CN108595975A - A kind of carrier-free information concealing method based on the retrieval of nearly multiimage - Google Patents
A kind of carrier-free information concealing method based on the retrieval of nearly multiimage Download PDFInfo
- Publication number
- CN108595975A CN108595975A CN201810434573.3A CN201810434573A CN108595975A CN 108595975 A CN108595975 A CN 108595975A CN 201810434573 A CN201810434573 A CN 201810434573A CN 108595975 A CN108595975 A CN 108595975A
- Authority
- CN
- China
- Prior art keywords
- image
- secret
- image block
- label
- concealed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000000605 extraction Methods 0.000 claims abstract description 20
- 101150060512 SPATA6 gene Proteins 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 7
- 238000010276 construction Methods 0.000 claims description 5
- 239000000284 extract Substances 0.000 claims description 5
- 230000009471 action Effects 0.000 claims description 4
- 238000007781 pre-processing Methods 0.000 claims description 3
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 241000270322 Lepidosauria Species 0.000 description 1
- 101000972349 Phytolacca americana Lectin-A Proteins 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
Abstract
A kind of carrier-free information concealing method based on the retrieval of nearly multiimage, this method include mainly large-scale natural image library establish, concealed label selections, image characteristics extraction, rapidly retrieving images index structure build, Information hiding and information extracting method.First by the image as secret information, it is divided into several Secret Image blocks, then it by using the mode of characteristic matching, is searched out in image library containing the natural image with Secret Image block vision similar image block, and confidential corespondence is carried out using the natural image as stego-image.The present invention can resist existing steganalysis method, improve hidden capacity, and can be hidden into image as secret information in image-carrier.
Description
Technical field
The invention belongs to information security fields, and in particular to a kind of carrier-free Information hiding based on the retrieval of nearly multiimage
Method.
Background technology
Information Hiding Techniques are mainly used in information security, copyright protection, military communication etc..In the past more than ten years
In, with the extensive use of digital picture, many image information concealing technologies are suggested.Most of image information is hidden at present
Tibetan technology when operation, often through modification image-carrier during embedded secret information, while the trace meeting changed
It stays on image-carrier.Whether steganalysis tool can embedding come detection image carrier to the trace of carrier modification according to these
Enter information so that these methods become dangerous.
This problem is paid attention in recent years, in May, 2014, and Universal Information hides and multi-media information security expert
In the committee, some experts propose the idea of " carrier-free Information hiding ".The thought refers to without other carriers, can
Carrier is obtained according to secret information or generates carrier.Carrier can hide secret information without any modification in this way, can be very
Good solves the problems, such as that traditional Information hiding cannot resist steganalysis detection.The idea of carrier-free Information hiding is carrying
After going out, domestic and international Information hiding field is obtained and has widely approved.
With the proposition of carrier-free Information hiding idea, the various information concealing methods based on carrier-free thought are also begun to out
It is existing.Carrier-free hides field in image information, application it is the most universal be exactly to be hidden into carrier figure using text as secret information
As in.Concrete operations are to extract the feature of carrier image, are binary message by the Feature Mapping of image, use the binary system
Information indicates carrier image;Then it is gone to obtain carrier image according to secret information.
The research of image carrier-free Information hiding at present belongs to starting stage, existing image carrier-free Information Hiding Techniques
Mainly there is following technical barrier:
1, existing image carrier-free information concealing method, an image-carrier can only hide seldom information, capacity ratio
It is relatively low;
2, existing image carrier-free information concealing method needs a relatively large image data base that could realize;
Text message can only be hidden into image as secret information and carried by 3, existing image carrier-free information concealing method
In body, carrier image cannot be hidden into using image as secret information.
Invention content
The present invention is directed to deficiency in the prior art, provides a kind of carrier-free Information hiding retrieved based on nearly multiimage
Method can resist existing steganalysis method, improve hidden capacity, and can be hidden into image as secret information
In image-carrier.
To achieve the above object, the present invention uses following technical scheme:
A kind of carrier-free information concealing method based on the retrieval of nearly multiimage, which is characterized in that include the following steps:
Step 1: foundation and the image preprocessing of image data base:Natural image database is established, it will be secret in database
Close image cutting is image block, as secret information;
Step 2: concealed label is chosen:Label is added before secret information, is provided guiding to obtain secret information, is used
Robust hashing algorithm obtains the Hash sequence as concealed label;
Step 3:Image characteristics extraction:Extract the characteristic information of image block;
Step 4:The index structure of rapidly retrieving images is built;
Step 5:Information hiding:According to concealed label, characteristics of image and index structure, retrieval includes and Secret Image block
The natural image of vision similar image block, and be hidden;
Step 6:Information extraction:According to concealed label and characteristics of image, secret information is obtained.
To optimize above-mentioned technical proposal, the concrete measure taken further includes:
In the step 1, the image size in image data base is 640 × 480, is m × n figure by image cutting
As block.
In the step 2, the Hash sequence as concealed label is obtained using robust hashing algorithm, it is specific as follows:
First, it is m × n region by image block cutting, with { b11, b12..., bmn indicate;
Secondly, the pixel average of each region is calculated, m × n value is obtained, with { V (b11), V (b12) ..., V (bmn)}
It indicates;
Finally, in sequence successively by the value next value adjacent with it compared with, obtain label { v to the end1, v2...,
vm*n-1}。
In the step 3, for the image block that cutting is m × n region, the color histogram in each region is extracted
Feature uses fiIt indicates, then in a certain order, the color histogram merging features in each region is believed at a feature
It ceases to indicate that the image block, final characteristic information are FK={ f0, f1..., fm×n-1, FK expression characteristic informations, 0≤i≤m ×
n-1。
In the step 4, the index structure of rapidly retrieving images includes concealed label, vocabulary tree construction and image block row
Table;Concealed label is used to guide the extraction of Secret Image block;Vocabulary tree construction extracts feature to image block all in image set,
Then to these feature clusterings, a tree-like structure is generated;Image block list uses concealed label and Secret Image block feature
Information obtains candidate natural image.
In the step 5, Information hiding, which is converted into the retrieval in image set, includes and Secret Image block vision similar diagram
As the natural image of block, it is as follows:
1) it is m × n Secret Image block by Secret Image cutting, with P={ pi| i=0 to i=m × n-1 } it indicates,
P indicates the set of Secret Image block, piIndicate i-th of Secret Image block, 0≤i≤m × n-1;
2) sender selects l concealed label effective as this by key from original concealed sequence label PL
Concealed sequence label PL-N={ plj| j=0 to j=l-1 }, PL-N indicates effective concealed sequence label, pljIt indicates j-th
Concealed label, 0≤j≤l-1;
By inciting somebody to action effective concealed mark cycle t times, whereinObtain the concealed label that may finally be used
Sequence PL-F={ Plk| k=0 to k=t × l-1 }, PL-F indicates the concealed sequence label that may finally be used, plkIndicate the
K concealed label, 0≤k≤t × l-1;
3) characteristic information for extracting each Secret Image block, by the image block of Secret Image institute cutting and concealed label sequence
Row are combined as Secret Image block feature and secret sequence label C={ ch=FKh+plh| h=0 to h=64 × 64-1 }, C is indicated
Secret Image block feature and concealed sequence label, chIndicate h-th of combination, FKhIndicate h-th of Secret Image block feature, plhTable
Show then h-th of concealed label, 0≤h≤64 × 64-1 retrieve each combination c in indexed fileh, obtain a candidate
Natural image block sequence;
4) in candidate natural image block sequence, by comparing Secret Image feature and candidate natural image block sequence
In each image block characteristics Euclidean distance, the image block of selected distance minimum, this image block and Secret Image block vision
It is similar, image-carrier of the original complete image as the secret information is then obtained according to the image block;
5) each image-carrier that will be obtained, is sent to recipient.
In the step 6, the process of information extraction is with Information hiding on the contrary, detailed process is as follows:
1) recipient obtains total m × n width image-carrier;
2) recipient possesses key identical with sender, and l concealed mark is selected from original concealed sequence label PL
Label are as effective secret sequence label PL-N={ plj| j=0 to j=l-1 };
By inciting somebody to action effective concealed mark cycle t times, whereinObtain the concealed label that may finally be used
Sequence is PL-F={ Plk| k=0 to k=t × l-1 };
3) according to the concealed sequence label PL-F that can be used, image block d is extracted in carrier imagei, every in extraction
An image block sequence D={ d is obtained after one width carrier imagei| i=0 to i=m × n-1 };
4) image block sequence D is stitched together in sequence, obtains complete image, this image is the secret figure hidden
Picture.
The beneficial effects of the invention are as follows:
1, a kind of carrier-free information concealing method based on nearly weight per image retrieval that the present invention designs, because not to carrier
Image carries out any modification, can be reasonably resistant to the attack of steganalysis;
2, a kind of carrier-free information concealing method retrieved based on nearly multiimage that the present invention designs, is realized in image
The function of middle hidden image;
3, a kind of carrier-free information concealing method examined based on nearly multiimage that the present invention designs, image block is hidden into
In image-carrier, the capacity of each width image-carrier can be effectively improved.
Description of the drawings
Fig. 1 is the overall frame structure figure of the present invention.
Fig. 2 is the schematic diagram that concealed label is obtained in the present invention.
Fig. 3 is the schematic diagram of image characteristics extraction in the present invention.
Fig. 4 is the schematic diagram of index structure in the present invention.
Specific implementation mode
In conjunction with the accompanying drawings, the present invention is further explained in detail.
A kind of carrier-free information concealing method based on the retrieval of nearly multiimage as shown in Figure 1, main includes extensive
Natural image library establish, concealed label selections, image characteristics extraction, rapidly retrieving images index structure build, information it is hidden
Tibetan and information extracting method.Extensive natural image library is established, and is the key that ensure stego-image search result quality.Secret mark
It refers to during hiding, to a label is added before secret information, for drawing to obtain secret information and providing that label, which are chosen,
Lead effect.This method main function of image characteristics extraction is, can be by a feature being extracted in the image come accurately
Indicate the width image.The index structure structure major function of rapidly retrieving images is to obtain image-carrier according to Secret Image block
When, corresponding image-carrier is obtained in slave image data base that can be rapidly and efficiently, and this method has used concealed label and figure
As feature.Information hiding is mainly using image block as secret information, by using above-mentioned label, characteristics of image and rope
Quotation part finds the natural image containing image block similar with Secret Image block vision to hide.Information extraction is mainly root
According to label and characteristics of image, secret information is got in the carrier.
This method can resist existing steganalysis method, improve hidden capacity, and can be using image as secret
In Information hiding to image-carrier, each section content is specific as follows:
One, image data base and image preprocessing
Image data base mainly by the image downloading famous image data set, downloaded by network search engines and
The image downloaded is collected using reptile instrument, while establishing image set, relevant treatment is carried out to image so that all figures
The size of picture is 640 × 480.It is m × n image block by image library image cutting, then next each operation is all pair
Image block is operated.
Two, concealed label
Concealed label, which is chosen mainly to find in the carrier, meets ga s safety degree, randomness, ubiquitous, can be identified for that secret
The data or feature of confidential information.In order to realize the selection of concealed label, a kind of robust hashing algorithm is used herein, can be obtained
To a Hash sequence, this Hash sequence is concealed label.The hash algorithm of robust meets ubiquitous, ga s safety degree, simultaneously
Different available labels can be got in sequence label according to information such as time and user identity, meets concealed label in this way
Randomness.Meanwhile randomness also improves the safety of method.
It is first m × n region by image block cutting, with { b11, b12..., bmn indicate;Secondly, each region is calculated
Pixel average value, m × n value is obtained, with { V (b11), V (b12) ..., V (bmn) indicate;Finally, in sequence successively
Compared with by value next value adjacent with it, specifically according to from left to right, sequence from top to bottom is compared, previous to be more than
The latter is just 1, and it is 0 to be less than, and obtains label { v to the end1, v2..., vm*n-1}。
Herein, image block is divided into 3 × 3 different regions, the length of concealed label is 8, so sharing 256 differences
Concealed label.During use, it can obtain different concealed sequence labels according to user identity etc. information and use.It obtains
Take the process of concealed label as shown in Figure 2.
Three, image characteristics extraction
In image characteristics extraction part, crucial problem is, for a given secret information block, how to find containing
With the natural image of this vision similar image block.It is accurately to be described in image block by extracting the feature of image first
Hold, used herein is the color histogram feature of image.Since color histogram belongs to global characteristics, image face can only be indicated
The distribution of color, and cannot indicate the spatial information of image, for this purpose, used herein is a kind of improved color histogram extraction side
Method.
As shown in figure 3, being first m × n region by image block cutting, the color histogram in each region is then extracted
Feature uses fiIt indicates, then in a certain order, the color histogram merging features in each region is believed at a feature
It ceases to indicate that the image block, final characteristic information are FK={ f0, f1..., fm×n-1, 0≤i≤m × n-1.
Four, the index structure of rapidly retrieving images
Function is that qualified image can be fast and accurately retrieved from image data base, as shown in figure 4, it is led
It is concealed label to have three parts, first part, which is used primarily in the extraction of guiding Secret Image block;Second part is word
Converge tree construction, all image blocks extract feature in the image set of the part pair one, then to these feature clusterings, generate one
Tree-like structure, a tree structure in this way, can quickly retrieve with the approximate image block of this feature, meanwhile, greatly
Amount is it is demonstrated experimentally that the similar image block of feature, is visually similar;Part III is then image block list, using hidden
Secret label and Secret Image block feature information can obtain a candidate natural image.
Five, Information hiding
Information hiding is converted to the retrieval in image set and includes the nature with Secret Image block vision similar image block
Image is as follows:
1, by the image as secret information, cutting is m × n Secret Image block, with P={ pi| i=0 to i=m ×
N-1 } it indicates, P indicates the set of image block, piIndicate i-th of image block, 0≤i≤m × n-1.
2, then sender selects l concealed label to make by a key key from original concealed sequence label PL
For this effective secret sequence label PL-N={ plj| j=0 to j=l-1 }, pljJ-th of concealed label of expression, 0≤j≤
L-1, PL-N indicate one selected from PL new concealed label.Due to there is a problem of that concealed label is not enough, mainly adopt
With by will effective concealed mark cycle t times, whereinFinally, can obtain one may finally use
Concealed sequence label PL-F={ Plk| k=0 to k=t × l-1 }, plkIndicate k-th of concealed label, 0≤k≤t × l-1.
3, by the image block of Secret Image cutting and concealed sequence label, the feature letter of each Secret Image block is extracted
Breath, is combined as the sequence C={ c of " Secret Image block feature+secret label "h=FKh+plh| h=0 to h=64 × 64-1 },
FKhIndicate then h-th of Secret Image block feature, 0≤h≤64 × 64-1 carry out retrieving each combination in indexed file
ch, a candidate natural image block sequence can be obtained.
4, in candidate sequence, by comparing the Europe of each image block characteristics in Secret Image feature and candidate sequence
Formula distance, the image block of selected distance minimum, this image block is then similar with Secret Image block vision, then according to the image
Block obtains image-carrier of the original complete image as the secret information.
5, the natural image for arriving each obtained secret information block retrieval, is sent to recipient.
Six, information extraction
The process of information extraction and Information hiding are exactly the opposite, can be quick by concealed label and stego-image carrier
Secret information is extracted in carrier image, detailed process is as follows:
1, recipient obtains carrier image, total m × n width carrier image.
2, recipient possesses key key identical with sender side, then selects l from original concealed sequence label PL
A secret label is as this effective secret sequence label PL-N={ plj| j=0 to j=l-1 }.Due to there is concealed mark
Not enough problem is signed, main use passes through effectively concealed mark cycle t times, whereinFinally, it can obtain
The concealed sequence label that may finally be used to one is PL-F={ Plk| k=0 to k=t × l-1 }.
3, image is extracted in carrier image according to concealed label according to concealed sequence label PL-F and carrier image
Block di, an image block sequence D={ d is obtained after extracting each width carrier imagei| i=0 to i=m × n-1 }.
4, image block sequence D is stitched together in sequence, has just obtained complete piece image, this image is as hidden
The Secret Image of Tibetan.
The above is only the preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-described embodiment,
All technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art
For those of ordinary skill, several improvements and modifications without departing from the principles of the present invention should be regarded as the protection of the present invention
Range.
Claims (7)
1. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage, which is characterized in that include the following steps:
Step 1: foundation and the image preprocessing of image data base:Natural image database is established, the secret in database is schemed
Picture cutting is image block, as secret information;
Step 2: concealed label is chosen:Label is added before secret information, guiding is provided to obtain secret information, using robust
Hash algorithm obtains the Hash sequence as concealed label;
Step 3:Image characteristics extraction:Extract the characteristic information of image block;
Step 4:The index structure of rapidly retrieving images is built;
Step 5:Information hiding:According to concealed label, characteristics of image and index structure, retrieval includes and Secret Image block vision
The natural image of similar image block, and be hidden;
Step 6:Information extraction:According to concealed label and characteristics of image, secret information is obtained.
2. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage as described in claim 1, it is characterised in that:
In the step 1, the image size in image data base is 640 × 480, is m × n image block by image cutting.
3. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage as claimed in claim 2, it is characterised in that:
In the step 2, the Hash sequence as concealed label is obtained using robust hashing algorithm, it is specific as follows:
First, it is m × n region by image block cutting, with { b11, b12..., bmn indicate;
Secondly, the pixel average of each region is calculated, m × n value is obtained, with { V (b11), V (b12) ..., V (bmn) table
Show;
Finally, in sequence successively by the value next value adjacent with it compared with, obtain label { v to the end1, v2...,
vm*n-1}。
4. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage as claimed in claim 3, it is characterised in that:
In the step 3, for the image block that cutting is m × n region, the color histogram feature in each region is extracted, f is usedi
It indicates, then in a certain order, the color histogram merging features in each region is indicated at a characteristic information
The image block, final characteristic information are FK={ f0, f1..., fm×n-1, FK indicates characteristic information, 0≤i≤m × n-1.
5. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage as claimed in claim 4, it is characterised in that:
In the step 4, the index structure of rapidly retrieving images includes concealed label, vocabulary tree construction and image block list;Secret mark
Sign the extraction for guiding Secret Image block;Vocabulary tree construction extracts feature to image block all in image set, then to this
A little feature clusterings generate a tree-like structure;Image block list is obtained using concealed label and Secret Image block feature information
Candidate natural image.
6. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage as claimed in claim 5, it is characterised in that:
In the step 5, by Information hiding be converted into image set retrieval comprising with Secret Image block vision similar image block from
Right image, is as follows:
1) it is m × n Secret Image block by Secret Image cutting, with P={ pi| i=0 to i=m × n-1 } it indicates, P is indicated
The set of Secret Image block, piIndicate i-th of Secret Image block, 0≤i≤m × n-1;
2) sender selects l concealed label effective concealed as this by key from original concealed sequence label PL
Sequence label PL-N={ plj| j=0 to j=l-1 }, PL-N indicates effective concealed sequence label, pljIndicate j-th of secret
Label, 0≤j≤l-1;
By inciting somebody to action effective concealed mark cycle t times, whereinObtain the concealed sequence label that may finally be used
PL-F={ Plk| k=0 to k=t × l-1 }, PL-F indicates the concealed sequence label that may finally be used, plkIt indicates k-th
Concealed label, 0≤k≤t × l-1;
3) characteristic information for extracting each Secret Image block, by the image block of Secret Image institute cutting and concealed sequence label group
It is combined into Secret Image block feature and secret sequence label C={ ch=FKh+plh| h=0 to h=64 × 64-1 }, C indicates secret
Image block characteristics and concealed sequence label, chIndicate h-th of combination, FKhIndicate h-th of Secret Image block feature, plhIndicate h
Then each combination c is retrieved in a secret label, 0≤h≤64 × 64-1 in indexed fileh, obtain a candidate nature
Image block sequence;
4) in candidate natural image block sequence, by comparing in Secret Image feature and candidate natural image block sequence
The Euclidean distance of each image block characteristics, the image block of selected distance minimum, this image block is similar to Secret Image block vision,
Then image-carrier of the original complete image as the secret information is obtained according to the image block;
5) each image-carrier that will be obtained, is sent to recipient.
7. a kind of carrier-free information concealing method based on the retrieval of nearly multiimage as claimed in claim 6, it is characterised in that:
In the step 6, the process of information extraction is with Information hiding on the contrary, detailed process is as follows:
1) recipient obtains total m × n width image-carrier;
2) recipient possesses key identical with sender, and l concealed label is selected to make from original concealed sequence label PL
For effective secret sequence label PL-N={ plj| j=0 to j=l-1 };
By inciting somebody to action effective concealed mark cycle t times, whereinObtain the concealed sequence label that may finally be used
For PL-F={ Plk| k=0 to k=t × l-1 };
3) according to the concealed sequence label PL-F that can be used, image block d is extracted in carrier imagei, carried extracting each width
An image block sequence D={ d is obtained after body imagei| i=0 to i=m × n-1 };
4) image block sequence D is stitched together in sequence, obtains complete image, this image is the Secret Image hidden.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810434573.3A CN108595975A (en) | 2018-05-07 | 2018-05-07 | A kind of carrier-free information concealing method based on the retrieval of nearly multiimage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810434573.3A CN108595975A (en) | 2018-05-07 | 2018-05-07 | A kind of carrier-free information concealing method based on the retrieval of nearly multiimage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108595975A true CN108595975A (en) | 2018-09-28 |
Family
ID=63635822
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810434573.3A Pending CN108595975A (en) | 2018-05-07 | 2018-05-07 | A kind of carrier-free information concealing method based on the retrieval of nearly multiimage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108595975A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727956A (en) * | 2019-10-11 | 2020-01-24 | 陕西师范大学 | Double-authentication test question backup disguising method combining codebook expansion and question stem hashing |
CN111782591A (en) * | 2020-06-22 | 2020-10-16 | 北京计算机技术及应用研究所 | Method for calculating file similar hash |
CN111797409A (en) * | 2020-03-26 | 2020-10-20 | 中南林业科技大学 | Big data Chinese text carrier-free information hiding method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105389517A (en) * | 2015-12-21 | 2016-03-09 | 西安电子科技大学 | Method for hiding secret information in images |
CN107818266A (en) * | 2017-10-26 | 2018-03-20 | 浙江财经大学 | Adaptive reversible information hidden method based on pixel replacement |
-
2018
- 2018-05-07 CN CN201810434573.3A patent/CN108595975A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105389517A (en) * | 2015-12-21 | 2016-03-09 | 西安电子科技大学 | Method for hiding secret information in images |
CN107818266A (en) * | 2017-10-26 | 2018-03-20 | 浙江财经大学 | Adaptive reversible information hidden method based on pixel replacement |
Non-Patent Citations (2)
Title |
---|
周志立等: "Coverless image steganography using partial-duplicate image retrival", 《SPRINGER-VERLAG GMBH GERMANY》 * |
周志立等: "基于图像BOW模型的无载体信息隐藏", 《应用科学学报》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727956A (en) * | 2019-10-11 | 2020-01-24 | 陕西师范大学 | Double-authentication test question backup disguising method combining codebook expansion and question stem hashing |
CN111797409A (en) * | 2020-03-26 | 2020-10-20 | 中南林业科技大学 | Big data Chinese text carrier-free information hiding method |
CN111797409B (en) * | 2020-03-26 | 2024-03-26 | 中南林业科技大学 | Carrier-free information hiding method for big data Chinese text |
CN111782591A (en) * | 2020-06-22 | 2020-10-16 | 北京计算机技术及应用研究所 | Method for calculating file similar hash |
CN111782591B (en) * | 2020-06-22 | 2023-05-16 | 北京计算机技术及应用研究所 | Method for calculating file similarity hash |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qin et al. | Coverless image steganography: a survey | |
Zhong et al. | An end-to-end dense-inceptionnet for image copy-move forgery detection | |
CN107609356B (en) | Text carrier-free information hiding method based on label model | |
Melekhov et al. | Siamese network features for image matching | |
CN108595975A (en) | A kind of carrier-free information concealing method based on the retrieval of nearly multiimage | |
CN103150375A (en) | Quick video retrieval system and quick video retrieval method for video detection | |
WO2021012793A1 (en) | Lawyer recommendation method based on big data analysis, and related device | |
CN106055531A (en) | Text information hiding technology using all Song Ci | |
CN112615974A (en) | Carrier-free covert communication method and system based on depth discriminator | |
CN104376236B (en) | Scheme self-adaptive digital watermark embedding grammar and extracting method based on camouflage science | |
CN103440332B (en) | A kind of image search method strengthening expression based on relational matrix regularization | |
CN111601179A (en) | Network advertisement promotion method based on video content | |
CN110674678A (en) | Method and device for identifying sensitive mark in video | |
Kumar et al. | Discrete cosine transform features matching-based forgery mask detection for copy-move forged images | |
CN112231508B (en) | Encrypted JPEG image retrieval method based on content | |
Qin et al. | Image retrieval based on a hybrid model of deep convolutional encoder | |
Liu et al. | MSNet: a multiple supervision network for remote sensing scene classification | |
Ji et al. | Text-to-image generation via semi-supervised training | |
Khorshid et al. | Coverless Image Steganography | |
CN114338058A (en) | Information processing method, device and storage medium | |
CN110222217A (en) | A kind of shoes watermark image search method based on sectionally weighting | |
Chuxuan | Cryptosystem recognition scheme based on convolution features | |
Yang et al. | Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors | |
CN115134142B (en) | Information hiding method and system based on file segmentation | |
Yang et al. | Multimodal Relationship-aware Attention Network for Fake News Detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |
|
RJ01 | Rejection of invention patent application after publication |