CN104159118A - Image byte XOR algorithm based on pseudo random sequence and LSB algorithm - Google Patents

Image byte XOR algorithm based on pseudo random sequence and LSB algorithm Download PDF

Info

Publication number
CN104159118A
CN104159118A CN201410375151.5A CN201410375151A CN104159118A CN 104159118 A CN104159118 A CN 104159118A CN 201410375151 A CN201410375151 A CN 201410375151A CN 104159118 A CN104159118 A CN 104159118A
Authority
CN
China
Prior art keywords
hidden information
key
hidden
image data
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410375151.5A
Other languages
Chinese (zh)
Inventor
张亚平
苏畅
布文秀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201410375151.5A priority Critical patent/CN104159118A/en
Publication of CN104159118A publication Critical patent/CN104159118A/en
Pending legal-status Critical Current

Links

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses an image byte XOR algorithm based on a pseudo random sequence and an LSB algorithm. The image byte XOR algorithm is characterized by comprising the embedding process and extraction process of hidden information, wherein the extraction process of the hidden information comprises the following steps: through communication of a secure channel, determining seeds I0, generating keys, of a sending party and a receiving party; obtaining keys of the hidden information by the sending party through a key generator; obtaining keys of the hidden information by the receiving party through the key generator; realizing the embedding of the hidden information, and obtaining a hidden information flow and a hidden carrier image data flow; then, realizing the extraction of hidden information flow. Compared with the prior art, the image byte XOR algorithm combines an information hiding technology with the encryption technology of cryptology, and has the characteristics of imperceptibility and higher security.

Description

A kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm
Technical field
The present invention relates to a kind of image information hidden algorithm, particularly relate to a kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm.
Background technology
Information Hiding Techniques is that hidden information is embedded in carrier image and obtains hidden carrier, by the propagation of carrier, has realized the safe transmission of hidden information.The weakness that Information Hiding Techniques can avoid cryptographic algorithm that ciphertext is exposed, makes illegal person be difficult to judge in carrier whether hidden hidden information.Information Hiding Algorithms based on time-space domain has utilized human eye to brightness definition and the limited feature of color definition, and human eye has visual redundancy characteristic, realized embedding and the safe transmission of hidden information.The present invention improves the classical LSB algorithm based on time-space domain.
Summary of the invention
The problem existing in order to overcome above-mentioned prior art, therefore, the present invention proposes a kind of.For hidden information is embedded in to carrier image, by the propagation of carrier, realized the safe transmission of hidden information
A kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm that the present invention proposes, the method comprises telescopiny and the leaching process of hidden information, wherein:
The embedding of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key 0;
Transmit leg utilizes key generator to obtain the key key of hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of carrier image data, carry out XOR, result is placed into the lowest order of carrier image data flow;
Each bit of hidden information stream is embedded in carrier image data flow, completes telescopiny, after telescopiny, above-mentioned hidden information stream and carrier image data flow are called hides hidden information stream and hidden carrier image data stream;
The leaching process of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key 0;
Recipient utilizes key generator to obtain the key key that hides hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of hidden carrier view data, carry out XOR, result is placed into the lowest order of hidden carrier view data;
All hiding hidden information stream is extracted from hidden carrier image data stream,, after reduction, obtain whole hidden information stream.
Compared with prior art, the present invention has disguise, the stronger feature of fail safe, that is:
1, this algorithm is combined Information Hiding Techniques with cryptography encryption technology organic phase, has possessed LSB algorithm simple, be easy to realize etc. advantage.Meanwhile, use seed to produce key sequence, by this key, complete the process of embedding and the extraction of algorithm, the fail safe of Information hiding is promoted greatly.
Even if 2 rogue attacks persons have obtained hidden carrier, the hiding algorithm of Information even, but rogue attacks person does not have key generator, can not determine the seed of the generation pseudo random sequence that this hidden carrier embedding hidden information is used simultaneously, guaranteed to a certain extent the fail safe of algorithm.
Accompanying drawing explanation
Fig. 1 is the key telescopiny of a kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm of the present invention;
Fig. 2 is the leaching process of a kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm of the present invention.
Embodiment
Below in conjunction with accompanying drawing, technical solution of the present invention and embodiment are further described.
As shown in Figure 1, transmit leg is determined the seed I that produces key 0, by key generator, generate a pseudo random sequence key key, according to the sequence of key, successively hidden information is carried out to XOR with which bit of each corresponding byte of carrier image data.By the method, the corresponding bits of the whole bits of hidden information and carrier image is replaced, finally obtain the carrier image that contains hidden information.
As shown in Figure 2, recipient determines seed I 0generate pseudo random sequence key key, according to other certain bits in the least significant bit of the sequence of key successively each byte of hidden carrier data flow and this byte (except least significant bit), carry out XOR, operation result is as a bit of hidden information, with this algorithm, all hidden informations are extracted from carrier image, obtain whole hidden informations.
The order of this sequence has determined a certain bit (except the least significant bit) x of bit of hidden information and corresponding byte of carrier image data i(i=1,2,3,4,5,6,7), carry out XOR, and result is placed into the lowest order of carrier image data, ( and i is integer);
The order of this sequence has determined that in the least significant bit of each byte of carrier image data and this byte, other certain bits (except least significant bit) carry out XOR, operation result is a bit of hidden information, with this algorithm, all hidden informations are extracted from carrier image, obtain whole hidden informations
Wherein, the telescopiny of hidden information is described below:
1,, by the communication of safe lane, determine that transmit leg and recipient produce the seed I of key 0;
2, transmit leg utilizes key generator to obtain the key key of hidden information;
3, by key key, generate one group of pseudo random sequence, its element is that { 1,2,3,4,5,6,7}, the order of this sequence has determined a certain bit (except the least significant bit) x of bit of hidden information and corresponding byte of carrier image data i(i=1,2,3,4,5,6,7), carry out XOR, and result is placed into the lowest order of carrier image data flow, ( x ′ 0 = S ⊕ x i 1 ≤ i ≤ 7 , And i is integer);
4, each bit of hidden information stream is embedded in carrier image data flow, completes the telescopiny of algorithm, after telescopiny, above-mentioned hidden information stream and carrier image data flow are called hides hidden information stream and hidden carrier image data stream.
Wherein the leaching process of hidden information is described below:
1,, by the communication of safe lane, determine that transmit leg and recipient produce the seed I of key 0;
2, recipient utilizes key generator to obtain the key key that hides hidden information;
3, by key key, generate one group of pseudo random sequence, its element is that { 1,2,3,4,5,6,7}, the order of this sequence has determined a certain bit (except the least significant bit) x of bit of hidden information and corresponding byte of hidden carrier view data i(i=1,2,3,4,5,6,7), carry out XOR, and result is placed into the lowest order of hidden carrier view data, ( x ′ 0 = S ⊕ x i 1 ≤ i ≤ 7 , And i is integer);
4, with this algorithm, all hiding hidden information stream is extracted from hidden carrier image data stream,, after reduction, obtain whole hidden information stream.
The above, it is only preferred embodiment of the present invention, be used for helping to understand method of the present invention and core concept, for one of ordinary skill in the art, according to thought of the present invention, this description all will change in specific embodiments and applications, so should not be construed as limitation of the present invention.

Claims (1)

1. the image bytes XOR algorithm based on pseudo random sequence and LSB algorithm, is characterized in that, the method comprises telescopiny and the leaching process of hidden information, wherein:
The embedding of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key 0;
Transmit leg utilizes key generator to obtain the key key of hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of carrier image data, carry out XOR, result is placed into the lowest order of carrier image data flow;
Each bit of hidden information stream is embedded in carrier image data flow, completes telescopiny, after telescopiny, above-mentioned hidden information stream and carrier image data flow are called hides hidden information stream and hidden carrier image data stream;
The leaching process of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key 0;
Recipient utilizes key generator to obtain the key key that hides hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of hidden carrier view data, carry out XOR, result is placed into the lowest order of hidden carrier view data;
All hiding hidden information stream is extracted from hidden carrier image data stream,, after reduction, obtain whole hidden information stream.
CN201410375151.5A 2014-07-30 2014-07-30 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm Pending CN104159118A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410375151.5A CN104159118A (en) 2014-07-30 2014-07-30 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410375151.5A CN104159118A (en) 2014-07-30 2014-07-30 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm

Publications (1)

Publication Number Publication Date
CN104159118A true CN104159118A (en) 2014-11-19

Family

ID=51884508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410375151.5A Pending CN104159118A (en) 2014-07-30 2014-07-30 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm

Country Status (1)

Country Link
CN (1) CN104159118A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956990A (en) * 2016-04-27 2016-09-21 广西财经学院 General type non-destructive information hiding algorithm for a large capacity image
CN106530204A (en) * 2016-11-21 2017-03-22 西华大学 Adaptive image information hiding method based on critical value
CN107846530A (en) * 2017-09-28 2018-03-27 四川长虹电器股份有限公司 Digital watermarking algorithm
CN109547663A (en) * 2018-09-13 2019-03-29 华南理工大学 A kind of improvement LSB image latent writing method of combining cipher

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1849774A (en) * 2003-09-12 2006-10-18 安全电子邮件哥德堡公司 Message security
US20130114741A1 (en) * 2011-11-07 2013-05-09 Microsoft Corporation Signaling of state information for a decoded picture buffer and reference picture lists

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1849774A (en) * 2003-09-12 2006-10-18 安全电子邮件哥德堡公司 Message security
US20130114741A1 (en) * 2011-11-07 2013-05-09 Microsoft Corporation Signaling of state information for a decoded picture buffer and reference picture lists

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
姜吉涛,周雪芹,刘晓红: "一种基于LSB的数字图像隐藏的改进算法", 《山东理工大学学报(自然科学版)》 *
景灏: "基于m序列的图像信息隐藏技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑 》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956990A (en) * 2016-04-27 2016-09-21 广西财经学院 General type non-destructive information hiding algorithm for a large capacity image
CN105956990B (en) * 2016-04-27 2019-10-15 广西财经学院 A kind of universal large capacity image lossless Information Hiding Algorithms
CN106530204A (en) * 2016-11-21 2017-03-22 西华大学 Adaptive image information hiding method based on critical value
CN107846530A (en) * 2017-09-28 2018-03-27 四川长虹电器股份有限公司 Digital watermarking algorithm
CN109547663A (en) * 2018-09-13 2019-03-29 华南理工大学 A kind of improvement LSB image latent writing method of combining cipher
CN109547663B (en) * 2018-09-13 2020-06-19 华南理工大学 Improved LSB image steganography method combined with cryptography

Similar Documents

Publication Publication Date Title
CN103761702A (en) Image hiding and authentication method based on secret sharing
Patel et al. LSB based image steganography using dynamic key cryptography
Mitra et al. A new image encryption approach using combinational permutation techniques
CN108566500A (en) The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN109257346B (en) Concealed transmission system based on block chain
CN105847629A (en) Reversible information hiding method for encrypted image
CN108111295B (en) Homomorphic encryption method based on analog-to-analog operation
Ulutas et al. Secret image sharing scheme with adaptive authentication strength
Gambhir et al. Integrating RSA cryptography & audio steganography
CN101882296A (en) Method for hiding Chebyshev neural network chaotic digital watermark information
Bansod et al. Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity
WO2014075469A1 (en) Method and device for information hiding
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN104537600A (en) Secondary image encrypting and decrypting methods and watermark information tamper area positioning method
CN104836657B (en) A kind of identity-based anonymity broadcast encryption method with efficient decryption features
CN104159118A (en) Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
CN105260981A (en) Optimal coupling image steganography method based on packet replacement
CN107659398A (en) Suitable for Android symmetric encryption method
CN105228087B (en) Mobile payment encryption method based on near-field communication
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN104618113B (en) The method that the authentication of a kind of mobile terminal and safe lane are set up
CN110635896B (en) Blind parameter estimation method for continuous variable quantum key distribution
CN104113543B (en) A kind of message discrimination method based on block cipher
CN105049176B (en) Decryption method for view data safe transmission
US11075889B2 (en) Method and system for encrypting/decrypting data with ultra-low latency for secure data storage and/or communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141119

WD01 Invention patent application deemed withdrawn after publication