CN104463767B - Visible encryption and decryption method with image disguising function and tampering identification function - Google Patents

Visible encryption and decryption method with image disguising function and tampering identification function Download PDF

Info

Publication number
CN104463767B
CN104463767B CN201410699303.7A CN201410699303A CN104463767B CN 104463767 B CN104463767 B CN 104463767B CN 201410699303 A CN201410699303 A CN 201410699303A CN 104463767 B CN104463767 B CN 104463767B
Authority
CN
China
Prior art keywords
image
pixels
point
block
width
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410699303.7A
Other languages
Chinese (zh)
Other versions
CN104463767A (en
Inventor
颜斌
王亚菲
宋凌云
杨红梅
刘得源
王恒
郭银景
白培瑞
赵海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University of Science and Technology
Original Assignee
Shandong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University of Science and Technology filed Critical Shandong University of Science and Technology
Priority to CN201410699303.7A priority Critical patent/CN104463767B/en
Publication of CN104463767A publication Critical patent/CN104463767A/en
Application granted granted Critical
Publication of CN104463767B publication Critical patent/CN104463767B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a visible encryption and decryption method with the image disguising function and the tampering identification function. In the visible encryption process, an encryption rule table T designed in the method is used, and two meaningful separated-storage images are built from an input secret image, two input disguising images and an input watermark image; in other words, the separated-storage images have the characteristics of the disguising images, and therefore an attacker can be confused; meanwhile, the watermark image is embedded into the two separated-storage images to be capable of being used for identifying false separated-storage images made by the attacker, and illegal tampering to the separated-storage images is accordingly identified; in the visible decryption process, the secret image can be recovered by stacking the two separated-storage images; as for extracting of watermark information, the watermark image can be extracted from the two separated-storage images according to the encryption rule table T of the method. By means of the visible encryption and decryption method, the contrast ratio of the separated-storage images and the contrast ratio of the recovered secret image are not changed, and the watermark image can be completely recovered.

Description

It is a kind of with camouflage test and the visual cryptography and decryption method of distorting authentication function
Technical field
The present invention relates to a kind of information concealing method, and in particular to it is a kind of with camouflage test and distort authentication function can Depending on encryption method and a kind of with camouflage test and distort the visual decryption method of authentication function.
Background technology
In recent years, network service and portable communication are developed rapidly and popularize, while also bringing serious data Safety problem, and data encryption technology is the important means for solving the problem.But, conventional encryption technique relies on complicated password Algorithm is learned, its huge operand limits its application on portable equipment.And, user also needs to preserve key, in order to avoid Lose or intercepted and captured by other people, so, seriously constrain the portability and reliability of data encryption.
In recent years, visual password had large development as Secret Sharing Scheme in theoretical and application.Using visual Encryption technology, can be divided into a width picture two parts or many parts transmission and store, and per part is referred to as one point and deposits image.Figure is deposited from point The information of original image cannot be obtained on picture, receiving terminal collects two parts or many parts points and deposits after image, by its simple superposition, so that it may Recover original private image information.In general visual cryptography, divide and deposit the meaningless image that image is black-white point random distribution, easily Cause the suspection of active attack person, distorting or destroying for picture is deposited to dividing so as to cause it.
It is significant image that two width of the schemes generation of the visual password with camouflage test point deposit image, is thus disperseed The attention of attacker.But, attacker intercepts and captures and point deposits after image, can implement Tampering attack, i.e., point deposited according to what is intercepted and captured The Secret Image of image 1 and falseness, generates false the dividing of a width and deposits image 2.False point is deposited image 2 and real point is deposited image 1 superposition, recovery is false Secret Image, and general user cannot be distinguished by the Secret Image and real secret figure of falseness Picture.
The content of the invention
For above-mentioned technical problem present in prior art, the present invention proposes one kind and there is camouflage test to recognize with distorting The visual encryption method of card function, the method can be during the visual cryptography with camouflage test, while being embedded in concealed water Official seal ceases, and the information can be used to detect that attacker distorts to point depositing image, and so as to serve protective effect is distorted.
To achieve these goals, the present invention is adopted the following technical scheme that:
It is a kind of with camouflage test and the visual encryption method for distorting authentication function, comprise the steps:
A1 is input into a width Secret Image, two width camouflage tests and a width watermarking images, and by each width image binaryzation;
A2, by watermarking images random number scramble, generates the scramble watermarking images of same size using key Kw;
A3 builds visual cryptography rule and watermark embedding method, referred to as encryption rule table T according to following requirement:
1) condition one:If Secret Image bit is 0, need to ensure that two width point deposit the corresponding 2x2 block of pixels superposition of image Afterwards, at least one 0;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two Individual 0, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition one, each pair is made up of two 2x2 block of pixels, respectively Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
2) condition two:If Secret Image bit is 1, need to ensure that two width point deposit the corresponding four bits superposition of image Afterwards, entirely 1;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two 0th, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition two, each pair is made up of two 2x2 block of pixels, respectively Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
Wherein, 1,0 for occurring in bit, pixel represents respectively black pixel and white pixel;
A4 utilizes above-mentioned encryption rule table T, the width Secret Image, two width camouflage tests and a width watermarking images from input Build two width and point deposit image, the structure rule for point depositing image is:
From top to bottom, the pixel that two width point deposit image is built one by one by left-to-right, each Secret Image pixel correspondence point is deposited Four pixels on image, that is, divide and deposit 4 times that image size is Secret Image.
Additionally, the invention allows for a kind of with camouflage test and the visual decryption method for distorting authentication function, it is adopted Use following technical scheme:
It is a kind of with camouflage test and the visual decryption method for distorting authentication function, with camouflage test and usurped using above-mentioned Change the visual encryption method of authentication function, it comprises the steps:
B1 receiving terminals receive two width and point deposit image, point will deposit image overlay and recover Secret Image information;
B2 obtains above-mentioned encryption rule table T, two width point is deposited into image and is collected, and according to key Kw scrambling sequence is generated;
B3 processes one by one the block of pixels that two width point deposit image from top to bottom, by left-to-right, deposits in image from each point every time A 2x2 block is taken out, that is, obtains a pair of 2x2 image blocks, referred to as image block pair, therefrom extract 1 bit watermark Pixel Information;
B4 inquires about above-mentioned encryption rule table T;If image block is pointed in first group of G1, the watermark bit for decoding is 1;If image block is pointed in first group of G0, the watermark bit for decoding is 0;
The watermarking images that b5 solves step b4 invert unrest using the scrambling sequence in step b1, recover watermarking images letter Breath, so as to complete watermark decoding.
The inventive method can simultaneously meet three below restriction when structure visual cryptography point deposits image:
(1) two width point deposits Restore Secret image after image overlay;
(2) divide and deposit the feature that image embodies camouflage test;
(3) contain watermark information in image point is deposited, extract in image watermark letter so as to receiving terminal can be deposited from two width point Breath.
The invention has the advantages that:
In the inventive method, watermark letter is embedded in image point is deposited simultaneously in the visual cryptography process with camouflage test Breath, dividing for generation is deposited image for significant image and contains watermark information, has thus disperseed the attention of attacker, enters one Step protects the copyright ownership of Secret Image, it is to avoid attacker obtains point depositing carry out after image and distorts and then premeditated change secret is schemed As information.When needing to carry out dispute over copyright certification to Secret Image, propose in image that watermarking images are secret to prove from point can deposit Belonging to the copyright of close image.Can also be realized to dividing the detection for depositing distorted image by extracting watermark.The inventive method will be visual Encryption with digital watermarking in combination with, you can depending on AES can by it is uncomplicated calculate Restore Secret information the characteristics of and number Both the characteristics of word watermark can effectively protect copyright combine, and both Secret Image can be carried out by the inventive method can Depending on encryption, the copyright of image can be further protected again, therefore, the inventive method has certain theory significance and applies valency Value.The inventive method do not change point deposit image and recover after Secret Image contrast, and can completely recover watermarking images.
Description of the drawings
Fig. 1 is have camouflage test in the present invention and distort the visual cryptography of authentication function and the flow chart element of decryption method Figure;
Fig. 2 is digital watermark embedding block diagram during Fig. 1 visual cryptographies;
Fig. 3 is the schematic diagram of encryption rule table T.
Specific embodiment
Below in conjunction with the accompanying drawings and specific embodiment is described in further detail to the present invention:
As depicted in figs. 1 and 2, it is a kind of with camouflage test and the visual encryption method for distorting authentication function including as follows Step:
A1 is input into a width Secret Image, two width camouflage tests and a width watermarking images, using error-diffusion method to each width figure As carrying out binary conversion treatment, each width image of input generates binary image;
A2, by watermarking images random number scramble, generates the scramble watermarking images of same size using key Kw;
A3 builds visual cryptography rule and watermark embedding method, referred to as encryption rule table T, such as Fig. 3 institutes according to following requirement Show:
1) condition one:If Secret Image bit is 0, need to ensure that two width point deposit the corresponding 2x2 block of pixels superposition of image Afterwards, at least one 0;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two Individual 0, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition one, each pair is made up of two 2x2 block of pixels, respectively Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
2) condition two:If Secret Image bit is 1, need to ensure that two width point deposit the corresponding four bits superposition of image Afterwards, entirely 1;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two 0th, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition two, each pair is made up of two 2x2 block of pixels, respectively Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
Wherein, 1,0 for occurring in bit, pixel represents respectively black pixel and white pixel;
From figure 3, it can be seen that after Secret Image, the pixel of two width camouflage tests determine, dividing and depositing the corresponding pixel of image Block has multiple choices, and any allocation plan is selected actually, is determined by the corresponding pixel value of watermark.
For example, when the pixel of Secret Image is white, the corresponding pixel of first camouflage test is white, second puppet The corresponding pixel of dress image is also white, and as seen from Figure 3, depositing image configurations scheme for corresponding point has 4 kinds of selections, selects on earth Any scheme, the present invention is selected according to the value of embedded watermark, if watermarking images respective pixel is 1, we then can be random First and second kind of allocative decision one of which is selected, if watermark pixel is 0, we can then randomly choose third and fourth kind of distribution side Case one of which.Therefore, watermark information is embedded in while visual cryptography is carried out to Secret Image, and in this process In, make use of and produce random number to select different allocative decisions by embedded key K, improve the safety of algorithm.
A4 utilizes above-mentioned encryption rule table T, the width Secret Image, two width camouflage tests and a width watermarking images from input Build two width and point deposit image, the structure rule for point depositing image is:
From top to bottom, the pixel that two width point deposit image is built one by one by left-to-right, each Secret Image pixel correspondence point is deposited Four pixels on image, that is, divide and deposit 4 times that image size is Secret Image;
Using two width camouflage tests, two width point can be made to deposit the feature that image is presented camouflage test, so as to attack can be confused Person, will not cause attacker to note;
Significant point of two width visual cryptographies being generated by said process and depositing image, each width point is deposited image and do not let out Dew watermark information and Secret Image information;The present invention is embedded in the meaningful point of watermark deposited in image and can be used to recognize attacker's system The falseness of work point deposits image, deposit illegally distorting for image for dividing so as to recognize;
A5 discloses above-mentioned encryption rule table T, and informs receiving terminal.
Additionally, present invention is alternatively directed to above-mentioned visual encryption method proposes a kind of visual decryption method, it includes following step Suddenly:
B1 receiving terminals receive two width and point deposit image, point will deposit image overlay and recover Secret Image information;
B2 obtains above-mentioned encryption rule table T, two width point is deposited into image and is collected, and according to key Kw scrambling sequence is generated;
B3 processes one by one the block of pixels that two width point deposit image from top to bottom, by left-to-right, deposits in image from each point every time A 2x2 block is taken out, that is, obtains a pair of 2x2 image blocks, referred to as image block pair, therefrom extract 1 bit watermark Pixel Information;
B4 inquires about above-mentioned encryption rule table T;If image block is pointed in first group of G1, the watermark bit for decoding is 1;If image block is pointed in first group of G0, the watermark bit for decoding is 0;
Due in telescopiny, the random number produced according to embedded watermark key K is in Secret Image, two width camouflage tests The scheme randomly selected in block of image pixels allocation plan is deposited with corresponding point of watermarking images various combination, therefore in watermark extracting During remain a need for embedded watermark key K;Deposit the various combination situation of image pixel value according to two width point successively, as shown in figure 3, Check that corresponding point is deposited in image configurations scheme to corresponding watermark assignment;
The watermarking images that b5 solves step b4 invert unrest using the scrambling sequence in step b1, recover watermarking images letter Whether breath, so as to complete watermark decoding, judge point to deposit image to receive according to the watermarking images information extracted and distort.
Certainly, described above is only presently preferred embodiments of the present invention, and the present invention is not limited to enumerate above-described embodiment, should When explanation, any those of ordinary skill in the art are all equivalent substitutes for being made, bright under the teaching of this specification Aobvious variant, all falls within the essential scope of this specification, ought to be protected by the present invention.

Claims (2)

1. it is a kind of with camouflage test and the visual encryption method for distorting authentication function, it is characterised in that to comprise the steps:
A1 is input into a width Secret Image, two width camouflage tests and a width watermarking images, and by each width image binaryzation;
A2, by watermarking images random number scramble, generates the scramble watermarking images of same size using key Kw;
A3 builds visual cryptography rule and watermark embedding method, referred to as encryption rule table T according to following requirement:
1) condition one:If Secret Image bit is 0, need to ensure that two width point are deposited after the corresponding 2x2 block of pixels superposition of image, extremely Rare one 0;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image must have two 0, Two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition one, each pair is made up of two 2x2 block of pixels, is corresponded to respectively Constructed divides the pixel for depositing image;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, second group is selected at random A pair of block of pixels in G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
2) condition two:If Secret Image bit is 1, need to ensure that two width point are deposited after the corresponding four bits superposition of image, entirely Portion is all 1;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two 0, two Individual 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition two, each pair is made up of two 2x2 block of pixels, is corresponded to respectively Constructed divides the pixel for depositing image;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, second group is selected at random A pair of block of pixels in G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
Wherein, 1,0 for occurring in bit, pixel represents respectively black pixel and white pixel;
A4 utilizes above-mentioned encryption rule table T, and the width Secret Image, two width camouflage tests and a width watermarking images from input builds Two width point deposit image, and the structure rule for point depositing image is:
From top to bottom, the pixel that two width point deposit image is built one by one by left-to-right, each Secret Image pixel correspondence point deposits image On four pixels, that is, divide and deposit 4 times that image size is Secret Image.
2. a kind of with camouflage test and the visual decryption method for distorting authentication function, using as claimed in claim 1 a kind of With camouflage test and the visual encryption method for distorting authentication function, it is characterised in that comprise the steps:
B1 receiving terminals receive two width and point deposit image, point will deposit image overlay and recover Secret Image information;
B2 obtains above-mentioned encryption rule table T, two width point is deposited into image and is collected, and according to key Kw scrambling sequence is generated;
B3 processes one by one the block of pixels that two width point deposit image from top to bottom, by left-to-right, deposits in image from each point take out every time One 2x2 block, that is, obtain a pair of 2x2 image blocks, referred to as image block pair, therefrom extracts 1 bit watermark Pixel Information;
B4 inquires about above-mentioned encryption rule table T;If image block is pointed in first group of G1, the watermark bit for decoding is 1;Such as Fruit image block is pointed in first group of G0, then the watermark bit for decoding is 0;
The watermarking images that b5 solves step b4 invert unrest using the scrambling sequence in step b1, recover watermarking images information, So as to complete watermark decoding.
CN201410699303.7A 2014-11-27 2014-11-27 Visible encryption and decryption method with image disguising function and tampering identification function Expired - Fee Related CN104463767B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410699303.7A CN104463767B (en) 2014-11-27 2014-11-27 Visible encryption and decryption method with image disguising function and tampering identification function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410699303.7A CN104463767B (en) 2014-11-27 2014-11-27 Visible encryption and decryption method with image disguising function and tampering identification function

Publications (2)

Publication Number Publication Date
CN104463767A CN104463767A (en) 2015-03-25
CN104463767B true CN104463767B (en) 2017-05-03

Family

ID=52909755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410699303.7A Expired - Fee Related CN104463767B (en) 2014-11-27 2014-11-27 Visible encryption and decryption method with image disguising function and tampering identification function

Country Status (1)

Country Link
CN (1) CN104463767B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214971B (en) * 2018-08-08 2019-05-28 山东科技大学 A kind of gray level image visual encryption method
CN110460737B (en) * 2019-07-09 2021-03-23 华北电力大学(保定) Image sharing and restoring method
CN110430337B (en) * 2019-08-02 2021-07-23 陕西师范大学 Image disguising and image restoring method, apparatus and storage medium
CN111030810B (en) * 2019-11-29 2022-08-05 童勤业 Anti-counterfeiting encryption method based on image local random transformation technology

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3087727B2 (en) * 1998-06-04 2000-09-11 三菱電機株式会社 Identification device, identification method, and transport device
CN102521785B (en) * 2011-10-26 2014-04-16 哈尔滨工业大学 Homomorphism image encryption and decryption method used for image sharing based on EC-ELGamal algorithm
JP2014155076A (en) * 2013-02-10 2014-08-25 Yoshinobu Takeuchi Method of designing digital watermark with indirect secret parameter and application method thereof
CN103295185B (en) * 2013-06-28 2015-09-09 浙江农林大学 Based on the asymmetrical image encryption method of random amplitude plate and Fourier transform

Also Published As

Publication number Publication date
CN104463767A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN103761702B (en) Image hiding and authentication method based on secret sharing
Laskar et al. High Capacity data hiding using LSB Steganography and Encryption
CN107809644B (en) A kind of encryption area image reversible data concealing method of double-encryption
CN106251278A (en) A kind of image encryption territory based on histogram feature reversible information hidden method
Shifa et al. Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering
CN104463767B (en) Visible encryption and decryption method with image disguising function and tampering identification function
Bashardoost et al. Enhanced LSB image Steganography method by using knight Tour algorithm, Vigenere Encryption and LZW compression
Somaraj et al. A novel image encryption technique using RGB pixel displacement for color images
CN107846530A (en) Digital watermarking algorithm
CN110211018A (en) A kind of chaos encryption reversible information hidden method based on odd even identification tactic
Cao et al. Secure QR code scheme based on visual cryptography
CN108961140A (en) Image guard method and device, image restoring method and device
CN105872305B (en) A kind of completely separable encryption area image reversible data concealing method
Habibi Lashkari et al. A survey on image steganography algorithms and evaluation
Deshmukh et al. Hash based least significant bit technique for video steganography
CN111723346B (en) Visual secret sharing method based on 'bamboo joint worm' reference matrix authentication
Al-Kadei Robust video data security using hybrid cryptography-steganography technique
Raniprima et al. Digital image steganography with encryption based on rubik's cube principle
Abboud Multifactor authentication for software protection
Kaur et al. XOR-EDGE based video steganography and testing against chi-square steganalysis
Lokhande An Effective Way of using LSB Steganography in images along with Cryptography
Rathod et al. Secure bank transaction using data hiding mechanisms
Kalamkar et al. A review on implementation visual cryptography and steganography
Das et al. Data hiding using randomization and multiple encrypted secret images
Abuhmaidan et al. Steganography: A Flexible Embedded Randomization Technique.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170503

Termination date: 20211127