CN106022011A - Image-based confidential information spreading method, device and system - Google Patents
Image-based confidential information spreading method, device and system Download PDFInfo
- Publication number
- CN106022011A CN106022011A CN201610371834.2A CN201610371834A CN106022011A CN 106022011 A CN106022011 A CN 106022011A CN 201610371834 A CN201610371834 A CN 201610371834A CN 106022011 A CN106022011 A CN 106022011A
- Authority
- CN
- China
- Prior art keywords
- image
- information
- fingerprint
- data base
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000000605 extraction Methods 0.000 claims abstract description 29
- 238000002360 preparation method Methods 0.000 claims abstract description 24
- 230000005540 biological transmission Effects 0.000 claims description 35
- 238000012937 correction Methods 0.000 claims description 10
- 239000000284 extract Substances 0.000 claims description 7
- 238000005070 sampling Methods 0.000 claims description 6
- 230000005236 sound signal Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000013139 quantization Methods 0.000 claims description 5
- 238000011084 recovery Methods 0.000 claims description 5
- 238000010030 laminating Methods 0.000 claims description 4
- 208000031481 Pathologic Constriction Diseases 0.000 claims description 3
- 210000001215 vagina Anatomy 0.000 claims description 3
- 230000024241 parasitism Effects 0.000 claims description 2
- 206010054949 Metaplasia Diseases 0.000 claims 1
- 230000015689 metaplastic ossification Effects 0.000 claims 1
- 230000003071 parasitic effect Effects 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 9
- 230000000007 visual effect Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 230000009467 reduction Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000006854 communication Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000012467 final product Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses an image-based confidential information spreading method. The method comprises the steps of obtaining a host image and information needing to be encrypted; performing fingerprint extraction on the host image, and judging whether fingerprints of the host image exist in a database or not; if fingerprints of the host image do not exist in the database, generating a decoding secret key, and storing fingerprints of the host image and the generated decoding secret key in the database; encoding and converting a binaryzation sequence of the information needing to the encrypted to generate a parasitic image; adopting the generated decoding secret key as a decoding input variable, inserting the parasitic image into the host image, and completing preparation of a confidential image. The image-based confidential information spreading method can enable the image to carry target resources, the target resources can be obtained without re-access of the Internet, information consistency is ensured, tamper-proofing is achieved, tension of the overall image vision is ensured, and inserted information cannot be seen by naked eyes. The invention further provides an image-based confidential information spreading device and system.
Description
Technical field
The present invention relates to technical field of information encryption, particularly relate to a kind of security information based on image and propagate
Methods, devices and systems.
Background technology
At present, existing information dissemination system based on image is often to increase character information, mark on image
The appreciable symbol of vision, mark or the signals such as note symbol, one-dimension code or Quick Response Code, publicize with access images
Resource ontology.This have the disadvantage that mainly has three: first, information and resource separation, visually
Information is not the resource itself that observer is to be obtained, needs again to access the Internet and could obtain target money
Source, such as may be with the network address of a mp3 or corresponding Quick Response Code on one picture, but user wants
Obtain is mp3 rather than this network address or Quick Response Code in fact;Second, the vision affecting general image is opened
Power, in order to allow image carry character information, Quick Response Code or other information, generally requires certain replacing artwork
Block pixel, thus have impact on globality and the aesthetic property of image;3rd, safety is not enough, information in plain text
Easily replace or distort, raw information can be replaced with fishing information and cause unsafe access;4th,
The form of embedding information is limited, and existing information dissemination system based on image can only carry character text information
Or the image information such as Quick Response Code, image itself cannot carry audio frequency or more different picture.
Summary of the invention
Based on this, it is necessary to provide a kind of embed information more safety and embed message form various based on figure
Security information transmission method, device and the system of picture.
A kind of security information transmission method based on image, the method includes: obtain host image and needs
The information of encryption;Described host image is carried out the extraction of fingerprint, and judges that the fingerprint of described host image is
No it is present in data base;If the described fingerprint of described host image is not present in described data base, then give birth to
Become decoding key, and the described decoding key of the described fingerprint of described host image Yu generation is stored in described
In data base;The binaryzation sequence of the described information needing encryption is carried out encoded translated generation spurious image;
Using generate described decoding key as deciphering input variable, and by described spurious image embed described host figure
Picture, completes the preparation of secrecy picture.
Wherein in an embodiment, the described binaryzation sequence to the described information needing encryption encodes
Include before being converted into spurious image:
Obtain the binaryzation sequence of the described information needing encryption;
Wherein, when the described information needing encryption is text, directly use coding corresponding for word utf-8,
Use the binary number that it encodes;
When described need encryption information be audio frequency time, audio signal is sampled, to sampling obtain from
The value of scatterplot quantifies, and the numerical value of quantization is carried out binaryzation;
When the described information needing encryption is image, image is carried out gray processing, uses the picture of gray level image
Element value carries out binaryzation, obtains binaryzation sequence.
Wherein in an embodiment, described using generate described decoding key as deciphering input variable, and
The described spurious image described host image of embedding is included:
Described spurious image is transformed into frequency domain, and by the described random secret key generated and through error correction redundancy
Property coded treatment cross described needs encryption information perform encryption;
It is added to performing the result that encryption generates the frequency domain of described host image;
Described host image in frequency domain is changed to spatial domain.
A kind of security information transmission method based on image, the method includes: refer to wanted decrypted image
Stricture of vagina extracts, and judges whether the finger print information of the image extracted is present in data base;If the institute of described image
State finger print information to be present in described data base, then from described data base, obtain key;By the institute obtained
State the decoding of secret key pair host image and obtain spurious image;Again described spurious image is performed decoding and obtain binaryzation
Sequence;Described binaryzation sequence of reducing obtains prime information, completes the preparation of secrecy picture.
Wherein in an embodiment, whether the finger print information of the described image judging to extract is present in data base
Include: calculate the fingerprint of wanted decrypted image;To the described fingerprint and the data that calculate wanted decrypted image
In storehouse, the described fingerprint of pre-stored carries out similarity-rough set;When described fingerprint is completely the same, return described secret
Key.
A kind of security information transmission device based on image, including: acquisition module, it is used for obtaining host image
And need the information of encryption;Judge module, for described host image carries out the extraction of fingerprint, and sentences
Whether the fingerprint of disconnected described host image is present in data base;Memory module, if for described host image
Described fingerprint be not present in described data base, then generate decoding key, and by the institute of described host image
The described decoding key stating fingerprint and generation is stored in described data base;Spurious image generation module, is used for
The binaryzation sequence of the described information needing encryption is carried out encoded translated generation spurious image;Embed module,
For the described decoding key to generate as deciphering input variable, and described spurious image is embedded described place
Master image, completes the preparation of secrecy picture.
Wherein in an embodiment, also include: binaryzation retrieval module, be used for obtaining described needs
The binaryzation sequence of the information of encryption;Wherein, when the described information needing encryption is text, directly use
The coding that word utf-8 is corresponding, uses the binary number that it encodes;When the described information needing encryption is audio frequency
Time, audio signal is sampled, the value of the discrete point that sampling obtains is quantified, the number that will quantify
Value carries out binaryzation;When the described information needing encryption is image, image is carried out gray processing, uses ash
The pixel value of degree image carries out binaryzation, obtains binaryzation sequence.
Wherein in an embodiment, described embedding module includes: encrypting module, for by described parasitic figure
As being transformed into frequency domain, and by the described random secret key generated and the institute crossed through error correction redundancy coded treatment
State and need the information of encryption to perform encryption;Laminating module, for the institute that the result performing encryption generation is added to
State the frequency domain of host image;Modular converter, for changing the described host image in frequency domain to space
Territory.
A kind of security information transmission device based on image, including: extract judge module, for to solve
Close image carries out fingerprint extraction, and judges whether the finger print information of the image extracted is present in data base;Secret
Key acquisition module, if the described finger print information for described image is present in described data base, then from described
Data base obtains key;Decoder module, obtains for the described secret key pair host image decoding by obtaining
Spurious image, and more described spurious image is performed decoding acquisition binaryzation sequence;Recovery module, is used for
Described binaryzation sequence of reducing obtains prime information, completes the preparation of secrecy picture.
Wherein in an embodiment, described extraction judge module includes: computing module, is used for calculating and is wanted
The fingerprint of decrypted image;Comparison module, for described fingerprint and the data base calculating wanted decrypted image
The described fingerprint of middle pre-stored carries out similarity-rough set;Key returns module, for when described fingerprint complete
During cause, return described key.
A kind of security information broadcasting system based on image, including client, be used for obtaining host image with
And need the information encrypted, described host image is carried out the extraction of fingerprint, to the described information needing encryption
Binaryzation sequence carry out encoded translated generation spurious image;And with described server generate described at random
Key is as deciphering input variable, and described spurious image is embedded described host image, completes secrecy picture
Preparation;Described server, for judging whether the described fingerprint of described host image is present in data base,
If the described fingerprint of described host image is not present in described data base, then generate random secret key, and by institute
The described random secret key of the described fingerprint and generation of stating host image is stored in described data base.
Wherein in an embodiment, described client is additionally operable to wanted decrypted image is carried out fingerprint extraction,
Key is obtained from the described data base of described server;And by the described secret key pair host image obtained
Decoding obtains spurious image, more described spurious image is performed decoding obtains binaryzation sequence, reduces described two
Value sequence obtains prime information, completes the preparation of secrecy picture.
Wherein in an embodiment, described server is additionally operable to judge the finger print information of image that extracts whether
It is present in data base.
Above-mentioned security information transmission method based on image, device and system, obtain host image and needs
The information of encryption;Host image is carried out the extraction of fingerprint, and judges whether the fingerprint of host image is present in
In data base;If the fingerprint of host image is not present in data base, then generate decoding key, and by host
The fingerprint of image is stored in described data base with the decoding key of generation;Two-value to the information needing encryption
Change sequence and carry out encoded translated generation spurious image;Using generate decoding key as deciphering input variable, and
Spurious image is embedded host image, completes the preparation of secrecy picture.Above-mentioned security information based on image passes
Broadcasting method use error correction redundancy coding to need carrying or secrecy information process, it is provided that to audio frequency,
Text, the embedding support of image information, can make image itself carry target resource, from without again
Access the Internet and can obtain target resource, ensure that the concordance of information simultaneously, prevent from distorting, and protect
Demonstrate,prove the visual tension force of general image, embed information naked eyes invisible.
Above-mentioned security information transmission method based on image, device and system, refer to wanted decrypted image
Stricture of vagina extracts, and judges whether the finger print information of the image extracted is present in data base;If the fingerprint letter of image
Breath is present in data base, then obtain key from data base;Decoded by the secret key pair host image obtained
Obtain spurious image;Again spurious image is performed decoding and obtain binaryzation sequence;Reduction binaryzation sequence obtains
Prime information, completes the preparation of secrecy picture.Above-mentioned security information transmission method based on image is by host
Finger image extraction, key acquisition, digital watermark technology recover spurious image, are protected by binaryzation Information recovering
Confidential information, improves the safety of deciphering.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of security information transmission method based on image in an embodiment;
Fig. 2 is the schematic flow sheet of security information transmission method based on image in another embodiment;
Fig. 3 is the structural representation of security information transmission device based on image in an embodiment;
Fig. 4 is the structural representation of security information transmission device based on image in another embodiment;
Fig. 5 is the structural representation of security information transmission device based on image in further embodiment;
Fig. 6 is the structural representation of security information transmission device based on image in another embodiment;And
Fig. 7 is the structural representation of security information broadcasting system based on image in an embodiment.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, by the following examples,
And combine accompanying drawing, being embodied as of security information transmission method based on image to the present invention, device and system
Mode is further elaborated.Should be appreciated that specific embodiment described herein is only in order to explain this
Invention, is not intended to limit the present invention.
In daily life, we want to use digital watermark technology to accomplish do not affecting picture appearance visual effect
On the premise of, record with allowing safety of image and carry the purpose including word, audio frequency or image information, this
The information being carried a bit is to embed in the picture in the way of secrecy, and naked eyes are sightless.The present embodiment carries
Supply a kind of security information transmission method based on image can realize above-mentioned technology requirement.
See Fig. 1, in an embodiment, it is provided that a kind of security information transmission method based on image, the party
Method comprises the following steps:
Step 102, obtains host image and needs the information of encryption.
In the present embodiment, use host image as carrier, support that character, image and phonotape and videotape etc. exist simultaneously
In can the multimedia messages of binaryzation, utilize visually part and the invisible part of vision of image to pass
Playing multimedia information.
Step 104, carries out the extraction of fingerprint, and judges whether the fingerprint of host image is present in host image
In data base.
In the present embodiment, host image carries out fingerprint extracting could be that follow-up deciphering obtains corresponding key.
Picture appearance one is tampered, and its finger image will change, and therefore can not obtain corresponding key and carry out correct
Information retrieval, thus ensure that the safety of the information hidden in transmitting procedure.
Step 106, if the fingerprint of host image is not present in data base, then generates decoding key, and by place
The fingerprint of master image is stored in data base with the decoding key of generation.
In the present embodiment, it is only necessary to the key being not in contact with security information itself is saved in data base, and
Do not preserve security information itself to data base, and then add degree of control and the degree of belief of client, even and if
Hacker illegally controls key data base, also cannot obtain security information.
Step 108, carries out encoded translated generation spurious image to the binaryzation sequence of the information needing encryption.
Step 110, using generate decoding key as deciphering input variable, and spurious image is embedded host figure
Picture, completes the preparation of secrecy picture.
In the present embodiment, multi-media objects resource encryption can be embedded certain host image, so that image
Auxiliary information and the target resource of display are integrated, it is not necessary to visit again the Internet download target resource, only
Need to obtain key and can open local resource.
Embedding from authorized client is asked by above-described embodiment, first calculates the host image that client provides
Fingerprint, as data base exists this fingerprint, illustrate that this host image is used by other clients, terminate
Service.If there is not this fingerprint in data base, then the information to required embedding carries out binary conversion treatment, then
Using certain error correction redundancy to encode, wherein, codes selection can be carried out encoding to obtain by customization
Spurious image, embeds host image by spurious image afterwards.Meanwhile, in data base required for carrying recorded decoding
Key information, be indexed with the fingerprint of host image.
Above-mentioned security information transmission method based on image, obtains host image and needs the information of encryption;
Host image is carried out the extraction of fingerprint, and judges whether the fingerprint of host image is present in data base;If
The fingerprint of host image is not present in data base, then generate decoding key, and by the fingerprint of host image with
The random secret key generated is stored in described data base;The binaryzation sequence of the information needing encryption is compiled
Code is converted into spurious image;As deciphering input variable and spurious image is embedding using the decoding key of generation
Enter host image, complete the preparation of secrecy picture.Above-mentioned security information transmission method based on image uses and entangles
The information needing carrying or secrecy is processed by wrong redundancy coding, it is provided that to audio frequency, text, image letter
The embedding support of breath, can make image itself carry target resource, from without again accessing the Internet i.e.
Target resource can be obtained, ensure that the concordance of information simultaneously, prevent from distorting, and ensure that general image
Visual tension force, embeds information naked eyes invisible.
In one embodiment, the binaryzation sequence to the information needing encryption carries out encoded translated generation parasitism
Include before image: obtain the binaryzation sequence of the information of needs encryption;Wherein, when the information needing encryption
During for text, directly use coding corresponding for word utf-8, use the binary number that it encodes;When needs add
When close information is audio frequency, audio signal is sampled, the value amount of carrying out to the discrete point that sampling obtains
Change, the numerical value of quantization is carried out binaryzation;When the information needing encryption is image, image is carried out gray scale
Change, use the pixel value of gray level image to carry out binaryzation, obtain binaryzation sequence.
In one embodiment, the decoding key using generation is as deciphering input variable and spurious image is embedding
Enter host image to include: spurious image is transformed into frequency domain, and by the decoding key generated and through error correction
The information needing encryption that redundancy coded treatment is crossed performs encryption;The result performing encryption generation is added to
The frequency domain of described host image, changes the described host image in frequency domain to spatial domain.
As in figure 2 it is shown, in one embodiment, it is provided that a kind of security information transmission method based on image,
The method includes:
Step 202, carries out fingerprint extraction to wanted decrypted image, and judges that the finger print information of the image extracted is
No it is present in data base.
In the present embodiment, calculate the fingerprint of wanted decrypted image, to calculate the fingerprint of wanted decrypted image with
In data base, the fingerprint of pre-stored carries out similarity-rough set, when fingerprint is completely the same, returns key.
Step 204, if the finger print information of image is present in data base, then obtains key from data base.
Step 206, obtains spurious image by the secret key pair host image decoding obtained.
Step 208, then spurious image is performed decoding acquisition binaryzation sequence.
Step 210, reduction binaryzation sequence obtains prime information, completes the preparation of secrecy picture.
Information retrieval from authorized client is asked by above-described embodiment, first calculates the host that client provides
The fingerprint of image, as there is not this fingerprint in data base, illustrates that this host image did not carry out information and embeds
Process, terminate service.As there is this fingerprint in data base, then provide in data base with this fingerprint matching is secret
Key.Use this key to extract the spurious image hidden in host image, then spurious image be decoded,
Obtain the binary expression of original cipher text.
Above-mentioned security information transmission method based on image, carries out fingerprint extraction to wanted decrypted image, and sentences
Whether the finger print information of the disconnected image extracted is present in data base;If the finger print information of image is present in data
In storehouse, then from data base, obtain key;Spurious image is obtained by the secret key pair host image decoding obtained;
Again spurious image is performed decoding and obtain binaryzation sequence;Reduction binaryzation sequence obtains prime information, completes to protect
The preparation of close picture.Above-mentioned security information transmission method based on image by host image fingerprint extraction,
Key obtain, digital watermark technology recover spurious image, by binaryzation Information recovering security information, improve
The safety of deciphering.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of security information based on image passes
Broadcasting device.Such as Fig. 3, acquisition module 110 should be included, judges by security information transmission device 10 based on image
Module 120, memory module 130, spurious image generation module 140 and embedding module 150.
Wherein, acquisition module 110 is for obtaining host image and needing the information of encryption;Judge module 120
For host image being carried out the extraction of fingerprint, and judge whether the fingerprint of host image is present in data base;
If memory module 130 is not present in data base for the fingerprint of host image, then generate decoding key, and
The decoding key of the fingerprint of host image Yu generation is stored in data base;Spurious image generation module 140
For the binaryzation sequence of the information needing encryption is carried out encoded translated generation spurious image;Embed module 150
For the random secret key to generate as deciphering input variable, and spurious image is embedded host image, complete
The preparation of secrecy picture.
Additionally, such as Fig. 4, in one embodiment, also include that binaryzation retrieval module 160 is for obtaining
Need the binaryzation sequence of the information of encryption;Wherein, when the information needing encryption is text, directly use
The coding that word utf-8 is corresponding, uses the binary number that it encodes;When the information needing encryption is audio frequency,
Audio signal is sampled, the value of the discrete point that sampling obtains is quantified, the numerical value of quantization is entered
Row binaryzation;When the information needing encryption is image, image is carried out gray processing, use gray level image
Pixel value carries out binaryzation, obtains binaryzation sequence.
Further, such as Fig. 4, in one embodiment, embed module 150 and include: encrypting module 151,
Laminating module 152 and modular converter 153.Wherein, encrypting module 151 is for being transformed into frequency by spurious image
Territory, and the decoding key generated is performed with the information needing encryption crossed through error correction redundancy coded treatment
Encryption;Laminating module 152 is for the frequency domain of the host image that the result performing encryption generation is added to;Turn
Die change block 153 is for changing host image to spatial domain from frequency domain.
Above-mentioned security information transmission device based on image, obtains host image by acquisition module 110 and needs
Information to be encrypted;By judge module 120, host image is carried out the extraction of fingerprint, and judges that host schemes
Whether the fingerprint of picture is present in data base;If not existed by the fingerprint of memory module 130 host image again
In data base, then generate decoding key, and the decoding key of the fingerprint of host image with generation is stored in
In data base;Compiled by the binaryzation sequence of the spurious image generation module 140 information to needing encryption
Code is converted into spurious image;Input as deciphering using the decoding key generated eventually through embedding module 150
Variable, and spurious image is embedded host image, complete the preparation of secrecy picture.Above-mentioned guarantor based on image
Confidential information transmission device uses error correction redundancy coding to process the information needing carrying or secrecy, it is provided that
To audio frequency, text, the embedding support of image information, image itself can be made to carry target resource, thus not
Need again to access the Internet and can obtain target resource, ensure that the concordance of information simultaneously, prevent from distorting,
And ensure that the visual tension force of general image, embed information naked eyes invisible.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of security information based on image passes
Broadcasting device.Such as Fig. 5, should security information transmission device 20 based on image include extracting judge module 210,
Key acquisition module 220, decoder module 230 and recovery module 240.
Wherein, extract judge module 210 and be used for wanted decrypted image is carried out fingerprint extraction, and judge to extract
The finger print information of image whether be present in data base;If key acquisition module 220 is for the fingerprint of image
Information is present in data base, then obtain key from data base;Decoder module 230 is for by acquisition
The decoding of secret key pair host image obtains spurious image, and spurious image performs decoding acquisition binaryzation sequence again
Row;Recovery module 240 is used for reducing binaryzation sequence and obtains prime information, completes the preparation of secrecy picture.
Additionally, such as Fig. 6, in one embodiment, extract judge module 210 and include computing module 211, ratio
Relatively module 212 and key return module 213.
Wherein, computing module 211 is for calculating the fingerprint of wanted decrypted image;Comparison module 212 by based on
The fingerprint calculating wanted decrypted image carries out similarity-rough set with the fingerprint of pre-stored in data base;Key returns
Module 213, for when fingerprint is completely the same, returns key.
Above-mentioned security information transmission device based on image, by extracting judge module 210 to figure to be deciphered
As carrying out fingerprint extraction, and judge whether the finger print information of the image extracted is present in data base;Pass through again
If the finger print information of key acquisition module 220 image is present in data base, then from data base, obtain key;
Decoder module 230 obtains spurious image by the secret key pair host image decoding obtained;Again spurious image is held
Row decoding obtains binaryzation sequence;Final recovery module 240 is reduced binaryzation sequence and is obtained prime information, completes
The preparation of secrecy picture.Above-mentioned security information transmission device based on image by host image fingerprint extraction,
Key obtain, digital watermark technology recover spurious image, by binaryzation Information recovering security information, improve
The safety of deciphering.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of security information based on image passes
Broadcast system.Such as Fig. 7, client 310 and service end should be included by security information broadcasting system 30 based on image
320。
Wherein, host image, for obtaining host image and needing the information of encryption, is entered by client 310
The extraction of row fingerprint, carries out encoded translated generation spurious image to the binaryzation sequence of the information needing encryption;
And the decoding key generated using server 320 is as deciphering input variable, and spurious image is embedded host
Image, completes the preparation of secrecy picture;Server 320 is for judging whether the fingerprint of host image is present in
In data base, if the fingerprint of host image is not present in data base, then generate decoding key, and by host
The fingerprint of image is stored in data base with the decoding key of generation.
Additionally, in one embodiment, client 310 is additionally operable to wanted decrypted image is carried out fingerprint extraction,
Key is obtained from the data base of server 320;And obtained by the secret key pair host image decoding obtained
Spurious image, then spurious image is performed decoding acquisition binaryzation sequence, reduction binaryzation sequence obtains former letter
Breath, completes the preparation of secrecy picture.
It addition, in one embodiment, server 320 is additionally operable to judge that the finger print information of the image extracted is
No it is present in data base.
In the present embodiment, it is somebody's turn to do security information broadcasting system based on image, security information is provided the strong anti-property usurped
Retaining the strong transmission capacity of information while ability, this system includes client and service end, wherein client
Possess encryption function and deciphering function, and service end need not preserve the encrypted content that user sends, and only use
Legitimate verification, PKI preservation and checking etc. in user identity.Its general characteristic is the literary composition of need for confidentiality
The multimedia messages such as basis or phonotape and videotape are changed into an image after a series of process, i.e. spurious image, and
It is embedded in the transmitting carrier of another image, i.e. host image, i.e. security information by the technology of digital watermarking,
Ultimately generate encrypted image, and ensure that host image is constant with encrypted image visual effect, general computer
System and network environment regard encrypted image as a common picture, and encrypted image can depart from native system mutually
Arbitrarily propagating in networking, user has only to use native system client software to be decrypted and use.
Meanwhile, being somebody's turn to do security information broadcasting system based on image can also be many matchmakers such as audio frequency, text, images
Body information and the combination in any of these multimedia messages, make image, i.e. by coding after binary sequence
Spurious image, and utilize digital watermark technology and key that spurious image is embedded into another image, i.e. host
Image to generate encrypted image, the most final product, and ensure that final encrypted image and original graph
Picture, i.e. host image visual effect is consistent: final encrypted image just as a real physical world inside
Magazine, naked eyes can only see journal surface, and this system can read front cover content behind, any to envelope
Face distort the content that client all can be caused cannot correctly to read magazine.This system is by by information two-value sequence
Rowization, error correction redundancy encodes, and PKI high in the clouds third party stores, and automatically calculates finger image to extract high in the clouds
The means such as PKI and step so that the encrypted image of carrying information can be propagated the most safely, and
Only have authenticity image and the client that authorized can obtain key and correctly understand in encrypted image
Information, it is ensured that encrypted image safety in communication process and anti-tamper.
Further, it is somebody's turn to do security information broadcasting system based on image and can be also used for the distribution of online music,
The surface plot picture of one macroscopic music album, itself has carried and has been available for broadcasting after client software recovers
Several mp3 put and relevant authorization message, general computer system is all regarded as common image,
The most arbitrarily can upload the local propagation of image, the user side software of native system can be simultaneously
The service condition of this music album be recorded in image by user, and keeps the visual effect of image constant.Should
System can also be used for granting and the propagation of network picture red packet, by the account information of the person of giving bonus, amount, is subject to
Benefit person's information and granting rule etc. are embedded into seen from naked eyes to be had in the image of red packet information, the most permissible
Uploading to arbitrarily can upload on the Internet the place of image, the most legal user could download image
This system client of rear use obtains corresponding red packet.
Further, should be calculated and phase by spurious image fingerprint by security information broadcasting system based on image
Compare like degree, the generation of multimedia messages binaryzation and the spurious image having from error correcting capability, key and number
Word watermark etc. technology ensure that the safety in multimedia ciphertext transmitting procedure, and spurious image one is tampered,
Then its fingerprint changes, it is impossible to obtain corresponding key from data base, therefore can not decode acquisition ciphertext letter
Breath.And the ciphertext hidden do not destroys the aesthetic property of host image.
It should be noted that this system can be widely applied to all kinds of internet, applications field needing encrypted transmission
The authenticity verification of scape, such as electronic ticket or electronic bill, novel bank transfer system, network multimedia
Version mandate, the tracking of information etc. of Internet picture ad system.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method,
Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating
In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.
Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory
Or random store-memory body (Random Access Memory, RAM) etc. ROM).
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the most right
The all possible combination of each technical characteristic in above-described embodiment is all described, but, if these skills
There is not contradiction in the combination of art feature, is all considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed,
But therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that, for this area
Those of ordinary skill for, without departing from the inventive concept of the premise, it is also possible to make some deformation and
Improving, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be with appended
Claim is as the criterion.
Claims (13)
1. a security information transmission method based on image, it is characterised in that the method includes:
Obtain host image and need the information of encryption;
Described host image is carried out the extraction of fingerprint, and judges whether the fingerprint of described host image is present in
In data base;
If the described fingerprint of described host image is not present in described data base, then generate decoding key, and
The described decoding key of the described fingerprint of described host image Yu generation is stored in described data base;
The binaryzation sequence of the described information needing encryption is carried out encoded translated generation spurious image;
Using generate described decoding key as deciphering input variable, and by described spurious image embed described place
Master image, completes the preparation of secrecy picture.
Method the most according to claim 1, it is characterised in that described to the described information needing encryption
Binaryzation sequence carry out encoded translated generation spurious image before include:
Obtain the binaryzation sequence of the described information needing encryption;
Wherein, when the described information needing encryption is text, directly use coding corresponding for word utf-8,
Use the binary number that it encodes;
When described need encryption information be audio frequency time, audio signal is sampled, to sampling obtain from
The value of scatterplot quantifies, and the numerical value of quantization is carried out binaryzation;
When the described information needing encryption is image, image is carried out gray processing, uses the picture of gray level image
Element value carries out binaryzation, obtains binaryzation sequence.
Method the most according to claim 1, it is characterised in that the described described decoding key to generate
As deciphering input variable, and the described spurious image described host image of embedding is included:
Described spurious image is transformed into frequency domain, and by the described random secret key generated and through error correction redundancy
Property coded treatment cross described needs encryption information perform encryption;
It is added to performing the result that encryption generates the frequency domain of described host image;
Described host image in frequency domain is changed to spatial domain.
4. a security information transmission method based on image, it is characterised in that the method includes:
Wanted decrypted image is carried out fingerprint extraction, and judges whether the finger print information of the image extracted is present in
In data base;
If the described finger print information of described image is present in described data base, then obtain from described data base
Key;
Spurious image is obtained by the described secret key pair host image decoding obtained;
Again described spurious image is performed decoding and obtain binaryzation sequence;
Described binaryzation sequence of reducing obtains prime information, completes the preparation of secrecy picture.
Method the most according to claim 4, it is characterised in that the fingerprint of the image that described judgement is extracted
Whether information is present in data base includes:
Calculate the fingerprint of wanted decrypted image;
The described fingerprint calculating wanted decrypted image is carried out similar to the described fingerprint of pre-stored in data base
Degree compares;
When described fingerprint is completely the same, return described key.
6. a security information transmission device based on image, it is characterised in that including:
Acquisition module, for obtaining host image and needing the information of encryption;
Judge module, for described host image carries out the extraction of fingerprint, and judges described host image
Whether fingerprint is present in data base;
Memory module, if the described fingerprint for described host image is not present in described data base, then gives birth to
Become decoding key, and the described decoding key of the described fingerprint of described host image Yu generation is stored in described
In data base;
Spurious image generation module, turns for the binaryzation sequence of the described information needing encryption is carried out coding
Metaplasia becomes spurious image;
Embed module, for the described decoding key to generate as deciphering input variable, and by described parasitism
Image embeds described host image, completes the preparation of secrecy picture.
Device the most according to claim 6, it is characterised in that also include: binaryzation retrieval mould
Block, for obtaining the binaryzation sequence of the described information needing encryption;
Wherein, when the described information needing encryption is text, directly use coding corresponding for word utf-8,
Use the binary number that it encodes;
When described need encryption information be audio frequency time, audio signal is sampled, to sampling obtain from
The value of scatterplot quantifies, and the numerical value of quantization is carried out binaryzation;
When the described information needing encryption is image, image is carried out gray processing, uses the picture of gray level image
Element value carries out binaryzation, obtains binaryzation sequence.
Device the most according to claim 6, it is characterised in that described embedding module includes:
Encrypting module, for described spurious image being transformed into frequency domain, and the described random secret key that will generate
Encryption is performed with the information of the described needs encryption crossed through error correction redundancy coded treatment;
Laminating module, for the frequency domain of the described host image that the result performing encryption generation is added to;
Modular converter, for changing the described host image in frequency domain to spatial domain.
9. a security information transmission device based on image, it is characterised in that including:
Extract judge module, for wanted decrypted image being carried out fingerprint extraction, and judge the image of extraction
Whether finger print information is present in data base;
Key acquisition module, if the described finger print information for described image is present in described data base, then
Key is obtained from described data base;
Decoder module, obtains spurious image for the described secret key pair host image decoding by obtaining, and
Again described spurious image is performed decoding and obtain binaryzation sequence;
Recovery module, the described binaryzation sequence that is used for reducing obtains prime information, completes the preparation of secrecy picture.
Device the most according to claim 9, it is characterised in that described extraction judge module includes:
Computing module, for calculating the fingerprint of wanted decrypted image;
Comparison module, for described fingerprint and the institute of pre-stored in data base calculating wanted decrypted image
State fingerprint and carry out similarity-rough set;
Key returns module, for when described fingerprint is completely the same, returns described key.
11. 1 kinds of security information broadcasting systems based on image, it is characterised in that including:
Client, for obtaining host image and needing the information of encryption, refers to described host image
The extraction of stricture of vagina, carries out encoded translated generation spurious image to the binaryzation sequence of the described information needing encryption;
And
The described decoding key generated using described server is as deciphering input variable, and by described spurious image
Embed described host image, complete the preparation of secrecy picture;
Described server, for judging whether the described fingerprint of described host image is present in data base, if
The described fingerprint of described host image is not present in described data base, then generate decoding key, and by described
The described fingerprint of host image is stored in described data base with the described decoding key of generation.
12. systems according to claim 11, it is characterised in that described client is additionally operable to being wanted
Decrypted image carries out fingerprint extraction, obtains key from the described data base of described server;And
Obtain spurious image by the described secret key pair host image decoding obtained, more described spurious image is held
Row decoding obtains binaryzation sequence, and described binaryzation sequence of reducing obtains prime information, completes the system of secrecy picture
Standby.
13. systems according to claim 11, it is characterised in that described server is additionally operable to judgement and carries
Whether the finger print information of the image taken is present in data base.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610371834.2A CN106022011A (en) | 2016-05-30 | 2016-05-30 | Image-based confidential information spreading method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610371834.2A CN106022011A (en) | 2016-05-30 | 2016-05-30 | Image-based confidential information spreading method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106022011A true CN106022011A (en) | 2016-10-12 |
Family
ID=57091546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610371834.2A Pending CN106022011A (en) | 2016-05-30 | 2016-05-30 | Image-based confidential information spreading method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022011A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108174241A (en) * | 2017-12-22 | 2018-06-15 | 武汉益模科技股份有限公司 | A kind of video playing encryption method and system |
CN108763895A (en) * | 2018-04-28 | 2018-11-06 | Oppo广东移动通信有限公司 | Image processing method and device, electronic equipment, storage medium |
CN109344947A (en) * | 2018-10-25 | 2019-02-15 | 福建昇兴云物联网科技有限公司 | Digital content generation method, two-dimensional code generation method and the recognition methods of two dimensional code |
CN110930502A (en) * | 2019-12-03 | 2020-03-27 | 湖南国奥电力设备有限公司 | Underground cable three-dimensional modeling method and device based on pictures |
CN111080726A (en) * | 2019-06-06 | 2020-04-28 | 广东小天才科技有限公司 | Picture transmission method and equipment |
CN111476853A (en) * | 2020-03-17 | 2020-07-31 | 西安万像电子科技有限公司 | Method, equipment and system for encoding and decoding character image |
CN111698226A (en) * | 2020-05-28 | 2020-09-22 | 中国平安财产保险股份有限公司 | Method and device for verifying and selling ticket |
CN112151048A (en) * | 2019-06-11 | 2020-12-29 | 李庆成 | Method for generating and processing audio-visual image data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060123243A1 (en) * | 2000-09-26 | 2006-06-08 | Seiko Epson Corporation | Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon |
CN1898695A (en) * | 2003-12-19 | 2007-01-17 | 创新科技有限公司 | Method and system to process a digital image |
CN102122385A (en) * | 2011-02-28 | 2011-07-13 | 北京工业大学 | Digital watermark method capable of simultaneously resisting various attacks |
CN103971318A (en) * | 2014-04-05 | 2014-08-06 | 海南大学 | 3D DWT-DFT (three-dimensional discrete wavelet transformation-discrete fourier transformation ) perceptual hash based digital watermarking method for volume data |
CN105426709A (en) * | 2015-11-12 | 2016-03-23 | 福建北卡科技有限公司 | JPEG image information hiding based private information communication method and system |
CN105453483A (en) * | 2013-06-13 | 2016-03-30 | 维萨国际服务协会 | Image based key derivation function |
-
2016
- 2016-05-30 CN CN201610371834.2A patent/CN106022011A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060123243A1 (en) * | 2000-09-26 | 2006-06-08 | Seiko Epson Corporation | Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon |
CN1898695A (en) * | 2003-12-19 | 2007-01-17 | 创新科技有限公司 | Method and system to process a digital image |
CN102122385A (en) * | 2011-02-28 | 2011-07-13 | 北京工业大学 | Digital watermark method capable of simultaneously resisting various attacks |
CN105453483A (en) * | 2013-06-13 | 2016-03-30 | 维萨国际服务协会 | Image based key derivation function |
CN103971318A (en) * | 2014-04-05 | 2014-08-06 | 海南大学 | 3D DWT-DFT (three-dimensional discrete wavelet transformation-discrete fourier transformation ) perceptual hash based digital watermarking method for volume data |
CN105426709A (en) * | 2015-11-12 | 2016-03-23 | 福建北卡科技有限公司 | JPEG image information hiding based private information communication method and system |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108174241B (en) * | 2017-12-22 | 2021-05-11 | 武汉益模科技股份有限公司 | Video playing encryption method and system |
CN108174241A (en) * | 2017-12-22 | 2018-06-15 | 武汉益模科技股份有限公司 | A kind of video playing encryption method and system |
CN108763895A (en) * | 2018-04-28 | 2018-11-06 | Oppo广东移动通信有限公司 | Image processing method and device, electronic equipment, storage medium |
CN108763895B (en) * | 2018-04-28 | 2021-03-30 | Oppo广东移动通信有限公司 | Image processing method and device, electronic equipment and storage medium |
CN109344947A (en) * | 2018-10-25 | 2019-02-15 | 福建昇兴云物联网科技有限公司 | Digital content generation method, two-dimensional code generation method and the recognition methods of two dimensional code |
CN111080726A (en) * | 2019-06-06 | 2020-04-28 | 广东小天才科技有限公司 | Picture transmission method and equipment |
CN111080726B (en) * | 2019-06-06 | 2023-05-23 | 广东小天才科技有限公司 | Picture transmission method and device |
CN112151048B (en) * | 2019-06-11 | 2024-04-02 | 李庆成 | Method for generating and processing audio-visual data |
CN112151048A (en) * | 2019-06-11 | 2020-12-29 | 李庆成 | Method for generating and processing audio-visual image data |
CN110930502A (en) * | 2019-12-03 | 2020-03-27 | 湖南国奥电力设备有限公司 | Underground cable three-dimensional modeling method and device based on pictures |
CN110930502B (en) * | 2019-12-03 | 2023-08-04 | 湖南国奥电力设备有限公司 | Underground cable three-dimensional modeling method and device based on pictures |
CN111476853A (en) * | 2020-03-17 | 2020-07-31 | 西安万像电子科技有限公司 | Method, equipment and system for encoding and decoding character image |
CN111476853B (en) * | 2020-03-17 | 2024-05-24 | 西安万像电子科技有限公司 | Method, equipment and system for encoding and decoding text image |
CN111698226B (en) * | 2020-05-28 | 2022-07-19 | 中国平安财产保险股份有限公司 | Method and device for verifying and selling ticket |
CN111698226A (en) * | 2020-05-28 | 2020-09-22 | 中国平安财产保险股份有限公司 | Method and device for verifying and selling ticket |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106022011A (en) | Image-based confidential information spreading method, device and system | |
Kamaruddin et al. | A review of text watermarking: theory, methods, and applications | |
Kumar et al. | A recent survey on multimedia and database watermarking | |
Bouslimi et al. | A joint encryption/watermarking system for verifying the reliability of medical images | |
Chang et al. | Privacy-preserving reversible information hiding based on arithmetic of quadratic residues | |
Bouslimi et al. | A crypto-watermarking system for ensuring reliability control and traceability of medical images | |
Sion et al. | On watermarking numeric sets | |
Zhang | Commutative reversible data hiding and encryption | |
CN100583750C (en) | Desynchronized fingerprinting method and system for digital multimedia data | |
Abood et al. | Audio steganography with enhanced LSB method for securing encrypted text with bit cycling | |
CN106251278A (en) | A kind of image encryption territory based on histogram feature reversible information hidden method | |
Singh et al. | A survey of digital watermarking techniques | |
Kaur et al. | An existential review on text watermarking techniques | |
CN104850765A (en) | Watermark processing method, device and system | |
CN103678960A (en) | Method and device for adding digital copyright information to data file | |
Xu et al. | Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification | |
CN110288504A (en) | It is a kind of to automatically add water impression method towards block chain digital education platform | |
Yari et al. | An overview and computer forensic challenges in image steganography | |
Alkhudaydi et al. | Integrating light-weight cryptography with diacritics Arabic text steganography improved for practical security applications | |
CN102164303B (en) | Video copyright protecting method, system and video distribution side's entity | |
CN101383701A (en) | Digital content protection method ciphered by biological characteristic | |
Alsaadi et al. | Text steganography in font color of MS excel sheet | |
Zhong et al. | A secure visual secret sharing scheme with authentication based on QR Code | |
US20190109710A1 (en) | System and method for randomizing hidden messages in digital files | |
Chaudhary et al. | An elucidation on steganography and cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |