CN106157231A - A kind of based on image information encryption and the decryption method of improving Arnold conversion and LSB - Google Patents

A kind of based on image information encryption and the decryption method of improving Arnold conversion and LSB Download PDF

Info

Publication number
CN106157231A
CN106157231A CN201610482879.7A CN201610482879A CN106157231A CN 106157231 A CN106157231 A CN 106157231A CN 201610482879 A CN201610482879 A CN 201610482879A CN 106157231 A CN106157231 A CN 106157231A
Authority
CN
China
Prior art keywords
image
frame
pixel
encryption
hiding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610482879.7A
Other languages
Chinese (zh)
Other versions
CN106157231B (en
Inventor
张迎周
卫学渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201610482879.7A priority Critical patent/CN106157231B/en
Publication of CN106157231A publication Critical patent/CN106157231A/en
Application granted granted Critical
Publication of CN106157231B publication Critical patent/CN106157231B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of based on image information encryption and the decryption method of improving Arnold conversion and LSB, first this method uses the Arnold conversion of improvement that image carries out pretreatment, then it is embedded in background image with LSB algorithm and constructs the new images containing encrypted image.Ciphering process is broadly divided into four big steps: calculates quantity of information, input key that background image can accommodate, and uses the Arnold conversion of improvement hiding frame to carry out pretreatment, the size of the hiding frame of storage, uses LSB algorithm to be embedded in background image by hiding frame.Decrypting process is broadly divided into three big steps: extracts hiding frame size, LSB algorithm extracts and hide frame, input key and the hiding frame after extracting is carried out Arnold inverse transformation deciphering.The present invention has been greatly reinforced the confidentiality of information.

Description

A kind of based on image information encryption and the decryption method of improving Arnold conversion and LSB
Technical field
The present invention relates to Information Hiding Techniques field, a kind of based on the image letter improving Arnold conversion and LSB Encryption for information and decryption method.
Background technology
Information Hiding Techniques (Steganography technique) is to add for image inside information security research field Close hiding a kind of technology.Also it is the solution party of the typical concealed access issues of one of them in computer application field simultaneously Case, in military field, the information encryption transmission field such as information disguising has a wide range of applications.
For this problem of Information Hiding Techniques, present stage air space algorithm the most sometimes and two kinds of solution party of transform-domain algorithm Case.But both are due to shortcoming inherently, can not well be directly used in the actual application that image information is hidden.Time The information that spatial domain major defect is hiding is easily detected, although and transform domain encryption technology is relatively preferable, but information The capacity hidden is little, and is limited by the pixel distribution of image.
Although the research of image information concealing technology is extensively, but the most not yet there is a kind of perfect solution, and And the hiding scheme that uses for different application scenarios is the most different.2007, Shao Li equality people " two dimension non equilateral image put Disorderly conversion " literary composition discusses the Arnold conversion several algorithms for non equilateral image enciphering transformation of improvement;2012, the summer Illuminate et al. then discusses present stage image concealing analytical technology in " Information Hiding Analysis based on image summary " literary composition Development, introduce for embedded in the method for the detection of the image of secret information.The Information hiding purpose master of image at present If preventing from being detected, being cracked out;But how to carry out anti-detection, anti-cracking is to go back problem demanding prompt solution at present.
Summary of the invention
The technical problem to be solved is to overcome the deficiencies in the prior art, and provides a kind of based on improving Arnold The image information encryption of conversion and LSB and decryption method, utilize the Arnold conversion the improved hiding hum pattern to needing steganography As converting, LSB algorithm is then utilized hiding frame to be embedded in background image image after generation encryption, after encryption Image and background image cannot be differentiated from naked eyes;After only needing encryption during deciphering, image just sub-argument can go out hiding frame.
The present invention solves above-mentioned technical problem by the following technical solutions:
A kind of based on improvement Arnold conversion and LSB the image information encryption proposed according to the present invention and decryption method, Comprise the following steps:
Step 1, loading background image, and calculate this background image open ended maximum pixel number;If hiding hum pattern The pixel count of picture exceedes maximum pixel number, then user carries out cutting to hiding frame;
The Arnold conversion that step 2, employing improve carries out pretreatment to hiding frame;Specific as follows:
Step 2.1), user input numerical value key1, key2 of 2 keys, key1 and key2 is positive integer;
Step 2.2), user select any one in following cipher mode that hiding frame is encrypted:
The first cipher mode: the new coordinate of each hiding frame pixel is (x ', y '), wherein: x '=(x+ Key2*y), y '=y;
The second cipher mode: the new coordinate of each hiding frame pixel is (x ', y '), wherein, x '=x, y ' =(key2*x+y);Wherein, (x y) is the original pixels coordinate of hiding frame needing encryption;
Then x ', y ' carry out complementation: x to the width A.width and height A.height of hiding frame respectively " =x ' mod A.width;Y "=y ' mod A.height;
Step 2.3), by original coordinate be (x, pixel y) move new pixel (x ", y ") place;
Step 2.4), repeated execution of steps 2.2)-step 2.3) key1 time;
Step 3, the size of hiding frame is stored in the beginning of background image;
Step 4, will through the pretreated hiding frame of step 2 use LSB algorithm be embedded in background image, from And generate the image after encryption;
Frame size is hidden in step 5, extraction;
Step 6, by LSB algorithm extract hide frame;
Step 7, user input key and the hiding frame after extracting are carried out Arnold inverse transformation deciphering, thus extensive Answer the initial data of hiding frame.
Enter as a kind of image information encryption based on improvement Arnold conversion and LSB of the present invention and decryption method One-step optimization scheme, described step 3 is specific as follows:
Step 3.1), traversal background image front 4 pixels, each pixel comprises 3 bytes;First by hiding hum pattern Height A.height every 2bit mono-assembling and dismantling of picture divide, and the most directly replace in background image each byte in front 6 bytes Most end 2bit;
Step 3.2), width A.width every 2bit mono-assembling and dismantling of hidden image A are divided, the most directly replace background Most end 2bit of each byte in rear 6 bytes in image.
Enter as a kind of image information encryption based on improvement Arnold conversion and LSB of the present invention and decryption method One-step optimization scheme, described step 4 is specific as follows:
Step 4.1), skip the size memory block of the hiding frame of front 4 pixels of background image, to hiding information Image carries out LSB encryption;If primary iteration number of times i=1;
Step 4.2), take out the i-th byte hidden in frame successively, leave the highest 2bit of this byte in the back of the body In the last 2bit of the 1st byte of (4+i) individual pixel of scape image, directly replace (4+i) individual pixel of background image The last 2bit of the 1st byte;
Step 4.3), then take out the 6th of this byte, the data of the 5th be placed on (4+i) individual pixel of background image The 2nd byte last 2bit in;
Step 4.4), when i less than hide frame all byte quantity, then i=i+1, repeat step 4.2)-step 4.4);Until all bytes of hiding frame being all placed in background image, thus generate image after encryption.
Enter as a kind of image information encryption based on improvement Arnold conversion and LSB of the present invention and decryption method One-step optimization scheme, described step 5 is specific as follows:
Step 5.1), load encryption after image to internal memory;
Step 5.2), extract front 4 pixel datas of image after encryption, wherein, according to encryption principle, front 2 pixels For the altitude information of image, rear 2 pixels are the width data of image;In front 2 pixels, each pixel the most directly carries Taking most end 2bit of the most each byte, be then stitched together and form the numerical value of 12bit, this numerical value hides frame exactly Height number A.height;
Step 5.3), extract rear 2 pixel datas in front 4 pixels of image after encryption, in rear 2 pixels, often Most end 2bit of the most each byte of individual pixel extracting directly in order, and direct splicing becomes the numerical value of 12bit in order, should Numerical value is exactly the width numerical value A.width hiding frame.
Enter as a kind of image information encryption based on improvement Arnold conversion and LSB of the present invention and decryption method One-step optimization scheme, described step 6 is specific as follows:
Step 6.1), skip front 4 pixels of image after encryption;
Step 6.2) from the beginning of the 5th pixel of the image after encryption, by most end 2bit of each byte of each pixel Extract and splice in order, the hiding frame after ultimately generating with improvement Arnold conversion.
Enter as a kind of image information encryption based on improvement Arnold conversion and LSB of the present invention and decryption method One-step optimization scheme, described step 7 is specific as follows:
Step 7.1) if the first cipher mode, then according to formula x1=(x "-key2*y "), y1=y " carries out figure As Arnold inverse transformation is deciphered;If the second cipher mode, then according to formula x1=x ", y1=(-key2*x "+y ") enters Row image Arnold inverse transformation is deciphered;
Step 7.2), then the width A.width of hiding frame and height A.height is taken by x1, y1 respectively Remaining computing: x=x1 mod A.width, y=y1mod A.height;If x < 0, x=x+A.width, if y < 0, y= y+A.height;
Step 7.3), repeated execution of steps 7.1) to step 7.2) key1 time, thus recovered hiding frame Initial data.
The present invention uses above technical scheme compared with prior art, has following technical effect that
(1) Arnold conversion is used in the middle of image information concealing technology;
(2) LSB algorithm is used to combine Arnold conversion embedded images so that hiding information capacity is bigger, and due to Present random arrangement after image conversion, comprise hiding information therefore, it is difficult to be detected;
(3) user is encrypted by the form of 3 keys, has been greatly reinforced the confidentiality of information;
(4) after encryption, image has certain anti-damage ability, loses certain Pixel Information and hides frame still Can be resumed;
(5) using the Arnold conversion algorithm improved, can be encrypted non-isometric image, tradition Arnold can only Rectangular image is encrypted scramble.
Accompanying drawing explanation
Fig. 1 is the encryption and decryption schematic diagram of the present invention.
Fig. 2 is the flow chart of the ciphering process of the present invention.
Fig. 3 is the flow chart of the decrypting process of the present invention.
Fig. 4 is the logic chart of the LSB storage data that this method uses.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the accompanying drawings and the specific embodiments Describe the present invention.
Describing for convenience, the major variable in simple definition algorithm is: hides frame A, background image B, embeds Image C after the encryption of rear generation, wherein represents the height of image with height, and width represents the width of image, A.width table Showing the width of A image, A.height represents the height of A image.B, C image is also same.Wherein user needs the key of input to have two Individual, key key1 and key key2, encrypted location is No. 1 or No. 2;
Fig. 1 is the encryption and decryption schematic diagram of the present invention, and first this method uses the Arnold conversion of improvement to carry out pre-to image Process, then it is embedded in background image with LSB algorithm and constructs the new images containing encrypted image.Ciphering process is main It is divided into four big steps: calculate quantity of information, input key that background image can accommodate, and use the Arnold conversion pair of improvement Hiding frame carries out pretreatment, the size of frame is hidden in storage, use LSB algorithm to be embedded into by hiding frame In background image.Decrypting process is broadly divided into three big steps: extracts and hides frame size, by the hiding letter of LSB algorithm extraction Breath image, input key also carry out Arnold inverse transformation deciphering to the hiding frame after extracting.
Fig. 2 is the flow chart of the ciphering process of the present invention, and encrypting step is:
Step 1) load background image B, and estimate this background image B and can accommodate great hiding information:
Step 1.1) by formulaCalculate the maximum pixel number of open ended hiding frame;
Step 1.2) if the pixel count hiding frame A is not above the maximum pixel that previous step is calculated Number, then perform next step, otherwise, need user that hiding frame A is carried out cutting.
Step 2) use the Arnold conversion improved that hiding frame A carries out pretreatment:
Step 2.1) user inputs the numerical value of 2 keys, key1 and key2, is positive integer;
Step 2.2) user's Choice encryption position is No. 1 or No. 2;Key1, key2 and encrypted location user can not lose, Also need three values all correctly could recover during original image;Wherein key1 is as the number of transitions of Arnold conversion;
Step 2.3) hiding hum pattern A picture is taked the Arnold conversion after improving, if user's Choice encryption position is 1 Number position, new x coordinate and the new y-coordinate computing formula of the most each image pixel be: x '=(x+key2*y), y '=y, as Really user's Choice encryption position is No. 2 positions, and new x coordinate and the new y-coordinate computing formula of the most each image pixel be: x ' =x, y '=(key2*x+y), then the width A.width and height A.height of hiding frame is carried out by x ', y ' respectively Complementation: x "=x ' mod A.width;Y "=y ' mod A.height;
Step 2.4) obtain new coordinate (x ", " after), by original, (x, y) pixel of coordinate moves new pixel to y Point (x ", y ") place;
Step 2.5) according to the numerical values recited repeated execution of steps 2.3 of key1) to step 2.4) key1 time;
Step 3) size of hiding frame A is stored in the beginning of background image B:
Step 3.1) traversal front 4 pixels of background image B, after being loaded into internal memory due to image, each pixel comprises 3 bytes, The most corresponding channel B, G passage, R passage (blue channel, green passage, red passage).Because 4 pixels amount to 12 bytes before this.Owing to repairing Most end 2bit changing each byte has no effect on the quality of image, and user's naked eyes cannot be differentiated, therefore, and the most end of each byte 2bit can be used to store data.First the width A.height of hiding frame A is stored in front 2 pixels (the most front 6 words Joint), the most each byte can deposit 2bit data, the most altogether 12bit, the highest deposits 212-1=4095 pixels tall, storage side Formula is height A.height every 2bit mono-assembling and dismantling of hiding frame A to be divided, and the most directly replaces 6 words before background image Every byte most end 2bit of joint;
Step 3.2) the width A.width of hidden image A is stored in rear 2 pixels (6 bytes after i.e.), it neutralizes front 6 words As joint, each byte 2bit data, 12bit the most altogether, the highest deposits 212The hiding frame of-1=4095 pixels tall. Storage mode and step 3.1) in hide frame A height A.height storage mode the same;
Step 4) the hiding frame A after Arnold conversion is embedded in background image B:
Step 4.1) skip the hidden image A size memory block of front 4 pixels of background image B, start image is carried out LSB encrypts.First take out 1 byte (8bit) (being designated as t) of hidden image A, leave the highest 2bit of this t byte in Background In the last 2bit of the 1st byte of the 5th pixel of picture B, directly replace the end of the 5th the 1st byte of pixel of background image B 2bit。
Step 4.2) then take out the second highest 2bit of t, 6,5 bit data are placed on the 2nd of the 5th pixel of background image In the last 2bit of byte, by that analogy, until all bytes of hiding frame A are all put in background image.So It is generated as image C after encryption.
Step 5) image C after encryption is preserved.
Fig. 3 is the flow chart of the decrypting process of the present invention, and decryption step is:
Step 1) extract and hide frame size:
Step 1.1) load encryption after image C to internal memory.
Step 1.2) extract front 4 pixel datas of image C after encryption, wherein, according to encryption principle, front 2 pixels are figure The altitude information of picture, rear 2 pixels are the width data of image.In front 2 pixels, each pixel extracting directly in order is wherein Most end 2bit of each byte, is then stitched together and forms the numerical value of 12bit, and this numerical value is exactly the height hiding frame Numerical value A.height;
Step 1.3) rear 2 pixel datas that extract after encryption in front 4 pixels of image C and according to step 1.2) method The most end 2bit direct splicing in order extracting the most each byte becomes the numerical value of 12bit, and this numerical value hides frame exactly Width numerical value Awidth;
Step 2) extract and hide frame:
Step 2.1) skip front 4 pixels of image after encryption;
Step 2.2) from the beginning of the 5th pixel, most end 2bit of each byte of each pixel (3 bytes) extracts Splice;1st byte-extraction most end 2bit data of the first the 5th pixel are to the 1st of the 1st pixel hiding frame A the The 7 of byte, 8;
Step 2.3) extract the most end 2bit data of the 5th pixel the 2nd byte the 1st pixel to hiding frame A 5,6 of 1st byte,
Step 2.4) by that analogy, extract (8bit correspondence 1 after the 1st byte of hiding the 1st pixel of frame A Individual byte), extract the 2nd byte, extract also according to order, until the pixel of all of hiding frame extracts complete, That hides frame is sized at step 1.2) and step 1.3) size that extracts;Ultimately generate with improving Arnold Hiding frame A after conversion;
Step 3) the hiding frame A after extracting is carried out Arnold inverse transformation deciphering:
Step 3.1) user inputs 2 keys key1, key2 and an encrypted location;
Step 3.2) if No. 1 position, then according to formula x1=(x "-key2*y "), y1=y " carries out image Arnold Inverse transformation is deciphered, if No. 2 positions are then according to formula x1=x ", y1=(-key2*x "+y ") carries out image Arnold contravariant Change deciphering;
Step 3.3) then the width A.width and height A.height of hiding frame is taken by x1, y1 respectively Remaining computing: x=x1 mod A.width;Y=y1 mod A.height;If x < 0, x=x+A.width, if y < 0, y =y+A.height;
Step 3.4) according to the numerical value repeated execution of steps 3.2 of key key1) to step 3.3) key1 time, thus recover The initial data of hiding frame;
Step 4) hiding frame is preserved, resume work.
Above in conjunction with accompanying drawing, embodiments of the present invention are explained in detail, but the present invention is not limited to above-mentioned enforcement Mode, in the ken that those of ordinary skill in the art are possessed, it is also possible on the premise of without departing from present inventive concept Make a variety of changes.
Fig. 4 is the LSB algorithm core concept in the decrypting process of the present invention:
It can be seen that LSB algorithm of the present invention deciphering thought is the last position 2bit number of each byte taking out each pixel Replace by binary form by the data needing embedding according to by them.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art in the technical scope that the invention discloses, the change that can readily occur in or replacement, all answer Contain within the scope of the present invention.

Claims (6)

1. encrypt and decryption method based on the image information improving Arnold conversion and LSB for one kind, it is characterised in that include following Step:
Step 1, loading background image, and calculate this background image open ended maximum pixel number;If hiding frame Pixel count exceedes maximum pixel number, then user carries out cutting to hiding frame;
The Arnold conversion that step 2, employing improve carries out pretreatment to hiding frame;Specific as follows:
Step 2.1), user input numerical value key1, key2 of 2 keys, key1 and key2 is positive integer;
Step 2.2), user select any one in following cipher mode that hiding frame is encrypted:
The first cipher mode: the new coordinate of each hiding frame pixel is (x ', y '), wherein: x '=(x+key2* Y), y '=y;
The second cipher mode: the new coordinate of each hiding frame pixel is (x ', y '), wherein, x '=x, y '= (key2*x+y);Wherein, (x y) is the original pixels coordinate of hiding frame needing encryption;
Then x ', y ' carry out complementation respectively to the width A.width of hiding frame and height A.height: x "=x ' mod A.width;Y "=y ' mod A.height;
Step 2.3), by original coordinate be (x, pixel y) move new pixel (x ", y ") place;
Step 2.4), repeated execution of steps 2.2)-step 2.3) key1 time;
Step 3, the size of hiding frame is stored in the beginning of background image;
Step 4, LSB algorithm will be used to be embedded in background image through the pretreated hiding frame of step 2, thus raw Become the image after encryption;
Frame size is hidden in step 5, extraction;
Step 6, by LSB algorithm extract hide frame;
Step 7, user input key and the hiding frame after extracting are carried out Arnold inverse transformation deciphering, thus recovering Hide the initial data of frame.
A kind of image information encryption based on improvement Arnold conversion and LSB the most according to claim 1 and decryption method, It is characterized in that, described step 3 is specific as follows:
Step 3.1), traversal background image front 4 pixels, each pixel comprises 3 bytes;First by hiding frame Highly A.height every 2bit mono-assembling and dismantling divide, and the most directly replace in background image in front 6 bytes each byte End 2bit;
Step 3.2), width A.width every 2bit mono-assembling and dismantling of hidden image A are divided, the most directly replace background image In most end 2bit of each byte in rear 6 bytes.
A kind of image information encryption based on improvement Arnold conversion and LSB the most according to claim 2 and decryption method, It is characterized in that, described step 4 is specific as follows:
Step 4.1), skip the size memory block of the hiding frame of front 4 pixels of background image, to hiding frame Carry out LSB encryption;If primary iteration number of times i=1;
Step 4.2), take out the i-th byte hidden in frame successively, leave the highest 2bit of this byte in Background In the last 2bit of the 1st byte of (4+i) individual pixel of picture, directly replace (4+i) individual pixel the 1st of background image The last 2bit of byte;
Step 4.3), then take out the 6th of this byte, the data of the 5th be placed on background image (4+i) individual pixel In the last 2bit of 2 bytes;
Step 4.4), when i less than hide frame all byte quantity, then i=i+1, repeat step 4.2)-step 4.4);Until all bytes of hiding frame being all placed in background image, thus generate image after encryption.
A kind of image information encryption based on improvement Arnold conversion and LSB the most according to claim 3 and decryption method, It is characterized in that, described step 5 is specific as follows:
Step 5.1), load encryption after image to internal memory;
Step 5.2), extract front 4 pixel datas of image after encryption, wherein, according to encryption principle, front 2 pixels are figure The altitude information of picture, rear 2 pixels are the width data of image;In front 2 pixels, each pixel extracting directly in order its In most end 2bit of each byte, be then stitched together and form the numerical value of 12bit, this numerical value is exactly the height hiding frame Number of degrees value A.height;
Step 5.3), extract rear 2 pixel datas in front 4 pixels of image after encryption, in rear 2 pixels, each picture Most end 2bit of the element the most each byte of extracting directly in order, and direct splicing becomes the numerical value of 12bit in order, this numerical value It is exactly the width numerical value A.width hiding frame.
A kind of image information encryption based on improvement Arnold conversion and LSB the most according to claim 4 and decryption method, It is characterized in that, described step 6 is specific as follows:
Step 6.1), skip front 4 pixels of image after encryption;
Step 6.2) from the beginning of the 5th pixel of the image after encryption, most end 2bit of each byte of each pixel is extracted Splice the most in order, the hiding frame after ultimately generating with improvement Arnold conversion.
A kind of image information encryption based on improvement Arnold conversion and LSB the most according to claim 4 and decryption method, It is characterized in that, described step 7 is specific as follows:
Step 7.1) if the first cipher mode, then according to formula x1=(x "-key2*y "), y1=y " carries out image Arnold inverse transformation is deciphered;If the second cipher mode, then according to formula x1=x ", y1=(-key2*x "+y ") is carried out Image Arnold inverse transformation is deciphered;
Step 7.2), then x1, y1 carry out remainder fortune to the width A.width of hiding frame and height A.height respectively Calculate: x=x1mod A.width, y=y1mod A.height;If x < 0, x=x+A.width, if y < 0, y=y+ A.height;
Step 7.3), repeated execution of steps 7.1) to step 7.2) key1 time, thus recovered the original of hiding frame Data.
CN201610482879.7A 2016-06-27 2016-06-27 A kind of image information encryption and decryption method based on improvement Arnold conversion and LSB Active CN106157231B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610482879.7A CN106157231B (en) 2016-06-27 2016-06-27 A kind of image information encryption and decryption method based on improvement Arnold conversion and LSB

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610482879.7A CN106157231B (en) 2016-06-27 2016-06-27 A kind of image information encryption and decryption method based on improvement Arnold conversion and LSB

Publications (2)

Publication Number Publication Date
CN106157231A true CN106157231A (en) 2016-11-23
CN106157231B CN106157231B (en) 2018-11-27

Family

ID=57350059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610482879.7A Active CN106157231B (en) 2016-06-27 2016-06-27 A kind of image information encryption and decryption method based on improvement Arnold conversion and LSB

Country Status (1)

Country Link
CN (1) CN106157231B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107634965A (en) * 2017-10-15 2018-01-26 天津飞眼无人机科技有限公司 The hidden biography system for the information that unmanned plane obtains
CN108805786A (en) * 2017-05-05 2018-11-13 北京大学 Steganalysis method and device are matched based on least significant bit
CN110780834A (en) * 2019-10-31 2020-02-11 深圳云里物里科技股份有限公司 Method, system and device for locally updating picture of display equipment
CN113452688A (en) * 2021-06-24 2021-09-28 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105118018A (en) * 2015-08-17 2015-12-02 安徽大学 An image hiding method based on a video carrier and under an off-line controllable mechanism
CN105303512A (en) * 2015-09-18 2016-02-03 安徽大学 Video dual watermark method based on SVD and QR codes

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105118018A (en) * 2015-08-17 2015-12-02 安徽大学 An image hiding method based on a video carrier and under an off-line controllable mechanism
CN105303512A (en) * 2015-09-18 2016-02-03 安徽大学 Video dual watermark method based on SVD and QR codes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GIRISH 等: "Encryption of an Image Using Least Significant Bit Substitution Method and Arnold Transformation", 《INTERNATIONAL JOURNAL OF COMBINED RESEARCH & DEVELOPMENT(IJCRD)》 *
朱宁: "Arnold加密算法改进", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
陈中 等: "基于Arnold变换的改进LSB水印嵌入方法研究", 《衡阳师范学院学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805786A (en) * 2017-05-05 2018-11-13 北京大学 Steganalysis method and device are matched based on least significant bit
CN108805786B (en) * 2017-05-05 2022-05-10 北京大学 Steganalysis method and device based on least significant bit matching
CN107634965A (en) * 2017-10-15 2018-01-26 天津飞眼无人机科技有限公司 The hidden biography system for the information that unmanned plane obtains
CN107634965B (en) * 2017-10-15 2023-09-01 天津飞眼无人机科技有限公司 Hidden transmission system for information acquired by unmanned aerial vehicle
CN110780834A (en) * 2019-10-31 2020-02-11 深圳云里物里科技股份有限公司 Method, system and device for locally updating picture of display equipment
CN113452688A (en) * 2021-06-24 2021-09-28 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms
CN113452688B (en) * 2021-06-24 2022-07-08 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms

Also Published As

Publication number Publication date
CN106157231B (en) 2018-11-27

Similar Documents

Publication Publication Date Title
Chai et al. TPE-GAN: Thumbnail preserving encryption based on GAN with key
CN107809644B (en) A kind of encryption area image reversible data concealing method of double-encryption
Li et al. Chaotic image encryption using pseudo-random masks and pixel mapping
Rawat et al. A steganography technique for hiding image in an image using lsb method for 24 bit color image
CN104751401B (en) A kind of novel Piecewise linear chaotic map image encryption and coding method
CN106157231A (en) A kind of based on image information encryption and the decryption method of improving Arnold conversion and LSB
CN107103631A (en) Encrypted domain reversible information hidden method based on classification scramble and hiding information classification
CN103778590A (en) Method and device for utilizing digital image to store and transmit information
CN103440613B (en) The color image encrypting method of hyperchaos Rossler system
Gamido et al. Implementation of modified AES as image encryption scheme
CN109547663A (en) A kind of improvement LSB image latent writing method of combining cipher
CN107070649A (en) A kind of big file selective cryptographic method for reducing write-in
CN112906043A (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
Wang et al. Study on image encryption algorithm based on arnold transformation and chaotic system
Sajitha et al. Review on various image encryption schemes
CN105872305B (en) A kind of completely separable encryption area image reversible data concealing method
Li et al. An image encryption method based on tent and Lorenz chaotic systems
Gutiérrez-Cárdenas Secret key steganography with message obfuscation by pseudo-random number generators
Bin et al. Image encryption algorithm based on chaotic map and S-DES
Abu-Alhaija Crypto-Steganographic LSB-based System for AES-Encrypted Data
Choudhary et al. An improved pixel sieve method for visual cryptography
Xu et al. An information hiding algorithm based on bitmap resource of portable executable file
Li et al. An optical image encryption scheme based on depth-conversion integral imaging and chaotic maps
Fadhil Accelerating Concealed ISB Steganography and triple-DES encryption using massive parallel GPU
Lan et al. A Color Image Encryption Algorithm Based on Improved DES

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant