CN104159118A - Image byte XOR algorithm based on pseudo random sequence and LSB algorithm - Google Patents
Image byte XOR algorithm based on pseudo random sequence and LSB algorithm Download PDFInfo
- Publication number
- CN104159118A CN104159118A CN201410375151.5A CN201410375151A CN104159118A CN 104159118 A CN104159118 A CN 104159118A CN 201410375151 A CN201410375151 A CN 201410375151A CN 104159118 A CN104159118 A CN 104159118A
- Authority
- CN
- China
- Prior art keywords
- hidden information
- key
- hidden
- image data
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses an image byte XOR algorithm based on a pseudo random sequence and an LSB algorithm. The image byte XOR algorithm is characterized by comprising the embedding process and extraction process of hidden information, wherein the extraction process of the hidden information comprises the following steps: through communication of a secure channel, determining seeds I0, generating keys, of a sending party and a receiving party; obtaining keys of the hidden information by the sending party through a key generator; obtaining keys of the hidden information by the receiving party through the key generator; realizing the embedding of the hidden information, and obtaining a hidden information flow and a hidden carrier image data flow; then, realizing the extraction of hidden information flow. Compared with the prior art, the image byte XOR algorithm combines an information hiding technology with the encryption technology of cryptology, and has the characteristics of imperceptibility and higher security.
Description
Technical field
The present invention relates to a kind of image information hidden algorithm, particularly relate to a kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm.
Background technology
Information Hiding Techniques is that hidden information is embedded in carrier image and obtains hidden carrier, by the propagation of carrier, has realized the safe transmission of hidden information.The weakness that Information Hiding Techniques can avoid cryptographic algorithm that ciphertext is exposed, makes illegal person be difficult to judge in carrier whether hidden hidden information.Information Hiding Algorithms based on time-space domain has utilized human eye to brightness definition and the limited feature of color definition, and human eye has visual redundancy characteristic, realized embedding and the safe transmission of hidden information.The present invention improves the classical LSB algorithm based on time-space domain.
Summary of the invention
The problem existing in order to overcome above-mentioned prior art, therefore, the present invention proposes a kind of.For hidden information is embedded in to carrier image, by the propagation of carrier, realized the safe transmission of hidden information
A kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm that the present invention proposes, the method comprises telescopiny and the leaching process of hidden information, wherein:
The embedding of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key
0;
Transmit leg utilizes key generator to obtain the key key of hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of carrier image data, carry out XOR, result is placed into the lowest order of carrier image data flow;
Each bit of hidden information stream is embedded in carrier image data flow, completes telescopiny, after telescopiny, above-mentioned hidden information stream and carrier image data flow are called hides hidden information stream and hidden carrier image data stream;
The leaching process of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key
0;
Recipient utilizes key generator to obtain the key key that hides hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of hidden carrier view data, carry out XOR, result is placed into the lowest order of hidden carrier view data;
All hiding hidden information stream is extracted from hidden carrier image data stream,, after reduction, obtain whole hidden information stream.
Compared with prior art, the present invention has disguise, the stronger feature of fail safe, that is:
1, this algorithm is combined Information Hiding Techniques with cryptography encryption technology organic phase, has possessed LSB algorithm simple, be easy to realize etc. advantage.Meanwhile, use seed to produce key sequence, by this key, complete the process of embedding and the extraction of algorithm, the fail safe of Information hiding is promoted greatly.
Even if 2 rogue attacks persons have obtained hidden carrier, the hiding algorithm of Information even, but rogue attacks person does not have key generator, can not determine the seed of the generation pseudo random sequence that this hidden carrier embedding hidden information is used simultaneously, guaranteed to a certain extent the fail safe of algorithm.
Accompanying drawing explanation
Fig. 1 is the key telescopiny of a kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm of the present invention;
Fig. 2 is the leaching process of a kind of image bytes XOR algorithm based on pseudo random sequence and LSB algorithm of the present invention.
Embodiment
Below in conjunction with accompanying drawing, technical solution of the present invention and embodiment are further described.
As shown in Figure 1, transmit leg is determined the seed I that produces key
0, by key generator, generate a pseudo random sequence key key, according to the sequence of key, successively hidden information is carried out to XOR with which bit of each corresponding byte of carrier image data.By the method, the corresponding bits of the whole bits of hidden information and carrier image is replaced, finally obtain the carrier image that contains hidden information.
As shown in Figure 2, recipient determines seed I
0generate pseudo random sequence key key, according to other certain bits in the least significant bit of the sequence of key successively each byte of hidden carrier data flow and this byte (except least significant bit), carry out XOR, operation result is as a bit of hidden information, with this algorithm, all hidden informations are extracted from carrier image, obtain whole hidden informations.
The order of this sequence has determined a certain bit (except the least significant bit) x of bit of hidden information and corresponding byte of carrier image data
i(i=1,2,3,4,5,6,7), carry out XOR, and result is placed into the lowest order of carrier image data, (
and i is integer);
The order of this sequence has determined that in the least significant bit of each byte of carrier image data and this byte, other certain bits (except least significant bit) carry out XOR, operation result is a bit of hidden information, with this algorithm, all hidden informations are extracted from carrier image, obtain whole hidden informations
Wherein, the telescopiny of hidden information is described below:
1,, by the communication of safe lane, determine that transmit leg and recipient produce the seed I of key
0;
2, transmit leg utilizes key generator to obtain the key key of hidden information;
3, by key key, generate one group of pseudo random sequence, its element is that { 1,2,3,4,5,6,7}, the order of this sequence has determined a certain bit (except the least significant bit) x of bit of hidden information and corresponding byte of carrier image data
i(i=1,2,3,4,5,6,7), carry out XOR, and result is placed into the lowest order of carrier image data flow, (
And i is integer);
4, each bit of hidden information stream is embedded in carrier image data flow, completes the telescopiny of algorithm, after telescopiny, above-mentioned hidden information stream and carrier image data flow are called hides hidden information stream and hidden carrier image data stream.
Wherein the leaching process of hidden information is described below:
1,, by the communication of safe lane, determine that transmit leg and recipient produce the seed I of key
0;
2, recipient utilizes key generator to obtain the key key that hides hidden information;
3, by key key, generate one group of pseudo random sequence, its element is that { 1,2,3,4,5,6,7}, the order of this sequence has determined a certain bit (except the least significant bit) x of bit of hidden information and corresponding byte of hidden carrier view data
i(i=1,2,3,4,5,6,7), carry out XOR, and result is placed into the lowest order of hidden carrier view data, (
And i is integer);
4, with this algorithm, all hiding hidden information stream is extracted from hidden carrier image data stream,, after reduction, obtain whole hidden information stream.
The above, it is only preferred embodiment of the present invention, be used for helping to understand method of the present invention and core concept, for one of ordinary skill in the art, according to thought of the present invention, this description all will change in specific embodiments and applications, so should not be construed as limitation of the present invention.
Claims (1)
1. the image bytes XOR algorithm based on pseudo random sequence and LSB algorithm, is characterized in that, the method comprises telescopiny and the leaching process of hidden information, wherein:
The embedding of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key
0;
Transmit leg utilizes key generator to obtain the key key of hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of carrier image data, carry out XOR, result is placed into the lowest order of carrier image data flow;
Each bit of hidden information stream is embedded in carrier image data flow, completes telescopiny, after telescopiny, above-mentioned hidden information stream and carrier image data flow are called hides hidden information stream and hidden carrier image data stream;
The leaching process of hidden information comprises following processing:
By the communication of safe lane, determine that transmit leg and recipient produce the seed I of key
0;
Recipient utilizes key generator to obtain the key key that hides hidden information;
By key key, generate one group of pseudo random sequence, according to the order of this sequence to hidden information bit a certain bit except least significant bit with corresponding byte of hidden carrier view data, carry out XOR, result is placed into the lowest order of hidden carrier view data;
All hiding hidden information stream is extracted from hidden carrier image data stream,, after reduction, obtain whole hidden information stream.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410375151.5A CN104159118A (en) | 2014-07-30 | 2014-07-30 | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410375151.5A CN104159118A (en) | 2014-07-30 | 2014-07-30 | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104159118A true CN104159118A (en) | 2014-11-19 |
Family
ID=51884508
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410375151.5A Pending CN104159118A (en) | 2014-07-30 | 2014-07-30 | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104159118A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105956990A (en) * | 2016-04-27 | 2016-09-21 | 广西财经学院 | General type non-destructive information hiding algorithm for a large capacity image |
CN106530204A (en) * | 2016-11-21 | 2017-03-22 | 西华大学 | Adaptive image information hiding method based on critical value |
CN107846530A (en) * | 2017-09-28 | 2018-03-27 | 四川长虹电器股份有限公司 | Digital watermarking algorithm |
CN109547663A (en) * | 2018-09-13 | 2019-03-29 | 华南理工大学 | A kind of improvement LSB image latent writing method of combining cipher |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1849774A (en) * | 2003-09-12 | 2006-10-18 | 安全电子邮件哥德堡公司 | Message security |
US20130114741A1 (en) * | 2011-11-07 | 2013-05-09 | Microsoft Corporation | Signaling of state information for a decoded picture buffer and reference picture lists |
-
2014
- 2014-07-30 CN CN201410375151.5A patent/CN104159118A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1849774A (en) * | 2003-09-12 | 2006-10-18 | 安全电子邮件哥德堡公司 | Message security |
US20130114741A1 (en) * | 2011-11-07 | 2013-05-09 | Microsoft Corporation | Signaling of state information for a decoded picture buffer and reference picture lists |
Non-Patent Citations (2)
Title |
---|
姜吉涛,周雪芹,刘晓红: "一种基于LSB的数字图像隐藏的改进算法", 《山东理工大学学报(自然科学版)》 * |
景灏: "基于m序列的图像信息隐藏技术研究", 《中国优秀硕士学位论文全文数据库 信息科技辑 》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105956990A (en) * | 2016-04-27 | 2016-09-21 | 广西财经学院 | General type non-destructive information hiding algorithm for a large capacity image |
CN105956990B (en) * | 2016-04-27 | 2019-10-15 | 广西财经学院 | A kind of universal large capacity image lossless Information Hiding Algorithms |
CN106530204A (en) * | 2016-11-21 | 2017-03-22 | 西华大学 | Adaptive image information hiding method based on critical value |
CN107846530A (en) * | 2017-09-28 | 2018-03-27 | 四川长虹电器股份有限公司 | Digital watermarking algorithm |
CN109547663A (en) * | 2018-09-13 | 2019-03-29 | 华南理工大学 | A kind of improvement LSB image latent writing method of combining cipher |
CN109547663B (en) * | 2018-09-13 | 2020-06-19 | 华南理工大学 | Improved LSB image steganography method combined with cryptography |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103761702A (en) | Image hiding and authentication method based on secret sharing | |
Patel et al. | LSB based image steganography using dynamic key cryptography | |
Mitra et al. | A new image encryption approach using combinational permutation techniques | |
CN108566500A (en) | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism | |
CN109257346B (en) | Concealed transmission system based on block chain | |
CN105847629A (en) | Reversible information hiding method for encrypted image | |
CN108111295B (en) | Homomorphic encryption method based on analog-to-analog operation | |
Ulutas et al. | Secret image sharing scheme with adaptive authentication strength | |
Gambhir et al. | Integrating RSA cryptography & audio steganography | |
CN101882296A (en) | Method for hiding Chebyshev neural network chaotic digital watermark information | |
Bansod et al. | Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity | |
WO2014075469A1 (en) | Method and device for information hiding | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
CN104537600A (en) | Secondary image encrypting and decrypting methods and watermark information tamper area positioning method | |
CN104836657B (en) | A kind of identity-based anonymity broadcast encryption method with efficient decryption features | |
CN104159118A (en) | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm | |
CN105260981A (en) | Optimal coupling image steganography method based on packet replacement | |
CN107659398A (en) | Suitable for Android symmetric encryption method | |
CN105228087B (en) | Mobile payment encryption method based on near-field communication | |
CN103117850B (en) | A kind of method for building up of the cryptographic system based on random sequence database | |
CN104618113B (en) | The method that the authentication of a kind of mobile terminal and safe lane are set up | |
CN110635896B (en) | Blind parameter estimation method for continuous variable quantum key distribution | |
CN104113543B (en) | A kind of message discrimination method based on block cipher | |
CN105049176B (en) | Decryption method for view data safe transmission | |
US11075889B2 (en) | Method and system for encrypting/decrypting data with ultra-low latency for secure data storage and/or communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141119 |
|
WD01 | Invention patent application deemed withdrawn after publication |