CN104967860B - A kind of method for compressing image encrypted based on subband - Google Patents

A kind of method for compressing image encrypted based on subband Download PDF

Info

Publication number
CN104967860B
CN104967860B CN201510453647.4A CN201510453647A CN104967860B CN 104967860 B CN104967860 B CN 104967860B CN 201510453647 A CN201510453647 A CN 201510453647A CN 104967860 B CN104967860 B CN 104967860B
Authority
CN
China
Prior art keywords
subband
main information
low frequency
image
information subband
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510453647.4A
Other languages
Chinese (zh)
Other versions
CN104967860A (en
Inventor
赵志武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHONGQING AEROSPACE ROCKET ELECTRONIC TECHNOLOGY Co Ltd
Original Assignee
CHONGQING AEROSPACE ROCKET ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING AEROSPACE ROCKET ELECTRONIC TECHNOLOGY Co Ltd filed Critical CHONGQING AEROSPACE ROCKET ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN201510453647.4A priority Critical patent/CN104967860B/en
Publication of CN104967860A publication Critical patent/CN104967860A/en
Application granted granted Critical
Publication of CN104967860B publication Critical patent/CN104967860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The present invention relates to a kind of method for compressing image encrypted based on subband, S1 is pre-processed to original image;S2 carries out the low frequency sub-band obtained after 5 grades of wavelet transformations, 5 grades of wavelet transformations of output to pretreated image(LL subbands)And high-frequency sub-band, wherein LL subbands are main information subband, and high-frequency sub-band is secondary information subband;The main information subband and all secondary information subbands that S3 is exported to S2 carry out Tier1 codings;S4 carries out stream cipher encrypting to main information sub-band number packet in Tier2 cataloged procedures, and S5 obtains all secondary information subband compressed data packets progress code stream organizations that the main information sub-band number packet after encryption and S3 are exported the compression image by encryption.This method does not increase extra memory and additional compression data code flow size by the way that main information subband is encrypted while picture compression efficiency is not reduced, and effectively improves the security of image information transmission.

Description

A kind of method for compressing image encrypted based on subband
Technical field
The present invention relates to image procossing, a kind of method for compressing image encrypted based on subband is referred specifically to.
Background technology
Compression of images refers to the technology that original picture element matrix is damaged or nondestructively represented with less bit, also referred to as image Coding.From the viewpoint of mathematics, this process be actually by two-dimensional array be transformed to one it is statistically unrelated The data acquisition system of connection.
The general principle of compression of images is:Redundancy is there is in view data, the redundancy of view data is mainly shown as:Figure Spatial redundancy caused by correlation as between adjacent pixel;There is caused by correlation the time in image sequence between different frame Redundancy;Spectral redundancy caused by the correlation of different color planes or spectral band.The purpose of data compression is exactly by removing this A little data redundancies represent bit number needed for data to reduce.It is huge due to image data amount, in storage, transmission, processing It is extremely difficult, therefore the compression of view data just seems extremely important.
Existing method for compressing image includes damaging data compression and lossless data compression.But either damage data compression Or lossless data compression mostly uses the image compression algorithm of standard, view data is not taken in compression, transmitting procedure Any safety measure so that view data is fully transparent visible in transmitting procedure, image information is easily intercepted and captured by attacker.
The content of the invention
In view of the above-mentioned problems existing in the prior art, it is simple it is an object of the invention to provide a kind of method and safe and reliable The method for compressing image encrypted based on subband, the method for compressing image effectively solves the security of Compressed Image Transmission.
To achieve the above object, the present invention is adopted the following technical scheme that:A kind of method for compressing image encrypted based on subband, Comprise the following steps:
S1:Original image is pre-processed;
S2:5 grades of wavelet transformations are carried out to pretreated image, method is as follows:
S2a:Make j=1;
S2b:Pretreated image carries out j-th stage wavelet transformation, and obtaining a subband in four subbands, four subbands is The main information subband of low frequency is designated as LLj, other three subbands are that high frequency time wants information subband to be designated as HL respectivelyj、LHj、HHj
S2c:By the main information subband LL of low frequency obtained after j-th stage wavelet transformationjProceed wavelet transformation, obtain four One is that the new main information subband of low frequency is designated as LL in new subband, four new subbandsj+1, other three are new high frequency time Information subband is wanted to be designated as HL respectivelyj+1、LHj+1And HHj+1
S2d:Make j=j+1;
S2e:If j<5, then step S2c is performed, next step is otherwise performed;
S2f:Export the main information subband LL of low frequency obtained after the 5th grade of wavelet transformation5The institute obtained with each wavelet transformation There is high frequency time to want information subband HLj、LHjAnd HHj, j=1,2,3,4,5;
S3:The main information subband LL of low frequency exported to step S2f5Information subband is wanted to carry out Tier1 volumes with all high frequency times Code, method is as follows:
S3a:The main information subband of low frequency and all high frequency times of step S2f outputs want information subband individually to carry out bit plane volume Code obtains adjudicating D and context CTX sequences accordingly;
S3b:Then all judgement D and context CTX obtained to step S3a carry out MQ codings respectively, obtain encoding stream, That is compressed data packets;
The main information subband LL of low frequency5Compressed data packets, which are obtained, by step S3a and S3b is designated as the main information sub-band number number of low frequency According to bag, all high frequency times want information subband to obtain compressed data packets by step S3a and S3b and be referred to as high frequency time wanting information subband Compressed data packets;
S4:The main information sub-band number packet of low frequency obtained to step S3b carries out Tier2 codings, and method is as follows:
Information sub-band number packet main to low frequency be encrypted using the cryptographic calculation of formula (1):
yk=(p1xk+p2δk)mod256 (1);
Wherein, xkFor k-th of data, y in the main information sub-band number packet of low frequencykFor the main information sub-band number packet of low frequency In k-th of data ciphertext data after encryption, δkFor k-th of key stream currency, P1 and P2 are the element less than 256 Number;
S5:By the main information sub-band number packet of low frequency after step S4 encryptions and all high frequencies of step S3b outputs Secondary information subband compressed data packets progress code stream organization obtains the compression image by encryption.
Preferably, change is handled centered on pretreatment in the step S1, the value of each pixel in original image Between 0-255, handled by original image centralization, by the value of each pixel in original image be revised as -128 to Between 127.
Preferably, parameter δ in formula (1) in the step S4k, P1 and P2 determination method is as follows:
S4a:Initial key is set, and initial key length is 128bit, initial key input Geffe generators are obtained one Pseudo-random number sequence;
S4b:Then step S4a is obtained into pseudo-random number sequence by Hash functional operation and obtains new pseudorandom number sequence, 8 are often taken to obtain a key stream currency δ in the new pseudorandom number sequencekValue;
S4c:According to obtained key stream currency δkValue obtain prime P 1 and P2 by being calculated as below:
1) prime number 2 will be removed in the prime number less than 256, ascending be arranged in order of remaining prime number is then formed into prime number Table;
2) calculated according to formula (2):
WP1kmod30 (2);
Wherein, WP1Value represent step 1) in table of primes position, WP1The prime number of pointed location is P1 in table of primes Value;
Calculated according to formula (3):
WP2=30+ δkmod23 (3);
Wherein, WP2Value represent step 1) in table of primes position, WP2The prime number of pointed location is P2 in table of primes Value.
Relative to prior art, the invention has the advantages that:
The method for compressing image that the present invention is provided is in image compression process, by being added to the main information subband of low frequency It is close, without additionally increase compressed data code stream size while picture compression efficiency is not reduced, and effectively improve image letter The security of transmission is ceased, length can flexibly change, arithmetic speed is fast while the AES also has, mistake in ciphertext transmission Less, even without mistake the advantages of.
Brief description of the drawings
The flow chart of Fig. 1-method for compressing image of the present invention.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
Referring to Fig. 1, a kind of method for compressing image encrypted based on subband is comprised the following steps:
S1:Original image is pre-processed, the pretreatment is preferably centralization processing, i.e., will be each in original image The value of pixel is handled between 0-255 by original image centralization, and the value of each pixel in original image is changed Between -128 to 127.After centralization processing, the pixel value of image is easy to compression below to handle on origin symmetry;
S2:5 grades of wavelet transformations are carried out to pretreated image, method is as follows:
S2a:Make j=1;
S2b:Pretreated image carries out j-th stage wavelet transformation, and obtaining a subband in four subbands, four subbands is The main information subband of low frequency is designated as LLj, other three subbands are that high frequency time wants information subband to be designated as HL respectivelyj、LHj、HHj
S2c:By the main information subband LL of low frequency obtained after j-th stage wavelet transformationjProceed wavelet transformation, obtain four One is that the new main information subband of low frequency is designated as LL in new subband, four new subbandsj+1, other three are new high frequency time Information subband is wanted to be designated as HL respectivelyj+1、LHj+1And HHj+1
S2d:Make j=j+1;
S2e:If j<5, then step S2c is performed, next step is otherwise performed;
S2f:Export the main information subband LL of low frequency obtained after the 5th grade of wavelet transformation5The institute obtained with each wavelet transformation There is high frequency time to want information subband HLj、LHjAnd HHj, i=1,2,3,4,5;
S3:The main information subband LL of low frequency exported to step S2f5Information subband is wanted to carry out Tier1 volumes with all high frequency times Code, method is as follows:
S3a:The main information subband of low frequency and all high frequency times of step S2f outputs want information subband individually to carry out bit plane volume Code obtains adjudicating D and context CTX sequences accordingly;
I.e.:To LL5The main information subband of low frequency carries out Bit-Plane Encoding and obtains adjudicating D and context CTX sequences accordingly;
Information subband HL is wanted to high frequency time1Bit-Plane Encoding is carried out to obtain adjudicating D and context CTX sequences accordingly;It is right High frequency time wants information subband LH1Bit-Plane Encoding is carried out to obtain adjudicating D and context CTX sequences accordingly;High frequency time will be believed Cease subband HH1Bit-Plane Encoding is carried out to obtain adjudicating D and context CTX sequences accordingly;Successively will to all high frequency times Information subband carries out Bit-Plane Encoding and obtains adjudicating D and context CTX sequences accordingly respectively;
S3b:Then all judgement D and context CTX obtained to step S3a carry out MQ codings, obtain encoding stream, that is, press Contracting packet;
The main information subband LL of low frequency5Compressed data packets, which are obtained, by step S3a and S3b is designated as the main information sub-band number number of low frequency According to bag, each high frequency time wants information subband can obtain a compressed data packets after step S3a and S3b, for convenience Describe below, information subband to obtain compressed data packets by step S3a and S3b and be referred to as high frequency time believing all high frequency times Cease subband compressed data packets;
It can also increase a rate control step in the step for carrying out following,
I.e.:A code check (specifically can rule of thumb set) is first set, the main information sub-band number packet of low frequency is carried out Rate Control, forms the new main information sub-band number packet of low frequency, information subband compressed data packets to carry out code check control high frequency time System forms new high frequency time and wants information subband compressed data packets.
So below step S4 is corresponding when encrypting, and is the main information sub-band number packet of new low frequency, and step S5 carries out code stream Packet during tissue is then main information sub-band number packet after step S4 encryptions and formed after Rate Control New high frequency time wants information subband compressed data packets.
S4:Using without Cipher Feedback application model, design encryption and decryption operates to be that unit is carried out with byte (8bit).Adding Simple linear process is avoided in the realization of close operation, using the key stream local leakage for avoiding bringing when data is zero.
The main information sub-band number packet of low frequency obtained to step S3b carries out Tier2 codings, and method is as follows:
Information sub-band number packet main to low frequency be encrypted using the cryptographic calculation of formula (1):
yk=(p1xk+p2δk)mod256 (1);
Wherein, xkFor k-th of data, y in the main information sub-band number packet of low frequencykFor the main information sub-band number packet of low frequency In k-th of data ciphertext data after encryption, δkFor k-th of key stream currency, P1 and P2 are the element less than 256 Number.
δk, P1 and P2 be all that 8bit, P1 and P2 are according to key stream currency δkObtain.Due to the prime number less than 256 only There are 54, and prime number value 2 need to be excluded, totally 53 prime numbers, this 53 prime numbers constitute a table of primes.Therefore P1δ can be passed throughk Mod30 is addressed to obtain in table of primes, P230+ δ can be passed throughkMod23 is addressed to obtain in table of primes, specific formula (1) parameter δ ink, P1 and P2 determination method is as follows:
Parameter δ in formula (1) in the step S4k, P1 and P2 determination method is as follows:
S4a:Initial key is set, and initial key length is 128bit, initial key input Geffe generators are obtained one Pseudo-random number sequence;
S4b:Then step S4a is obtained into pseudo-random number sequence by Hash functional operation and obtains new pseudorandom number sequence, 8 are often taken to obtain a key stream currency δ in the new pseudorandom number sequencekValue;
S4c:According to obtained key stream currency δkValue obtain prime P 1 and P2 by being calculated as below:
1) prime number 2 will be removed in the prime number less than 256, ascending be arranged in order of remaining prime number is then formed into prime number Table;
2) calculated according to formula (2):
WP1kmod30 (2);
Wherein, WP1Value represent step 1) in table of primes position, WP1The prime number of pointed location is P1 in table of primes Value;
Calculated according to formula (3):
WP2=30+ δkmod23 (3);
Wherein, WP2Value represent step 1) in table of primes position, WP2The prime number of pointed location is P2 in table of primes Value.
The main information sub-band number packet of low frequency includes N number of data, k=1,2,3 .., N, during encryption, each data correspondence One key stream currency, so as to add AES security.
Pass through parameter δk, P1 and P2 are effectively increased the security of AES, while effective controling power encryption is calculated The computation complexity of method, is easy to computing and realization.S5:By by step S4 encryption after the main information sub-band number packet of low frequency and All high frequency times of step S3b outputs want information subband compressed data packets progress code stream organization to obtain the compression image by encryption
Key stream currency δ is obtained by key stream generator, the key stream generator be based primarily upon Geffe generators and Hash functions are designed, and wherein Geffe generators are a kind of key stream generators based on linear feedback shift register LFSR, It produces stream cipher using linear feedback shift register LFSR.LFSR output is a pseudo-random number sequence, i.e. m sequences Row.Geffe generators have used 3 linear feedback shift register LFSR, and it is combined in a non-linear fashion.Its In, 2 linear feedback shift register LFSR are as the input of recombiner, and the 3rd linear feedback shift register LFSR be used for Control the output of recombiner.
But m-sequence and compound m-sequence (including Geffe generators), its internal state is can be by analyzing output codons And be cracked.In order to overcome this problem, we have concatenated the Hash letters of unidirectional trapdoor after pseudo-random sequence generator Number.Cracker just can not inversely obtain the internal state of Geffe generators, so as to protect by the stream cipher code word of final output The security of this key stream generator is demonstrate,proved.
The image encryption compression algorithm is directed to safety defect of the JPEG2000 standards on image compressing transmission, in standard On the basis of add stream cipher encrypting algorithm, i.e., encryption has been carried out to afterbody low frequency LL subbands, has been effectively protected The main information of image, so as to solve the security of Compressed Image Transmission.Through image encryption compression algorithm handle image by Dsp chip is exported, and is handled by the data protocol of fpga chip, is obtained the output of unmanned plane image encryption compression set.
Finally illustrate, the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although with reference to compared with The present invention is described in detail good embodiment, it will be understood by those within the art that, can be to skill of the invention Art scheme is modified or equivalent substitution, and without departing from the objective and scope of technical solution of the present invention, it all should cover at this Among the right of invention.

Claims (3)

1. a kind of method for compressing image encrypted based on subband, it is characterised in that comprise the following steps:
S1:Original image is pre-processed;
S2:5 grades of wavelet transformations are carried out to pretreated image, method is as follows:
S2a:Make j=1;
S2b:Pretreated image carries out j-th stage wavelet transformation, and it is low frequency to obtain a subband in four subbands, four subbands Main information subband is designated as LLj, other three subbands are that high frequency time wants information subband to be designated as HL respectivelyj、LHj、HHj
S2c:By the main information subband LL of low frequency obtained after j-th stage wavelet transformationjProceed wavelet transformation, obtain four it is new One is that the new main information subband of low frequency is designated as LL in subband, four new subbandsj+1, other three are that new high frequency time will be believed Breath subband is designated as HL respectivelyj+1、LHj+1And HHj+1
S2d:Make j=j+1;
S2e:If j<5, then step S2c is performed, next step is otherwise performed;
S2f:Export the main information subband LL of low frequency obtained after the 5th grade of wavelet transformation5All high frequencies obtained with each wavelet transformation Secondary information subband HLj、LHjAnd HHj, j=1,2,3,4,5;
S3:The main information subband LL of low frequency exported to step S2f5Information subband is wanted to carry out Tier1 codings, side with all high frequency times Method is as follows:
S3a:The main information subband of low frequency and all high frequency times of step S2f outputs want information subband individually to carry out Bit-Plane Encoding to obtain To corresponding judgement D and context CTX sequences;
S3b:Then all judgement D and context CTX obtained to step S3a carry out MQ codings respectively, obtain encoding stream, that is, press Contracting packet;
The main information subband LL of low frequency5Compressed data packets, which are obtained, by step S3a and S3b is designated as the main information sub-band number packet of low frequency, All high frequency times want information subband by step S3a and S3b obtain compressed data packets be referred to as high frequency time want information subband compress Packet;
S4:The main information sub-band number packet of low frequency obtained to step S3b carries out Tier2 codings, and method is as follows:
Information sub-band number packet main to low frequency be encrypted using the cryptographic calculation of formula (1):
yk=(p1xk+p2δk)mod256 (1);
Wherein, xkFor k-th of data, y in the main information sub-band number packet of low frequencykFor kth in the main information sub-band number packet of low frequency Individual data ciphertext data after encryption, δkFor k-th of key stream currency, P1 and P2 are the prime number less than 256;
S5:Will by all high frequency times of the main information sub-band number packet of low frequency after step S4 encryptions and step S3b outputs Information subband compressed data packets progress code stream organization obtains the compression image by encryption.
2. the method for compressing image as claimed in claim 1 encrypted based on subband, it is characterised in that pre- in the step S1 The value for each pixel being processed as in centralization processing, original image is between 0-255, at original image centralization Reason, the value of each pixel in original image is revised as between -128 to 127.
3. the method for compressing image as claimed in claim 1 or 2 encrypted based on subband, it is characterised in that in the step S4 Parameter δ in formula (1)k, P1 and P2 determination method is as follows:
S4a:Initial key is set, and initial key length is 128bit, by initial key input Geffe generators obtain one it is pseudo- with Machine Number Sequence;
S4b:Then step S4a is obtained into pseudo-random number sequence by Hash functional operation and obtains new pseudorandom number sequence, at this 8 are often taken to obtain a key stream currency δ in new pseudorandom number sequencekValue;
S4c:According to obtained key stream currency δkValue obtain prime P 1 and P2 by being calculated as below:
1) prime number 2 will be removed in the prime number less than 256, ascending be arranged in order of remaining prime number is then formed into table of primes;
2) calculated according to formula (2):
WP1kmod30 (2);
Wherein, WP1Value represent step 1) in table of primes position, WP1The prime number of pointed location is P1 value in table of primes;
Calculated according to formula (3):
WP2=30+ δkmod23 (3);
Wherein, WP2Value represent step 1) in table of primes position, WP2The prime number of pointed location is P2 value in table of primes.
CN201510453647.4A 2015-07-29 2015-07-29 A kind of method for compressing image encrypted based on subband Active CN104967860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510453647.4A CN104967860B (en) 2015-07-29 2015-07-29 A kind of method for compressing image encrypted based on subband

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510453647.4A CN104967860B (en) 2015-07-29 2015-07-29 A kind of method for compressing image encrypted based on subband

Publications (2)

Publication Number Publication Date
CN104967860A CN104967860A (en) 2015-10-07
CN104967860B true CN104967860B (en) 2017-10-13

Family

ID=54221784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510453647.4A Active CN104967860B (en) 2015-07-29 2015-07-29 A kind of method for compressing image encrypted based on subband

Country Status (1)

Country Link
CN (1) CN104967860B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314270B (en) * 2018-12-12 2022-09-30 上海领甲数据科技有限公司 Data encryption and decryption method based on validity period uniform distribution symmetric algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000032458A (en) * 1998-07-07 2000-01-28 Ricoh Co Ltd Image compression method
CN1527249A (en) * 2003-09-25 2004-09-08 南京邮电学院 Quick enciphering method and device for wavelet image
CN101360242A (en) * 2008-09-22 2009-02-04 西安电子科技大学 Tag-tree encoding method based on JPEG2000
CN102523455A (en) * 2012-01-02 2012-06-27 西安电子科技大学 Multi-thread arithmetic coding circuit and method based on standard JPEG 2000
CN103428495A (en) * 2013-08-02 2013-12-04 中国联合网络通信集团有限公司 Image encryption method and device and image decryption method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000032458A (en) * 1998-07-07 2000-01-28 Ricoh Co Ltd Image compression method
CN1527249A (en) * 2003-09-25 2004-09-08 南京邮电学院 Quick enciphering method and device for wavelet image
CN101360242A (en) * 2008-09-22 2009-02-04 西安电子科技大学 Tag-tree encoding method based on JPEG2000
CN102523455A (en) * 2012-01-02 2012-06-27 西安电子科技大学 Multi-thread arithmetic coding circuit and method based on standard JPEG 2000
CN103428495A (en) * 2013-08-02 2013-12-04 中国联合网络通信集团有限公司 Image encryption method and device and image decryption method and device

Also Published As

Publication number Publication date
CN104967860A (en) 2015-10-07

Similar Documents

Publication Publication Date Title
CN104468090B (en) Character cipher coding method based on image pixel coordinates
CN105184931B (en) A kind of method for unlocking based on bluetooth, system, handheld terminal and electronic lock
US9172529B2 (en) Hybrid encryption schemes
US11699361B2 (en) Data security apparatus and method using constant optical signal input to analog component
CN104333446B (en) A kind of novel ultra-light magnitude QTL block cipher implementation method
CN107770405A (en) Image encryption method and device
CN104821942B (en) Face identification method and system
CN107483963B (en) 1-bit image compression encryption method
CN104967860B (en) A kind of method for compressing image encrypted based on subband
CN111556004A (en) Hybrid dual network encryption system
CN105117653B (en) A kind of near infrared spectrum data encryption method
EP2571192A1 (en) Hybrid encryption schemes
KR101665595B1 (en) Apparatus and Method for Protecting Side channel Attacks on
CN112332971B (en) Safe and efficient data transmission method based on superlattice and compressed sensing
CN110213257B (en) High-safety IP secret communication method based on true random stream exclusive or encryption
CN104580129A (en) SSL asynchronization agent method based on stream processing
CN106686586B (en) Wireless transmission system and encryption and decryption method thereof
CN111556003A (en) Dual network encryption system
Alwan et al. A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
CN105025037B (en) The implementation method of the cipher block chaining model MAC algorithms of anti-CPA attacks
Wang et al. A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
Brindha Digital camera with real time chaotic image encryption
Ong et al. A low-complexity DWT module and CRS minimal instruction set computer architecture for wireless visual sensor networks
CN106817220A (en) A kind of method of encryption of communicated data, device and encryption device
Gornale et al. Discrete Wavelet Transform (DWT) Based Triple-Stegging with Elliptic Curve Cryptography (ECC)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant