CN109379507A - A kind of guard method of image, storage medium - Google Patents

A kind of guard method of image, storage medium Download PDF

Info

Publication number
CN109379507A
CN109379507A CN201811088985.2A CN201811088985A CN109379507A CN 109379507 A CN109379507 A CN 109379507A CN 201811088985 A CN201811088985 A CN 201811088985A CN 109379507 A CN109379507 A CN 109379507A
Authority
CN
China
Prior art keywords
image
block
dct coefficient
encrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811088985.2A
Other languages
Chinese (zh)
Inventor
叶从欢
单志广
熊曾刚
张学敏
徐方
刘振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Engineering University
Original Assignee
Hubei Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Engineering University filed Critical Hubei Engineering University
Priority to CN201811088985.2A priority Critical patent/CN109379507A/en
Publication of CN109379507A publication Critical patent/CN109379507A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The present embodiments relate to a kind of guard methods of image, storage medium.Wherein, it provides through this embodiment: discrete cosine transform processing is carried out to obtained each image block, obtain changing image block corresponding with its (referring to each image block), secret information is embedded in each changing image block, DCT coefficient block after obtaining hiding information corresponding with its (referring to each changing image block), DCT coefficient block after each hiding information is encrypted, after the encryption carried out specifically by chaos encryption algorithm and encryption code key, obtain encrypted DCT coefficient block corresponding with its (the DCT coefficient block after referring to each hiding information), after carrying out inverse two-dimension discrete cosine transform processing to each encrypted DCT coefficient block, obtain the technical solution of encrypted image, it avoids in the prior art, when by the way that entire image being encrypted, encrypt accuracy not High technology drawback, to realize the technical effect accurately encrypted to image.

Description

A kind of guard method of image, storage medium
Technical field
The present embodiments relate to technical field of image processing more particularly to a kind of guard methods of image, storage medium.
Background technique
With the development of science and technology, image procossing has been applied to focus of attention in many fields.For example, image The application of processing in the camera, application etc. of the image procossing in VR technology.
Since image carries many information, to avoid leakage information, need to carry out encryption and decryption processing to image.
In the prior art, it when being encrypted to image, usually to the whole image got while encrypting Processing.I.e. based on whole image, it is encrypted on the basis of whole image.
During inventor realizes the present invention, at least there is the not high technology drawback of image encryption accuracy in discovery.
Summary of the invention
In order to solve the above technical problems, the embodiment of the invention provides a kind of guard methods of image, storage medium.
According to an aspect of an embodiment of the present invention, described the embodiment of the invention provides a kind of guard method of image Method includes:
The carrier image got is pre-processed, multiple images block is obtained;
Discrete cosine transform processing is carried out to each described image block, obtains multiple changing image blocks, wherein an institute State the corresponding changing image block of image block;
Preset secret information is respectively embedded into each changing image block, the DCT after obtaining multiple hiding informations Coefficient block, wherein the DCT coefficient block after the corresponding hiding information of a changing image block;
It is carried out by the DCT coefficient block after chaos encryption algorithm and the preset encryption each hiding information of secret key pair Encryption obtains multiple encrypted DCT coefficient blocks, wherein the DCT coefficient block after a hiding information is one corresponding The encrypted DCT coefficient block;
Inverse two-dimension discrete cosine transform is carried out to the encrypted DCT coefficient block to handle, and obtains encrypted image.
There is provided through this embodiment: discrete cosine transform processing carried out to obtained each image block, obtain and its (referring to each image block) corresponding changing image block, secret information is embedded in each changing image block, obtains (referring to it Each changing image block) DCT coefficient block after corresponding hiding information, the DCT coefficient block after each hiding information is carried out Encryption obtains (referring to each hidden with it after the encryption carried out specifically by chaos encryption algorithm and encryption code key DCT coefficient block after hiding information) corresponding encrypted DCT coefficient block, inverse two dimension is carried out to each encrypted DCT coefficient block After discrete cosine transform processing, the technical solution of encrypted image is obtained, is avoided in the prior art, by being carried out to entire image When encryption, the not high technology drawback of encryption accuracy, to realize the technical effect accurately encrypted to image.
Preferably, the described pair of carrier image got pre-processes, and obtains multiple images block, specifically includes:
The carrier image is converted, the carrier image of bivector is obtained;
The carrier image of the bivector is subjected to piecemeal processing, obtains described multiple images block.
It provides through this embodiment: conversion process first being carried out to carrier image, obtains the carrier image of bivector, then Piecemeal processing is carried out to the carrier image of obtained bivector, obtains the technical solution of multiple images block, realize efficiently and Accurately carrier image is split, obtains the technical effect of multiple images block.
Preferably, the method also includes:
The location information of the secret information is determined according to preset hiding code key and preset pseudo-random function;
It is described that preset secret information is respectively embedded into each changing image block, specifically:
The secret information is respectively embedded into each changing image block according to the positional information.
It provides through this embodiment: when existing basis hides code key and pseudo-random function has determined the position letter of secret information After breath, then secret information is embedded in by the technical solution in changing image block according to location information, realizes and safely and reliably exist The technical effect of secret information is embedded in changing image block.
Preferably, the method also includes:
The digital finger-print information that will acquire carries out transcoding processing, obtains binary data stream;
The binary data stream is stored into one-dimensional vector, the secret information is obtained.
There is provided through this embodiment: binary data stream obtained according to digital finger-print information, and will obtain two into After data flow processed is stored into one-dimensional vector, obtain the technical solution of secret information, realize secret information safety and can By the technical effect of property.
Preferably, the method also includes: to the encrypted image carry out two-dimension discrete cosine transform processing, obtain multiple The encrypted DCT coefficient block.
The method also includes: after the chaos encryption algorithm and each decryption of encryption secret key pair DCT coefficient block is decrypted, the DCT coefficient block after obtaining multiple hiding informations.
The method also includes: the secret information in DCT coefficient block after will be embedded in each hiding information Rejecting processing is carried out, multiple changing image blocks are obtained.
The method also includes: inverse discrete cosine transform processing is carried out to each modified-image block, is obtained multiple Described image block.
The method also includes: splicing is carried out to multiple described image blocks, obtains the carrier image.
Wherein, described that splicing is carried out to multiple described image blocks, the carrier image is obtained, is specifically included:
Split processing is carried out to multiple described image blocks, obtains the carrier image of bivector;
Conversion process is carried out to the carrier image of the bivector, obtains the carrier image.
Wherein, the method also includes:
Binary data stream is determined according to the secret information;
Transcoding processing is carried out to the binary data stream, obtains digital finger-print information.
The another aspect provided according to embodiments of the present invention computer-readable is deposited the embodiment of the invention also provides a kind of Storage media, including instruction, when run on a computer, so that computer executes method described in any embodiment as above
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the guard method of image provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the encryption method of image provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of the decryption method of image provided in an embodiment of the present invention;
Fig. 4 is separable enciphering hiding algorithm flow schematic diagram provided in an embodiment of the present invention;
Fig. 5 is inseparable enciphering hiding algorithm flow schematic diagram provided in an embodiment of the present invention;
Fig. 6 is the contrast schematic diagram of original image and encrypted image;
Fig. 7 is the contrast schematic diagram of the image after encrypted image and decryption;
Fig. 8 is that digital finger-print Information hiding extracts schematic diagram;
Fig. 9 is that Arnold-DCT combines encrypting fingerprint algorithmic procedure schematic diagram;
Figure 10 is the effect diagram that Logistic-DCT scheme realizes the fingerprint embedding and encryption and decryption of jpeg image;
Figure 11 is Logistic-DCT scheme image histogram.
Specific embodiment
In being described below, for illustration and not for limitation, propose such as specific system structure, interface, technology it The detail of class, to understand thoroughly the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system and method Detailed description, in order to avoid unnecessary details interfere description of the invention.
The embodiment of the invention provides a kind of guard methods of image, storage medium.
According to an aspect of an embodiment of the present invention, the embodiment of the invention provides a kind of guard methods of image.
First embodiment:
Please refer to Fig. 1 and Fig. 2, wherein Fig. 1 is that a kind of process of the guard method of image provided in an embodiment of the present invention is shown It is intended to, Fig. 2 is a kind of flow diagram of the encryption method of image provided in an embodiment of the present invention.
Guard method can be divided into encryption and decryption two large divisions, this method (specially encryption unit combined with Figure 1 and Figure 2, Point) include:
S100: pre-processing the carrier image got, obtains multiple images block.
When getting carrier image, first carrier image is pre-processed, to obtain multiple images block.
Wherein, there are many pretreated modes, such as:
Carrier image is split according to the size of the area of carrier image, obtains multiple images block.Preferably, each The area equation of image block.
It is of course also possible to divide according to demand to carrier image, multiple images block is obtained.Such as, by carrier image point For part A and part B, although the area equation of the area of part A and part B, part A is attached most importance to mian part timesharing, then by the portion A It is divided into a image block, part B is divided into b image block, and a is greater than b.
S200: discrete cosine transform processing is carried out to each image block, obtains multiple changing image blocks, wherein one Image block corresponds to a changing image block.
If sharing n image block, discrete cosine transform processing is carried out to each of n image block, to each After a image block is handled, a changing image block can be all obtained.
Wherein, discrete cosine transform processing can make image be transformed into DCT frequency domain from airspace.
Define the discrete cosine transform F (u, v) for the image f (x, y) that size is [M × N] are as follows:
Inverse discrete cosine transform f (x, y) are as follows:
Piece image is made discrete cosine transform image is in fact equivalent to decompose, so that one group of formation is similar In the spatial frequency of frequency spectrum, what F (u, v) was indicated is the weight that spatial frequency corresponding to each pixel accounts in original image. And inverse discrete cosine transformation is precisely the inverse process of discrete cosine transform, the effect of transformation coefficient F (u, v) is extremely important, because It can accurately and completely provide the size of the component shared by every kind of frequency content in restructuring procedure.It is constituted in F (u, v) coefficient In matrix, the average brightness of image F (x, y) is indicated with F (0,0), and it is referred to as direct current (DC) coefficient;There is also 63 Coefficient, which is referred to as them, exchanges (AC) coefficient, and horizontal spatial frequency is successively increased according to order from left to right, in vertical direction On spatial frequency successively increased according to direction from top to bottom.
S300: preset secret information is respectively embedded into each changing image block, the DCT after obtaining multiple hiding informations Coefficient block, wherein the DCT coefficient block after the corresponding hiding information of a changing image block.
S400: by chaos encryption algorithm and it is preset encryption each hiding information of secret key pair after DCT coefficient block into Row encryption obtains multiple encrypted DCT coefficient blocks, wherein DCT coefficient block corresponding one after a hiding information adds DCT coefficient block after close.
If the gray value at image image (i, j) is I (i, j), meet following 1≤i of condition≤M, 1≤j≤N, I ' (i, j) indicates gray value of the I (i, j) at (i, j) after replacement.The replacement formula of pixel are as follows:It is understood that decryption is encryption Inverse process.So the formula of decryption are as follows: Wherein: what L was indicated is the color value size of image;What mod was indicated is modulus operation;Indicate step-by-step XOR operation.r1,r2,r3 What is indicated is the key of chaos sequence value replacement transformation by r1,r2,r3Corresponding chaos system provides, and transformation can be divided into repeatedly It carries out, the more cipher round results of number of repetition are better.If this number of repetition is defined as n, it can be first with chaos encryption Initial value collectively forms the encryption key of the Encryption Algorithm with corresponding parameter, so obviously increases key space itself, It is improved the encryption intensity of the algorithm.If the image to be encrypted is very big, r can be could see by formula above1, r2,r3Template matrix is also required to increase with it, but in this case can reduce the efficiency of encryption.So we can be by preparatory Image, which is carried out piecemeal processing, just can solve this problem, and can also can be improved the encryption efficiency of image in this way. Referring specifically to Fig. 6 and Fig. 7, wherein Fig. 6 is the contrast schematic diagram of original image and encrypted image.Wherein, in Fig. 6 The figure on the left side is original image, the image after the figure bit encryption on the right.Wherein, Fig. 7 is the image after encrypted image and decryption Contrast schematic diagram.Wherein, the figure on the left side of Fig. 7 is encrypted image, and the figure on the right is the image (i.e. original image) after decryption.
It is encrypted, is obtained by the DCT coefficient block after chaos encryption algorithm and the encryption each hiding information of secret key pair To the technical solution of encrypted DCT coefficient block, the technology effect of encrypted DCT coefficient block is realized efficiently and accurately obtained Fruit, so that the information of encrypted DCT coefficient block is not easy to be stolen by people, it is ensured that the safety of encrypted DCT coefficient block and Reliability.
S500: inverse two-dimension discrete cosine transform is carried out to each encrypted DCT coefficient block and is handled, encrypted image is obtained.
There is provided through this embodiment: discrete cosine transform processing carried out to obtained each image block, obtain and its (referring to each image block) corresponding changing image block, secret information is embedded in each changing image block, obtains (referring to it Each changing image block) DCT coefficient block after corresponding hiding information, the DCT coefficient block after every hiding information is added It is close, after the encryption processing carried out specifically by chaos encryption algorithm and encryption code key, obtain (referring to each hide with it DCT coefficient block after information) corresponding encrypted DCT coefficient block, to each encrypted DCT coefficient block carry out inverse two dimension from After dissipating cosine transform processing, the technical solution of encrypted image is obtained, is avoided in the prior art, by adding to entire image When close processing, the not high technology drawback of encryption accuracy, to realize the technical effect accurately encrypted to image.
Second embodiment:
The present embodiment is based on first embodiment.In the present embodiment, S100 is specifically included:
Carrier image is converted, the carrier image of bivector is obtained.
If carrier image is the carrier image of non-bivector, the conversion of bivector is first carried out to carrier image, is obtained To the carrier image of bivector.
The carrier image of bivector is subjected to piecemeal processing, obtains multiple images block.
Such as: the carrier image of bivector is divided into the image block of [8 × 8] of 64 non-overlaps.
It is understood that the number of image block is only intended to for example, and should not be understood as to of the invention real herein Apply the restriction of a protection scope.
It provides through this embodiment: conversion process first being carried out to carrier image, obtains the carrier image of bivector, then Piecemeal processing is carried out to the carrier image of obtained bivector, obtains the technical solution of multiple images block, realize efficiently and Accurately carrier image is split, obtains the technical effect of multiple images block.
3rd embodiment:
The present embodiment is based on first or second embodiments.In the present embodiment, this method further include:
The location information of secret information is determined according to preset hiding code key and preset pseudo-random function;
Preset secret information is respectively embedded into each changing image block, specifically:
Secret information is respectively embedded into each changing image block according to location information.
It provides through this embodiment: when existing basis hides code key and pseudo-random function has determined the position letter of secret information After breath, then secret information is embedded in by the technical solution in changing image block according to location information, realizes and safely and reliably exist The technical effect of secret information is embedded in changing image block.
Fourth embodiment:
The present embodiment is based on the first any embodiment into 3rd embodiment.In the present embodiment, this method is also Include:
The digital finger-print information that will acquire carries out transcoding processing, obtains binary data stream;
Binary data stream is stored into one-dimensional vector, secret information is obtained.
There is provided through this embodiment: binary data stream obtained according to digital finger-print information, and will obtain two into After data flow processed is stored into one-dimensional vector, obtain the technical solution of secret information, realize secret information safety and can By the technical effect of property.
It is understood that first embodiment corresponding encryption method into the guard method that fourth embodiment is image, The guard method of image further includes the decryption method with encryption method inverse process each other.
Please refer to Fig. 1 and Fig. 3, wherein Fig. 1 is that a kind of process of the guard method of image provided in an embodiment of the present invention is shown It is intended to, Fig. 3 is a kind of flow diagram of the decryption method of image provided in an embodiment of the present invention.
In conjunction with Fig. 1 and Fig. 3, this method also (specially decryption portion) includes:
S600: two-dimension discrete cosine transform processing is carried out to encrypted image, obtains multiple encrypted DCT coefficient blocks.
This method further include:
S700: being decrypted by the DCT coefficient block after chaos encryption algorithm and the encryption each decryption of secret key pair, DCT coefficient block after obtaining multiple hiding informations.
This method further include:
S800: the secret information in DCT coefficient block after will be embedded in each hiding information carries out rejecting processing, obtains more A changing image block.
This method further include:
S900: inverse discrete cosine transform processing is carried out to each modified-image block, obtains multiple images block.
This method further include:
S1000: splicing is carried out to multiple images block, obtains carrier image.
Wherein, splicing is carried out to multiple described image blocks, obtains carrier image, specifically includes:
Split processing is carried out to multiple images block, obtains the carrier image of bivector;
Conversion process is carried out to the carrier image of bivector, obtains carrier image.
Wherein, this method further include:
Binary data stream is determined according to secret information;
Transcoding processing is carried out to binary data stream, obtains digital finger-print information.
Now in conjunction with practical situations, the technical solution of the application is explained in detail.
It is understood that discrete cosine transform uses a kind of picture coding scheme based on orthogonal transformation, a width Image is actually that the spatially optical strength of Pixel of Digital Image is converted to frequency after discrete cosine transform Data so the information hidden into after its transformation is also not hides in the spatial domain again, but are hidden in a frequency domain, warp The frequency data for crossing image after anti-cosine transform are converted into pixel value spatially again, so will be secret by discrete cosine transform Ciphertext data is hidden into after the frequency domain of carrier image, if carrier image is under attack, most of attacks all make the picture of image Plain value changes, although pixel value is changed, frequency domain is more much smaller than spatial domain by being influenced, so improving The robustness of the algorithm.
Before encrypting jpeg stream, content owner first on original jpeg stream retaining space to carry out data insertion, Then secret number finger print information is embedded into the free space by content owner's reservation in the past, then to modified JPEG Stream is encrypted.After the jpeg stream for receiving encryption, receiving end can by image watermarking cipher key-extraction secret number finger print information, And original jpeg stream or the jpeg stream by encryption key creation label decryption can be restored.
Digital finger-print secret information is embedded into carrier jpeg stream by content owner first, then again to carrier jpeg stream It is encrypted.In recipient, the JPEG for the label encryption that he is first received with encryption key decryption is then extensive with image watermarking key Restore the confidential data of beginning jpeg stream and insertion.
It specifically may participate in Fig. 4 and Fig. 5.
Image is encrypted using logic chaotic maps (Logistic chaos) Encryption Algorithm, then selects and is converting Hiding discrete cosine transform (DCT) hidden algorithm in domain is hidden digital finger-print secret information.
The specific implementation to the program is described in detail respectively below.
Digital finger-print hidden algorithm in this algorithm uses the quantization method method of DCT domain, the digital finger-print information based on DCT The specific hiding and extraction process of hidden algorithm is as shown in Fig. 8 to Fig. 9.Wherein, Fig. 8 is that digital finger-print Information hiding extracts signal Figure.Fig. 9 is that Arnold-DCT combines encrypting fingerprint algorithmic procedure schematic diagram.
Referring to Fig. 10, Figure 10 is the effect that Logistic-DCT scheme realizes the fingerprint embedding and encryption and decryption of jpeg image Fruit schematic diagram.Carrier image and original image are without significant difference after hiding in figure, it is possible to illustrate that this scheme can reach pair The insertion purpose of digital finger-print.Carrier image becomes the noise that a width human eye can not be differentiated after the encryption of Encryption Algorithm Image, and the carrier image obtained after decryption is consistent with original image, therefore deduces that the program can reach encryption Purpose.
Wherein, (a) is original image, (b) is hidden image, (c) is encrypted image, (d) is decrypted image.
Figure 11 is please referred to, Figure 11 is Logistic-DCT scheme image histogram.It can be seen by image histogram in Figure 11 Out, image after being embedded in digital finger-print secret information image histogram without significant change, it can be seen that the algorithm can reach It hides and requires, and the algorithm is by the way that after image encryption, the histogram of image becomes flat by original tortuous injustice, this just increases Its encryption performance is added, so that it be made to be more difficult to be cracked.
Wherein, (a) is original image image, (b) is original image histogram, (c) is hidden image, (d) straight for hidden image Fang Tu (e) is encrypted image, (f) is encrypted image histogram, (i) is decrypted image, (g) is decrypted image histogram.
The another aspect provided according to embodiments of the present invention computer-readable is deposited the embodiment of the invention also provides a kind of Storage media, including instruction, when run on a computer, so that computer executes method described in any embodiment as above
Reader should be understood that in the description of this specification reference term " one embodiment ", " is shown " some embodiments " The description of example ", " specific example " or " some examples " etc. means specific features described in conjunction with this embodiment or example, structure Or feature is included at least one embodiment or example of the invention.In the present specification, to the schematic of above-mentioned term Statement need not be directed to identical embodiment or example.Moreover, specific features, structure or the feature of description can be any It can be combined in any suitable manner in a or multiple embodiment or examples.In addition, without conflicting with each other, the technology of this field The feature of different embodiments or examples described in this specification and different embodiments or examples can be combined by personnel And combination.
It is apparent to those skilled in the art that for convenience of description and succinctly, the dress of foregoing description The specific work process with unit is set, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can select some or all of unit therein according to the actual needs to realize the mesh of the embodiment of the present invention 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product To be stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention substantially or Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Out, which is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes all or part of each embodiment method of the present invention Step.And storage medium above-mentioned include: USB flash disk, it is mobile hard disk, read-only memory (ROM, Read-Only Memory), random Access various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic or disk Matter.
It should also be understood that magnitude of the sequence numbers of the above procedures are not meant to execute sequence in various embodiments of the present invention It is successive, the execution of each process sequence should be determined by its function and internal logic, the implementation without coping with the embodiment of the present invention Journey constitutes any restriction.
More than, only a specific embodiment of the invention, but scope of protection of the present invention is not limited thereto, and it is any to be familiar with Those skilled in the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or substitutions, These modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be wanted with right Subject to the protection scope asked.

Claims (10)

1. a kind of guard method of image, which is characterized in that the described method includes:
The carrier image got is pre-processed, multiple images block is obtained;
Discrete cosine transform processing is carried out to each described image block, obtains multiple changing image blocks, wherein a figure As the corresponding changing image block of block;
Preset secret information is respectively embedded into each changing image block, the DCT coefficient after obtaining multiple hiding informations Block, wherein the DCT coefficient block after the corresponding hiding information of a changing image block;
It is encrypted by the DCT coefficient block after chaos encryption algorithm and the preset encryption each hiding information of secret key pair Processing, obtains multiple encrypted DCT coefficient blocks, wherein the DCT coefficient block after a hiding information corresponds to described in one Encrypted DCT coefficient block;
Inverse two-dimension discrete cosine transform is carried out to each encrypted DCT coefficient block to handle, and obtains encrypted image.
2. a kind of guard method of image according to claim 1, which is characterized in that the described pair of carrier image got It is pre-processed, obtains multiple images block, specifically include:
The carrier image is converted, the carrier image of bivector is obtained;
The carrier image of the bivector is subjected to piecemeal processing, obtains described multiple images block.
3. a kind of guard method of image according to claim 1, which is characterized in that the method also includes:
The location information of the secret information is determined according to preset hiding code key and preset pseudo-random function;
It is described that preset secret information is respectively embedded into each changing image block, specifically:
The secret information is respectively embedded into each changing image block according to the positional information.
4. the guard method of image according to claim 1, which is characterized in that the method also includes:
The digital finger-print information that will acquire carries out transcoding processing, obtains binary data stream;
The binary data stream is stored into one-dimensional vector, the secret information is obtained.
5. a kind of guard method of image described in any one of -4 according to claim 1, which is characterized in that the method is also wrapped It includes:
Two-dimension discrete cosine transform processing is carried out to the encrypted image, obtains multiple encrypted DCT coefficient blocks.
6. the guard method of image according to claim 5, which is characterized in that the method also includes:
Place is decrypted by the DCT coefficient block after the chaos encryption algorithm and the encryption each decryption of secret key pair Reason, the DCT coefficient block after obtaining multiple hiding informations.
7. a kind of guard method of image according to claim 6, which is characterized in that the method also includes:
The secret information in DCT coefficient block after will be embedded in each hiding information carries out rejecting processing, obtains more A changing image block.
8. a kind of decryption method of image according to claim 6, which is characterized in that the method also includes:
Inverse discrete cosine transform processing is carried out to each modified-image block, obtains multiple described image blocks.
9. a kind of decryption method of image a method according to any one of claims 6-8, which is characterized in that the method is also wrapped It includes:
Splicing is carried out to multiple described image blocks, obtains the carrier image.
10. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer executes such as Method of any of claims 1-9.
CN201811088985.2A 2018-09-18 2018-09-18 A kind of guard method of image, storage medium Pending CN109379507A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811088985.2A CN109379507A (en) 2018-09-18 2018-09-18 A kind of guard method of image, storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811088985.2A CN109379507A (en) 2018-09-18 2018-09-18 A kind of guard method of image, storage medium

Publications (1)

Publication Number Publication Date
CN109379507A true CN109379507A (en) 2019-02-22

Family

ID=65405656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811088985.2A Pending CN109379507A (en) 2018-09-18 2018-09-18 A kind of guard method of image, storage medium

Country Status (1)

Country Link
CN (1) CN109379507A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502913A (en) * 2019-08-22 2019-11-26 天津一鉴楼文化科技有限公司 A kind of method that symmetrical hash obscures content
CN110634096A (en) * 2019-08-07 2019-12-31 华中师范大学 Self-adaptive multi-mode information hiding method and device
CN111064717A (en) * 2019-12-06 2020-04-24 浙江大华技术股份有限公司 Data encoding method, data decoding method, related terminal and device
CN111654592A (en) * 2020-06-05 2020-09-11 中国矿业大学 Multi-image hiding method based on secret sharing
CN111931891A (en) * 2020-10-13 2020-11-13 北京博大格林高科技有限公司 Method for constructing anti-counterfeiting graphic code by using novel orthogonal code, anti-counterfeiting graphic code and generation device
CN113704710A (en) * 2021-08-27 2021-11-26 上海钧正网络科技有限公司 Information hiding method and device and computer storage medium
CN113704710B (en) * 2021-08-27 2024-06-07 上海钧正网络科技有限公司 Information hiding method and device and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005603A (en) * 2006-01-18 2007-07-25 华中科技大学 Method and device for enciphering, deenciphering and transfer code of image data
CN101739657A (en) * 2009-11-06 2010-06-16 上海第二工业大学 DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method
JP2015115921A (en) * 2013-12-16 2015-06-22 満男 江口 Image compression decompression method, device and program for cryptographic communication, and storage medium
CN107845055A (en) * 2017-07-17 2018-03-27 安徽大学 The image encryption method of anti-Facebook compressions
CN108230225A (en) * 2017-12-29 2018-06-29 中国地质大学(武汉) A kind of hierarchical access control method towards ground big data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005603A (en) * 2006-01-18 2007-07-25 华中科技大学 Method and device for enciphering, deenciphering and transfer code of image data
CN101739657A (en) * 2009-11-06 2010-06-16 上海第二工业大学 DCT domain-based color image digital watermark embedding method and DCT domain-based color image digital watermark extracting method
JP2015115921A (en) * 2013-12-16 2015-06-22 満男 江口 Image compression decompression method, device and program for cryptographic communication, and storage medium
CN107845055A (en) * 2017-07-17 2018-03-27 安徽大学 The image encryption method of anti-Facebook compressions
CN108230225A (en) * 2017-12-29 2018-06-29 中国地质大学(武汉) A kind of hierarchical access control method towards ground big data

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110634096A (en) * 2019-08-07 2019-12-31 华中师范大学 Self-adaptive multi-mode information hiding method and device
CN110634096B (en) * 2019-08-07 2022-04-26 华中师范大学 Self-adaptive multi-mode information hiding method and device
CN110502913A (en) * 2019-08-22 2019-11-26 天津一鉴楼文化科技有限公司 A kind of method that symmetrical hash obscures content
CN111064717A (en) * 2019-12-06 2020-04-24 浙江大华技术股份有限公司 Data encoding method, data decoding method, related terminal and device
CN111064717B (en) * 2019-12-06 2022-11-22 浙江大华技术股份有限公司 Data encoding method, data decoding method, related terminal and device
CN111654592A (en) * 2020-06-05 2020-09-11 中国矿业大学 Multi-image hiding method based on secret sharing
CN111931891A (en) * 2020-10-13 2020-11-13 北京博大格林高科技有限公司 Method for constructing anti-counterfeiting graphic code by using novel orthogonal code, anti-counterfeiting graphic code and generation device
CN111931891B (en) * 2020-10-13 2021-08-24 北京博大格林高科技有限公司 Method for constructing anti-counterfeiting graphic code by using novel orthogonal code, anti-counterfeiting graphic code and generation device
CN113704710A (en) * 2021-08-27 2021-11-26 上海钧正网络科技有限公司 Information hiding method and device and computer storage medium
CN113704710B (en) * 2021-08-27 2024-06-07 上海钧正网络科技有限公司 Information hiding method and device and computer storage medium

Similar Documents

Publication Publication Date Title
Sirichotedumrong et al. Privacy-preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain
CN109379507A (en) A kind of guard method of image, storage medium
Denis et al. Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
JP4877788B2 (en) Method and system for securely processing an input image sequence
Hurrah et al. Embedding in medical images: an efficient scheme for authentication and tamper localization
Abdullah et al. A framework for iris biometrics protection: a marriage between watermarking and visual cryptography
Najih et al. An improved secure image hiding technique using PN-sequence based on DCT-OTP
Madhu et al. An overview of image security techiques
Sirichotedumrong et al. On the security of pixel-based image encryption for privacy-preserving deep neural networks
Jawad et al. A review of color image encryption techniques
CN110110535A (en) A kind of low distortion steganography method based on picture element matrix
Priya et al. Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection
Sirichotedumrong et al. Visual security evaluation of learnable image encryption methods against ciphertext-only attacks
Fkirin et al. Two-level security approach combining watermarking and encryption for securing critical colored images
Singh et al. A recent survey on data hiding techniques
Rashaideh et al. Real-time image encryption and decryption methods based on the Karhunen-Loeve transform
Malipatil et al. An efficient 3D watermarking algorithm for 3D mesh models
Alam et al. A lossless digital watermarking scheme based on a new 3D-hyper chaotic map
Singh et al. DIP using image encryption and XOR operation affine transform
Yang Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment
Köhler et al. Protecting information with subcodstanography
CN110516461B (en) Multichannel image encryption method and device, storage medium and electronic equipment
Huang et al. Image data hiding with multi-scale autoencoder network
Maheshwari et al. Robust multi-modal watermarking using visually encrypted watermark
Ridzoň et al. Information hiding within still images based on the DCT coefficients flipping and encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222

RJ01 Rejection of invention patent application after publication