CN106022011A - Image-based confidential information spreading method, device and system - Google Patents

Image-based confidential information spreading method, device and system Download PDF

Info

Publication number
CN106022011A
CN106022011A CN201610371834.2A CN201610371834A CN106022011A CN 106022011 A CN106022011 A CN 106022011A CN 201610371834 A CN201610371834 A CN 201610371834A CN 106022011 A CN106022011 A CN 106022011A
Authority
CN
China
Prior art keywords
image
information
fingerprint
data base
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610371834.2A
Other languages
Chinese (zh)
Inventor
黄缨宁
佘桂华
武博文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Acacia Forest Network Technology (beijing) Co Ltd
Original Assignee
Acacia Forest Network Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Acacia Forest Network Technology (beijing) Co Ltd filed Critical Acacia Forest Network Technology (beijing) Co Ltd
Priority to CN201610371834.2A priority Critical patent/CN106022011A/en
Publication of CN106022011A publication Critical patent/CN106022011A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses an image-based confidential information spreading method. The method comprises the steps of obtaining a host image and information needing to be encrypted; performing fingerprint extraction on the host image, and judging whether fingerprints of the host image exist in a database or not; if fingerprints of the host image do not exist in the database, generating a decoding secret key, and storing fingerprints of the host image and the generated decoding secret key in the database; encoding and converting a binaryzation sequence of the information needing to the encrypted to generate a parasitic image; adopting the generated decoding secret key as a decoding input variable, inserting the parasitic image into the host image, and completing preparation of a confidential image. The image-based confidential information spreading method can enable the image to carry target resources, the target resources can be obtained without re-access of the Internet, information consistency is ensured, tamper-proofing is achieved, tension of the overall image vision is ensured, and inserted information cannot be seen by naked eyes. The invention further provides an image-based confidential information spreading device and system.

Description

Security information transmission method based on image, device and system
Technical field
The present invention relates to technical field of information encryption, particularly relate to a kind of security information based on image and propagate Methods, devices and systems.
Background technology
At present, existing information dissemination system based on image is often to increase character information, mark on image The appreciable symbol of vision, mark or the signals such as note symbol, one-dimension code or Quick Response Code, publicize with access images Resource ontology.This have the disadvantage that mainly has three: first, information and resource separation, visually Information is not the resource itself that observer is to be obtained, needs again to access the Internet and could obtain target money Source, such as may be with the network address of a mp3 or corresponding Quick Response Code on one picture, but user wants Obtain is mp3 rather than this network address or Quick Response Code in fact;Second, the vision affecting general image is opened Power, in order to allow image carry character information, Quick Response Code or other information, generally requires certain replacing artwork Block pixel, thus have impact on globality and the aesthetic property of image;3rd, safety is not enough, information in plain text Easily replace or distort, raw information can be replaced with fishing information and cause unsafe access;4th, The form of embedding information is limited, and existing information dissemination system based on image can only carry character text information Or the image information such as Quick Response Code, image itself cannot carry audio frequency or more different picture.
Summary of the invention
Based on this, it is necessary to provide a kind of embed information more safety and embed message form various based on figure Security information transmission method, device and the system of picture.
A kind of security information transmission method based on image, the method includes: obtain host image and needs The information of encryption;Described host image is carried out the extraction of fingerprint, and judges that the fingerprint of described host image is No it is present in data base;If the described fingerprint of described host image is not present in described data base, then give birth to Become decoding key, and the described decoding key of the described fingerprint of described host image Yu generation is stored in described In data base;The binaryzation sequence of the described information needing encryption is carried out encoded translated generation spurious image; Using generate described decoding key as deciphering input variable, and by described spurious image embed described host figure Picture, completes the preparation of secrecy picture.
Wherein in an embodiment, the described binaryzation sequence to the described information needing encryption encodes Include before being converted into spurious image:
Obtain the binaryzation sequence of the described information needing encryption;
Wherein, when the described information needing encryption is text, directly use coding corresponding for word utf-8, Use the binary number that it encodes;
When described need encryption information be audio frequency time, audio signal is sampled, to sampling obtain from The value of scatterplot quantifies, and the numerical value of quantization is carried out binaryzation;
When the described information needing encryption is image, image is carried out gray processing, uses the picture of gray level image Element value carries out binaryzation, obtains binaryzation sequence.
Wherein in an embodiment, described using generate described decoding key as deciphering input variable, and The described spurious image described host image of embedding is included:
Described spurious image is transformed into frequency domain, and by the described random secret key generated and through error correction redundancy Property coded treatment cross described needs encryption information perform encryption;
It is added to performing the result that encryption generates the frequency domain of described host image;
Described host image in frequency domain is changed to spatial domain.
A kind of security information transmission method based on image, the method includes: refer to wanted decrypted image Stricture of vagina extracts, and judges whether the finger print information of the image extracted is present in data base;If the institute of described image State finger print information to be present in described data base, then from described data base, obtain key;By the institute obtained State the decoding of secret key pair host image and obtain spurious image;Again described spurious image is performed decoding and obtain binaryzation Sequence;Described binaryzation sequence of reducing obtains prime information, completes the preparation of secrecy picture.
Wherein in an embodiment, whether the finger print information of the described image judging to extract is present in data base Include: calculate the fingerprint of wanted decrypted image;To the described fingerprint and the data that calculate wanted decrypted image In storehouse, the described fingerprint of pre-stored carries out similarity-rough set;When described fingerprint is completely the same, return described secret Key.
A kind of security information transmission device based on image, including: acquisition module, it is used for obtaining host image And need the information of encryption;Judge module, for described host image carries out the extraction of fingerprint, and sentences Whether the fingerprint of disconnected described host image is present in data base;Memory module, if for described host image Described fingerprint be not present in described data base, then generate decoding key, and by the institute of described host image The described decoding key stating fingerprint and generation is stored in described data base;Spurious image generation module, is used for The binaryzation sequence of the described information needing encryption is carried out encoded translated generation spurious image;Embed module, For the described decoding key to generate as deciphering input variable, and described spurious image is embedded described place Master image, completes the preparation of secrecy picture.
Wherein in an embodiment, also include: binaryzation retrieval module, be used for obtaining described needs The binaryzation sequence of the information of encryption;Wherein, when the described information needing encryption is text, directly use The coding that word utf-8 is corresponding, uses the binary number that it encodes;When the described information needing encryption is audio frequency Time, audio signal is sampled, the value of the discrete point that sampling obtains is quantified, the number that will quantify Value carries out binaryzation;When the described information needing encryption is image, image is carried out gray processing, uses ash The pixel value of degree image carries out binaryzation, obtains binaryzation sequence.
Wherein in an embodiment, described embedding module includes: encrypting module, for by described parasitic figure As being transformed into frequency domain, and by the described random secret key generated and the institute crossed through error correction redundancy coded treatment State and need the information of encryption to perform encryption;Laminating module, for the institute that the result performing encryption generation is added to State the frequency domain of host image;Modular converter, for changing the described host image in frequency domain to space Territory.
A kind of security information transmission device based on image, including: extract judge module, for to solve Close image carries out fingerprint extraction, and judges whether the finger print information of the image extracted is present in data base;Secret Key acquisition module, if the described finger print information for described image is present in described data base, then from described Data base obtains key;Decoder module, obtains for the described secret key pair host image decoding by obtaining Spurious image, and more described spurious image is performed decoding acquisition binaryzation sequence;Recovery module, is used for Described binaryzation sequence of reducing obtains prime information, completes the preparation of secrecy picture.
Wherein in an embodiment, described extraction judge module includes: computing module, is used for calculating and is wanted The fingerprint of decrypted image;Comparison module, for described fingerprint and the data base calculating wanted decrypted image The described fingerprint of middle pre-stored carries out similarity-rough set;Key returns module, for when described fingerprint complete During cause, return described key.
A kind of security information broadcasting system based on image, including client, be used for obtaining host image with And need the information encrypted, described host image is carried out the extraction of fingerprint, to the described information needing encryption Binaryzation sequence carry out encoded translated generation spurious image;And with described server generate described at random Key is as deciphering input variable, and described spurious image is embedded described host image, completes secrecy picture Preparation;Described server, for judging whether the described fingerprint of described host image is present in data base, If the described fingerprint of described host image is not present in described data base, then generate random secret key, and by institute The described random secret key of the described fingerprint and generation of stating host image is stored in described data base.
Wherein in an embodiment, described client is additionally operable to wanted decrypted image is carried out fingerprint extraction, Key is obtained from the described data base of described server;And by the described secret key pair host image obtained Decoding obtains spurious image, more described spurious image is performed decoding obtains binaryzation sequence, reduces described two Value sequence obtains prime information, completes the preparation of secrecy picture.
Wherein in an embodiment, described server is additionally operable to judge the finger print information of image that extracts whether It is present in data base.
Above-mentioned security information transmission method based on image, device and system, obtain host image and needs The information of encryption;Host image is carried out the extraction of fingerprint, and judges whether the fingerprint of host image is present in In data base;If the fingerprint of host image is not present in data base, then generate decoding key, and by host The fingerprint of image is stored in described data base with the decoding key of generation;Two-value to the information needing encryption Change sequence and carry out encoded translated generation spurious image;Using generate decoding key as deciphering input variable, and Spurious image is embedded host image, completes the preparation of secrecy picture.Above-mentioned security information based on image passes Broadcasting method use error correction redundancy coding to need carrying or secrecy information process, it is provided that to audio frequency, Text, the embedding support of image information, can make image itself carry target resource, from without again Access the Internet and can obtain target resource, ensure that the concordance of information simultaneously, prevent from distorting, and protect Demonstrate,prove the visual tension force of general image, embed information naked eyes invisible.
Above-mentioned security information transmission method based on image, device and system, refer to wanted decrypted image Stricture of vagina extracts, and judges whether the finger print information of the image extracted is present in data base;If the fingerprint letter of image Breath is present in data base, then obtain key from data base;Decoded by the secret key pair host image obtained Obtain spurious image;Again spurious image is performed decoding and obtain binaryzation sequence;Reduction binaryzation sequence obtains Prime information, completes the preparation of secrecy picture.Above-mentioned security information transmission method based on image is by host Finger image extraction, key acquisition, digital watermark technology recover spurious image, are protected by binaryzation Information recovering Confidential information, improves the safety of deciphering.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of security information transmission method based on image in an embodiment;
Fig. 2 is the schematic flow sheet of security information transmission method based on image in another embodiment;
Fig. 3 is the structural representation of security information transmission device based on image in an embodiment;
Fig. 4 is the structural representation of security information transmission device based on image in another embodiment;
Fig. 5 is the structural representation of security information transmission device based on image in further embodiment;
Fig. 6 is the structural representation of security information transmission device based on image in another embodiment;And
Fig. 7 is the structural representation of security information broadcasting system based on image in an embodiment.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, by the following examples, And combine accompanying drawing, being embodied as of security information transmission method based on image to the present invention, device and system Mode is further elaborated.Should be appreciated that specific embodiment described herein is only in order to explain this Invention, is not intended to limit the present invention.
In daily life, we want to use digital watermark technology to accomplish do not affecting picture appearance visual effect On the premise of, record with allowing safety of image and carry the purpose including word, audio frequency or image information, this The information being carried a bit is to embed in the picture in the way of secrecy, and naked eyes are sightless.The present embodiment carries Supply a kind of security information transmission method based on image can realize above-mentioned technology requirement.
See Fig. 1, in an embodiment, it is provided that a kind of security information transmission method based on image, the party Method comprises the following steps:
Step 102, obtains host image and needs the information of encryption.
In the present embodiment, use host image as carrier, support that character, image and phonotape and videotape etc. exist simultaneously In can the multimedia messages of binaryzation, utilize visually part and the invisible part of vision of image to pass Playing multimedia information.
Step 104, carries out the extraction of fingerprint, and judges whether the fingerprint of host image is present in host image In data base.
In the present embodiment, host image carries out fingerprint extracting could be that follow-up deciphering obtains corresponding key. Picture appearance one is tampered, and its finger image will change, and therefore can not obtain corresponding key and carry out correct Information retrieval, thus ensure that the safety of the information hidden in transmitting procedure.
Step 106, if the fingerprint of host image is not present in data base, then generates decoding key, and by place The fingerprint of master image is stored in data base with the decoding key of generation.
In the present embodiment, it is only necessary to the key being not in contact with security information itself is saved in data base, and Do not preserve security information itself to data base, and then add degree of control and the degree of belief of client, even and if Hacker illegally controls key data base, also cannot obtain security information.
Step 108, carries out encoded translated generation spurious image to the binaryzation sequence of the information needing encryption.
Step 110, using generate decoding key as deciphering input variable, and spurious image is embedded host figure Picture, completes the preparation of secrecy picture.
In the present embodiment, multi-media objects resource encryption can be embedded certain host image, so that image Auxiliary information and the target resource of display are integrated, it is not necessary to visit again the Internet download target resource, only Need to obtain key and can open local resource.
Embedding from authorized client is asked by above-described embodiment, first calculates the host image that client provides Fingerprint, as data base exists this fingerprint, illustrate that this host image is used by other clients, terminate Service.If there is not this fingerprint in data base, then the information to required embedding carries out binary conversion treatment, then Using certain error correction redundancy to encode, wherein, codes selection can be carried out encoding to obtain by customization Spurious image, embeds host image by spurious image afterwards.Meanwhile, in data base required for carrying recorded decoding Key information, be indexed with the fingerprint of host image.
Above-mentioned security information transmission method based on image, obtains host image and needs the information of encryption; Host image is carried out the extraction of fingerprint, and judges whether the fingerprint of host image is present in data base;If The fingerprint of host image is not present in data base, then generate decoding key, and by the fingerprint of host image with The random secret key generated is stored in described data base;The binaryzation sequence of the information needing encryption is compiled Code is converted into spurious image;As deciphering input variable and spurious image is embedding using the decoding key of generation Enter host image, complete the preparation of secrecy picture.Above-mentioned security information transmission method based on image uses and entangles The information needing carrying or secrecy is processed by wrong redundancy coding, it is provided that to audio frequency, text, image letter The embedding support of breath, can make image itself carry target resource, from without again accessing the Internet i.e. Target resource can be obtained, ensure that the concordance of information simultaneously, prevent from distorting, and ensure that general image Visual tension force, embeds information naked eyes invisible.
In one embodiment, the binaryzation sequence to the information needing encryption carries out encoded translated generation parasitism Include before image: obtain the binaryzation sequence of the information of needs encryption;Wherein, when the information needing encryption During for text, directly use coding corresponding for word utf-8, use the binary number that it encodes;When needs add When close information is audio frequency, audio signal is sampled, the value amount of carrying out to the discrete point that sampling obtains Change, the numerical value of quantization is carried out binaryzation;When the information needing encryption is image, image is carried out gray scale Change, use the pixel value of gray level image to carry out binaryzation, obtain binaryzation sequence.
In one embodiment, the decoding key using generation is as deciphering input variable and spurious image is embedding Enter host image to include: spurious image is transformed into frequency domain, and by the decoding key generated and through error correction The information needing encryption that redundancy coded treatment is crossed performs encryption;The result performing encryption generation is added to The frequency domain of described host image, changes the described host image in frequency domain to spatial domain.
As in figure 2 it is shown, in one embodiment, it is provided that a kind of security information transmission method based on image, The method includes:
Step 202, carries out fingerprint extraction to wanted decrypted image, and judges that the finger print information of the image extracted is No it is present in data base.
In the present embodiment, calculate the fingerprint of wanted decrypted image, to calculate the fingerprint of wanted decrypted image with In data base, the fingerprint of pre-stored carries out similarity-rough set, when fingerprint is completely the same, returns key.
Step 204, if the finger print information of image is present in data base, then obtains key from data base.
Step 206, obtains spurious image by the secret key pair host image decoding obtained.
Step 208, then spurious image is performed decoding acquisition binaryzation sequence.
Step 210, reduction binaryzation sequence obtains prime information, completes the preparation of secrecy picture.
Information retrieval from authorized client is asked by above-described embodiment, first calculates the host that client provides The fingerprint of image, as there is not this fingerprint in data base, illustrates that this host image did not carry out information and embeds Process, terminate service.As there is this fingerprint in data base, then provide in data base with this fingerprint matching is secret Key.Use this key to extract the spurious image hidden in host image, then spurious image be decoded, Obtain the binary expression of original cipher text.
Above-mentioned security information transmission method based on image, carries out fingerprint extraction to wanted decrypted image, and sentences Whether the finger print information of the disconnected image extracted is present in data base;If the finger print information of image is present in data In storehouse, then from data base, obtain key;Spurious image is obtained by the secret key pair host image decoding obtained; Again spurious image is performed decoding and obtain binaryzation sequence;Reduction binaryzation sequence obtains prime information, completes to protect The preparation of close picture.Above-mentioned security information transmission method based on image by host image fingerprint extraction, Key obtain, digital watermark technology recover spurious image, by binaryzation Information recovering security information, improve The safety of deciphering.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of security information based on image passes Broadcasting device.Such as Fig. 3, acquisition module 110 should be included, judges by security information transmission device 10 based on image Module 120, memory module 130, spurious image generation module 140 and embedding module 150.
Wherein, acquisition module 110 is for obtaining host image and needing the information of encryption;Judge module 120 For host image being carried out the extraction of fingerprint, and judge whether the fingerprint of host image is present in data base; If memory module 130 is not present in data base for the fingerprint of host image, then generate decoding key, and The decoding key of the fingerprint of host image Yu generation is stored in data base;Spurious image generation module 140 For the binaryzation sequence of the information needing encryption is carried out encoded translated generation spurious image;Embed module 150 For the random secret key to generate as deciphering input variable, and spurious image is embedded host image, complete The preparation of secrecy picture.
Additionally, such as Fig. 4, in one embodiment, also include that binaryzation retrieval module 160 is for obtaining Need the binaryzation sequence of the information of encryption;Wherein, when the information needing encryption is text, directly use The coding that word utf-8 is corresponding, uses the binary number that it encodes;When the information needing encryption is audio frequency, Audio signal is sampled, the value of the discrete point that sampling obtains is quantified, the numerical value of quantization is entered Row binaryzation;When the information needing encryption is image, image is carried out gray processing, use gray level image Pixel value carries out binaryzation, obtains binaryzation sequence.
Further, such as Fig. 4, in one embodiment, embed module 150 and include: encrypting module 151, Laminating module 152 and modular converter 153.Wherein, encrypting module 151 is for being transformed into frequency by spurious image Territory, and the decoding key generated is performed with the information needing encryption crossed through error correction redundancy coded treatment Encryption;Laminating module 152 is for the frequency domain of the host image that the result performing encryption generation is added to;Turn Die change block 153 is for changing host image to spatial domain from frequency domain.
Above-mentioned security information transmission device based on image, obtains host image by acquisition module 110 and needs Information to be encrypted;By judge module 120, host image is carried out the extraction of fingerprint, and judges that host schemes Whether the fingerprint of picture is present in data base;If not existed by the fingerprint of memory module 130 host image again In data base, then generate decoding key, and the decoding key of the fingerprint of host image with generation is stored in In data base;Compiled by the binaryzation sequence of the spurious image generation module 140 information to needing encryption Code is converted into spurious image;Input as deciphering using the decoding key generated eventually through embedding module 150 Variable, and spurious image is embedded host image, complete the preparation of secrecy picture.Above-mentioned guarantor based on image Confidential information transmission device uses error correction redundancy coding to process the information needing carrying or secrecy, it is provided that To audio frequency, text, the embedding support of image information, image itself can be made to carry target resource, thus not Need again to access the Internet and can obtain target resource, ensure that the concordance of information simultaneously, prevent from distorting, And ensure that the visual tension force of general image, embed information naked eyes invisible.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of security information based on image passes Broadcasting device.Such as Fig. 5, should security information transmission device 20 based on image include extracting judge module 210, Key acquisition module 220, decoder module 230 and recovery module 240.
Wherein, extract judge module 210 and be used for wanted decrypted image is carried out fingerprint extraction, and judge to extract The finger print information of image whether be present in data base;If key acquisition module 220 is for the fingerprint of image Information is present in data base, then obtain key from data base;Decoder module 230 is for by acquisition The decoding of secret key pair host image obtains spurious image, and spurious image performs decoding acquisition binaryzation sequence again Row;Recovery module 240 is used for reducing binaryzation sequence and obtains prime information, completes the preparation of secrecy picture.
Additionally, such as Fig. 6, in one embodiment, extract judge module 210 and include computing module 211, ratio Relatively module 212 and key return module 213.
Wherein, computing module 211 is for calculating the fingerprint of wanted decrypted image;Comparison module 212 by based on The fingerprint calculating wanted decrypted image carries out similarity-rough set with the fingerprint of pre-stored in data base;Key returns Module 213, for when fingerprint is completely the same, returns key.
Above-mentioned security information transmission device based on image, by extracting judge module 210 to figure to be deciphered As carrying out fingerprint extraction, and judge whether the finger print information of the image extracted is present in data base;Pass through again If the finger print information of key acquisition module 220 image is present in data base, then from data base, obtain key; Decoder module 230 obtains spurious image by the secret key pair host image decoding obtained;Again spurious image is held Row decoding obtains binaryzation sequence;Final recovery module 240 is reduced binaryzation sequence and is obtained prime information, completes The preparation of secrecy picture.Above-mentioned security information transmission device based on image by host image fingerprint extraction, Key obtain, digital watermark technology recover spurious image, by binaryzation Information recovering security information, improve The safety of deciphering.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of security information based on image passes Broadcast system.Such as Fig. 7, client 310 and service end should be included by security information broadcasting system 30 based on image 320。
Wherein, host image, for obtaining host image and needing the information of encryption, is entered by client 310 The extraction of row fingerprint, carries out encoded translated generation spurious image to the binaryzation sequence of the information needing encryption; And the decoding key generated using server 320 is as deciphering input variable, and spurious image is embedded host Image, completes the preparation of secrecy picture;Server 320 is for judging whether the fingerprint of host image is present in In data base, if the fingerprint of host image is not present in data base, then generate decoding key, and by host The fingerprint of image is stored in data base with the decoding key of generation.
Additionally, in one embodiment, client 310 is additionally operable to wanted decrypted image is carried out fingerprint extraction, Key is obtained from the data base of server 320;And obtained by the secret key pair host image decoding obtained Spurious image, then spurious image is performed decoding acquisition binaryzation sequence, reduction binaryzation sequence obtains former letter Breath, completes the preparation of secrecy picture.
It addition, in one embodiment, server 320 is additionally operable to judge that the finger print information of the image extracted is No it is present in data base.
In the present embodiment, it is somebody's turn to do security information broadcasting system based on image, security information is provided the strong anti-property usurped Retaining the strong transmission capacity of information while ability, this system includes client and service end, wherein client Possess encryption function and deciphering function, and service end need not preserve the encrypted content that user sends, and only use Legitimate verification, PKI preservation and checking etc. in user identity.Its general characteristic is the literary composition of need for confidentiality The multimedia messages such as basis or phonotape and videotape are changed into an image after a series of process, i.e. spurious image, and It is embedded in the transmitting carrier of another image, i.e. host image, i.e. security information by the technology of digital watermarking, Ultimately generate encrypted image, and ensure that host image is constant with encrypted image visual effect, general computer System and network environment regard encrypted image as a common picture, and encrypted image can depart from native system mutually Arbitrarily propagating in networking, user has only to use native system client software to be decrypted and use.
Meanwhile, being somebody's turn to do security information broadcasting system based on image can also be many matchmakers such as audio frequency, text, images Body information and the combination in any of these multimedia messages, make image, i.e. by coding after binary sequence Spurious image, and utilize digital watermark technology and key that spurious image is embedded into another image, i.e. host Image to generate encrypted image, the most final product, and ensure that final encrypted image and original graph Picture, i.e. host image visual effect is consistent: final encrypted image just as a real physical world inside Magazine, naked eyes can only see journal surface, and this system can read front cover content behind, any to envelope Face distort the content that client all can be caused cannot correctly to read magazine.This system is by by information two-value sequence Rowization, error correction redundancy encodes, and PKI high in the clouds third party stores, and automatically calculates finger image to extract high in the clouds The means such as PKI and step so that the encrypted image of carrying information can be propagated the most safely, and Only have authenticity image and the client that authorized can obtain key and correctly understand in encrypted image Information, it is ensured that encrypted image safety in communication process and anti-tamper.
Further, it is somebody's turn to do security information broadcasting system based on image and can be also used for the distribution of online music, The surface plot picture of one macroscopic music album, itself has carried and has been available for broadcasting after client software recovers Several mp3 put and relevant authorization message, general computer system is all regarded as common image, The most arbitrarily can upload the local propagation of image, the user side software of native system can be simultaneously The service condition of this music album be recorded in image by user, and keeps the visual effect of image constant.Should System can also be used for granting and the propagation of network picture red packet, by the account information of the person of giving bonus, amount, is subject to Benefit person's information and granting rule etc. are embedded into seen from naked eyes to be had in the image of red packet information, the most permissible Uploading to arbitrarily can upload on the Internet the place of image, the most legal user could download image This system client of rear use obtains corresponding red packet.
Further, should be calculated and phase by spurious image fingerprint by security information broadcasting system based on image Compare like degree, the generation of multimedia messages binaryzation and the spurious image having from error correcting capability, key and number Word watermark etc. technology ensure that the safety in multimedia ciphertext transmitting procedure, and spurious image one is tampered, Then its fingerprint changes, it is impossible to obtain corresponding key from data base, therefore can not decode acquisition ciphertext letter Breath.And the ciphertext hidden do not destroys the aesthetic property of host image.
It should be noted that this system can be widely applied to all kinds of internet, applications field needing encrypted transmission The authenticity verification of scape, such as electronic ticket or electronic bill, novel bank transfer system, network multimedia Version mandate, the tracking of information etc. of Internet picture ad system.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method. Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory Or random store-memory body (Random Access Memory, RAM) etc. ROM).
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the most right The all possible combination of each technical characteristic in above-described embodiment is all described, but, if these skills There is not contradiction in the combination of art feature, is all considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed, But therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that, for this area Those of ordinary skill for, without departing from the inventive concept of the premise, it is also possible to make some deformation and Improving, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be with appended Claim is as the criterion.

Claims (13)

1. a security information transmission method based on image, it is characterised in that the method includes:
Obtain host image and need the information of encryption;
Described host image is carried out the extraction of fingerprint, and judges whether the fingerprint of described host image is present in In data base;
If the described fingerprint of described host image is not present in described data base, then generate decoding key, and The described decoding key of the described fingerprint of described host image Yu generation is stored in described data base;
The binaryzation sequence of the described information needing encryption is carried out encoded translated generation spurious image;
Using generate described decoding key as deciphering input variable, and by described spurious image embed described place Master image, completes the preparation of secrecy picture.
Method the most according to claim 1, it is characterised in that described to the described information needing encryption Binaryzation sequence carry out encoded translated generation spurious image before include:
Obtain the binaryzation sequence of the described information needing encryption;
Wherein, when the described information needing encryption is text, directly use coding corresponding for word utf-8, Use the binary number that it encodes;
When described need encryption information be audio frequency time, audio signal is sampled, to sampling obtain from The value of scatterplot quantifies, and the numerical value of quantization is carried out binaryzation;
When the described information needing encryption is image, image is carried out gray processing, uses the picture of gray level image Element value carries out binaryzation, obtains binaryzation sequence.
Method the most according to claim 1, it is characterised in that the described described decoding key to generate As deciphering input variable, and the described spurious image described host image of embedding is included:
Described spurious image is transformed into frequency domain, and by the described random secret key generated and through error correction redundancy Property coded treatment cross described needs encryption information perform encryption;
It is added to performing the result that encryption generates the frequency domain of described host image;
Described host image in frequency domain is changed to spatial domain.
4. a security information transmission method based on image, it is characterised in that the method includes:
Wanted decrypted image is carried out fingerprint extraction, and judges whether the finger print information of the image extracted is present in In data base;
If the described finger print information of described image is present in described data base, then obtain from described data base Key;
Spurious image is obtained by the described secret key pair host image decoding obtained;
Again described spurious image is performed decoding and obtain binaryzation sequence;
Described binaryzation sequence of reducing obtains prime information, completes the preparation of secrecy picture.
Method the most according to claim 4, it is characterised in that the fingerprint of the image that described judgement is extracted Whether information is present in data base includes:
Calculate the fingerprint of wanted decrypted image;
The described fingerprint calculating wanted decrypted image is carried out similar to the described fingerprint of pre-stored in data base Degree compares;
When described fingerprint is completely the same, return described key.
6. a security information transmission device based on image, it is characterised in that including:
Acquisition module, for obtaining host image and needing the information of encryption;
Judge module, for described host image carries out the extraction of fingerprint, and judges described host image Whether fingerprint is present in data base;
Memory module, if the described fingerprint for described host image is not present in described data base, then gives birth to Become decoding key, and the described decoding key of the described fingerprint of described host image Yu generation is stored in described In data base;
Spurious image generation module, turns for the binaryzation sequence of the described information needing encryption is carried out coding Metaplasia becomes spurious image;
Embed module, for the described decoding key to generate as deciphering input variable, and by described parasitism Image embeds described host image, completes the preparation of secrecy picture.
Device the most according to claim 6, it is characterised in that also include: binaryzation retrieval mould Block, for obtaining the binaryzation sequence of the described information needing encryption;
Wherein, when the described information needing encryption is text, directly use coding corresponding for word utf-8, Use the binary number that it encodes;
When described need encryption information be audio frequency time, audio signal is sampled, to sampling obtain from The value of scatterplot quantifies, and the numerical value of quantization is carried out binaryzation;
When the described information needing encryption is image, image is carried out gray processing, uses the picture of gray level image Element value carries out binaryzation, obtains binaryzation sequence.
Device the most according to claim 6, it is characterised in that described embedding module includes:
Encrypting module, for described spurious image being transformed into frequency domain, and the described random secret key that will generate Encryption is performed with the information of the described needs encryption crossed through error correction redundancy coded treatment;
Laminating module, for the frequency domain of the described host image that the result performing encryption generation is added to;
Modular converter, for changing the described host image in frequency domain to spatial domain.
9. a security information transmission device based on image, it is characterised in that including:
Extract judge module, for wanted decrypted image being carried out fingerprint extraction, and judge the image of extraction Whether finger print information is present in data base;
Key acquisition module, if the described finger print information for described image is present in described data base, then Key is obtained from described data base;
Decoder module, obtains spurious image for the described secret key pair host image decoding by obtaining, and Again described spurious image is performed decoding and obtain binaryzation sequence;
Recovery module, the described binaryzation sequence that is used for reducing obtains prime information, completes the preparation of secrecy picture.
Device the most according to claim 9, it is characterised in that described extraction judge module includes:
Computing module, for calculating the fingerprint of wanted decrypted image;
Comparison module, for described fingerprint and the institute of pre-stored in data base calculating wanted decrypted image State fingerprint and carry out similarity-rough set;
Key returns module, for when described fingerprint is completely the same, returns described key.
11. 1 kinds of security information broadcasting systems based on image, it is characterised in that including:
Client, for obtaining host image and needing the information of encryption, refers to described host image The extraction of stricture of vagina, carries out encoded translated generation spurious image to the binaryzation sequence of the described information needing encryption; And
The described decoding key generated using described server is as deciphering input variable, and by described spurious image Embed described host image, complete the preparation of secrecy picture;
Described server, for judging whether the described fingerprint of described host image is present in data base, if The described fingerprint of described host image is not present in described data base, then generate decoding key, and by described The described fingerprint of host image is stored in described data base with the described decoding key of generation.
12. systems according to claim 11, it is characterised in that described client is additionally operable to being wanted Decrypted image carries out fingerprint extraction, obtains key from the described data base of described server;And
Obtain spurious image by the described secret key pair host image decoding obtained, more described spurious image is held Row decoding obtains binaryzation sequence, and described binaryzation sequence of reducing obtains prime information, completes the system of secrecy picture Standby.
13. systems according to claim 11, it is characterised in that described server is additionally operable to judgement and carries Whether the finger print information of the image taken is present in data base.
CN201610371834.2A 2016-05-30 2016-05-30 Image-based confidential information spreading method, device and system Pending CN106022011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610371834.2A CN106022011A (en) 2016-05-30 2016-05-30 Image-based confidential information spreading method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610371834.2A CN106022011A (en) 2016-05-30 2016-05-30 Image-based confidential information spreading method, device and system

Publications (1)

Publication Number Publication Date
CN106022011A true CN106022011A (en) 2016-10-12

Family

ID=57091546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610371834.2A Pending CN106022011A (en) 2016-05-30 2016-05-30 Image-based confidential information spreading method, device and system

Country Status (1)

Country Link
CN (1) CN106022011A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108174241A (en) * 2017-12-22 2018-06-15 武汉益模科技股份有限公司 A kind of video playing encryption method and system
CN108763895A (en) * 2018-04-28 2018-11-06 Oppo广东移动通信有限公司 Image processing method and device, electronic equipment, storage medium
CN109344947A (en) * 2018-10-25 2019-02-15 福建昇兴云物联网科技有限公司 Digital content generation method, two-dimensional code generation method and the recognition methods of two dimensional code
CN110930502A (en) * 2019-12-03 2020-03-27 湖南国奥电力设备有限公司 Underground cable three-dimensional modeling method and device based on pictures
CN111080726A (en) * 2019-06-06 2020-04-28 广东小天才科技有限公司 Picture transmission method and equipment
CN111476853A (en) * 2020-03-17 2020-07-31 西安万像电子科技有限公司 Method, equipment and system for encoding and decoding character image
CN111698226A (en) * 2020-05-28 2020-09-22 中国平安财产保险股份有限公司 Method and device for verifying and selling ticket
CN112151048A (en) * 2019-06-11 2020-12-29 李庆成 Method for generating and processing audio-visual image data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060123243A1 (en) * 2000-09-26 2006-06-08 Seiko Epson Corporation Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon
CN1898695A (en) * 2003-12-19 2007-01-17 创新科技有限公司 Method and system to process a digital image
CN102122385A (en) * 2011-02-28 2011-07-13 北京工业大学 Digital watermark method capable of simultaneously resisting various attacks
CN103971318A (en) * 2014-04-05 2014-08-06 海南大学 3D DWT-DFT (three-dimensional discrete wavelet transformation-discrete fourier transformation ) perceptual hash based digital watermarking method for volume data
CN105426709A (en) * 2015-11-12 2016-03-23 福建北卡科技有限公司 JPEG image information hiding based private information communication method and system
CN105453483A (en) * 2013-06-13 2016-03-30 维萨国际服务协会 Image based key derivation function

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060123243A1 (en) * 2000-09-26 2006-06-08 Seiko Epson Corporation Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon
CN1898695A (en) * 2003-12-19 2007-01-17 创新科技有限公司 Method and system to process a digital image
CN102122385A (en) * 2011-02-28 2011-07-13 北京工业大学 Digital watermark method capable of simultaneously resisting various attacks
CN105453483A (en) * 2013-06-13 2016-03-30 维萨国际服务协会 Image based key derivation function
CN103971318A (en) * 2014-04-05 2014-08-06 海南大学 3D DWT-DFT (three-dimensional discrete wavelet transformation-discrete fourier transformation ) perceptual hash based digital watermarking method for volume data
CN105426709A (en) * 2015-11-12 2016-03-23 福建北卡科技有限公司 JPEG image information hiding based private information communication method and system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108174241B (en) * 2017-12-22 2021-05-11 武汉益模科技股份有限公司 Video playing encryption method and system
CN108174241A (en) * 2017-12-22 2018-06-15 武汉益模科技股份有限公司 A kind of video playing encryption method and system
CN108763895A (en) * 2018-04-28 2018-11-06 Oppo广东移动通信有限公司 Image processing method and device, electronic equipment, storage medium
CN108763895B (en) * 2018-04-28 2021-03-30 Oppo广东移动通信有限公司 Image processing method and device, electronic equipment and storage medium
CN109344947A (en) * 2018-10-25 2019-02-15 福建昇兴云物联网科技有限公司 Digital content generation method, two-dimensional code generation method and the recognition methods of two dimensional code
CN111080726A (en) * 2019-06-06 2020-04-28 广东小天才科技有限公司 Picture transmission method and equipment
CN111080726B (en) * 2019-06-06 2023-05-23 广东小天才科技有限公司 Picture transmission method and device
CN112151048B (en) * 2019-06-11 2024-04-02 李庆成 Method for generating and processing audio-visual data
CN112151048A (en) * 2019-06-11 2020-12-29 李庆成 Method for generating and processing audio-visual image data
CN110930502A (en) * 2019-12-03 2020-03-27 湖南国奥电力设备有限公司 Underground cable three-dimensional modeling method and device based on pictures
CN110930502B (en) * 2019-12-03 2023-08-04 湖南国奥电力设备有限公司 Underground cable three-dimensional modeling method and device based on pictures
CN111476853A (en) * 2020-03-17 2020-07-31 西安万像电子科技有限公司 Method, equipment and system for encoding and decoding character image
CN111476853B (en) * 2020-03-17 2024-05-24 西安万像电子科技有限公司 Method, equipment and system for encoding and decoding text image
CN111698226B (en) * 2020-05-28 2022-07-19 中国平安财产保险股份有限公司 Method and device for verifying and selling ticket
CN111698226A (en) * 2020-05-28 2020-09-22 中国平安财产保险股份有限公司 Method and device for verifying and selling ticket

Similar Documents

Publication Publication Date Title
CN106022011A (en) Image-based confidential information spreading method, device and system
Kamaruddin et al. A review of text watermarking: theory, methods, and applications
Kumar et al. A recent survey on multimedia and database watermarking
Bouslimi et al. A joint encryption/watermarking system for verifying the reliability of medical images
Chang et al. Privacy-preserving reversible information hiding based on arithmetic of quadratic residues
Bouslimi et al. A crypto-watermarking system for ensuring reliability control and traceability of medical images
Sion et al. On watermarking numeric sets
Zhang Commutative reversible data hiding and encryption
CN100583750C (en) Desynchronized fingerprinting method and system for digital multimedia data
Abood et al. Audio steganography with enhanced LSB method for securing encrypted text with bit cycling
CN106251278A (en) A kind of image encryption territory based on histogram feature reversible information hidden method
Singh et al. A survey of digital watermarking techniques
Kaur et al. An existential review on text watermarking techniques
CN104850765A (en) Watermark processing method, device and system
CN103678960A (en) Method and device for adding digital copyright information to data file
Xu et al. Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification
CN110288504A (en) It is a kind of to automatically add water impression method towards block chain digital education platform
Yari et al. An overview and computer forensic challenges in image steganography
Alkhudaydi et al. Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications
CN102164303B (en) Video copyright protecting method, system and video distribution side's entity
CN101383701A (en) Digital content protection method ciphered by biological characteristic
Alsaadi et al. Text steganography in font color of MS excel sheet
Zhong et al. A secure visual secret sharing scheme with authentication based on QR Code
US20190109710A1 (en) System and method for randomizing hidden messages in digital files
Chaudhary et al. An elucidation on steganography and cryptography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012