CN107169914B - A kind of cipher-text information generation method for image latent writing - Google Patents

A kind of cipher-text information generation method for image latent writing Download PDF

Info

Publication number
CN107169914B
CN107169914B CN201710341821.5A CN201710341821A CN107169914B CN 107169914 B CN107169914 B CN 107169914B CN 201710341821 A CN201710341821 A CN 201710341821A CN 107169914 B CN107169914 B CN 107169914B
Authority
CN
China
Prior art keywords
key
information
cipher
optimal
steganography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710341821.5A
Other languages
Chinese (zh)
Other versions
CN107169914A (en
Inventor
李亚峰
陈贞佐
杨任尔
郑紫微
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo University
Zhejiang Business Technology Institute
Original Assignee
Ningbo University
Zhejiang Business Technology Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo University, Zhejiang Business Technology Institute filed Critical Ningbo University
Priority to CN201710341821.5A priority Critical patent/CN107169914B/en
Publication of CN107169914A publication Critical patent/CN107169914A/en
Application granted granted Critical
Publication of CN107169914B publication Critical patent/CN107169914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The present invention relates to a kind of cipher-text information generation method for image latent writing, by original private information block, using the 2 of generationlThe key that a length is l carries out exclusive or encryption, obtained cipher-text information is embedded into the test carrier image being pre-selected, obtain different test hidden images, then steganography performance is evaluated according to test carrier image from different hidden images, obtain steganography performance it is optimal when key used in secret information, optimal key using the key as secret information, original private information and optimal key are subjected to exclusive or encryption, the cipher-text information of original private information is obtained, obtains the final cipher-text information for carrying out steganography.Compared with prior art, the advantage of the invention is that:The performance of steganographic system gets a promotion after searching for the optimal key of secret information, in addition the computation complexity with relatively low encryption, decryption, suitable for being used on mobile terminal.

Description

A kind of cipher-text information generation method for image latent writing
Technical field
The present invention relates to a kind of cipher-text information generation method for image latent writing.
Background technology
Steganography is using the redundancy and human sensory's redundancy in the multimedias such as text, sound, image and video, letter Breath is hidden in multimedia, the covert communications for sending out to realize by public network.Steganography not only conceals communication Content, while the fact that conceal communication.Due to a large amount of presence of network epigraph and the redundancy of view data it is big, can be embedding Enter secret information capacity it is also big the features such as, the Steganography of mainstream is using image as carrier at present.The mesh of image latent writing algorithm Be in secret information embedded images as much as possible, do not found by steganalysis person, thus vision can not perceptual performance, Anti- statistic mixed-state, hidden capacity are the most important performances of image latent writing system.It is adapted to using the embedded scheme of improvement, or selection Steganography carrier, or the performance of steganographic system can be improved to strategies such as secret information pretreatments.
Experiment can verify that secret information passes through the steganographic system of des encryption pretreatment, for LSB class steganographic algorithms, comment The index histogram distortion of the anti-statistic mixed-state of valency steganographic system and security has a distinct increment with relative entropy;And become for DCT Change the steganographic algorithm in domain, the steganographic algorithm situation based on run length steganographic algorithm, based on improved pixel difference and diamond shape coding It is uncertain.Be embedded into by the secret information of des encryption in the carrier image having, the anti-statistic mixed-state of steganographic system and Security can be lifted, but be embedded into the anti-statistic mixed-state of the steganographic system for the carrier image having and security and can be reduced on the contrary. This illustrates that encrypted secret information is the bit stream for having pseudo-random characteristics, it can be improved for the steganographic system having The anti-statistic mixed-state and security of steganographic system, but the anti-of steganographic system can be reduced on the contrary for other steganographic system Statistic mixed-state, therefore it is not the bit stream of optimal distribution, that is to say, that we can not individually judge a bit flow distribution It is whether good and bad.This uncertain potential possibility for also having contained the raising anti-statistic mixed-state of steganographic system in fact, for secret The pretreatment of secret letter encryption for information does not bring gain in performance to system, then has other random characters distribution bit stream may The anti-statistic mixed-state of steganographic system can be made to increase, this must just consider two other factor of steganographic system: Steganographic algorithm and carrier image, put forward the high performance advantage for being secret information at all and whether giving full play to steganographic algorithm, reach With the seamless optimum matching relation merged or be similar to seamless fusion of carrier image, and reaching this optimum matching relation can lead to Cross and suitable pretreatment is carried out to secret information.
The content of the invention
The technical problems to be solved by the invention are to provide a kind of ciphertext for image latent writing for the above-mentioned prior art Information generating method.
Technical solution is used by the present invention solves above-mentioned technical problem:A kind of cipher-text information for image latent writing is given birth to Into method, it is characterised in that:Include the following steps:
Step (1), original private information block:Original private information is carried out the encoded translated bit stream into length for n, With A=(e1,e2,…,en) represent, wherein eiThe bit stream that length is n, is then divided into length by ∈ { 0,1 }, i=1,2 ..., n For the k groups of l, wherein k=n/l, is grouped later bit stream A=(A1,A2,…,Ak), wherein m groups secret information is Am= (el(m-1)+1,el(m-1)+2,…,el(m-1)+l), m=1,2 ..., k;
Step (2), generation 2lA length is the key of l:Respectively 0,1 ..., 2l- 1 totally 2lIt is l's that number, which changes into length, Binary number is as 2lA key, wherein x-th of key keyx=(ex1,ex2,…,exl) represent, wherein exh∈ { 0,1 }, x =1,2 ..., 2l, h=1,2 ..., l;
Step (3), encrypt original private information:By whole k groups secret informations in original private information respectively with step Suddenly the 2 of (2) generationlA key carries out exclusive or encryption in the key that a length is l, produces a version of original private information Cipher-text information;Using same method, using remaining 2l- 1 key is secret to whole k groups in original private information respectively Information carry out exclusive or encryption, obtain original private information remaining 2lThe cipher-text information of -1 version;
Step (4), obtain step (3) 2lThe cipher-text information of a version is respectively embedded in the test carrier being pre-selected In image, 2 are respectively obtainedlThe test hidden image of a version, then assesses 2 according to test carrier imagelThe test of a version The steganography performance of hidden image, obtain steganography performance it is optimal when key used in original private information, using the key as original The optimal key of beginning secret information;
Step (5), the optimal key for obtaining original private information and step (4) carry out exclusive or encryption, obtain original secret The cipher-text information of confidential information;
Step (6), the cipher-text information using the cipher-text information that step (5) obtains as final progress steganography.
As an improvement, the optimal key of original secret information obtains in the following way in the step (4):
Step (4-1), set three parameters:The numbering j, optimal steganography performance parameter ξ of test keyMost preferablyIt is optimal with obtaining The numbering J of steganography performance parameter counterpart keysMost preferably;By j and JMost preferablyInitial value be set to 1, optimal steganography performance parameter ξMost preferablyValue Need to preset according to test steganography performance index;
Original private information, is used j-th of key progress exclusive or encryption by step (4-2), obtains the ciphertext letter of jth version Breath;
The cipher-text information of jth version, be embedded into the test carrier image being pre-selected by step (4-3), obtains jth version This test hidden image;
Step (4-4), the comparison for testing hidden image and test carrier image by jth version, obtain jth version Test the evaluation and test steganography performance ξ of hidden imagej, judge ξjWhether better than the optimal steganography performance parameter value set in step (4-1) ξMost preferably;If ξjBetter than ξMost preferably, then by ξjIt is assigned to ξMost preferably, and j is assigned to JMost preferably;Otherwise existing ξ is keptMost preferablyAnd JMost preferablyIt is constant;
Step (4-5), judge whether j is less than 2l, if so, (4-6) is performed, if not, output JMost preferablyAfter terminate;
Step (4-6), by the value of j add 1, repeats step (4-2) to step (4-5).
Compared with prior art, the advantage of the invention is that:Lead in the cipher-text information generation method for image latent writing The optimal key of search secret information is crossed, this method has preferable universality, suitable for every kind of steganographic algorithm, by search Steganography performance can be improved after the optimal key of secret information, the computation complexity in addition decrypted is relatively low, is also applied for mobile communication Terminal.
Brief description of the drawings
Fig. 1 is the structure diagram for the cipher-text information generation method for being used for image latent writing in the embodiment of the present invention;
Fig. 2 is the flow diagram that the optimal key in secret information is searched in Fig. 1 systems.
Embodiment
The present invention is described in further detail below in conjunction with attached drawing embodiment.
A kind of cipher-text information generation method for image latent writing in the present invention as shown in Figure 1, it is characterised in that:Including Following steps:
Step (1), original private information block:Original private information is carried out the encoded translated bit stream into length for n, With A=(e1,e2,…,en) represent, wherein eiThe bit stream that length is n, is then divided into length by ∈ { 0,1 }, i=1,2 ..., n For the k groups of l, wherein k=n/l, is grouped later bit stream A=(A1,A2,…,Ak), wherein m groups secret information is Am= (el(m-1)+1,el(m-1)+2,…,el(m-1)+l), m=1,2 ..., k;
Step (2), generation 2lA length is the key of l:Respectively 0,1 ..., 2l- 1 totally 2lIt is l's that number, which changes into length, Binary number is as 2lA key, wherein x-th of key keyx=(ex1,ex2,…,exl) represent, wherein exh∈ { 0,1 }, x =1,2 ..., 2l, h=1,2 ..., l;
Step (3), encrypt original private information:By whole k groups secret informations in original private information respectively with step Suddenly the 2 of (2) generationlA key carries out exclusive or encryption in the key that a length is l, produces a version of original private information Cipher-text information;Using same method, using remaining 2l- 1 key is secret to whole k groups in original private information respectively Information carry out exclusive or encryption, obtain original private information remaining 2lThe cipher-text information of -1 version;
Step (4), obtain step (3) 2lThe cipher-text information of a version is respectively embedded in the test carrier being pre-selected In image, 2 are respectively obtainedlThe test hidden image of a version, then assesses 2 according to test carrier imagelThe test of a version The steganography performance of hidden image, obtain steganography performance it is optimal when key used in original private information, using the key as original The optimal key of beginning secret information;
Step (5), the optimal key for obtaining original private information and step (4) carry out exclusive or encryption, obtain original secret The cipher-text information of confidential information;
Step (6), the cipher-text information using the cipher-text information that step (5) obtains as final progress steganography.
Referring to Fig. 2, the optimal key of original secret information, obtains in the following way in the step (4):
Step (4-1), set three parameters:The numbering j, optimal steganography performance parameter ξ of test keyMost preferablyIt is optimal with obtaining The numbering J of steganography performance parameter counterpart keysMost preferably;By j and JMost preferablyInitial value be set to 1, optimal steganography performance parameter ξMost preferablyValue Need to preset according to test steganography performance index;
Original private information, is used j-th of key progress exclusive or encryption by step (4-2), obtains the ciphertext letter of jth version Breath;
The cipher-text information of jth version, be embedded into the test carrier image being pre-selected by step (4-3), obtains jth version This test hidden image;
Step (4-4), the comparison for testing hidden image and test carrier image by jth version, obtain jth version Test the evaluation and test steganography performance index ξ of hidden imagej, judge ξjWhether refer to better than the optimal steganography performance set in step (4-1) Mark ξMost preferably;If ξjBetter than ξMost preferably, then by ξjIt is assigned to ξMost preferably, and j is assigned to JMost preferably;Otherwise existing ξ is keptMost preferablyAnd JMost preferablyIt is constant;
Step (4-5), judge whether j is less than 2l, if so, (4-6) is performed, if not, output JMost preferablyAfter terminate;
Step (4-6), by the value of j add 1, repeats step (4-2) to step (4-5).
Evaluation and test steganography performance index ξ in step (4-4)jParameter have very much, such as secret information embedded quantity, carrier image With the histogram distortion of hidden image;When secret information embedded quantity is more, and the histogram of carrier image and hidden image loses Very more hour, steganography performance are more excellent;When hidden image after embedded secret information is not easy to be detected, steganography performance is better, Can be by comparing evaluation and test steganography performance index ξjIn parameter judge whether better than setting optimal steganography performance parameter value.

Claims (1)

  1. A kind of 1. cipher-text information generation method for image latent writing, it is characterised in that:Include the following steps:
    Step (1), original private information block:Original private information is carried out the encoded translated bit stream into length for n, uses A =(e1,e2,…,en) represent, wherein ei∈ { 0,1 }, i=1,2 ..., n, it is l that the bit stream that length is n, which is then divided into length, K groups, wherein k=n/l, is grouped later bit stream A=(A1,A2,…,Ak), wherein m groups secret information is Am= (el(m-1)+1,el(m-1)+2,…,el(m-1)+l), m=1,2 ..., k;
    Step (2), generation 2lA length is the key of l:Respectively 0,1 ..., 2l- 1 totally 2lNumber change into length be l two into Number processed is as 2lA key, wherein x-th of key keyx=(ex1,ex2,…,exl) represent, wherein exh∈ { 0,1 }, x=1, 2,…,2l, h=1,2 ..., l;
    Step (3), encrypt original private information:Whole k groups secret informations in original private information are used into step (2) respectively The 2 of generationlKey carries out exclusive or encryption in the key that a length is l, produce original private information a version it is close Literary information;Using same method, using remaining 2l- 1 key is respectively to whole k groups secret informations in original private information Carry out exclusive or encryption, obtain original private information remaining 2lThe cipher-text information of -1 version;
    Step (4), obtain step (3) 2lThe cipher-text information of a version is respectively embedded in the test carrier image being pre-selected In, respectively obtain 2lThe test hidden image of a version, then assesses 2 according to test carrier imagelThe test steganography of a version The steganography performance of image, obtain steganography performance it is optimal when key used in original private information, using the key as original secret The optimal key of confidential information;
    In the step, the optimal key of original private information obtains in the following way:
    Step (4-1), set three parameters:The numbering j, optimal steganography performance parameter ξ of test keyMost preferablyWith the optimal steganography of acquirement The numbering J of performance parameter counterpart keysMost preferably;By j and JMost preferablyInitial value be set to 1, optimal steganography performance index ξMost preferablyValue according to Test steganography performance index needs to preset;
    Original private information, is used j-th of key progress exclusive or encryption by step (4-2), obtains the cipher-text information of jth version;
    The cipher-text information of jth version, be embedded into the test carrier image being pre-selected by step (4-3), obtains jth version Test hidden image;
    Step (4-4), the comparison for testing hidden image and test carrier image by jth version, obtain the test of jth version The evaluation and test steganography performance index ξ of hidden imagej, judge ξjWhether better than the optimal steganography performance index set in step (4-1) ξMost preferably;If ξjBetter than ξMost preferably, then by ξjIt is assigned to ξMost preferably, and j is assigned to JMost preferably;Otherwise existing ξ is keptMost preferablyAnd JMost preferablyIt is constant;
    Step (4-5), judge whether j is less than 2l, if so, (4-6) is performed, if not, output JMost preferablyAfter terminate;
    Step (4-6), by the value of j add 1, repeats step (4-2) to step (4-5);
    Step (5), the optimal key for obtaining original private information and step (4) carry out exclusive or encryption, obtain original private letter The cipher-text information of breath;
    Step (6), the cipher-text information using the cipher-text information that step (5) obtains as final progress steganography.
CN201710341821.5A 2017-05-16 2017-05-16 A kind of cipher-text information generation method for image latent writing Active CN107169914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710341821.5A CN107169914B (en) 2017-05-16 2017-05-16 A kind of cipher-text information generation method for image latent writing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710341821.5A CN107169914B (en) 2017-05-16 2017-05-16 A kind of cipher-text information generation method for image latent writing

Publications (2)

Publication Number Publication Date
CN107169914A CN107169914A (en) 2017-09-15
CN107169914B true CN107169914B (en) 2018-04-20

Family

ID=59816041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710341821.5A Active CN107169914B (en) 2017-05-16 2017-05-16 A kind of cipher-text information generation method for image latent writing

Country Status (1)

Country Link
CN (1) CN107169914B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169913B (en) * 2017-05-16 2018-04-27 宁波大学 A kind of digital picture steganography method based on the optimal key of search
CN109785218B (en) * 2018-12-27 2022-12-30 中国人民解放军国防科技大学 QR code-based physical domain image steganography method and device
CN110086955B (en) * 2019-04-29 2020-02-21 浙江工商职业技术学院 Large-capacity image steganography method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1920877A (en) * 2006-09-19 2007-02-28 北京邮电大学 Statistic supervision and structure supervision based hidden messages analysis system
CN102938888A (en) * 2012-10-31 2013-02-20 华南理工大学 Secret document steganography and extraction method suitable for wireless communication environment
KR20150000396A (en) * 2013-06-21 2015-01-02 고려대학교 산학협력단 Broadcast encryption method and system
CN105260981A (en) * 2015-10-08 2016-01-20 宁波大学 Optimal coupling image steganography method based on packet replacement
WO2016195551A1 (en) * 2015-06-02 2016-12-08 Telefonaktiebolaget Lm Ericsson (Publ) Method and encryption node for encrypting message
CN107169913A (en) * 2017-05-16 2017-09-15 宁波大学 A kind of digital picture steganography method based on the optimal key of search

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7945070B2 (en) * 2006-02-24 2011-05-17 Digimarc Corporation Geographic-based watermarking keys

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1920877A (en) * 2006-09-19 2007-02-28 北京邮电大学 Statistic supervision and structure supervision based hidden messages analysis system
CN102938888A (en) * 2012-10-31 2013-02-20 华南理工大学 Secret document steganography and extraction method suitable for wireless communication environment
KR20150000396A (en) * 2013-06-21 2015-01-02 고려대학교 산학협력단 Broadcast encryption method and system
WO2016195551A1 (en) * 2015-06-02 2016-12-08 Telefonaktiebolaget Lm Ericsson (Publ) Method and encryption node for encrypting message
CN105260981A (en) * 2015-10-08 2016-01-20 宁波大学 Optimal coupling image steganography method based on packet replacement
CN107169913A (en) * 2017-05-16 2017-09-15 宁波大学 A kind of digital picture steganography method based on the optimal key of search

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Is quantum key distribution suitable for steganography?;Fei Gao etl;《Quantum Inf Process》;20131230;第625-630页 *
一种基于移动终端的最佳匹配隐写系统;丁石磊等;《计算机工程》;20140707;第41卷(第3期);第303-305、311页 *
基于图像特征的隐写术载体图像的选择;杨任尔等;《光电子.激光》;20140415;第25卷(第4期);第764-768页 *

Also Published As

Publication number Publication date
CN107169914A (en) 2017-09-15

Similar Documents

Publication Publication Date Title
Anand et al. Watermarking techniques for medical data authentication: a survey
Dhawan et al. Analysis of various data security techniques of steganography: A survey
Ge et al. A high capacity multi-level approach for reversible data hiding in encrypted images
Ma et al. Reversible data hiding in encrypted images by reserving room before encryption
Qiu et al. Reversible data hiding in encrypted images using adaptive reversible integer transformation
Manjula et al. A novel hash based least significant bit (2-3-3) image steganography in spatial domain
CN107169914B (en) A kind of cipher-text information generation method for image latent writing
Maiti et al. Data hiding in images using some efficient steganography techniques
CN109547663B (en) Improved LSB image steganography method combined with cryptography
Wu et al. Separable reversible data hiding in encrypted images based on scalable blocks
GNDU RC State-of-the-art Review on Steganographic Techniques
Chen et al. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map
Sun et al. Privacy-aware image encryption based on logistic map and data hiding
Das et al. An image secret sharing technique with block based image coding
CN107169913B (en) A kind of digital picture steganography method based on the optimal key of search
Varghese et al. A detailed review based on secure data transmission using cryptography and steganography
Li et al. Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression
Wu Joint security and robustness enhancement for quantization based data embedding
CN108735223B (en) Method and system for embedding and extracting digital watermark of audio file
Kumar et al. Copyright protection of medical images: A view of the state-of-the-art research and current developments
Xiang et al. Degradative encryption: An efficient way to protect SPIHT compressed images
Purushothaman et al. An improved secret sharing using xor-based visual cryptography
Lee et al. A data hiding scheme based on turtle-shell for AMBTC compressed images
CN112184841A (en) Block replacement generating type information hiding and recovering method, device and medium
Sattar Jabbar et al. Design and Implementation Digital Invitation System Based on Secure Hash Algorithm 3.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant