CN105025195B - A kind of camouflage satellite data transmission method - Google Patents
A kind of camouflage satellite data transmission method Download PDFInfo
- Publication number
- CN105025195B CN105025195B CN201510374201.2A CN201510374201A CN105025195B CN 105025195 B CN105025195 B CN 105025195B CN 201510374201 A CN201510374201 A CN 201510374201A CN 105025195 B CN105025195 B CN 105025195B
- Authority
- CN
- China
- Prior art keywords
- image
- data
- satellite
- transmission
- waiting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present invention proposes a kind of camouflage satellite data transmission method, is proposed to solve the safe and secret problem of data transfer.After this method is handled, satellite image data looks like other view data, and satellite secret data is hidden wherein;What is directly obtained after transmission data receiver is " false data " after originator is handled, but receiving end can correctly recover real satellite image data and secret data according to " false data ".This method is based on Information hiding and image procossing, and effect that is hidden true and showing vacation is played in message transmitting procedure, while has the characteristics of information disguising, hiding, secrecy and anti-intercepting and capturing.
Description
Technical field
The present invention relates to a kind of method of data transfer, more particularly to a kind of the real of the view data to be transmitted is divided
Resolution, real content stash, and are transmitted in the form of other view data, and data volume does not increase, and what others received is false
Data, so as to protect the transmission of True Data, belong to communication (such as data communication technology) field.
Background technology
Current society is the society of information, and the safety problem of information is into increasingly urgent problems, Information hiding
Referred to as image watermarking is an important branch of information security, and secret information is embedded into carrier using the visual redundancy of the mankind
In, so as to reach the purpose of safe transmission secret information.
Camouflage transmission technology, the country do not have particular study, and spacecraft is not also applied at present.Camouflage
It is exactly the information transfer " setting up defences " to space system that transmission technology, which is applied to space, " manufacturing products for both peacetime and wartime us ", civil-military inosculation, can be utilized
Commercial satellite transmits secret information, secret information can also be become other insensitive informations carry out it is hidden hand down in a direct line from the master defeated, do not expose us
True intention.
With the development of science and technology, the high efficiency of transmission of view data and the safety of transmission become more and more important.Pass through letter
Breath concealing technology can be accomplished in the case where not changing image size, secret information is embedded in the picture, so as to realize secret
The transmission of information and image.On the other hand, for remote sensing images, medical image and law image etc., it is desirable in the secret letter of extraction
Carrier image being capable of high quality resume after breath.
Information hiding is often viewed as a communication process, and its input is secret data waiting for transmission, is passed in channel
Defeated is disclosed carrier data, and what is received is then the carrier data for being concealed with secret information.
Embedded mobile GIS is hidden for information about is divided into two major classes:When spatial domain embedded mobile GIS, second, transform domain embedded mobile GIS.It is hidden
The data volume of Tibetan is referred to as absolute hidden capacity or hidden capacity, and the ratio between hiding data volume and carrier data amount are referred to as hiding relatively
Capacity or embedded rate, general relative hidden capacity are far smaller than 1.
The content of the invention
Present invention solves the technical problem that it is:Overcome the deficiencies in the prior art, there is provided a kind of camouflage satellite data passes
Transmission method, solves the safe and secret problem of data transfer, this method is based on Information hiding and image procossing, in not change data
Amount, not in the case of change data form, carries out normal data transfer, improves the transmission safety of satellite data transmission system
Property.
Technical scheme:A kind of camouflage satellite data transmission method, step are as follows:
1) according to satellite image A waiting for transmission size, image B of the width with size is generated, or selected from image library
One width, as image B waiting for transmission, while obtains image B mark data with the equal-sized images of satellite image A;
2) with satellite image A subtracted image B waiting for transmission, image E is obtained, image E is carried out data compression, obtains image
E compressed data C;
3) satellite image A waiting for transmission is compressed, obtains satellite image A compressed data D, calculated and obtain satellite image A
PSNR values;
4) using image B as carrier image, above-mentioned compressed data C, compressed data D, image B mark data, satellite
Image A PSNR values, satellite secret data are merged into one group of data, are hidden into image B, obtain as secret information G after scramble
To stego-image B`;
5) stego-image B` is transmitted;
6) receiving terminal extracts the secret information G after scramble to the stego-image B` of reception, is compressed after scrambling resumption
Compressed data C, compressed data D and image B mark data, satellite image A PSNR values afterwards, then decompression is carried out,
Satellite image A and image E is obtained, image B is obtained according to image B mark data reverse process;
7) image B and image E progress add operations, the image A1 being restored, meanwhile, according to the compression number extracted
Decompress to obtain another image A2 according to D;
8) a kind of high image of quality is selected as recovery from image A1 and A2 obtain original satellite image A;While from
Extracting data after scrambling resumption goes out satellite secret data.
According to satellite image A waiting for transmission size in step 1), one width of generation with the image B of size specific steps such as
Under:
Satellite image A entirety is carried out diminution to handle to obtain small image A3 or select from satellite image A non-sensitive area
A fritter is selected as small image A3;Afterwards image A3 amplify, obtain with satellite image A with size image as image B, it is small
Mark data of the data as image B after image A3 compressions.
Select a width with the equal-sized images of satellite image A as image B waiting for transmission from image library in step 1)
Specific method be:
According to image A size and type, selected from image data base, select the image of same size, same type
As image B, wherein image data base is made up of the different types of camouflage test B1 of n kinds, B2, B3 ... .Bn in advance, and n is just whole
Number;Label mark datas as image B of the image B in image data base.
The beneficial effect of the present invention compared with prior art is:
(1) current camouflage technology if based on routine Information Hiding Techniques, then can accomplish Information hiding, and
It can not accomplish that carrier is hidden, and the present invention can hide information, carrier;
(2) present invention satellite image data in itself and satellite secret data is combined together as secret information, it is hidden
Ensconce in other images and be transmitted, the diagram seems ostensible, and others is difficult to know hiding true picture information.
(3) what current hiding information method had can accomplish " hidden true ", but be not easily achieved " showing vacation ";The present invention relates to
The authenticity of a kind of view data to be transmitted, such as true resolution ratio, true content stash, with other view data
Form is transmitted, and data volume does not increase, and what others received is false data, so as to protect the transmission of True Data.
(4) capacity of the hiding secret information of method proposed by the invention can be made fixed therefore hidden as needed
Hiding the amount of satellite secret data can also be previously set, and be easy to hardware to realize.
(5) for the present invention the hiding combination hidden with secret data of carrier, technical scheme is unique, has carrier
The disguise of camouflage property and secret information, there is confidentiality and anti-intercepting and capturing hiding while.
Information security data transmission technology has been widely used for the spacecrafts such as remote sensing satellite, space probe and all kinds of defended
Star Data transfer system, broader applications will be being obtained from now on.At the same time, the requirement to star epigraph data transfer is also increasingly
It is high.
Brief description of the drawings
Fig. 1 is principle of the invention figure;
Fig. 2 is real satellite image A;
Fig. 3 is the image B waiting for transmission generated according to satellite image A;
Fig. 4 is the image B waiting for transmission chosen from database.
Embodiment
In order to verify set forth herein algorithm performance, 8 bit greys that size is 512 × 512 are employed in emulation experiment
Spend satellite image A and B two images to carry out camouflage transmission and recover, B is newly-generated image.
True picture is satellite image A, such as Fig. 2;Carrier image B, such as Fig. 2 and Fig. 3.
A kind of camouflage satellite data transmission method, specific implementation step are as follows:
1) according to satellite data waiting for transmission:512 × 512 8 bit grayscale image A size, by predetermined technology way
Footpath generates new images B of the width with size, or selects a width with the image of size as new images waiting for transmission from image library
B, while image B mark data is obtained, image B mark data accounts for the 1/128 of total view data;
2) with satellite image A subtracted image B waiting for transmission, image E is obtained, image E is carried out R1 times of data compression, obtained
Image E compressed data C;Obtain satellite image A=E+B PSNR1 values;Data compression method can select JPEG2000 standards
Compression method, such as R1=16 times, PSNR=39dB;
3) satellite image A waiting for transmission is compressed R2 times, obtains satellite image A compressed data D, obtain image A's
PSNR2 values;As data compression method can select JPEG2000 standard compression methods, R2=8, PSNR=41dB, also may be selected
The compression methods such as vector quantization (VQ);
4) using image B as carrier image, mark data above-mentioned compressed data C, compressed data D and image B, defend
Star chart is merged into one group of data as A PSNR values, satellite secret data, is hidden into after scramble as secret information G in image B,
Secret information G data volume meets the requirement of hidden method hidden capacity, obtains stego-image B`;Disorder method can use general
Disorder method, satellite secret data accounts for the 1/32 of total view data.LSB hidden methods and other may be selected in Information hiding
Hidden method, hidden capacity relative value can contemplate 2/8 or even 4/8, be typically chosen in 2/ (R2), R2<R1;
5) stego-image B` is transmitted;Such as normal channel coding, modulation, demodulation, decoding etc.;
6) secret information after scramble is extracted to the stego-image B` of reception, data C after being compressed after scrambling resumption,
Compressed data D and image B mark data, image A compression ratio PSNR values, then decompression is carried out, obtain satellite mapping
As A and image E, obtained receiving image B according to image B mark data reverse process:Tabled look-up according to label or according to small figure
As amplification;
7) image B and image E is carried out add operation, the image A1 being restored.Meanwhile according to the compression number extracted
Decompress to obtain another image A2 according to D;
8) it is high from image A1 and A2 selection PSNR values, it is high or according to sentencing figure that PSNR values are selected according to PSNR1 and PSNR2
The subjective judgement of personnel selects the high image of quality as the image A recovered, that is, the satellite data received;Simultaneously from scrambling resumption
Extracting data afterwards goes out satellite secret data.
It is as follows that the step of predetermined technological approaches generation piece image B is as new images waiting for transmission are pressed in step 1):
Satellite image A entirety carries out diminution processing, such as overall to reduce 64 times and obtain small image A3 or from the non-sensitive of satellite image A
Area selects a fritter, such as the fritter at edge, accounts for the 1/64 of the satellite image A gross areas, amplifies as small image A3, then image A3
64 times, obtain with image A with size 512*512 images as image B, image A3 compresses r times such as r=2 data, accounts for total figure
As the 1/128 of data volume, as image B mark data, image B quality or resolution ratio are less than protosatellite image A, belong to figure
As A lower quality version image, the only partial information containing satellite image A;
The image B as corresponding to predetermined technological approaches selects a width from image library is as new figure waiting for transmission in step 1)
The step of picture, is as follows:According to satellite image A size and big type, selected, selected in the image data base big from one
Same size, the image of same type as new images B, wherein image data base in advance by the different types of camouflage test B1 of n kinds,
B2, B3 ... Bn are formed, and n is positive integer, works as n=16, and image B is as image B mark data in the label of image data base
4 bits, account for nybble, work as n=256, and image B as image B mark data is 8 bits in the label of image data base,
Account for a byte.If big type is city image, ocean imagery, desert image, field image, mountain range image, meadow image is gloomy
Woods image, farmland image etc., it is similar be all scenery, portrait and scenery are just to be similar.
As can be seen here, satellite image A has been carried out camouflage transmission by the present invention, and satellite image A is can't see in transmission, only
The image of this camouflage of image B can be seen, while satellite secret data is hidden in image B and transmitted, image B and satellite image A
It is too wide in the gap, satellite image A is not seen therefrom, does not see the secret data of satellite yet, so as to ensure satellite image data
While safe transmission, the safe transmission of satellite secret data also ensure that.
The content not being described in detail in description of the invention belongs to the known technology of those skilled in the art.
Claims (3)
- A kind of 1. camouflage satellite data transmission method, it is characterised in that step is as follows:1) according to satellite image A waiting for transmission size, image B of the width with size is generated, or from image library Select a width with the equal image of satellite image A sizes as image B waiting for transmission, while obtain image B mark number According to;2) with satellite image A subtracted image B waiting for transmission, image E is obtained, image E is carried out data compression, obtains image E's Compressed data C;3) satellite image A waiting for transmission is compressed, obtains satellite image A compressed data D, calculated and obtain satellite image A's PSNR values;4) using image B as carrier image, above-mentioned compressed data C, compressed data D, image B mark data, satellite image A PSNR values, satellite secret data be merged into one group of data, be hidden into image B, obtain containing close as secret information G after scramble Image B`;5) stego-image B` is transmitted;6) receiving terminal extracts the secret information G after scramble to the stego-image B` of reception, is pressed after being compressed after scrambling resumption Contracting data C, compressed data D and image B mark data, satellite image A PSNR values, then decompression is carried out, obtain Satellite image A and image E, image B is obtained according to image B mark data reverse process;7) image B and image E progress add operations, the image A1 being restored, meanwhile, according to the compressed data D extracted Decompression obtains another image A2;8) a kind of high image of quality is selected as recovery from image A1 and A2 obtain original satellite image A;Simultaneously from scramble Extracting data after recovery goes out satellite secret data.
- A kind of 2. camouflage satellite data transmission method according to claim 1, it is characterised in that:Basis in step 1) Satellite image A waiting for transmission size, generate a width comprising the following steps that with the image B of size:Satellite image A entirety is carried out diminution to handle to obtain small image A3 or select one from satellite image A non-sensitive area Fritter is as small image A3;Afterwards image A3 amplify, obtain with satellite image A with size image as image B, small image Mark data of the data as image B after A3 compressions.
- A kind of 3. camouflage satellite data transmission method according to claim 1, it is characterised in that:From figure in step 1) As selected in storehouse a width with the equal-sized images of satellite image A as image B waiting for transmission specific method for:According to image A size and type, selected from image data base, select the image conduct of same size, same type Image B, wherein image data base are made up of the different types of camouflage test B1 of n kinds, B2, B3 ... .Bn in advance, and n is positive integer; Label mark datas as image B of the image B in image data base.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510374201.2A CN105025195B (en) | 2015-06-30 | 2015-06-30 | A kind of camouflage satellite data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510374201.2A CN105025195B (en) | 2015-06-30 | 2015-06-30 | A kind of camouflage satellite data transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105025195A CN105025195A (en) | 2015-11-04 |
CN105025195B true CN105025195B (en) | 2017-11-28 |
Family
ID=54414870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510374201.2A Active CN105025195B (en) | 2015-06-30 | 2015-06-30 | A kind of camouflage satellite data transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105025195B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106101715B (en) * | 2016-07-28 | 2019-01-25 | 西安空间无线电技术研究所 | A kind of image based on Information hiding processes by demand method |
CN114598508B (en) * | 2022-02-21 | 2023-06-27 | 北京航空航天大学 | Hidden information transmission method and device based on Ethernet transaction |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013167865A (en) * | 2012-01-19 | 2013-08-29 | Univ Of Aizu | Confidential information hiding device, confidential information restoring device, confidential information hiding program, and confidential information restoring program |
CN103414892A (en) * | 2013-07-25 | 2013-11-27 | 西安空间无线电技术研究所 | Method for hiding high-capacity compression-resisting image information |
CN103414840A (en) * | 2013-07-25 | 2013-11-27 | 西安空间无线电技术研究所 | Data hiding method based on image set |
CN104144277A (en) * | 2014-07-23 | 2014-11-12 | 西安空间无线电技术研究所 | Multi-path image lossless hidden transmission method |
CN104202500A (en) * | 2014-07-23 | 2014-12-10 | 西安空间无线电技术研究所 | High capacity information hiding transmission method with controllable carrier quality |
CN104683811A (en) * | 2013-11-29 | 2015-06-03 | 中国科学院声学研究所 | Information hiding and extracting method based on integer DCT (Discrete Cosine Transformation) coefficient modulation |
-
2015
- 2015-06-30 CN CN201510374201.2A patent/CN105025195B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013167865A (en) * | 2012-01-19 | 2013-08-29 | Univ Of Aizu | Confidential information hiding device, confidential information restoring device, confidential information hiding program, and confidential information restoring program |
CN103414892A (en) * | 2013-07-25 | 2013-11-27 | 西安空间无线电技术研究所 | Method for hiding high-capacity compression-resisting image information |
CN103414840A (en) * | 2013-07-25 | 2013-11-27 | 西安空间无线电技术研究所 | Data hiding method based on image set |
CN104683811A (en) * | 2013-11-29 | 2015-06-03 | 中国科学院声学研究所 | Information hiding and extracting method based on integer DCT (Discrete Cosine Transformation) coefficient modulation |
CN104144277A (en) * | 2014-07-23 | 2014-11-12 | 西安空间无线电技术研究所 | Multi-path image lossless hidden transmission method |
CN104202500A (en) * | 2014-07-23 | 2014-12-10 | 西安空间无线电技术研究所 | High capacity information hiding transmission method with controllable carrier quality |
Also Published As
Publication number | Publication date |
---|---|
CN105025195A (en) | 2015-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yadav et al. | A secure video steganography with encryption based on LSB technique | |
CN101847251A (en) | Digital watermark embedding and extraction method based on chaos sequences | |
CN103426141B (en) | A kind of image content authentication method and system | |
CN103996165B (en) | A kind of insertion of digital picture zero watermarking and extracting method based on compressed sensing feature | |
CN103414840B (en) | A kind of data-hiding method based on image set | |
Sachdeva et al. | Colour image steganography based on modified quantization table | |
Chakraborty et al. | Reversible color image watermarking using trigonometric functions | |
Rakhmawati | Image fragile watermarking with two authentication components for tamper detection and recovery | |
CN105227962A (en) | A kind of lossless information concealing method based on data difference | |
Kishor et al. | A review on steganography through multimedia | |
CN105025195B (en) | A kind of camouflage satellite data transmission method | |
Munshi | Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography | |
Deshmukh et al. | Hash based least significant bit technique for video steganography | |
Kumar et al. | Digital image steganography based on combination of DCT and DWT | |
CN105023232A (en) | Process for transmitting and rebuilding a payload embedded in a picture using payload-in-picture-encoding | |
Patel et al. | Survey on different methods of image steganography | |
Al-Aidroos et al. | Image steganography based on LSB matching and image enlargement | |
Rajesh et al. | Steganography algorithm based on discrete cosine transform for data embedding into raw video streams | |
CN104079938B (en) | Image self-hidden method with controllable transmission quality | |
Lysenko et al. | Applying of Kutter-Jordan-Bossen steganographic algorithm in video sequences | |
CN106101715A (en) | A kind of image based on Information hiding processes by demand method | |
Sivadasan | Secure transmission of data by splitting image | |
Lakhwani et al. | Kvl algorithm: Improved security & psnr for hiding image in image using steganography | |
Tulasidasu et al. | Steganography based secret image sharing using block division technique | |
CN108629749B (en) | Method for combining image compression and hiding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |