information that embeds respectively Three pixels, { m1,m2,m3,m4,m5,m6,m7It is hidden unit, p1,p2For certification bit.
Detailed description of the invention
We select Matlab7.0 as software platform, the design of programming realization the present invention program.Implementation process is chosen The standard testing image " Jet " of 256 × 256 as Secret Image, the standard testing image " Lena " of 4 512 × 512, " Peppers ", " Baboon ", " Elaine " as carrier image, Selecting All Parameters k=3, n=4 in secret sharing.
It is a feature of the present invention that it is to be recovered two parts by privacy share and Information hiding with image authentication and secret information Composition.Concrete operation step is:
I. privacy share and Information hiding, comprise the following steps:
The first step, reads in the standard testing image " Jet " of 256 × 256 as Secret Image SE;
Second step, uses formula (1) that Secret Image SE is converted to difference image DIFF={diffij};
diff i j = se i j i f i = 0 a n d j = 0 se i j - se ( i - 1 ) j i f i &NotEqual; 0 a n d j = 0 se i j - se i ( j - 1 ) o t h e r w i s e - - - ( 1 )
3rd step, does Huffman encoding to difference image DIFF, the bit sequence y after being encoded, and records coding code Table;
3 bits every in sequences y are divided into one group by the 4th step, and will often to organize bits switch be decimal number as sharing Coefficient, obtains coefficient vector d, then draws element number M=116556 in d by experiment;
5th step, by privacy share multinomial, produces 4 shadows to be concealed vectorial:
(1). from vector d, order chooses 3 elements not having to share shared coefficient as formula (2),
fi(x)=(a0+a1x+a2x2)mod23, i=1,2 ..., l (2)
Wherein a0,a1,a2It is 3 shared coefficients, total number l=38852 of element in shadow vector;
(2). take x=1,2,3,4, calculate f respectivelyi(1),fi(2),fi(3),fi(4) 4, and in order it are respectively added to Individual row vector S(1),S(2),S(3),S(4)In (S(1),S(2),S(3),S(4)Initial value is empty);
S(1)={ fi(1)},S(2)={ fi(2)},S(3)={ fi(3)},S(4)={ fi(4) }, i=1,2 ..., l (3)
(3). repeat step (1)-(2), until all elements is processed complete in d, S(1),S(2),S(3),S(4)It is 4 and treats hidden The shadow vector hidden;
6th step, chooses 4 width carrier images " Lena ", " Peppers ", " Baboon ", " Elaine ", and a key K =214 (value of K can randomly select);
7th step, uses formula (4) and (5) that key K is shared as 4 sub-key K1,K2,K3,K4:
Q (x)=214+7625x+5435x2 (4)
K1=q (1)=13274, K2=q (2)=37204, K3=q (3)=72004, K4=q (4)=117674 (5)
Wherein, in formula (4), coefficient 7625 and 5435 is the integer randomly selected;
8th step, embeds carrier image by shadow vector to be concealed, with shadow vector S according to matrix coder is theoretical(1)Embedding As a example by entering carrier image " Lena ", step is as follows:
. carrier image " Lena " is divided into non-overlapping copies 1 × 3 block of pixels, and by each pixel value in block With its 8bit binary representation, as shown in Figure 1;
(2). determine S by following steps(1)In each element in carrier image " Lena ", be randomly-embedded position:
A) calculating the sum of all pieces in carrier image " Lena " is L=87040, then:
I.e. in 2 blocks of every continuous print, randomly choose a block as embedded block;
B) sub-key K is used1=13274 generation Random number sequences 10790,13885,24583 ... };
C) formula (7) is utilized to determine S(1)In the 1st value (i.e. i(1)=1) embedded location in carrier image " Lena " is Loc (1)=2, both second block was chosen as embedded block:
L o c ( i ( j ) ) - i ( j ) &times; t + r i mod t , r i mod t = 0 L o c ( i ( j ) ) - ( i ( j ) - 1 ) &times; t + r i mod t , r i mod t &NotEqual; 0 - - - ( 7 )
(3). by S(1)In the 1st value 2 be converted to binary bit sequence { s1s2s3}={ 010}, and according to shown in Fig. 2, carry Take the hidden unit { m on second block of carrier image1,m2,m3,m4,m5,m6,m7}={ 0001101};
(4). calculateBy the relation shown in table 1, by the m in amendment hidden unit4Will { 010} is embedded into hidden unit { m to bit sequence1,m2,m3,m4,m5,m6,m7In }, after embedding, hidden unit is revised as { m '1, m′2,m′3,m′4,m′5, m '6,m′7}={ 0000101};
Table 1
(5). repeat step (2)-(4), until S(1)In all elements be all hidden in carrier image " Lena ";
9th step, calculates the certification bit p of each piece in carrier image by formula (8)1,p2, and embed it in Fig. 2 In relevant position:
p 1 , p 2 = X O R < H K 1 ( TH ( 1 ) | | B I D ( 1 ) ) > 2 - - - ( 8 )
In formula,It is with sub-key K1Hash function, TH(1)Certification bit p is removed in each piece1,p2And it is hidden Hide unit { m1,m2,m3,m4,m5,m6,m7Remaining 15bit sequence outside },Mark for block;
Tenth step, is converted to the binary representation (as shown in Figure 2) of each pixel in the carrier image after embedding information Decimal number, forms camouflage testAccording to same method by S(2),S(3),S(4)It is respectively embedded in carrier image In " Peppers ", " Baboon ", " Elaine ", and formed 4 camouflage test and corresponding sub-key are met at 4 Different participant's keepings.
II. image authentication and secret information recover, and at least the participant of 3 or more than 3 is in the secret recovery process, Secret information just can be resumed.Comprise the following steps:
The first step, the camouflage test that the participants recovered that are in the secret provide them to be heldAnd it is sub accordingly Key Kj
Second step, divides camouflage testFor the block of pixels of the 1 × 3 of non-overlapping copies, and each pixel value in block is used Its 8bit binary representation;
3rd step, it is achieved verification process (as a example by the first width camouflage test " Lena "):
(1). extract the certification bit p on corresponding certification position in first block of pixels1=1, p2=1;
(2). use formula (8) to calculate the certification bit of this blockAndThis camouflage test block By certification;
(3). repeat step (1) and (2) until in camouflage test all of piece all by certification, then camouflage test is not usurped Change, otherwise camouflage test authentification failure, it is impossible to be in the secret Information recovering.
4th step, the extraction (the step for of only could being participated in by the camouflage test of certification) of shadow vector:
(1). use sub-key K that participant provides1=13274 generation Random number sequences 10790,13885, 24583,…};
(2). utilize formula (7) to determine shadow vector S(1)In first element embedding position in camouflage test " Lena " Put, and extract embedded block on this position hidden unit { m '1,m′2,m′3,m′4,m′5,m′6,m′7}={ 0000101};
(3). use formula (9) to calculate the bit sequence s of this element1=0, s2=1, s3=0, and it is converted into decimal scale Several 2, it is sequentially recorded in vectorIn:
s 1 = 0 &CirclePlus; 0 &CirclePlus; 1 &CirclePlus; 1 = 0 s 2 = 0 &CirclePlus; 0 &CirclePlus; 0 &CirclePlus; 1 = 1 s 3 = 0 &CirclePlus; 1 &CirclePlus; 0 &CirclePlus; 1 = 0 - - - ( 9 )
(4). repeat (2)-(3), until all of element is all extracted in shadow vector;
5th step, it is assumed that by the quantity of the camouflage test of certification more than or equal to 3, respectively these camouflage test are entered The above-mentioned FOUR EASY STEPS of row, extracts the shadow vector embedded;
6th step, collects at least 3 shadow vectors, by the shared coefficient of Lagrange interpolation polynomial recovery, and successively It is stored in vector d ';
7th step, is converted to binary bit sequence by middle for vector d ' element, uses pre-recorded coding code table, completes Decoding sequence is also converted to matrix and represents by Hafman decoding, obtains difference image;
8th step, recovers former Secret Image by the inverse process of difference;
In order to the present invention superiority compared with other schemes is described, we arrange lower to this at identical experiment condition and parameter Scheme of the invention and other schemes have done emulation experiment.Experimental result is as shown in table 2.
Table 2
Other the scheme from table 2 it can be seen that compare, our scheme is in hiding secret information and the mistake of certification bit Cheng Zhong, the average amendment amount to pixel each in carrier image is minimum, and this also implies that the solution of the present invention is in camouflage Image can obtain better image quality.Meanwhile, the PSNR value of the 4 width camouflage test be given in table 2 also demonstrates this point. In terms of authentication capability, the scheme of the scheme of Lin and Tsai and Yang et al. is more weak, and the scheme of Chang and Hsieh is relatively The authentication capability of the present invention program is slightly higher, but their scheme have employed the certification position of 4bit, reduces to a certain extent The visual quality of camouflage test, and the solution of the present invention is only with the certification position of 2bit, it is also possible to obtain well certification energy Power, makes again the visual quality of camouflage test be substantially improved simultaneously.

Claims (1)

1. an image concealing based on privacy share and authentication method, it is characterised in that be by privacy share and Information hiding with Image authentication and secret information recover two parts composition, and concrete operation step is as follows:
I. privacy share and Information hiding, comprise the following steps:
The first step, reads in Secret Image SE of a width h × g, and wherein, h represents the line number of Secret Image SE, and g represents Secret Image The columns of SE;
Second step, uses formula (1) that Secret Image SE is converted to difference image DIFF={diffij};
diff i j = se i j i f i = 0 a n d j = 0 se i j - se ( i - 1 ) j i f i &NotEqual; 0 a n d j = 0 se i j - se i ( j - 1 ) o t h e r w i s e - - - ( 1 )
Wherein, i represents the i-th row, and j represents that jth arranges;
3rd step, does Huffman encoding to difference image DIFF, the bit sequence y after being encoded, and records coding code table;
3 bits every in sequences y are divided into one group by the 4th step, and will often organize bits switch be decimal number as shared coefficient, Obtaining coefficient vector d, in note d, element number is M;
5th step, by privacy share multinomial, produces n shadow to be concealed vectorial:
(1). from vector d, order chooses k the element not having the to share shared coefficient as formula (2),
fi(x)=(a0+a1x+a2x2+…+ak-1xk-1)mod23, i=1,2 ..., l (2)
Wherein a0,a1,…,ak-1Being k shared coefficient, l is the total number of element in each shadow vector,
(2). take x=1,2 ..., n, calculate f respectivelyi(1),fi(2),…,fi(n), and be respectively added in order n row to Amount S(1),S(2),…,S(n)In, wherein S(1),S(2),…,S(n)Initial value is empty;
S(1)={ fi(1)},S(2)={ fi(2)},…,S(n)={ fi(n) }, i=1,2 ..., l (3)
(3). repeat step (1)-(2), until all elements is processed complete in d, S(1),S(2),…,S(n)To be concealed for n Shadow vector;
6th step, chooses n width landscape or character image as carrier image C(j), j=1,2 ..., a n and key K;
7th step, uses formula (4) and (5) that key K is shared as n sub-key K1,…,Kj,…,Kn:
Q (x)=K+a1x+a2x2+…+ak-1xk-1 (4)
K1=q (1), K2=q (2) ..., Kn=q (n) (5)
Wherein a1,…,ak-1It is k-1 the integer randomly selected;
8th step, embeds carrier image according to matrix coder is theoretical by shadow vector to be concealed, and step is as follows:
(1). by carrier image C(j)Be divided into non-overlapping copies 1 × 3 block of pixels, and by its 8bit of each pixel value in block Binary representation;
(2). determine S by following steps(j)In each element at carrier image C(j)In be randomly-embedded position:
A) carrier image C is set(j)In the sum of all pieces be L, then:
In t block of every continuous print, i.e. randomly choose a block as embedded block;
B) sub-key K is usedjProduce Random number sequence
C) formula (7) is utilized to determine S(j)In i-th(j)Individual element is at carrier image C(j)In embedded location:
(3). by S(j)In i-th(j)Individual value is converted to binary bit sequence { s1s2s3, and extract embedding determined by formula (7) Hidden unit { the m of position1,m2,m3,m4,m5,m6,m7};
(4). setBy the relation shown in table 1, can be by bit sequence by most amendment 1bit {s1s2s3It is embedded into this hidden unit { m1,m2,m3,m4,m5,m6,m7In };
Table 1
(5). repeat step (2)-(4), until S(j)In all elements be all hidden in carrier image block;
9th step, calculates the certification bit p of each piece in carrier image by formula (8)1,p2, and embed it in corresponding positions Put;
p 1 p 2 = X O R < H K j ( TH ( j ) | | B I D ( j ) ) > 2 - - - ( 8 )
In formula,It is with sub-key KjHash function, TH(j)Certification bit p is removed in each piece1,p2And hide single Unit { m1,m2,m3,m4,m5,m6,m7Remaining 15bit sequence outside },Mark for block;
Tenth step, is converted to decimal number by the binary representation of each pixel in the carrier image after embedding information, forms puppet Dress imageAnd by n camouflage testAnd corresponding sub-key KjMeet at n different participants keeping;
II. image authentication and secret information recover, and at least k or k above participant are in the secret recovery process, secret Information just can be resumed, and comprises the following steps:
The first step, the camouflage test that the participants recovered that are in the secret provide them to be heldAnd corresponding sub-key Kj
Second step, divides camouflage testFor the block of pixels of the 1 × 3 of non-overlapping copies, and each pixel value in block is used it 8bit binary representation;
3rd step, it is achieved verification process:
(1). extract the certification bit p on corresponding certification position in camouflage test block1,p2
(2). use formula (8) to calculate the certification bit of camouflage test blockAnd compare p1WithAnd p2WithIt is the most equal, If equal, then camouflage test block is not tampered with, if unequal, then this camouflage test block is tampered, and camouflage test is not by recognizing Card, it is impossible to for the recovery of secret information;
(3). repeat step (1) and (2) and all complete certification until in camouflage test all of piece;
4th step, the extraction of shadow vector, the step for of only could being participated in by the camouflage test of certification:
(1). use sub-key K that participant providesjProduce Random number sequence
(2). utilize formula (7) to determine in shadow vector i-th(j)Individual element is at camouflage testIn embedded location, and extract should Hidden unit { the m ' of embedded block on position1,m′2,m′3,m′4,m′5,m′6,m′7};
(3). use formula (9) to calculate the bit sequence { s of this element1s2s3, and it is converted into decimal number, it is sequentially recorded in VectorIn;
s 1 = m 1 &prime; &CirclePlus; m 3 &prime; &CirclePlus; m 5 &prime; &CirclePlus; m 7 &prime; s 2 = m 2 &prime; &CirclePlus; m 3 &prime; &CirclePlus; m 6 &prime; &CirclePlus; m 7 &prime; s 3 = m 4 &prime; &CirclePlus; m 5 &prime; &CirclePlus; m 6 &prime; &CirclePlus; m 7 &prime; - - - ( 9 )
(4). repeat (2)-(3), until all of element is all extracted in shadow vector;
5th step, it is assumed that by the quantity of the camouflage test of certification more than or equal to k, respectively these camouflage test are carried out on State the operation of the 4th step, extract the shadow vector embedded;
6th step, collects at least k shadow vector, recovers to share coefficient by Lagrange interpolation polynomial, and be sequentially stored into In vector d ', vector d ' have recorded the shared coefficient after recovery;
7th step, is converted to binary bit sequence by middle for vector d ' element, uses pre-recorded coding code table, completes Hough Decoding sequence is also converted to matrix and represents by graceful decoding, obtains difference image;
8th step, recovers former Secret Image by the inverse process of difference.
CN201410009363.1A 2014-01-09 2014-01-09 Image hiding and authentication method based on secret sharing Active CN103761702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410009363.1A CN103761702B (en) 2014-01-09 2014-01-09 Image hiding and authentication method based on secret sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410009363.1A CN103761702B (en) 2014-01-09 2014-01-09 Image hiding and authentication method based on secret sharing

Publications (2)

Publication Number Publication Date
CN103761702A CN103761702A (en) 2014-04-30
CN103761702B true CN103761702B (en) 2017-01-11

Family

ID=50528935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410009363.1A Active CN103761702B (en) 2014-01-09 2014-01-09 Image hiding and authentication method based on secret sharing

Country Status (1)

Country Link
CN (1) CN103761702B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786330A (en) * 2017-09-26 2018-03-09 陈彦丰 For the method, apparatus of privacy sharing, computer-readable storage medium and electronic equipment
CN111444521B (en) * 2020-02-21 2023-09-01 成都信息工程大学 Image secret sharing method based on threshold increase and digital signature system

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897409B (en) * 2014-05-13 2019-05-10 无锡科技职业学院 A method of the management of the key based on crypto chip
CN104244016B (en) * 2014-08-12 2018-04-10 中山大学 A kind of H264 video contents altering detecting method
CN104751400B (en) * 2015-01-16 2018-04-17 西安电子科技大学 Secret image share method based on the insertion of pixel-map matrix
CN104835107B (en) * 2015-05-12 2019-05-03 陕西师范大学 Digital image covering and reconstructing method based on segmentation sequences
CN105279728B (en) * 2015-10-08 2019-04-09 宁波大学 Pretreated intelligent mobile terminal image latent writing method is encrypted based on secret information
CN105590297B (en) * 2015-12-10 2019-01-22 陕西师范大学 Based on GF (27) significant (K, the N) image point of finite field and double authentication deposits reconstructing method
CN105634732B (en) * 2016-01-21 2018-06-19 中国人民武装警察部队工程大学 A kind of more bit reversible information hidden methods of ciphertext domain
CN105872305B (en) * 2016-04-13 2018-06-05 宁波工程学院 A kind of completely separable encryption area image reversible data concealing method
CN106530368B (en) * 2016-10-28 2019-06-11 陕西师范大学 A kind of progressive secret image sharing of prime field multi-threshold and reconstructing method
CN106683053B (en) * 2016-10-28 2019-10-08 陕西师范大学 A kind of GF (26) the progressive secret image sharing of finite field multi-threshold and reconstructing method
CN106791265B (en) * 2016-11-11 2019-06-11 陕西师范大学 A kind of insertion of improvement EMD Image Steganographic and extracting method based on no weight vector
CN106980791B (en) * 2017-03-30 2020-07-10 上海海洋大学 Secret sharing method for extended weighting threshold ocean remote sensing image in cloud environment
CN107133905A (en) * 2017-04-27 2017-09-05 齐鲁工业大学 It is a kind of that positioning figure reversible information hidden method is exempted from based on code division multiplexing
CN108600574A (en) * 2018-04-20 2018-09-28 大连理工大学 Secret sharing method based on Faster R-CNN ' s
CN109711121B (en) * 2018-12-27 2021-03-12 清华大学 Text steganography method and device based on Markov model and Huffman coding
CN110136045B (en) * 2019-04-18 2022-12-20 电子科技大学 Method for hiding and recovering based on mutual scrambling of two images
CN110111477B (en) * 2019-04-23 2021-09-14 湖北工业大学 Lottery information anti-counterfeiting authentication method and system based on information hiding
CN110390623B (en) * 2019-07-19 2023-03-24 成都信息工程大学 Secret sharing-based image media security authentication recovery method
CN110602349B (en) * 2019-08-27 2021-07-02 成都信息工程大学 Method for security protection of associated image content
CN110995954B (en) * 2019-10-11 2022-10-04 中国平安财产保险股份有限公司 Method and device for detecting picture steganography, computer equipment and storage medium
CN110766597B (en) * 2019-10-22 2023-07-07 合肥高维数据技术有限公司 Picture camouflage method and device, electronic equipment and storage medium
CN111541652B (en) * 2020-04-02 2022-05-20 杭州电子科技大学 System for improving security of secret information keeping and transmission
CN111723346B (en) * 2020-06-09 2023-05-02 绍兴聚量数据技术有限公司 Visual secret sharing method based on 'bamboo joint worm' reference matrix authentication
CN113032807B (en) * 2021-03-25 2022-07-01 绍兴图信物联科技有限公司 Authenticatable (2,3) secret image sharing method and device based on mixed fractal matrix
CN113312604B (en) * 2021-05-31 2023-05-09 南京信息工程大学 Distributed secret image sharing method with public reconstruction based on blockchain authentication
CN113141254B (en) * 2021-06-22 2021-09-24 成都信息工程大学 High-adaptability secret image sharing method
CN113422770B (en) * 2021-06-22 2022-05-24 成都信息工程大学 Secret image anti-attack splitting method based on (k, n) threshold
CN114979402B (en) * 2022-03-25 2023-03-21 西安电子科技大学 Shared image storage method based on matrix coding embedding
CN114782563B (en) * 2022-05-26 2023-07-14 中国人民解放军国防科技大学 Secret image sharing method and system for JPEG image

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Method for secretly sharing and restoring digital image
CN103037223A (en) * 2012-12-14 2013-04-10 太原科技大学 Secret image share method based on block compressed sensing
CN103414839A (en) * 2013-07-25 2013-11-27 太原科技大学 Graded-and-grouped secret image sharing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102426690A (en) * 2011-07-30 2012-04-25 成都信息工程学院 Method for secretly sharing and restoring digital image
CN103037223A (en) * 2012-12-14 2013-04-10 太原科技大学 Secret image share method based on block compressed sensing
CN103414839A (en) * 2013-07-25 2013-11-27 太原科技大学 Graded-and-grouped secret image sharing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《Secret Image Sharing Scheme with Flexible Adjustment Shadow Images》;Li Liu,Anhong Wang,Wenjie Liu et al.;《2012 International Conference on Computing,Measurement,Control and Sensor Network》;20120831;第29-32页 *
《一种可压缩的(r,n)门限秘密图像共享方案》;刘艳芳,余梅生;《计算机工程与应用》;20061231(第33期);第43-45页 *
《一种适用于彩色图像的秘密共享方案》;刘丽 等;《太原科技大学学报》;20121231;第33卷(第6期);第411-413页 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786330A (en) * 2017-09-26 2018-03-09 陈彦丰 For the method, apparatus of privacy sharing, computer-readable storage medium and electronic equipment
CN111444521B (en) * 2020-02-21 2023-09-01 成都信息工程大学 Image secret sharing method based on threshold increase and digital signature system

Also Published As

Publication number Publication date
CN103761702A (en) 2014-04-30

Similar Documents

Publication Publication Date Title
CN103761702B (en) Image hiding and authentication method based on secret sharing
CN105825257B (en) Information hiding and hiding information extracting method and system based on two-dimensional bar code
Chang et al. A watermarking-based image ownership and tampering authentication scheme
CN105634732B (en) A kind of more bit reversible information hidden methods of ciphertext domain
CN108537049B (en) Adaptive steganography algorithm based on binary image
CN104200424B (en) Difference conversion based (K, N) meaningful image sharing and recovering method
CN107742272A (en) A kind of semi-fragile watermarks method for positioning and recovering based on distorted image
Anand et al. Joint watermarking-encryption-ECC for patient record security in wavelet domain
CN105303075B (en) Adaptive Text Watermarking method based on PDF format
Whitelam et al. Securing multimodal biometric data through watermarking and steganography
CN105590297B (en) Based on GF (27) significant (K, the N) image point of finite field and double authentication deposits reconstructing method
CN105760722A (en) Watermark embedding electronic signature generation method and platform
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN107846530A (en) Digital watermarking algorithm
Al-Rahal et al. HIGH LEVEL SECURITY BASED STEGANORAPHY IN IMAGE AND AUDIO FILES.
CN105306778A (en) Security watermark algorithm combining cryptography
CN104036531B (en) Information hiding method based on vector quantization and bintree
CN101141466B (en) Document authentication method based on interweaving watermark and biological characteristic
CN104463767B (en) Visible encryption and decryption method with image disguising function and tampering identification function
Kim A new public-key authentication watermarking for binary document images resistant to parity attacks
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
Purushothaman et al. An improved secret sharing using xor-based visual cryptography
CN104702814B (en) (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods
Shukla Non-separable histogram based reversible data hiding approach using inverse S-order and skew tent map
Sudha et al. Randomly tampered image detection and self-recovery for a text document using Shamir secret sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant