CN104463767B - Visible encryption and decryption method with image disguising function and tampering identification function - Google Patents
Visible encryption and decryption method with image disguising function and tampering identification function Download PDFInfo
- Publication number
- CN104463767B CN104463767B CN201410699303.7A CN201410699303A CN104463767B CN 104463767 B CN104463767 B CN 104463767B CN 201410699303 A CN201410699303 A CN 201410699303A CN 104463767 B CN104463767 B CN 104463767B
- Authority
- CN
- China
- Prior art keywords
- image
- pixels
- point
- block
- width
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a visible encryption and decryption method with the image disguising function and the tampering identification function. In the visible encryption process, an encryption rule table T designed in the method is used, and two meaningful separated-storage images are built from an input secret image, two input disguising images and an input watermark image; in other words, the separated-storage images have the characteristics of the disguising images, and therefore an attacker can be confused; meanwhile, the watermark image is embedded into the two separated-storage images to be capable of being used for identifying false separated-storage images made by the attacker, and illegal tampering to the separated-storage images is accordingly identified; in the visible decryption process, the secret image can be recovered by stacking the two separated-storage images; as for extracting of watermark information, the watermark image can be extracted from the two separated-storage images according to the encryption rule table T of the method. By means of the visible encryption and decryption method, the contrast ratio of the separated-storage images and the contrast ratio of the recovered secret image are not changed, and the watermark image can be completely recovered.
Description
Technical field
The present invention relates to a kind of information concealing method, and in particular to it is a kind of with camouflage test and distort authentication function can
Depending on encryption method and a kind of with camouflage test and distort the visual decryption method of authentication function.
Background technology
In recent years, network service and portable communication are developed rapidly and popularize, while also bringing serious data
Safety problem, and data encryption technology is the important means for solving the problem.But, conventional encryption technique relies on complicated password
Algorithm is learned, its huge operand limits its application on portable equipment.And, user also needs to preserve key, in order to avoid
Lose or intercepted and captured by other people, so, seriously constrain the portability and reliability of data encryption.
In recent years, visual password had large development as Secret Sharing Scheme in theoretical and application.Using visual
Encryption technology, can be divided into a width picture two parts or many parts transmission and store, and per part is referred to as one point and deposits image.Figure is deposited from point
The information of original image cannot be obtained on picture, receiving terminal collects two parts or many parts points and deposits after image, by its simple superposition, so that it may
Recover original private image information.In general visual cryptography, divide and deposit the meaningless image that image is black-white point random distribution, easily
Cause the suspection of active attack person, distorting or destroying for picture is deposited to dividing so as to cause it.
It is significant image that two width of the schemes generation of the visual password with camouflage test point deposit image, is thus disperseed
The attention of attacker.But, attacker intercepts and captures and point deposits after image, can implement Tampering attack, i.e., point deposited according to what is intercepted and captured
The Secret Image of image 1 and falseness, generates false the dividing of a width and deposits image 2.False point is deposited image 2 and real point is deposited image
1 superposition, recovery is false Secret Image, and general user cannot be distinguished by the Secret Image and real secret figure of falseness
Picture.
The content of the invention
For above-mentioned technical problem present in prior art, the present invention proposes one kind and there is camouflage test to recognize with distorting
The visual encryption method of card function, the method can be during the visual cryptography with camouflage test, while being embedded in concealed water
Official seal ceases, and the information can be used to detect that attacker distorts to point depositing image, and so as to serve protective effect is distorted.
To achieve these goals, the present invention is adopted the following technical scheme that:
It is a kind of with camouflage test and the visual encryption method for distorting authentication function, comprise the steps:
A1 is input into a width Secret Image, two width camouflage tests and a width watermarking images, and by each width image binaryzation;
A2, by watermarking images random number scramble, generates the scramble watermarking images of same size using key Kw;
A3 builds visual cryptography rule and watermark embedding method, referred to as encryption rule table T according to following requirement:
1) condition one:If Secret Image bit is 0, need to ensure that two width point deposit the corresponding 2x2 block of pixels superposition of image
Afterwards, at least one 0;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two
Individual 0, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one
0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition one, each pair is made up of two 2x2 block of pixels, respectively
Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random
A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
2) condition two:If Secret Image bit is 1, need to ensure that two width point deposit the corresponding four bits superposition of image
Afterwards, entirely 1;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two
0th, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition two, each pair is made up of two 2x2 block of pixels, respectively
Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random
A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
Wherein, 1,0 for occurring in bit, pixel represents respectively black pixel and white pixel;
A4 utilizes above-mentioned encryption rule table T, the width Secret Image, two width camouflage tests and a width watermarking images from input
Build two width and point deposit image, the structure rule for point depositing image is:
From top to bottom, the pixel that two width point deposit image is built one by one by left-to-right, each Secret Image pixel correspondence point is deposited
Four pixels on image, that is, divide and deposit 4 times that image size is Secret Image.
Additionally, the invention allows for a kind of with camouflage test and the visual decryption method for distorting authentication function, it is adopted
Use following technical scheme:
It is a kind of with camouflage test and the visual decryption method for distorting authentication function, with camouflage test and usurped using above-mentioned
Change the visual encryption method of authentication function, it comprises the steps:
B1 receiving terminals receive two width and point deposit image, point will deposit image overlay and recover Secret Image information;
B2 obtains above-mentioned encryption rule table T, two width point is deposited into image and is collected, and according to key Kw scrambling sequence is generated;
B3 processes one by one the block of pixels that two width point deposit image from top to bottom, by left-to-right, deposits in image from each point every time
A 2x2 block is taken out, that is, obtains a pair of 2x2 image blocks, referred to as image block pair, therefrom extract 1 bit watermark Pixel Information;
B4 inquires about above-mentioned encryption rule table T;If image block is pointed in first group of G1, the watermark bit for decoding is
1;If image block is pointed in first group of G0, the watermark bit for decoding is 0;
The watermarking images that b5 solves step b4 invert unrest using the scrambling sequence in step b1, recover watermarking images letter
Breath, so as to complete watermark decoding.
The inventive method can simultaneously meet three below restriction when structure visual cryptography point deposits image:
(1) two width point deposits Restore Secret image after image overlay;
(2) divide and deposit the feature that image embodies camouflage test;
(3) contain watermark information in image point is deposited, extract in image watermark letter so as to receiving terminal can be deposited from two width point
Breath.
The invention has the advantages that:
In the inventive method, watermark letter is embedded in image point is deposited simultaneously in the visual cryptography process with camouflage test
Breath, dividing for generation is deposited image for significant image and contains watermark information, has thus disperseed the attention of attacker, enters one
Step protects the copyright ownership of Secret Image, it is to avoid attacker obtains point depositing carry out after image and distorts and then premeditated change secret is schemed
As information.When needing to carry out dispute over copyright certification to Secret Image, propose in image that watermarking images are secret to prove from point can deposit
Belonging to the copyright of close image.Can also be realized to dividing the detection for depositing distorted image by extracting watermark.The inventive method will be visual
Encryption with digital watermarking in combination with, you can depending on AES can by it is uncomplicated calculate Restore Secret information the characteristics of and number
Both the characteristics of word watermark can effectively protect copyright combine, and both Secret Image can be carried out by the inventive method can
Depending on encryption, the copyright of image can be further protected again, therefore, the inventive method has certain theory significance and applies valency
Value.The inventive method do not change point deposit image and recover after Secret Image contrast, and can completely recover watermarking images.
Description of the drawings
Fig. 1 is have camouflage test in the present invention and distort the visual cryptography of authentication function and the flow chart element of decryption method
Figure;
Fig. 2 is digital watermark embedding block diagram during Fig. 1 visual cryptographies;
Fig. 3 is the schematic diagram of encryption rule table T.
Specific embodiment
Below in conjunction with the accompanying drawings and specific embodiment is described in further detail to the present invention:
As depicted in figs. 1 and 2, it is a kind of with camouflage test and the visual encryption method for distorting authentication function including as follows
Step:
A1 is input into a width Secret Image, two width camouflage tests and a width watermarking images, using error-diffusion method to each width figure
As carrying out binary conversion treatment, each width image of input generates binary image;
A2, by watermarking images random number scramble, generates the scramble watermarking images of same size using key Kw;
A3 builds visual cryptography rule and watermark embedding method, referred to as encryption rule table T, such as Fig. 3 institutes according to following requirement
Show:
1) condition one:If Secret Image bit is 0, need to ensure that two width point deposit the corresponding 2x2 block of pixels superposition of image
Afterwards, at least one 0;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two
Individual 0, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one
0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition one, each pair is made up of two 2x2 block of pixels, respectively
Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random
A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
2) condition two:If Secret Image bit is 1, need to ensure that two width point deposit the corresponding four bits superposition of image
Afterwards, entirely 1;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two
0th, two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition two, each pair is made up of two 2x2 block of pixels, respectively
Divide the pixel for depositing image constructed by correspondence;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, is selected at random
A pair of block of pixels in two groups of G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
Wherein, 1,0 for occurring in bit, pixel represents respectively black pixel and white pixel;
From figure 3, it can be seen that after Secret Image, the pixel of two width camouflage tests determine, dividing and depositing the corresponding pixel of image
Block has multiple choices, and any allocation plan is selected actually, is determined by the corresponding pixel value of watermark.
For example, when the pixel of Secret Image is white, the corresponding pixel of first camouflage test is white, second puppet
The corresponding pixel of dress image is also white, and as seen from Figure 3, depositing image configurations scheme for corresponding point has 4 kinds of selections, selects on earth
Any scheme, the present invention is selected according to the value of embedded watermark, if watermarking images respective pixel is 1, we then can be random
First and second kind of allocative decision one of which is selected, if watermark pixel is 0, we can then randomly choose third and fourth kind of distribution side
Case one of which.Therefore, watermark information is embedded in while visual cryptography is carried out to Secret Image, and in this process
In, make use of and produce random number to select different allocative decisions by embedded key K, improve the safety of algorithm.
A4 utilizes above-mentioned encryption rule table T, the width Secret Image, two width camouflage tests and a width watermarking images from input
Build two width and point deposit image, the structure rule for point depositing image is:
From top to bottom, the pixel that two width point deposit image is built one by one by left-to-right, each Secret Image pixel correspondence point is deposited
Four pixels on image, that is, divide and deposit 4 times that image size is Secret Image;
Using two width camouflage tests, two width point can be made to deposit the feature that image is presented camouflage test, so as to attack can be confused
Person, will not cause attacker to note;
Significant point of two width visual cryptographies being generated by said process and depositing image, each width point is deposited image and do not let out
Dew watermark information and Secret Image information;The present invention is embedded in the meaningful point of watermark deposited in image and can be used to recognize attacker's system
The falseness of work point deposits image, deposit illegally distorting for image for dividing so as to recognize;
A5 discloses above-mentioned encryption rule table T, and informs receiving terminal.
Additionally, present invention is alternatively directed to above-mentioned visual encryption method proposes a kind of visual decryption method, it includes following step
Suddenly:
B1 receiving terminals receive two width and point deposit image, point will deposit image overlay and recover Secret Image information;
B2 obtains above-mentioned encryption rule table T, two width point is deposited into image and is collected, and according to key Kw scrambling sequence is generated;
B3 processes one by one the block of pixels that two width point deposit image from top to bottom, by left-to-right, deposits in image from each point every time
A 2x2 block is taken out, that is, obtains a pair of 2x2 image blocks, referred to as image block pair, therefrom extract 1 bit watermark Pixel Information;
B4 inquires about above-mentioned encryption rule table T;If image block is pointed in first group of G1, the watermark bit for decoding is
1;If image block is pointed in first group of G0, the watermark bit for decoding is 0;
Due in telescopiny, the random number produced according to embedded watermark key K is in Secret Image, two width camouflage tests
The scheme randomly selected in block of image pixels allocation plan is deposited with corresponding point of watermarking images various combination, therefore in watermark extracting
During remain a need for embedded watermark key K;Deposit the various combination situation of image pixel value according to two width point successively, as shown in figure 3,
Check that corresponding point is deposited in image configurations scheme to corresponding watermark assignment;
The watermarking images that b5 solves step b4 invert unrest using the scrambling sequence in step b1, recover watermarking images letter
Whether breath, so as to complete watermark decoding, judge point to deposit image to receive according to the watermarking images information extracted and distort.
Certainly, described above is only presently preferred embodiments of the present invention, and the present invention is not limited to enumerate above-described embodiment, should
When explanation, any those of ordinary skill in the art are all equivalent substitutes for being made, bright under the teaching of this specification
Aobvious variant, all falls within the essential scope of this specification, ought to be protected by the present invention.
Claims (2)
1. it is a kind of with camouflage test and the visual encryption method for distorting authentication function, it is characterised in that to comprise the steps:
A1 is input into a width Secret Image, two width camouflage tests and a width watermarking images, and by each width image binaryzation;
A2, by watermarking images random number scramble, generates the scramble watermarking images of same size using key Kw;
A3 builds visual cryptography rule and watermark embedding method, referred to as encryption rule table T according to following requirement:
1) condition one:If Secret Image bit is 0, need to ensure that two width point are deposited after the corresponding 2x2 block of pixels superposition of image, extremely
Rare one 0;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image must have two 0,
Two 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition one, each pair is made up of two 2x2 block of pixels, is corresponded to respectively
Constructed divides the pixel for depositing image;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, second group is selected at random
A pair of block of pixels in G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
2) condition two:If Secret Image bit is 1, need to ensure that two width point are deposited after the corresponding four bits superposition of image, entirely
Portion is all 1;If camouflage test respective pixel is 0, it is corresponding be divided to deposit corresponding four pixels on image and must have two 0, two
Individual 1;If the corresponding pixel of camouflage test is 1, divides and deposit corresponding four pixels of image and there must be three 1, one 0;
There is N pair if meeting the image pixel combination of point depositing of above-mentioned condition two, each pair is made up of two 2x2 block of pixels, is corresponded to respectively
Constructed divides the pixel for depositing image;By N to block of pixels random division be two groups, be referred to as G1 and G0;
If watermark bit is 1, a pair of block of pixels in first group of G1 are selected;If watermark bit is 0, second group is selected at random
A pair of block of pixels in G0;
Selected block of pixels is filled out and point is deposited on image correspondence position;
Wherein, 1,0 for occurring in bit, pixel represents respectively black pixel and white pixel;
A4 utilizes above-mentioned encryption rule table T, and the width Secret Image, two width camouflage tests and a width watermarking images from input builds
Two width point deposit image, and the structure rule for point depositing image is:
From top to bottom, the pixel that two width point deposit image is built one by one by left-to-right, each Secret Image pixel correspondence point deposits image
On four pixels, that is, divide and deposit 4 times that image size is Secret Image.
2. a kind of with camouflage test and the visual decryption method for distorting authentication function, using as claimed in claim 1 a kind of
With camouflage test and the visual encryption method for distorting authentication function, it is characterised in that comprise the steps:
B1 receiving terminals receive two width and point deposit image, point will deposit image overlay and recover Secret Image information;
B2 obtains above-mentioned encryption rule table T, two width point is deposited into image and is collected, and according to key Kw scrambling sequence is generated;
B3 processes one by one the block of pixels that two width point deposit image from top to bottom, by left-to-right, deposits in image from each point take out every time
One 2x2 block, that is, obtain a pair of 2x2 image blocks, referred to as image block pair, therefrom extracts 1 bit watermark Pixel Information;
B4 inquires about above-mentioned encryption rule table T;If image block is pointed in first group of G1, the watermark bit for decoding is 1;Such as
Fruit image block is pointed in first group of G0, then the watermark bit for decoding is 0;
The watermarking images that b5 solves step b4 invert unrest using the scrambling sequence in step b1, recover watermarking images information,
So as to complete watermark decoding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410699303.7A CN104463767B (en) | 2014-11-27 | 2014-11-27 | Visible encryption and decryption method with image disguising function and tampering identification function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410699303.7A CN104463767B (en) | 2014-11-27 | 2014-11-27 | Visible encryption and decryption method with image disguising function and tampering identification function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104463767A CN104463767A (en) | 2015-03-25 |
CN104463767B true CN104463767B (en) | 2017-05-03 |
Family
ID=52909755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410699303.7A Expired - Fee Related CN104463767B (en) | 2014-11-27 | 2014-11-27 | Visible encryption and decryption method with image disguising function and tampering identification function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104463767B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109214971B (en) * | 2018-08-08 | 2019-05-28 | 山东科技大学 | A kind of gray level image visual encryption method |
CN110460737B (en) * | 2019-07-09 | 2021-03-23 | 华北电力大学(保定) | Image sharing and restoring method |
CN110430337B (en) * | 2019-08-02 | 2021-07-23 | 陕西师范大学 | Image disguising and image restoring method, apparatus and storage medium |
CN111030810B (en) * | 2019-11-29 | 2022-08-05 | 童勤业 | Anti-counterfeiting encryption method based on image local random transformation technology |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3087727B2 (en) * | 1998-06-04 | 2000-09-11 | 三菱電機株式会社 | Identification device, identification method, and transport device |
CN102521785B (en) * | 2011-10-26 | 2014-04-16 | 哈尔滨工业大学 | Homomorphism image encryption and decryption method used for image sharing based on EC-ELGamal algorithm |
JP2014155076A (en) * | 2013-02-10 | 2014-08-25 | Yoshinobu Takeuchi | Method of designing digital watermark with indirect secret parameter and application method thereof |
CN103295185B (en) * | 2013-06-28 | 2015-09-09 | 浙江农林大学 | Based on the asymmetrical image encryption method of random amplitude plate and Fourier transform |
-
2014
- 2014-11-27 CN CN201410699303.7A patent/CN104463767B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN104463767A (en) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103761702B (en) | Image hiding and authentication method based on secret sharing | |
Laskar et al. | High Capacity data hiding using LSB Steganography and Encryption | |
CN107809644B (en) | A kind of encryption area image reversible data concealing method of double-encryption | |
CN106251278A (en) | A kind of image encryption territory based on histogram feature reversible information hidden method | |
Shifa et al. | Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering | |
CN104463767B (en) | Visible encryption and decryption method with image disguising function and tampering identification function | |
Bashardoost et al. | Enhanced LSB image Steganography method by using knight Tour algorithm, Vigenere Encryption and LZW compression | |
Somaraj et al. | A novel image encryption technique using RGB pixel displacement for color images | |
CN107846530A (en) | Digital watermarking algorithm | |
CN110211018A (en) | A kind of chaos encryption reversible information hidden method based on odd even identification tactic | |
Cao et al. | Secure QR code scheme based on visual cryptography | |
CN108961140A (en) | Image guard method and device, image restoring method and device | |
CN105872305B (en) | A kind of completely separable encryption area image reversible data concealing method | |
Habibi Lashkari et al. | A survey on image steganography algorithms and evaluation | |
Deshmukh et al. | Hash based least significant bit technique for video steganography | |
CN111723346B (en) | Visual secret sharing method based on 'bamboo joint worm' reference matrix authentication | |
Al-Kadei | Robust video data security using hybrid cryptography-steganography technique | |
Raniprima et al. | Digital image steganography with encryption based on rubik's cube principle | |
Abboud | Multifactor authentication for software protection | |
Kaur et al. | XOR-EDGE based video steganography and testing against chi-square steganalysis | |
Lokhande | An Effective Way of using LSB Steganography in images along with Cryptography | |
Rathod et al. | Secure bank transaction using data hiding mechanisms | |
Kalamkar et al. | A review on implementation visual cryptography and steganography | |
Das et al. | Data hiding using randomization and multiple encrypted secret images | |
Abuhmaidan et al. | Steganography: A Flexible Embedded Randomization Technique. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170503 Termination date: 20211127 |