CN107358568A - A kind of image information of noise camouflage hides transmission method - Google Patents
A kind of image information of noise camouflage hides transmission method Download PDFInfo
- Publication number
- CN107358568A CN107358568A CN201710464590.7A CN201710464590A CN107358568A CN 107358568 A CN107358568 A CN 107358568A CN 201710464590 A CN201710464590 A CN 201710464590A CN 107358568 A CN107358568 A CN 107358568A
- Authority
- CN
- China
- Prior art keywords
- image
- noise
- information
- transmission method
- camouflage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/24—Testing correct operation
- H04L1/245—Testing correct operation by using the properties of transmission codes
- H04L1/246—Testing correct operation by using the properties of transmission codes two-level transmission codes, e.g. binary
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Image Processing (AREA)
- Facsimile Transmission Control (AREA)
Abstract
A kind of image information of noise camouflage of the present invention hides transmission method, by the way that secret information is disguised oneself as noise, it is added in carrier image and implements camouflage and hide, even if passing through 4 times of standard compressions in transmission, legitimate receiver also can correctly extract secret information, high quality resume carrier image;After illicit reception person receives stego-image, high quality graphic can not be obtained, contains secret information in noise even if knowing, also can not correctly extract.Compared with other congenic methods, the present invention improves the security and robustness of Information hiding, and in the case where hidden capacity is appropriate, the ability and high quality carrier recovery ability of (4 8 times of JPEG2000 compressions) are still compressed with anti-high power.
Description
Technical field
The present invention relates to a kind of method of data transfer, more particularly to a kind of image information of noise camouflage hides transmission side
Method, belong to communication (such as data communication technology) field.
Background technology
Data transfer and image procossing are the important subjects of the current communications field.With the development of science and technology, people couple
The demand of high-definition picture is increasing, and data compression is imperative.
Information hiding, alternatively referred to as steganography, spatial information (si) is hidden and transform domain information is hidden etc. can be divided into, it is hidden as satellite
The new tool of communication is covered, can be by some significant datas (caused by the secret terrestrial object information, satellite itself such as remote sensing satellite acquisition
Data that data, ground upload etc.) it is hidden in satellite remote sensing date and is transmitted by disclosed satellite channel, do not increasing transmission
Reach on the premise of speed covert communications or reach the purpose for expanding transmission capacity, provided for satellite communication a kind of safe
Information transfer approach.
In image after hiding information, picture quality typically keeps original state, at this end (legitimate receiver) positive acknowledgement
While to secret information, carrier image enemy (illicit reception person) is also possible to obtain.In some occasions, us is only wanted to
(legitimate receiver) receives high quality graphic, or only wants to enemy and receive ropy image or the image by noise pollution,
Stego-image information after data compression is not lost simultaneously, and carrier image quality is still higher, and conventional hidden method is difficult to
Meet to require.
The content of the invention
Present invention solves the technical problem that it is:A kind of overcome the deficiencies in the prior art, there is provided image information of noise camouflage
Transmission method is hidden, the image of transmission looks like the image by noise pollution, and stego-image may pass through certain multiple
Standard data compression, illicit reception person can not obtain secret information, and legitimate receiver can correctly obtain secret information,
High quality graphic can be recovered, available for the occasion that is hidden into is transmitted in image again that secret information is worn camouflage.
The technical scheme is that:A kind of image information of noise camouflage hides transmission method, and step is as follows:
1) the binary system secret data S that length is L is switched into noise, L is positive integer;
2) location position is carried out to the carrier image A1 that size is M*N, M and N are positive integer;
3) formed containing close image;
4) stego-image is subjected to R times of standard data compression, obtains compressed data stream;
5) receiving terminal decompresses to compressed data stream, obtains receiving image B;
6) secret information is extracted;
7) recover to obtain carrier image A1.
Binary system secret data S production method is in the step 1):After binary system secret information S0 is added into error correcting code
It is changed into binary system secret data S.
The L=M*N*D, D are the number between 0 to 1.
The specific method that the binary system secret data S that length is L is switched to noise in the step 1) is:If Sj=0,
Sj is switched into T1, if Sj=1, Sj is switched into T2, forms Q1, Q2 ... QL numbers, T1 is integer between 0 to 127, and T2 is
Integer between 128 to 255;Wherein Sj be binary system secret data S in a certain position, j=1,2 ... L.
The specific method of location position is in the step 2):If carrier image as A1 element value be 0 to 255 between integer,
Produce L random integers to X1 and X2 by the pseudo random number production method of agreement, X1 be 1 to the integer between M, X2 be 1 arrive N it
Between integer, each X1 and X2 form a coordinate P, share P1, P2 ... PL.
The specific method of the step 3) is:The pixel value of Pj positions is replaced with Qj, j=1,2 ... L, formed containing close
Image.
The detailed process of extraction secret information is in the step 6):L are produced by the pseudo random number production method of agreement
Random integers take out the pixel value Qj for receiving image Pj position correspondences, if Qj >=128, information Sj=1 to X1 and X2;If Qj<
128, then Sj=0.
The specific method of the step 7) is:The pixel value of reception image B Pj positions is free of close pixel value with surrounding
Average be replaced, rest of pixels value it is constant, be restored carrier image A1.
The number without close pixel is 2-4 around described.
The beneficial effect of the present invention compared with prior art is:
The present invention is not in the case where increasing actual pixels and not changing carrier data amount, there is provided a kind of efficient letter
Hidden method is ceased, the image for similar salt-pepper noise that secret information is disguised oneself as, adds the security of hiding secret data, together
When there is resistance to compression.
It is of the invention to have these points substantive different and progressive compared with current background technology:
(1) present invention produces L random number location, random number location according to Secret Message Length in carrier image first
Arrange sending and receiving end, it is not necessary to send, from without introducing additional information, improve hiding security.
(2) present invention becomes secret information two level T1 and T2 noise, similar to salt-pepper noise, rather than usually
Salt-pepper noise value 0 and 255, improve adaptability of the hidden method to carrier image.
(3) T1 and T2 level values can optimize, and recover so as to be advantageous to the extraction of receiving terminal high quality information and carrier image.
(4) stego-image can reduce the bit error rate of secret information after judgement, without error code, compression when compressing 4 times
The secret information bit error rate is still very low during high power, improves the performance of information concealing method in the presence of a harsh environment.
(5) image that the present invention disguises oneself as secret information similar to salt-pepper noise, stego-image seem dirty by noise
Dye or serious pollution, the carrier image serious distortion that illicit reception person receives, even if using efficient filtering (in adaptive
Value filtering method), it can not also recover carrier very well, more can not correctly extract secret information, reach fascination purpose.
(6) technical solution of the present invention is unique, has broken in traditional hidden method and has typically kept high quality containing close carrier image
Present situation, deliberately deteriorate carrier image quality and legitimate receiver due to grasp priori and can recover processing obtain it is high-quality
Spirogram picture.
(7) it is of the invention, hide and all carried out with information extraction recovery process in spatial domain, it is not necessary to complicated conversion, very easily
In realization.
(8) Information Hiding Capacity of the present invention can design in advance with resistance to compression, incompressible when hidden capacity is small
Ability is especially strong, and recovers carrier image quality height, even and if most of information concealing methods reduce hidden capacity, anti-high multiplication of voltage
The ability of contracting also not necessarily improves.Information lossless is hiding, carrier near lossless extensive in the case of the present invention can be used for high compression ratio
Distortionless in multiple or engineering.
Brief description of the drawings
Fig. 1 is result (uncompressed) of the present invention to original image, wherein (a) is original image, (b) is containing close figure
Picture, PSNR=23.0dB, (c) be illicit reception person's optimal filter after image, PSNR=29.6dB d) for legitimate receiver recover
Image, PSNR=41.8dB;
Fig. 2 is result (4 times compression) of the present invention to original image, is recovered wherein (a) is 4 times of compressions of original image
Image PSNR=44.8dB (b) is that 4 times of compressions of stego-image recover image, and PSNR=22.8dB (c) is that illicit reception person is optimal
Filtered image, PSNR=26.2dB d) it is that legitimate receiver recovers image, PSNR=35.5dB.
Embodiment
By the performance of the simulating, verifying present invention, the 8 bit international standards that 1 width size is 512 × 512 are employed in experiment
Gray level image (lena.bmp) carries out Information hiding transmission.
1) is changed into binary data S (length L) after binary system secret information S0 is added into error correcting code, switchs to Noise Method
It is as follows:
S=0 switchs to T1, and S=1 switchs to T2, forms Q1, Q2 ... QL numbers,
T1 is integer between 0 to 127, and T2 is integer between 128 to 255;
L=D*512*512, T1=110, T2=145
D=1/8, C=1/64
2) carries out location position according to Secret Message Length L to the carrier image A1 that size is M*N, if image A1 pixels
Be worth for integer between 0 to 255, method it is as follows:
L integer is produced to X1 and X2 by the integer production method of agreement, and X1 is 1 to the integer between M, and X2 arrives N for 1
Between integer, each X1 and X2 form a coordinate P, share P1, P2 ... PL;
3) formed containing close image:
The pixel value of Pj positions is replaced with Qj, j=1,2 ... L, formed containing close image, the image seems by class
Like the pollution of salt-pepper noise, now hidden capacity C=L/ (M*N*8)=D/8;
4) stego-image is subjected to standard data compression, compresses R=4 times, obtain compressed data stream;
5) receiving terminal decompresses to compressed data stream, obtains receiving image B;
6) secret information extracts:L random number is produced to X1 and X2 by the pseudo random number production method of agreement, and X1 is 1
To the integer between M, X2 is 1 to the integer between N, and each X1 and X2 form a coordinate P, shares P1, P2 ... PL, and taking-up connects
The pixel value Qj of image Pj position correspondences is received, if Qj>=128, then information Sj=1;If Qj<128, then Sj=0;
7) carrier image recovers:The pixel value of reception image B Pj positions is free of close pixel value for 2 to 4 with surrounding
Average is replaced, and rest of pixels value is constant, and be restored carrier image A1, wherein L=M*N*D, is between 0 to 1
Number, hidden capacity C=D/8.
The performance of hidden algorithm is weighed using indexs such as PSNR (Y-PSNR), hidden capacity C.For a width size
For H × W 8bit digital pictures, PSNR is used for reflecting original image and recovers the similarity degree between image, it is generally desirable to
More than 30dB.PSNR is defined as follows:
In formula, mean square deviations of the MSE between original image and stego-image, calculation formula is
Here xij,The pixel value of original image and stego-image at (i, j) place is represented respectively.
Hidden capacity of the present invention, Performance Simulation Results are as follows:
Information Hiding Capacity (relative value) C=L/ (M*N*8)
If L=D*M*N, C=D*M*N/ (M*N*8)=D/8
During D=1/2, C=1/16,1 bit is hidden equivalent to every 2 pixels;
During D=1/4, C=1/32,1 bit is hidden equivalent to every 4 pixels;
During D=1/8, C=1/64,1 bit is hidden equivalent to every 8 or 2*4 pixel;
During D=1/16, C=1/128,1 bit is hidden equivalent to every 16 or 4*4 pixel;
During D=1/32, C=1/256,1 bit is hidden equivalent to every 32 or 4*8 pixel;
During D=1/64, C=1/512,1 bit is hidden equivalent to every 64 or 8*8 pixel;
During D=1/128, C=1/1024,1 bit is hidden equivalent to every 128 or 8*16 pixel;
During D=1/256, C=1/2048,1 bit is hidden equivalent to every 256 or 16*16 pixel.
As hidden capacity C=1/64, for lena.bmp images, the PSNR=containing close carrier image and original image
23dB, it appears that noise pollution is serious.And the secret information bit error rate is 0 after recovering, recover carrier image and original image PSNR
=41dB.
With JPEG2000 compressing 4 times containing close carrier image, the secret information bit error rate of recovery is 0.2%, is much smaller than
1%, in the range of the error correction of error correcting code, PSNR is better than 35dB (lena.bmp).
With JPEG2000 compressing 8 times containing close carrier image, the secret information bit error rate is 0.068=6.8%, is less than
10%, in the range of the error correction of error correcting code.Recover carrier image and be better than 31dB with original image PSNR.
While high speed data transfer, toward the other low speed datas of contact simultaneous transmission or part high-speed data.The present invention
A kind of method that transmission secret information is hidden using special caused noise is provided, secret information disguises oneself as special make an uproar
Sound, and this specific type noise can use the filtering method of optimization to filter out, so as to improve carrier image Quality of recovery, and
Hiding amount is fixed all the time, is had high-performance and low complex degree, is easy to the characteristics of software and hardware is realized, so as to carry transmission etc. in image
Many occasions have practical value.
In a word, the present invention proposes a kind of simple efficient incompressible hiding transmission method, by the way that secret information is pretended
Into noise, it is added in carrier image and implements to pretend to hide, even if is not lost still by 4 times of compressions, secret information in transmission.Enemy
After receiving stego-image, think and be contaminated and information can not be extracted, even if enemy, which knows, contains secret information in noise, also without
Method is correctly extracted, because order is random, so as to improve the security of Information hiding.Compared with other congenic methods, should
Method is improved in performance of both hidden capacity and PSNR.
Unspecified part of the present invention belongs to general knowledge as well known to those skilled in the art.
Claims (9)
1. a kind of image information of noise camouflage hides transmission method, it is characterised in that step is as follows:
1) the binary system secret data S that length is L is switched into noise, L is positive integer;
2) location position is carried out to the carrier image A1 that size is M*N, M and N are positive integer;
3) formed containing close image;
4) stego-image is subjected to R times of standard data compression, obtains compressed data stream;
5) receiving terminal decompresses to compressed data stream, obtains receiving image B;
6) secret information is extracted;
7) recover to obtain carrier image A1.
2. a kind of image information of noise camouflage according to claim 1 hides transmission method, it is characterised in that:The step
It is rapid 1) in binary system secret data S production method be:It is changed into binary system secret after binary system secret information S0 is added into error correcting code
Data S.
3. a kind of image information of noise camouflage according to claim 1 or 2 hides transmission method, it is characterised in that:Institute
L=M*N*D is stated, D is the number between 0 to 1.
4. a kind of image information of noise camouflage according to claim 1 or 2 or 3 hides transmission method, it is characterised in that:
The specific method that the binary system secret data S that length is L is switched to noise in the step 1) is:If Sj=0, Sj is switched to
T1, if Sj=1, Sj is switched into T2, forms Q1, Q2 ... QL numbers, T1 is integer between 0 to 127, T2 for 128 to 255 it
Between integer;Wherein Sj be binary system secret data S in a certain position, j=1,2 ... L.
5. a kind of image information of noise camouflage according to claim 4 hides transmission method, it is characterised in that:The step
It is rapid 2) in the specific method of location position be:If carrier image as A1 element value be 0 to 255 between integer, by the pseudorandom of agreement
Number production method produces L random integers to X1 and X2, and X1 is 1 to the integer between M, and X2 is 1 to the integer between N, each
X1 and X2 forms a coordinate P.
6. a kind of image information of noise camouflage according to claim 5 hides transmission method, it is characterised in that:The step
Rapid specific method 3) is:The pixel value of Pj positions is replaced with Qj, j=1,2 ... L, formed containing close image.
7. a kind of image information of noise camouflage according to claim 6 hides transmission method, it is characterised in that:The step
It is rapid 6) in extraction secret information detailed process be:By agreement pseudo random number production method produce L random integers to X1 with
X2, take out the pixel value Qj for receiving image Pj position correspondences, if Qj >=128, information Sj=1;If Qj<128, then Sj=0.
8. a kind of image information of noise camouflage according to claim 7 hides transmission method, it is characterised in that:The step
Rapid specific method 7) is:The pixel value of reception image B Pj positions is replaced with average of the surrounding without close pixel value,
Rest of pixels value is constant, and be restored carrier image A1.
9. a kind of image information of noise camouflage according to claim 8 hides transmission method, it is characterised in that:The week
The number without close pixel is enclosed for 2-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710464590.7A CN107358568B (en) | 2017-06-19 | 2017-06-19 | Noise-disguised image information hiding transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710464590.7A CN107358568B (en) | 2017-06-19 | 2017-06-19 | Noise-disguised image information hiding transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107358568A true CN107358568A (en) | 2017-11-17 |
CN107358568B CN107358568B (en) | 2020-11-20 |
Family
ID=60272883
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710464590.7A Active CN107358568B (en) | 2017-06-19 | 2017-06-19 | Noise-disguised image information hiding transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107358568B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108629749A (en) * | 2018-04-26 | 2018-10-09 | 西安空间无线电技术研究所 | A kind of compression of images and the hiding method being combined |
CN110188561A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and noise |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6031914A (en) * | 1996-08-30 | 2000-02-29 | Regents Of The University Of Minnesota | Method and apparatus for embedding data, including watermarks, in human perceptible images |
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
WO2000068872A1 (en) * | 1999-05-11 | 2000-11-16 | Sony Electronics, Inc. | An information embedding and retrieval method and apparatus |
US6567532B1 (en) * | 1999-12-02 | 2003-05-20 | Eastman Kodak Company | Method and computer program for extracting an embedded message from a digital image |
CN1620003A (en) * | 2004-11-15 | 2005-05-25 | 北京交通大学 | Anti interference information hidding method based on turbo code and image carrier |
CN101452569A (en) * | 2008-12-05 | 2009-06-10 | 江南大学 | Processing method of image latent writing based on auxiliary pixel |
US20110194727A1 (en) * | 2010-02-11 | 2011-08-11 | National Taiwan University Of Science & Technology | Image data processig systems for hiding secret information and data hiding methods using the same |
CN102355359A (en) * | 2011-07-15 | 2012-02-15 | 华南理工大学 | Method for hiding secret information in modulation constellation |
CN103414892A (en) * | 2013-07-25 | 2013-11-27 | 西安空间无线电技术研究所 | Method for hiding high-capacity compression-resisting image information |
CN103476026A (en) * | 2013-09-06 | 2013-12-25 | 中国科学院软件研究所 | Self-adaption covert communication method based on satellite channel coding |
CN105118016A (en) * | 2015-06-23 | 2015-12-02 | 暨南大学 | Graphics and text information hiding method based on visual interference |
CN105933320A (en) * | 2016-05-26 | 2016-09-07 | 西安空间无线电技术研究所 | Anti-compression high-capacity information hiding and extracting method |
CN106127667A (en) * | 2016-06-13 | 2016-11-16 | 天津大学 | A kind of jpeg image self adaptation steganography method |
-
2017
- 2017-06-19 CN CN201710464590.7A patent/CN107358568B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6031914A (en) * | 1996-08-30 | 2000-02-29 | Regents Of The University Of Minnesota | Method and apparatus for embedding data, including watermarks, in human perceptible images |
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
WO2000068872A1 (en) * | 1999-05-11 | 2000-11-16 | Sony Electronics, Inc. | An information embedding and retrieval method and apparatus |
US6567532B1 (en) * | 1999-12-02 | 2003-05-20 | Eastman Kodak Company | Method and computer program for extracting an embedded message from a digital image |
CN1620003A (en) * | 2004-11-15 | 2005-05-25 | 北京交通大学 | Anti interference information hidding method based on turbo code and image carrier |
CN101452569A (en) * | 2008-12-05 | 2009-06-10 | 江南大学 | Processing method of image latent writing based on auxiliary pixel |
US20110194727A1 (en) * | 2010-02-11 | 2011-08-11 | National Taiwan University Of Science & Technology | Image data processig systems for hiding secret information and data hiding methods using the same |
CN102355359A (en) * | 2011-07-15 | 2012-02-15 | 华南理工大学 | Method for hiding secret information in modulation constellation |
CN103414892A (en) * | 2013-07-25 | 2013-11-27 | 西安空间无线电技术研究所 | Method for hiding high-capacity compression-resisting image information |
CN103476026A (en) * | 2013-09-06 | 2013-12-25 | 中国科学院软件研究所 | Self-adaption covert communication method based on satellite channel coding |
CN105118016A (en) * | 2015-06-23 | 2015-12-02 | 暨南大学 | Graphics and text information hiding method based on visual interference |
CN105933320A (en) * | 2016-05-26 | 2016-09-07 | 西安空间无线电技术研究所 | Anti-compression high-capacity information hiding and extracting method |
CN106127667A (en) * | 2016-06-13 | 2016-11-16 | 天津大学 | A kind of jpeg image self adaptation steganography method |
Non-Patent Citations (3)
Title |
---|
JESSICA FRIDRICH ET AL: "Writing on Wet Paper", 《IEEE TRANSACTIONS ON SIGNAL PROCESSING》 * |
MING SUN FU ET AL: "Data hiding watermarking for halftone images", 《IEEE TRANSACTIONS ON IMAGE PROCESSING》 * |
王朔中等: "以数字图像为载体的隐写分析研究进展", 《计算机学报》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108629749A (en) * | 2018-04-26 | 2018-10-09 | 西安空间无线电技术研究所 | A kind of compression of images and the hiding method being combined |
CN108629749B (en) * | 2018-04-26 | 2021-10-01 | 西安空间无线电技术研究所 | Method for combining image compression and hiding |
CN110188561A (en) * | 2019-05-29 | 2019-08-30 | 华南师范大学 | Information concealing method and robot system based on big data and noise |
Also Published As
Publication number | Publication date |
---|---|
CN107358568B (en) | 2020-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103414892A (en) | Method for hiding high-capacity compression-resisting image information | |
CN102238388B (en) | Self-adaptive robust video watermarking method based on AVS (Audio Video Standard) | |
CN104065976B (en) | A kind of compression of images and security transmission method based on video | |
CN103973937B (en) | Information concealing method based on wireless multimedia sensor network | |
CN102938841B (en) | Method for hiding information in bearing image, image quality evaluation method and information transmission method | |
CN105227962B (en) | A kind of lossless information concealing method based on data difference | |
CN106339978B (en) | A kind of compressed sensing based color digital image watermark insertion and extracting method | |
CN107358568A (en) | A kind of image information of noise camouflage hides transmission method | |
CN111654592B (en) | Multi-image hiding method based on secret sharing | |
CN107018414B (en) | A method of the lossless hiding high quality graphic in low-quality image compressed data | |
CN107622469B (en) | Quaternion wavelet transform-based image carrier-free information hiding method | |
CN113923312B (en) | Robust reversible watermarking method of digital image coding layer based on wireless communication | |
CN108521535B (en) | A kind of Information hiding transmission method based on image blend processing | |
CN106875324A (en) | Lossless image information concealing method based on SBDE | |
CN104202500B (en) | A kind of controllable high content information of carrier quality hides transmission method | |
Ramaswamy et al. | Lossless data hiding based on histogram modification. | |
CN107277507B (en) | Spatial domain transform domain hybrid image compression method | |
CN103780913A (en) | Data compression method based on error hiding | |
Thongkor et al. | Image watermarking based on DWT coefficients modification for social networking services | |
Yang | Robust Watermarking Scheme Based on Radius Weight Mean and Feature‐Embedding Technique | |
Goswami et al. | Hybrid DCT-DWT Digital Image Steganography | |
CN105141960B (en) | A kind of method that information transfer is carried out based on JPEG2000 compressed bit streams | |
Yang et al. | Reversible data hiding in the spatial and frequency domains | |
Danti et al. | Secured data hiding of invariant sized secrete image based on discrete and hybrid wavelet transform | |
Mazumder et al. | A high capacity and secured color image steganographic technique using discrete wavelet transformation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |