CN108898537B - A kind of digital picture steganography method - Google Patents
A kind of digital picture steganography method Download PDFInfo
- Publication number
- CN108898537B CN108898537B CN201810285937.6A CN201810285937A CN108898537B CN 108898537 B CN108898537 B CN 108898537B CN 201810285937 A CN201810285937 A CN 201810285937A CN 108898537 B CN108898537 B CN 108898537B
- Authority
- CN
- China
- Prior art keywords
- image
- scramble
- transformation
- carrier
- secret information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The present invention relates to a kind of digital picture steganography methods, for secret information to be embedded in carrier image, it is transmitted with generating Secret Image, it is characterised in that include the following steps: Step 1: carrying out multiple Arnold scramble transformation to experimental vehicle image forms carrier image space;Step 2: secret information to be embedded is respectively embedded in the image in carrier image space;Hidden image is obtained with Arnold scramble transformation Step 3: close scramble image will be carried;Step 4: selecting final carrier image, and using k as key;Step 5: carrier image is carried out k Arnold scramble transformation as final carrier image, secret information is embedded in final carrier image using key k, then the final close image of load is carried out n-k Arnold scramble transformation, forms final hidden image.The present invention can make to be embedded in after secret information is distorted minimum caused by carrier image.
Description
Technical field
The present invention relates to a kind of digital picture steganography methods.
Background technique
Steganography is a kind of Information Hiding Techniques by the way that secret information to be hidden in other media bearers, as carrier
Digital Media can be text, image, audio, video etc., be considered as the most common carrier since digital picture capacity is larger.
Target based on digital picture steganographic algorithm is insertion secret information as much as possible, and does not destroy each of carrier image as far as possible
A characteristic, that is, reach that image fault is as small as possible, and keeps the statistical nature of image.In steganography system, steganography mistake
Journey can be by formula s=Em(c, m) description, wherein c is carrier image, and s is hidden image, and m is secret information to be embedded, EmFor
Steganography embedded mobile GIS.Steganalysis is by the change of detection carrier image feature or exception to determine whether comprising secret
Information, it is clear that the performance of steganographic system and insertion distortion function f=D (c, s) are closely related, can release distortion letter by two formulas above
Number f=D (c, Em(c,m)).It can be seen that the performance of steganographic system is not only related to steganography embedded mobile GIS, also with the close phase of carrier image
It closes.
Summary of the invention
It, should the technical problem to be solved by the present invention is to provide a kind of digital picture steganography method for the above-mentioned prior art
Method can make to be embedded in after secret information is distorted minimum caused by carrier image, or is similarly distorted situation in carrier image
Under, the secret information capacity of insertion reaches maximum.
The technical scheme of the invention to solve the technical problem is: a kind of digital picture steganography method, feature
It is to include the following steps:
Step 1: to experimental vehicle image c0It carries out an Arnold scramble transformation and forms the first scramble image c1, wherein setting
Random formula is as follows:
Wherein x, y be experimental vehicle image in a certain pixel where position coordinates, x ', y ' be scramble transformation after should
Position coordinates where pixel,For image array, wherein a, b are preset natural number, and N is image array
Order;
Step 2: to the first scramble image c1An Arnold scramble transformation is carried out again forms the second scramble image c2, with this
Analogize, by the i-th scramble image ciI+1 scramble image c is formed by an Arnold scramble transformationi+1, i ∈ therein 1,
2 ... n }, finally by experimental vehicle image c0Carrier image space C={ c is formd by a series of Arnold scramble transformation0,
c1,c2,…,cn, wherein n is the shuffling cycle of experimental vehicle image, and the size of shuffling cycle and image has relationship;
Step 3: secret information to be embedded is converted to binary code stream m, a kind of common image latent writing side is selected
The binary code stream m of secret information is respectively embedded in carrier image space C={ c by method0,c1,c2,…,cnIn n+1 figure
As in, forms n+1 and carry close scramble image Asj(j∈{0,1,2,…n});
Step 4: carrying close scramble image As for n+1j(j ∈ 0,1,2 ... n }) by with Arnold scramble transformation point
Hidden image s is not obtainedj: close scramble image As is carried for one ofj, n-j Arnold scramble transformation of progress can be obtained hidden
Write image sj, wherein j ∈ { 0,1,2 ... n };
Step 5: an index of the image latent writing method performance of specified evaluation, passes through following formula: k=arg min
D(c0,sj) j ∈ { 0,1,2 ... n }, the scramble image with secret information best match to be embedded is selected as final carrier
Image, arg min D (c0,sj) indicate hidden image sjCompared to experimental vehicle image c0It is deemed-to-satisfy4 in specified image latent writing
The minimum value of distortion value in energy, and using k as key;
Step 6: the key k obtained using step 5, carries out setting for k Arnold scramble transformation formation for carrier image
The final carrier image that random image is embedded in as secret information, the binary code for being converted secret information using image latent writing method
Stream m be embedded in final carrier image, form the close image of final load, then recycle key k the final close image of load into
N-k Arnold scramble transformation of row, forms final hidden image.
In the step 2, when experimental vehicle image size is 512 × 512, shuffling cycle n is 383.
In the step 1, a=b=1.
Compared with the prior art, the advantages of the present invention are as follows: the present invention utilizes Arnold scramble transformation by a width carrier figure
As the multiple carrier images with different statistical properties of generation, that is, construct the load being made of multiple versions of carrier image
Volumetric image space, in order to improve the performance of steganographic system, during steganography can carrier image space search to secret
The carrier image version of information best match so that insertion processing is distorted minimum caused by image, or is similarly being distorted
In the case of, embedding capacity reaches maximum.
Detailed description of the invention
Fig. 1 be the embodiment of the present invention in step 1 to step 5 flow chart.
Fig. 2 is to carry out image transmission and received flow chart using digital picture steganography method in the embodiment of the present invention.
Specific embodiment
The present invention will be described in further detail below with reference to the embodiments of the drawings.
Digital picture steganography method provided in this embodiment, for secret information to be embedded in carrier image, to generate secret
Image is transmitted comprising following steps:
Step 1: to experimental vehicle image c0It carries out an Arnold scramble transformation and forms the first scramble image c1, wherein setting
Random formula is as follows:
Wherein x, y be experimental vehicle image in a certain pixel where position coordinates, x ', y ' be scramble transformation after should
Position coordinates where pixel,For image array, wherein a, b are preset natural number, in the present embodiment
A=b=1, N are the order of image array, the image of corresponding 512*512, N 512;
Step 2: to the first scramble image c1An Arnold scramble transformation is carried out again forms the second scramble image c2, with this
Analogize, by the i-th scramble image ciI+1 scramble image c is formed by an Arnold scramble transformationi+1, i ∈ therein 1,
2 ... n }, finally by experimental vehicle image c0Carrier image space C={ c is formd by a series of Arnold scramble transformation0,
c1,c2,…,cn, wherein n is the shuffling cycle of experimental vehicle image, and the size of shuffling cycle and image has relationship;When experiment carries
When body image size is 512 × 512, shuffling cycle n is 383;
Step 3: secret information to be embedded is converted to binary code stream m, a kind of common image latent writing side is selected
The binary code stream m of secret information is respectively embedded in carrier image space C={ c by method0,c1,c2,…,cnIn n+1 figure
As in, forms n+1 and carry close scramble image Asj(j∈{0,1,2,…n});
Step 4: carrying close scramble image As for n+1j(j ∈ 0,1,2 ... n }) by with Arnold scramble transformation point
Hidden image s is not obtainedj: close scramble image As is carried for one ofj, n-j Arnold scramble transformation of progress can be obtained hidden
Write image sj, wherein j ∈ { 0,1,2 ... n };
Step 5: an index of the image latent writing method performance of specified evaluation, passes through following formula: k=arg min
D(c0,sj) j ∈ { 0,1,2 ... n }, the scramble image with secret information best match to be embedded is selected as final carrier
Image, arg min D (c0,sj) indicate hidden image sjCompared to experimental vehicle image c0It is deemed-to-satisfy4 in specified image latent writing
The minimum value of distortion value in energy, and using k as key;
Step 6: the key k obtained using step 5, carries out setting for k Arnold scramble transformation formation for carrier image
The final carrier image that random image is embedded in as secret information, the binary code for being converted secret information using image latent writing method
Stream m be embedded in final carrier image, form the close image of final load, then recycle key k the final close image of load into
N-k Arnold scramble transformation of row, forms final hidden image.
Using the above method, in information sender, best key k is searched using step 5, is obtained using step 6
Then key k and final hidden image are transmitted to recipient by hidden passageway by final hidden image;Receiving party
The scramble that k Arnold scramble transformation forms steganography is carried out first with the key pair hidden image received by hidden passageway
Then image extracts secret information from the hidden image of scramble using the extracting method of steganography, shown in Figure 2.
Claims (3)
1. a kind of digital picture steganography method is transmitted for secret information to be embedded in carrier image with generating Secret Image,
It is characterized by comprising following steps:
Step 1: to experimental vehicle image c0It carries out an Arnold scramble transformation and forms the first scramble image c1, wherein scramble is public
Formula is as follows:
Wherein x, y are the position coordinates where a certain pixel in experimental vehicle image, and x ', y ' are the pixel after scramble transformation
Position coordinates where point,For image array, wherein a, b are preset natural number, and N is the rank of image array
Number;
Step 2: to the first scramble image c1An Arnold scramble transformation is carried out again forms the second scramble image c2, with such
It pushes away, by the i-th scramble image ciI+1 scramble image c is formed by an Arnold scramble transformationi+1, i ∈ therein 1,2 ...
N }, finally by experimental vehicle image c0Carrier image space C={ c is formd by a series of Arnold scramble transformation0,c1,
c2,…,cn, wherein n is the shuffling cycle of experimental vehicle image, and the size of shuffling cycle and image has relationship;
Step 3: secret information to be embedded is converted to binary code stream m, a kind of common image latent writing method is selected, it will
The binary code stream m of secret information is respectively embedded in carrier image space C={ c0,c1,c2,…,cnIn n+1 image work as
In, it forms n+1 and carries close scramble image Asj(j∈{0,1,2,…n});
Step 4: carrying close scramble image As for n+1j(j ∈ 0,1,2 ... n }) by being obtained respectively with Arnold scramble transformation
To hidden image sj: close scramble image As is carried for one ofj, carrying out n-j Arnold scramble transformation can be obtained steganography figure
As sj, wherein j ∈ { 0,1,2 ... n };
Step 5: an index of the image latent writing method performance of specified evaluation, passes through following formula: k=argmin D (c0,
sj) j ∈ { 0,1,2 ... n }, it selects with the scramble image of secret information best match to be embedded as final carrier image,
argmin D(c0,sj) indicate hidden image sjCompared to experimental vehicle image c0In specified image latent writing method performance
The minimum value of distortion value, and using k as key;
Step 6: the key k obtained using step 5, carries out the scramble figure that k Arnold scramble transformation is formed for carrier image
As the final carrier image as secret information insertion, the binary code stream m for being converted secret information using image latent writing method
It is embedded in final carrier image, forms the close image of final load, then recycle key k that the final close image of load is carried out n-
K Arnold scramble transformation, forms final hidden image.
2. digital picture steganography method according to claim 1, it is characterised in that: in the step 2, work as experimental vehicle
When image size is 512 × 512, shuffling cycle n is 383.
3. digital picture steganography method according to claim 1, it is characterised in that: in the step 1, a=b=1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810285937.6A CN108898537B (en) | 2018-04-03 | 2018-04-03 | A kind of digital picture steganography method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810285937.6A CN108898537B (en) | 2018-04-03 | 2018-04-03 | A kind of digital picture steganography method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108898537A CN108898537A (en) | 2018-11-27 |
CN108898537B true CN108898537B (en) | 2019-07-16 |
Family
ID=64342307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810285937.6A Active CN108898537B (en) | 2018-04-03 | 2018-04-03 | A kind of digital picture steganography method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108898537B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109658322B (en) * | 2018-12-11 | 2019-09-03 | 宁波大学 | A kind of large capacity image latent writing method and secret information extraction method |
CN110430335B (en) * | 2019-08-02 | 2021-05-11 | 陕西师范大学 | Information disguising and recovering method, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050624A (en) * | 2014-06-20 | 2014-09-17 | 宁波大学 | Digital image steganographic method |
CN107578362A (en) * | 2017-05-24 | 2018-01-12 | 上海大学 | It is embedded in the method for secret information in the picture based on textures synthesis |
-
2018
- 2018-04-03 CN CN201810285937.6A patent/CN108898537B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050624A (en) * | 2014-06-20 | 2014-09-17 | 宁波大学 | Digital image steganographic method |
CN107578362A (en) * | 2017-05-24 | 2018-01-12 | 上海大学 | It is embedded in the method for secret information in the picture based on textures synthesis |
Non-Patent Citations (1)
Title |
---|
基于图像特征的隐写术载体图像的选择;杨任尔 等;《光电子.激光》;20140430;第25卷(第4期);第764-768页 |
Also Published As
Publication number | Publication date |
---|---|
CN108898537A (en) | 2018-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Coverless image steganography using partial-duplicate image retrieval | |
Rajendran et al. | Chaotic map based random image steganography using lsb technique. | |
Cao et al. | Coverless information hiding based on the molecular structure images of material. | |
Zhang et al. | Reference sharing mechanism for watermark self-embedding | |
Wazirali et al. | An optimized steganography hiding capacity and imperceptibly using genetic algorithms | |
Chang et al. | A secure fragile watermarking scheme based on chaos-and-hamming code | |
Zhang et al. | Fragile watermarking with error-free restoration capability | |
Zhou et al. | Secret-to-image reversible transformation for generative steganography | |
Zhang et al. | A generative method for steganography by cover synthesis with auxiliary semantics | |
Peng et al. | Image authentication scheme based on reversible fragile watermarking with two images | |
CN101452569B (en) | Processing method of image latent writing based on auxiliary pixel | |
Yin et al. | Reversible data hiding in encrypted image based on block histogram shifting | |
CN110312138B (en) | High-embedding-capacity video steganography method and system based on time sequence residual convolution modeling | |
CN108898537B (en) | A kind of digital picture steganography method | |
Wang et al. | HidingGAN: High capacity information hiding with generative adversarial network | |
CN115482139A (en) | Traceable deep learning model black box watermark scheme | |
CN102142129B (en) | Visual secret sharing-based image content tampering detection method | |
CN110136045B (en) | Method for hiding and recovering based on mutual scrambling of two images | |
Cui et al. | Multitask identity-aware image steganography via minimax optimization | |
Li et al. | Coverless image steganography using morphed face recognition based on convolutional neural network | |
Pan et al. | A lossless watermarking scheme for halftone image authentication | |
CN107169914A (en) | A kind of cipher-text information generation method for image latent writing | |
CN111284157B (en) | Commodity package anti-counterfeiting printing and verifying method based on fractional order steganography technology | |
CN111275603B (en) | Security image steganography method based on style conversion and electronic device | |
Qin et al. | Artificial Intelligence Oriented Information Hiding and Multimedia Forensics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |