CN109547663B - Improved LSB image steganography method combined with cryptography - Google Patents

Improved LSB image steganography method combined with cryptography Download PDF

Info

Publication number
CN109547663B
CN109547663B CN201811069942.XA CN201811069942A CN109547663B CN 109547663 B CN109547663 B CN 109547663B CN 201811069942 A CN201811069942 A CN 201811069942A CN 109547663 B CN109547663 B CN 109547663B
Authority
CN
China
Prior art keywords
secret
information
image
secret information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811069942.XA
Other languages
Chinese (zh)
Other versions
CN109547663A (en
Inventor
穆罕默德.希瓦
杨俊美
李洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN201811069942.XA priority Critical patent/CN109547663B/en
Publication of CN109547663A publication Critical patent/CN109547663A/en
Application granted granted Critical
Publication of CN109547663B publication Critical patent/CN109547663B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Facsimile Transmission Control (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)

Abstract

The invention discloses a cryptograph-combined improved LSB image steganography method, which comprises the following steps: (1) and (3) encryption process: inputting a carrier image and secret information, and carrying out encryption preprocessing to obtain the lowest k effective bit of a carrier image block and binary information of a secret information array block; applying cryptographic encryption coding to the secret information array block according to the carrier image block to generate a secret key for each secret information array block; replacing the least-significant-k bits of the carrier image with the obtained encryption information, thereby outputting an encrypted image, and taking a key address in the encrypted image as an output; (2) and (3) decryption process: inputting an encrypted image and a key address, and dividing the encrypted image into nxn pixel blocks; and then, decrypting the encrypted image by using the secret key, and finally, applying a decoding algorithm to the decrypted information to obtain the secret information. Compared with the traditional method, the method increases the information hiding capacity and has the advantages of good hiding performance and good robustness.

Description

Improved LSB image steganography method combined with cryptography
Technical Field
The invention relates to the field of information security and cryptography, in particular to an improved LSB (least significant bit) image steganography method combining cryptography.
Background
With the rapid development of information technology and the widespread use of the internet, digital media has become an important carrier for military, commercial, etc. organizations and individuals to acquire and transfer information. Meanwhile, digital communication in the internet is vulnerable to eavesdropping, malicious interference and the like, so people pay more attention to the communication security problem than ever before. The traditional encryption technology converts information into ciphertext to hide information content, but has the defect that the ciphertext after encryption is meaningless messy code and easily attracts the attention of an attacker, so that the information is interfered or intercepted, even damaged. In this context, a new communication security concept is gradually formed: communication security not only means hiding the content of information but also requires the existence of hidden information transmission behavior. Therefore, more covert digital Steganography (Steganography) with "camouflage" features is gaining increasing attention.
The basic modes of information hiding include transmission hiding, carrier hiding and storage hiding, and the implementation methods include an information hiding method based on replacement, an information hiding method based on transformation and an information hiding method based on spread spectrum, at present, steganography plays an increasingly important role in the field of information security, and is summarized into three aspects of secret communication, integrity and qualification authentication, and illegal disclosure of data, (1) secret communication is mainly used for secure communication of information, secret information is hidden in common multimedia information for transmission by steganography in network communication, and eavesdroppers have difficulty in detecting multimedia information really hidden with secret information when facing massive multimedia information on a network, (2) an important aspect of computer system security is data integrity.
The basic principle of digital steganography is to hide secret information to be transmitted into redundant information by utilizing the characteristic of the redundant information which is insensitive to a human perception system and exists in digital carriers such as images, videos, audios and texts, and the secret information is transmitted by means of transmission of the carriers. Because the surface of the information-embedded secret carrier is the same as that of a common carrier, a possible attacker can hardly perceive the existence of secret information, and the safe and concealed transmission of the information is ensured.
The Least Significant Bit (LSB) algorithm belongs to the spatial domain information hiding algorithm, which is one of the most widely used hiding techniques. Each image can be uniquely represented by its bit-plane, while the human visual system is very insensitive to the lowest few bits in the bit-plane, and replacing these corresponding bits with secret messages is a very confusing means of information hiding, and the amount of information hiding is relatively large. In this type of information hiding method, a lossless image format is mainly used and data can be directly processed and restored. The main disadvantages of the conventional image steganography based on the LSB algorithm are low security, poor detection resistance and poor robustness.
Disclosure of Invention
The invention aims to overcome the defects and shortcomings in the prior art, and provides an improved LSB image steganography method combined with cryptography.
In order to realize the purpose, the invention adopts the following technical scheme:
a method for improved LSB image steganography incorporating cryptography, comprising the steps of:
(1) and (3) encryption process: inputting a carrier image and secret information, and carrying out encryption preprocessing to obtain the lowest k effective bit of a carrier image block and a binary code of a secret information array block; applying cryptographic encryption coding to the secret information array block according to the carrier image block to generate a secret key for each secret information array block; carrying out encryption operation on the secret information array block according to the obtained secret key, then replacing the least-k significant bit of the carrier image with the encrypted secret information array, thereby outputting an encrypted image, and taking the address of the secret key in the encrypted image as output;
(2) and (3) decryption process: firstly, inputting an encrypted image and a secret key address, then decrypting the encrypted image by using the secret key, and finally applying a decoding algorithm to the decrypted information to obtain secret information.
As a preferred technical solution, in the step (1), the encryption preprocessing is: dividing an input carrier image into blocks of non-overlapping n × n pixels, and then extracting the least significant k bits of each block; meanwhile, a string table compression algorithm is applied to carry out compression coding on the input secret information, then the coded information is converted into binary information, the binary information is read into a secret information array, and the secret information array is divided into n multiplied by n bit blocks, so that a secret information array block can be obtained.
As a preferred technical solution, in the step (1), the specific process of generating the key for each secret information array block is as follows: carrying out XOR processing on the binary codes of the carrier image block and the secret information array block to obtain a result array; then, the total number t of each row of binary codes in the result array being 1 is calculated, and a key is generated for each secret information array block, namely if t > n/2, the corresponding key is 1, otherwise, the corresponding key is 0.
As a preferred technical solution, in the step (1), the encrypting operation on the secret information array block according to the key specifically includes: if the secret key corresponding to the binary column of the secret information array block is 1, each bit of the column is inverted, and if the corresponding secret key is 0, the column is kept as it is.
As a preferred technical scheme, the specific process of the step (2) is as follows:
firstly, inputting an encrypted image and a key address, dividing the encrypted image into blocks of n multiplied by n pixels, and extracting encryption information bits from the least k significant bits of the encrypted image blocks according to the key address; then, carrying out decryption operation on the encrypted information of each encrypted image block according to the secret key; and finally, applying a string table decompression algorithm to the decrypted information to obtain the secret information.
Compared with the prior art, the invention has the following advantages and effects:
1. the image steganography method of the invention applies the principle of cryptography, reduces the difference between the bits of the carrier image and the bits of the secret information, and enhances the robustness and the anti-detection performance;
2. the invention combines the string table compression algorithm to compress and encode the secret information, thereby increasing the capacity of the secret information.
Drawings
FIG. 1 is a flow chart of the improved LSB image steganography method of the present invention incorporating cryptography;
fig. 2(a) -2 (h) are exemplary diagrams of the improved LSB image steganography method in combination with cryptography in an encryption phase of the present invention, wherein fig. 2(a) is an input carrier image; FIG. 2(b) is an input secret; FIG. 2(c) shows the result array obtained by XOR processing the information array block; FIGS. 2(d) and 2(e) are processes for generating a key from a result array; FIGS. 2(f) and 2(g) are processes for encrypting an array of information according to a key; fig. 2(h) shows an output encrypted image.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention.
Examples
Fig. 1 shows a cryptogra phic improved LSB image steganography method, which includes the following steps:
and (3) an encryption stage:
inputting: carrier image, secret information;
and (3) outputting: encrypting the image and the secret key.
The first step is as follows: inputting a standard carrier image; as shown in fig. 2 (a);
the second step is that: dividing the carrier image into small blocks of n × n pixels without overlap;
the third step: extracting the least-k significant bit (Im _ b) of each tile;
the fourth step: inputting secret information; as shown in FIG. 2 (b);
the fifth step: applying a string table compression algorithm (LZW compression algorithm) to carry out compression coding on the secret information;
and a sixth step: converting the encoded information into binary information;
the seventh step: reading the binary information into an information array;
eighth step: dividing the information array into small blocks (mess _ b) of n × n bits;
the ninth step: applying cryptographic encryption coding to the information array block according to the carrier image block (i.e. performing exclusive or processing on the binary codes of the carrier image block and the secret information block) to obtain a result array (res _ b), as shown in fig. 2 (c); calculating the total number t of each row of binary codes in the result array as 1, as shown in fig. 2(d), generating a key (Keys) for each small block, i.e. if t > n/2, the corresponding key is 1, otherwise, the corresponding key is 0, as shown in fig. 2 (e);
the tenth step: encrypting the secret information array block according to the secret key, specifically operating as follows: if the key corresponding to the binary column of the secret information array block is 1, each bit of the column is inverted, and if the corresponding key is 0, the column is kept as it is, as shown in fig. 2 (f); replacing the least-k significant bit (Im _ b) with the encrypted secret information array block, as shown in fig. 2 (g);
the eleventh step: finding out the key address in the image as output;
the twelfth step: the encrypted image is output as shown in fig. 2 (h).
And a decryption stage:
inputting: encrypting the image, the key address;
and (3) outputting: carrier image, secret information.
The first step is as follows: inputting an encrypted image;
the second step is that: dividing the encrypted image into small blocks of n x n pixels;
the third step: extracting encryption information bits from the least k significant bits of the encryption image block according to the position of the secret key;
the fourth step: carrying out decryption operation on each small block according to the secret key;
the fifth step: a string table decompression algorithm (LZW decompression algorithm) is applied to obtain the secret information.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the claims.

Claims (3)

1. A method for improving LSB image steganography in combination with cryptography, comprising the steps of:
(1) and (3) encryption process: inputting a carrier image and secret information, and carrying out encryption preprocessing to obtain the lowest k effective bit of a carrier image block and a binary code of a secret information array block; applying cryptographic encryption coding to the secret information array block according to the carrier image block to generate a secret key for each secret information array block; carrying out encryption operation on the secret information array block according to the obtained secret key, then replacing the least-k significant bit of the carrier image with the encrypted secret information array, thereby outputting an encrypted image, and taking the address of the secret key in the encrypted image as output;
(2) and (3) decryption process: firstly, inputting an encrypted image and a secret key address, then decrypting the encrypted image by using the secret key, and finally applying a decoding algorithm to decrypted information to obtain secret information;
the encryption preprocessing comprises the following steps: dividing an input carrier image into blocks of non-overlapping n × n pixels, and then extracting the least significant k bits of each block; meanwhile, a string table compression algorithm is applied to carry out compression coding on the input secret information, then the coded information is converted into binary information, the binary information is read into a secret information array, and the secret information array is divided into n multiplied by n bit blocks, so that a secret information array block can be obtained;
the specific process of generating the secret key for each secret information array block is as follows: carrying out XOR processing on the binary codes of the carrier image block and the secret information array block to obtain a result array; then, the total number t of each row of binary codes in the result array being 1 is calculated, and a key is generated for each secret information array block, namely if t > n/2, the corresponding key is 1, otherwise, the corresponding key is 0.
2. The method for improving the LSB image steganography in combination with cryptography according to claim 1, wherein in step (1), the encrypting operation on the secret information array block according to the secret key specifically comprises: if the secret key corresponding to the binary column of the secret information array block is 1, each bit of the column is inverted, and if the corresponding secret key is 0, the column is kept as it is.
3. The improved LSB image steganography method in combination with cryptography according to claim 1, wherein the specific process of step (2) is as follows:
firstly, inputting an encrypted image and a key address, dividing the encrypted image into blocks of n multiplied by n pixels, and extracting encryption information bits from the least k significant bits of the encrypted image blocks according to the key address; then, carrying out decryption operation on the encrypted information of each encrypted image block according to the secret key; and finally, applying a string table decompression algorithm to the decrypted information to obtain the secret information.
CN201811069942.XA 2018-09-13 2018-09-13 Improved LSB image steganography method combined with cryptography Active CN109547663B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811069942.XA CN109547663B (en) 2018-09-13 2018-09-13 Improved LSB image steganography method combined with cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811069942.XA CN109547663B (en) 2018-09-13 2018-09-13 Improved LSB image steganography method combined with cryptography

Publications (2)

Publication Number Publication Date
CN109547663A CN109547663A (en) 2019-03-29
CN109547663B true CN109547663B (en) 2020-06-19

Family

ID=65838995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811069942.XA Active CN109547663B (en) 2018-09-13 2018-09-13 Improved LSB image steganography method combined with cryptography

Country Status (1)

Country Link
CN (1) CN109547663B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110110535B (en) * 2019-04-24 2021-01-01 湖北工业大学 Low-distortion steganography method based on pixel matrix
CN110796585B (en) * 2019-10-28 2023-02-28 中国人民解放军空军工程大学 Image hiding method based on deep learning
CN111698226B (en) * 2020-05-28 2022-07-19 中国平安财产保险股份有限公司 Method and device for verifying and selling ticket
CN115206331B (en) * 2022-06-13 2024-04-05 华南理工大学 Voice super-resolution method based on conical residual dense network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104159118A (en) * 2014-07-30 2014-11-19 天津大学 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104159118A (en) * 2014-07-30 2014-11-19 天津大学 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于记忆特性的LSB密写;易云 等;《科技广场》;20061106(第7期);第28-29页 *

Also Published As

Publication number Publication date
CN109547663A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
Saraireh A secure data communication system using cryptography and steganography
CN109547663B (en) Improved LSB image steganography method combined with cryptography
Zhang Commutative reversible data hiding and encryption
Maiti et al. Data hiding in images using some efficient steganography techniques
Farschi et al. A novel chaotic approach for information hiding in image
Varghese et al. A detailed review based on secure data transmission using cryptography and steganography
Debnath et al. An advanced image encryption standard providing dual security: Encryption using hill cipher & RGB image steganography
Thomas et al. Advanced cryptographic steganography using multimedia files
Ahmed et al. Robust and secure image steganography based on elliptic curve cryptography
Ramya et al. Steganography based data hiding for security applications
Kumar et al. Dual transform technique for robust steganography
Ramalingam et al. A steganography approach for sequential data encoding and decoding in video images
Banupriya et al. Video steganography using LSB algorithm for security application
Rao et al. A novel information security scheme using cryptic steganography
Prema et al. An enhanced security algorithm for wireless application using RSA and genetic approach
Abdelmged et al. A Combined approach of steganography and cryptography technique based on parity checker and huffman encoding
Qu et al. Reversible data hiding in encrypted image with secure multi-party for telemedicine applications
Yadav et al. A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
Nehra et al. Review Paper On Image Based Steganography
Sajjad et al. Improved Video Steganography with Dual Cover Medium, DNA and Complex Frames.
Rao et al. A Novel Image Encryption Using Parity Based Visual Cryptography
Wang Reversible integer wavelet transform for the joint of image encryption and watermarking
Kaur et al. Modified Approach Using Lsb In Image Steganography
Mallick et al. Crypto steganography using linear algebraic equation
Kumar Information Hiding in Images Using Steganography Techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant