CN110430335A - A kind of method, equipment and the storage medium of information disguising and recovery - Google Patents

A kind of method, equipment and the storage medium of information disguising and recovery Download PDF

Info

Publication number
CN110430335A
CN110430335A CN201910711927.9A CN201910711927A CN110430335A CN 110430335 A CN110430335 A CN 110430335A CN 201910711927 A CN201910711927 A CN 201910711927A CN 110430335 A CN110430335 A CN 110430335A
Authority
CN
China
Prior art keywords
bit
value
sequence
key
formula
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910711927.9A
Other languages
Chinese (zh)
Other versions
CN110430335B (en
Inventor
邵利平
赵艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Central China Technology Development Of Electric Power Co ltd
Original Assignee
Shaanxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Normal University filed Critical Shaanxi Normal University
Priority to CN201910711927.9A priority Critical patent/CN110430335B/en
Publication of CN110430335A publication Critical patent/CN110430335A/en
Application granted granted Critical
Publication of CN110430335B publication Critical patent/CN110430335B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/90Determination of colour characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption

Abstract

The invention belongs to image information safety and digital image signal process crossing domain, disclose method, equipment and the storage medium of a kind of information disguising and recovery.In camouflage, secret information the coordinate in key image is encoded to first to transmit to avoid the direct channels of secret information, secondly prepare more part is introduced, coordinate points are further encoded to the high frequency colour sequential for providing sample image and by key pseudo-random placement on blank texture image to be synthesized, finally generate image containing close grain by point texture generation strategy pixel-by-pixel.When restoring, according to cipher key-extraction colour sequential, coordinate is restored by sample image then in conjunction with the interval extension strategy of prepare more part and extracts secret information according to key image.Compared with the conventional method, this method carries out textures synthesis by point pixel-by-pixel, will not leave behind apparent splicing trace and repeat pattern, and secret information places one's entire reliance upon key, has certain anti-attack ability and higher safety.

Description

A kind of method, equipment and the storage medium of information disguising and recovery
Technical field
The invention belongs to image information safety and digital image signal process crossing domain, it is related to a kind of information disguising and extensive Multiple method, equipment and storage medium.
Background technique
With the development of internet, more and more information are bringing the same of great convenience by network transmission When, there is also certain security risks.For the safety of secret information in protection transmission, it has been proposed that hiding secret letter with image Breath, for example, being directed to the document of secret writing: Mao Ping Hua, 2019 (Mao Ping Hua, Wang Zichi, Zhang Xinpeng are based on the non-right of DCT domain correlation Claim JPEG steganography [J] computer science, 2019,46 (01): 203-207.);GANDHARBA S, 2016 (GANDHARBA S.Adaptive pixel value differencing steganography using both vertical and Horizontal [J] .Multimedia Tools and Applications, 2016,75 (21): 13541-13556.); YANG T Y, 2017 (YANG T Y, CHEN H S.Matrix embedding in steganography with binary Reed-Muller codes [J] .IET Image Processing, 2017,11 (7): 522-529.) and Zhang Yang, 2018 ( Ocean, Shao Liping, Ren Pingan exempt from base vector EMD (n, m) model and its application [J] CAD on Image Steganographic With graphics journal, 2018,30 (8): 1490-1504.);For point document deposited: Ou Yangxianbin, 2017 (Ou Yangxianbin, Shaos Benefit is flat, and the non-equivalent backup of Le Zhifang and double certification limited area images of selfreparing point deposit [J] Journal of Software, 2017,12 (28): 3306-3346.) He Huangyan swallow, 2018 (Huang Yanyan, Shao Liping combination EMD-clClose figure separate-management method [J] of the multichip carrier of insertion Journal of Image and Graphics, 2018,23 (8): 1108-1130.) on.But the essence of these methods is all traditional modification formula insertion Information concealing method, carrier image need to be modified, embedding close carrier visual quality can be affected greatly, easily cause attacker Suspection.
Such issues that avoid, there has been proposed texture production carrier-free Information hidings, it mainly includes texture structure Formula Information hiding and the spliced Information hiding of texture.Wherein texture structure formula Information hiding is in such a way that analog texture generates Some class natural textures are generated, such as: QIAN Z X, 2018 (QIAN Z X, PAN L, LI S, ZHANG X P.Steganography by constructing marbling texture [C] // the // 2018China Information Hiding Workshop (CIHW2018), Guang Zhou, 2018:17-35.);Pan Lin, 2016 (Pan Lin, Money development, steganography [J] the applied science journal of Zhang Xinpeng based on construction texture image, 2016,34 (5): 625-632.) With XU J, 2015 (XU J, MAO X, JIN X, et al.Hidden message in a deformation-based Texture [J] .Visual Computer International Journal of Computer Graphics, 2015,31 (12): 1653-1669.) etc., such methods are all to draw texture by generating class water shadow to hide secret information, but generated Texture is all non-natural texture, to cannot effectively be covered to secret information.
Spliced hide of texture derives from OTORI H, 2007 (OTORI H, KURIYAMA S.Data- earliest Embeddable texture synthesis [C] //International Symposium on Smart Graphics, Kyoto, Japan, 2007:146-157.) and OTORI H, 2009 (OTORI H, KURIYAMA S.Texture synthesis For mobile data communications [J] .IEEE Computer Graphics and Applications, 2009,29 (6): 74-81.), such methods are by way of sample texture padding come the local binary mould to expression secret information Formula pixel is covered, but due to that cannot cover well to local binary patterns, thus the person that easily causes steganalysis Suspection and cause secret information to be revealed.To avoid this problem, WU C, 2015 (WU C, WANG C M.Steganography Using reversible texture synthesis [J] .Transactions on Image Processing, 2015, 24 (1): 130-139.);QIN Z C, 2017 (QIN Z C, LI M, WU B.Robust steganography via patch-based texture synthesis[C]//International Conference on Internet Multimedia Computing and Service.Springer, Singapore, 2017:429-439.) and QIAN Z X, 2016 (QIAN Z X, ZHOU H, ZHANG W M, et al.Robust steganography using texture synthesis[C]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2016:21-23.) All be generated in such a way that texture fritter splices it is similar with given sample containing close grain.But WU C, 2015 introduce mirror image Operation is so that coding and non-coding sample fritter there are apparent distinguishing characteristics, cause to encode fritter and directly reveal.QIN Z C, 2017 and QIAN Z X, there is fixed one-to-one relationships between the segmentation of 2016 secret informations and sample fritter classification, easily The suspection for causing attacker causes safety lower.In addition WU C, 2015, QIN Z C, 2017 and QIAN Z X contain in 2016 Close grain image is using EFROS A A, 2001 (EFROS A A, FREEMAN W T.Image quilting for texture synthesis and transfer[C]//Proc.of the 28th Annual Conference on Computer Graphics and Interactive Techniques, 2001:341-346.) in suture algorithm come pair The texture of overlapping region is spliced, and is inevitably resulted from suture trace and is repeated texture pattern, thus cannot be to secret Information is covered.
Summary of the invention
It is an object of the invention to overcome the above-mentioned prior art, provide a kind of information disguising and recovery method, Equipment and storage medium.
In order to achieve the above objectives, the present invention is achieved by the following scheme:
A kind of information disguising method, comprising the following steps:
S1: pass through preset-key k1R rank key graph S is generated, 2 value secret information bit sequence B are inputted, 2 value secrets are believed Breath bit sequence B is encoded to 2RSystem Number Sequence R;
S2: by R rank key graph S with 2RThe pixel coordinate of element same pixel value in system Number Sequence R, by 2RSystem Number Sequence R is encoded to 2 value bit bit string b;
S3: picking out m+t kind color in default texture sample figure T and constitute palette sequence V, initialize blank image K, Pass through preset-key k2Generate random coordinates sequence C;
S4: by the mapping relations of element and element index in palette sequence V, the 3 of 2 value bit bit string b are backed up again It is encoded to colour sequential V ', places all elements in colour sequential V ' on blank image K in conjunction with random coordinates sequence C;
S5: texture padding is carried out to rest position in blank image K by point texture generation strategy pixel-by-pixel, is obtained containing close Texture image K.
Information disguising method of the present invention further improvement is that
The S1's method particularly includes:
S1-1: pass through preset-key k1Generation resolution ratio is h1×w1R rank key graph
S1-2: 2 value secret information bit sequence B of input, being one group for every R bit in B, to be converted to length be l12R System Number SequenceWherein l1It is determined by formula (1);
Wherein, symbolExpression rounds up;
The S2's method particularly includes:
By in R rank key graph S with 2RThe pixel coordinate of element same pixel value in system Number Sequence R, by 2RSystem number sequence Column R is encoded to 2 value bit bit stringsWherein l2It is determined by formula (2);
The S2's method particularly includes:
S2-1: to 2RSystem Number SequenceIn each element ri, random selection and r in R rank key graph SiIt is worth phase Deng elementAnd record its corresponding coordinate position (ui, vi), by formula (3) by uiAnd viBeing converted to length is2 System bit bit string
Wherein, bin (ui) it is 2 value transfer functions, it is used for ui2 value bit bit strings are converted to, for ui∈ [0, h1- 1], bin(ui) by uiBeing converted to length is2 value bit bit strings, for vi∈ [0, w1- 1], bin (vi) by viBeing converted to length is2 value bit bit strings, symbol " | | " is that bit bit string is connected function;
S2-2: S2-1 is repeated extremelyBe converted to l1A 2 system bit bit stringBy formula (4) by l1 A 2 system bit bit stringSeries connection obtains 2 value bit bit strings
The S3's method particularly includes:
S3-1: in resolution ratio h2×w2Default texture sample figureIn select the highest m+t kind of the frequency of occurrences Color constitutes palette sequence V=(vi)m+t
S3-2: initialization resolution ratio is h3×w3R rank blank image
S3-3: pass through preset-key k2Generation length is 3l3Random coordinates sequenceWherein (xi, yi)∈h3×w3And in random coordinates sequence C coordinate two neither etc., l3It is determined by formula (5):
Wherein, symbolIt indicates to be rounded downwards;
The S4's method particularly includes:
S4-1: by 2 value bits in 2 value bit bit string b withA bit is 1 group, and to be converted to length be l3Sequence
S4-2: by sequenceEach of element di, d is encoded to by formula (6)iBackup
S4-3: it repeats S4-2 and D is extremely encoded to 3l3A elementIt is logical It crosses formula (7) and obtains colour sequential V ';
S4-4: willAs (x in blank image K3·i+k, y3·i+k), i=0,1 ..., l3- 1, k=0,1, the member of 2 positions Element;
The S5's method particularly includes:
S5-1: in blank image K, to any kI, jAndNote is with kI, jCentered on γ × γ neighborhood be N (kI, j), all elements t is traversed in texture sample figure TX, yCentered on γ × γ neighborhood N ' (tX, y), N is obtained by formula (8) (kI, j) and N ' (tX, y) similarity and therefrom choose with N (kI, j) most like neighborhoodIt pressesTo kI, jAssignment;
Wherein, p, q are corresponding 8 neighborhood N (kI, j), N ' (tX, y) in corresponding position pixel, R (x), G (x), B (x) point The R of pixel x, G, B component value, d (N (k are not representedI, j), N ' (tX, y)) smaller show N (kI, j) and N ' (tX, y) more similar;
S5-2: S5-1 all elements into blank image K are repeatedAssignment is completed, image containing close grain is obtained K。
Another aspect of the invention, a kind of computer readable storage medium, the computer-readable recording medium storage have meter The step of calculation machine program, the computer program realizes the information disguising method when being executed by processor.
Another aspect of the invention, a kind of computer equipment, including memory, processor and storage are in the memory And the computer program that can be run on the processor, the processor realize the information when executing the computer program The step of camouflage method.
Another aspect of the invention, a kind of information recovering method, comprising the following steps:
R1: pass through preset-key k2Random coordinates sequence C is generated, close grain is contained from input by random coordinates sequence C Colour sequential V ' is extracted in figure K ';
R2: m+t kind color is picked out in default texture sample figure T and constitutes palette sequence V, passes through palette sequence V In element and element index mapping relations, colour sequential V ' is decoded as 2 value bit bit string b;
R3: pass through preset-key k1R rank key graph S is generated, extracts secret in key graph S in conjunction with 2 value bit bit string b Information B.
Information recovering method of the present invention further improvement is that
The R1's method particularly includes:
R1-1: pass through preset-key k2Generation length is 3l3Random coordinates sequenceWherein (xi, yi)∈h3×w3And coordinate two is neither etc. in random coordinates sequence C;
R1-2: by random coordinates sequence C from the figure containing close grain of inputIn, to each (xi, yi) ∈ C, Find (x3·i+k, y3·i+k), i ∈ [0, l3- 1], k=0, all elements of 1,2 positionAnd combine, obtain color Sequence V ';
The R2's method particularly includes:
R2-1: in resolution ratio h2×w2Texture sample figureIn select the highest m+t kind color of the frequency of occurrences Constitute palette sequence V=(vi)m+t
R2-2: it is found out according to palette sequence VIndex positionIt is calculated by formula (9)
NoteNumber of elements positioned at section [0, m-1] is denoted as Ec, d is calculated by following 5 kinds of situationsi:
1. if Ec=0, it sets
2. if Ec=1 andElement value positioned at section [0, m-1] is v, sets di=v;
3. if Ec=2 andElement value positioned at section [0, m-1] is v1, v2, set di=(v1+v2)/2;
4. if Ec=3 andThere are two and more than two values are equal, and note equal value is v, sets di=v;
5. if Ec=3 andTwo neither etc., sets
R2-3: repeating R2-2 all coordinates into random coordinates sequence C and be disposed, and obtaining length by formula (10) is l2 2 value bit bit string b:
Wherein, Left () is 2 value bit string cutted functions, and the 1st parameter is the 2 value bit bit strings to be intercepted, the 2nd Parameter is from the length intercepted from left to right;l2It is determined by formula (11);
The R3's method particularly includes:
R3-1: pass through preset-key k1Generation resolution ratio is h1×w1R rank key graph
R3-2: by the 2 value bits of 2 value bit bit string b withIt is 1 group, is divided into l1Group is denoted asPass through formula (12) and formula (13) respectively from each groupingBefore middle interceptionA 2 value bit is with afterA 2 It is worth bit as coordinate (ui, vi), then pass through formula (14) for (u in R rank key graph Si, vi) the corresponding element in position is assigned to ri, wherein i=0,1 ..., l1-1;
Wherein, Right () is 2 value bit string cutted functions, and the 1st parameter is the 2 value bit bit strings to be intercepted, the 2nd A parameter is from the length intercepted from right to left;
R3-3: by ri, i=0,1 ..., l1- 1 is respectively converted into the 2 system bit bit strings that length is R, is R by all length The series connection of 2 system bit bit strings be 2 system bit bit strings that length is N, obtain secret information B=(Bi)N
Another aspect of the invention, a kind of computer readable storage medium, the computer-readable recording medium storage have meter The step of calculation machine program, the computer program realizes the information recovering method when being executed by processor.
Another aspect of the invention, a kind of computer equipment, including memory, processor and storage are in the memory And the computer program that can be run on the processor, the processor realize the information when executing the computer program The step of restoration methods.
Compared with prior art, the invention has the following advantages:
The present invention is generated using point texture synthetic method pixel-by-pixel containing close grain, and image containing close grain is pixel-level generation Rather than the splicing of texture fritter generates, so avoiding solid existing for the block splicing production Information hiding based on suture algorithm There is splicing trace and reduce the generation of repeat pattern, safety is higher, and is not easy to cause the suspection of attacker.It efficiently solves Tradition is spliced in the information concealing method of textures synthesis based on block since image containing close grain uses suture algorithm come to overlapping The texture in region is spliced, and is inevitably resulted from suture trace and is repeated texture pattern, thus cannot be to secret information The problem of being covered.Secret information is expressed by the key graph coordinate of key generation, is secret containing what is be embedded in close blindage figure Coordinate information of the confidential information in key graph rather than secret information, avoid the direct channels transmission of secret information, and secret The insertion of information and extraction process place one's entire reliance upon key, safety with higher.It efficiently solves existing based on block splicing Due to using the small block coding secret information of sample, secret information transmits the information concealing method of textures synthesis in the channel, safety The not high problem of property.Invention introduces the certification policies based on prepare more part and interval extension, and more parts of secrets are embedded in when embedding close Information at the extraction all extracts more parts of secret informations, then compares more parts of secret informations, and secret information is identical The secret information of most parts takes mean value as secret information, the plan as the secret information correctly extracted if being different from Summary can effectively improve the anti-attack ability for extracting secret information.Efficiently solve the existing letter based on block splicing textures synthesis Hidden method is ceased due to lacking authentication information, if can not determine after being attacked containing close blindage figure, the secret information extracted is It is no be correct secret information the problem of.
Detailed description of the invention
Fig. 1 is information disguising method flow chart of the present invention;
Fig. 2 is information recovering method flow chart of the present invention;
Fig. 3 is texture sample figure of the invention, is the 8-bit color image texture 1 of 64 × 64 resolution ratio;
Fig. 4 is texture sample figure of the invention, is the 8-bit color image texture 2 of 64 × 64 resolution ratio;
Fig. 5 is texture sample figure of the invention, is the 8-bit color image texture 3 of 64 × 64 resolution ratio;
Fig. 6 is texture sample figure of the invention, is the 8-bit color image texture 4 of 64 × 64 resolution ratio;
Fig. 7 is close figure of the invention, is 8 gray level image lena of 64 × 64 resolution ratio;
Fig. 8 is of the invention using Fig. 3 as texture sample figure, and Fig. 7 is that the resolution ratio that close figure generates is 512 × 512 containing close Texture 1, user key takes key1=6546, key2=7653;
Fig. 9 is of the invention using Fig. 4 as texture sample figure, and Fig. 7 is that the resolution ratio that close figure generates is 512 × 512 containing close Texture 2, user key takes key1=6548, key2=7659;
Figure 10 is of the invention using Fig. 5 as texture sample figure, and Fig. 7 is that the resolution ratio that close figure generates is 512 × 512 containing close Texture 3, user key takes key1=6546, key2=7653;
Figure 11 is of the invention using Fig. 6 as texture sample figure, and Fig. 7 is that the resolution ratio that close figure generates is 512 × 512 containing close Texture 4, user key takes key1=6548, key2=7659;
Figure 12 is the close figure of the invention recovered by Fig. 8, and the bit error rate BR relative to Fig. 7 is 0%;
Figure 13 is the close figure of the invention recovered by Fig. 9, and the bit error rate BR relative to Fig. 7 is 0%;
Figure 14 is the close figure of the invention recovered by Figure 10, and the bit error rate BR relative to Fig. 7 is 0%;
Figure 15 is the close figure of the invention recovered by Figure 11, and the bit error rate BR relative to Fig. 7 is 0%;
Figure 16 cuts out attack graph to Fig. 8 progress 1.9% to be of the invention;
Figure 17 cuts out attack graph to Fig. 9 progress 3.4% to be of the invention;
Figure 18 cuts out attack graph to Figure 10 progress 4.1% to be of the invention;
Figure 19 cuts out attack graph to Figure 11 progress 2.6% to be of the invention;
Figure 20 is the random noise attack graph of the invention to Fig. 8 progress 8%;
Figure 21 is the random noise attack graph of the invention to Fig. 9 progress 20%;
Figure 22 is the random noise attack graph of the invention to Figure 10 progress 15%;
Figure 23 is the random noise attack graph of the invention to Figure 11 progress 10%;
Figure 24 is the close figure of the invention recovered by Figure 16, and the bit error rate BR relative to Fig. 7 is 0.63%, peak value noise It is 30.7281dB than PSNR=;
Figure 25 is the close figure of the invention recovered by Figure 17, and the bit error rate BR relative to Fig. 7 is 1.12%, peak value noise It is 28.1291dB than PSNR=;
Figure 26 is the close figure of the invention recovered by Figure 18, and the bit error rate BR relative to Fig. 7 is 1.37%, peak value noise It is 26.7750dB than PSNR=;
Figure 27 is the close figure of the invention recovered by Figure 19, and the bit error rate BR relative to Fig. 7 is 0.85%, peak value noise It is 29.8146dB than PSNR=;
Figure 28 is the close figure of the invention recovered by Figure 20, and the bit error rate BR relative to Fig. 7 is 2.66%, peak value noise It is 24.3136dB than PSNR=;
Figure 29 is the close figure of the invention recovered by Figure 21, and the bit error rate BR relative to Fig. 7 is 6.35%, peak value noise It is 20.1874dB than PSNR=;
Figure 30 is the close figure of the invention recovered by Figure 22, and the bit error rate BR relative to Fig. 7 is 4.79%, peak value noise It is 21.7039dB than PSNR=;
Figure 31 is the close figure of the invention recovered by Figure 23, and the bit error rate BR relative to Fig. 7 is 3.13%, peak value noise It is 23.7018dB than PSNR=.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only this The embodiment of a part is invented, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, should fall within the scope of the present invention.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
The present invention is done using JAVA jdk1.8.0_65 as implementation environment combination accompanying drawings and embodiments below further detailed It describes in detail bright.
The invention will be described in further detail with reference to the accompanying drawing:
Referring to Fig. 1, information disguising method of the present invention, comprising the following steps:
Step 1: pass through preset-key k first1Generation resolution ratio is h1×w1R rank key graphThen the 2 value secret information bit sequence B=(B that input length is Ni)N, finally by 2 values Every R bit in secret information bit sequence B is one group, and to be converted to length be l12RSystem Number SequenceWherein l1 It is determined by formula (1);
Wherein, symbolExpression rounds up.
Such as: if taking the random seed of linear congruence random generator as key k1, then by k1=6546, R=8, h1= w1=16 producible S=(sI, j)16×16, sI, j∈ [0,28- 1], it is assumed that 2 value secret information bit sequence B=of input (1101011010110010)2, then N=16, then length can be obtained by formula (1) is2R=28 It include 2 element r in=256 system Number Sequence R, R0=(11010110)2=214, r1=(10110010)2=178, i.e. R= (r0=214, r1=178).
Step 2: for 2RSystem Number SequenceIn each element ri, random selection and r in R rank key graph SiValue Equal elementAnd record its corresponding coordinate position (ui, vi), by formula (3) by uiAnd viBeing converted to length is2 System bit bit stringThus it can incite somebody to actionBe converted to l1A 2 system bit bit stringIt is carried out by formula (4) 2 value bit bit strings can be obtained in bit bit serialWherein l2It is determined by formula (2);
In formula (3), bin (ui) it is 2 value transfer functions, it is used for ui2 value bit bit strings are converted to, for ui∈ [0, h1- 1], bin (ui) can be by uiBeing converted to length is2 value bit bit strings, for vi∈ [0, w1- 1], bin (vi) can be by viConversion It is for length2 value bit bit strings, symbol " | | " is that bit bit string is connected function;
Such as: for R=(r0=214, r1=178) 2 element r in0=214, r1=178, and if r0Equal R rank Element is s in key graph S4,6=214, then record its corresponding coordinate position (u0, v0)=(4,6), it here can be by u0=4 conversions ForA 2 system position bin (u0)=(0100)2, can be by v0=6 are converted toA 2 system position bin (v0)=(0110)2, to be obtained by formula (3)For r1=178, and if r1Element is in equal S s5,2=178,Then willBit is carried out by formula (4) 2 value bit bit strings can be obtained in bit serialWherein
Step 3: first from texture sample figureIn select the highest m+t kind color of the frequency of occurrences and constitute toning Plate sequence V=(vi)m+t, then initializing resolution ratio is h3×w3R rank blank imageBy key k2 Generation length is 3l3Random coordinates sequenceWherein (xi, yi)∈h3×w3And in C coordinate two neither etc., l3It is determined by formula (5), symbolIt indicates to be rounded downwards;
Such as: take h2=w2=64, m=16, t=2, then can be from texture sample figure T=(tX, y)64×64In select appearance frequency The highest 18 kinds of colors of rate constitute palette sequence V=(vi)18;Take h3=w3=512, R=8, can obtain resolution ratio is 512 × 512 8 rank blank image K=(kI, j=28- 1=255)512×512;If taking the random seed of linear congruence random generator as close Key k2, take k2=7653, l2=16, it can be obtained by formula (5)Then producing length is 3l3 The random coordinates sequence of=34=12 and coordinate two neither etc. are as follows: C=((55,64), (49,74), (82,84), (228, 113), (89,73), (169,196), (170,165), (253,129), (104,222), (116,62), (235,246), (235, 161));
Step 4: by the mapping relations of element and element index in palette sequence V, by 3 weights of 2 value bit bit string b Backup is encoded to colour sequential V ', finally combines random coordinates sequence C to place in blank image K all in colour sequential V ' Element.Specific method is:
1) by 2 value bits in 2 value bit bit string b withA bit is 1 group, and to be converted to length be l3SequenceWherein l3It is determined by formula (6), forIn each element di, by formula (7) by diIt is encoded to diBackup
2) it executes repeatedly 1), D can be encoded to 3l3A elementIt will It is as colour sequential V ', as shown in formula (8);
3) willAs (x in blank image K3·i+k, y3·i+k), i=0,1 ..., l3- 1, k=0,1, the element of 2 positions;
Such as:
1) b=(0100011001010010) is taken2, l2=16, by 2 value bits in b with A bit is 1 group and is converted to length and isSequence D=(d0, d1, d2, d3)= ((0100)2, (0110)2, (0101)2, (0010)2)=(4,6,5,2), for d0=4, it can be calculated by formula (6)Wherein (x3·0+0, y3·0+0)=(x0, y0)=(55,64) be C in the 0th coordinate, can similarly obtain
2) for d1=6, it can obtainFor d2=5, it can obtain For d3=2, it can obtainIt can be obtained by formula (7):
3) willAs (x in K3·i+k, y3·i+k)=(x3·0+0, y3·0+0)=(55,64) position element, willAs (x in K1, y1)=(49,74) position element, willAs (x in K2, y2)=(82,84) position Element;It willAs (x in K3·i+k, y3·i+k)=(x3·1+0, y3·1+0)=(x3, y3)=(228,113) position element, It willAs (x in K4, y4)=(89,73) position element, willAs (x in K5, y5)=(169,196) position The element set;It willAs (x in K3·i+k, y3·i+k)=(x3·2+0, y3·2+0)=(x6, y6)=(170,165) position Element, willAs (x in K7, y7)=(253,129) position element, willAs (x in K8, y8)=(104, 222) element of position;It willAs (x in K3·i+k, y3·i+k)=(x3·3+0, y3·3+0)=(x9, y9)=(116,62) The element of position, willAs (x in K10, y10)=(253,246) position element, willAs (x in K11, y11)=(235,161) position element.
Step 5: combining point texture generation strategy pixel-by-pixel first, carries out texture padding to rest position in blank image K, Method particularly includes:
In blank image K, to any kI, jAndNote is with kI, jCentered on γ × γ neighborhood be N (kI, j), In All elements t is traversed in texture sample figure TX, yCentered on γ × γ neighborhood N ' (tX, y), N (k is calculated by formula (8)I, j) and N ' (tX, y) similarity, choose with N (kI, j) most like γ × γ neighborhoodIt pressesTo kI, jAssignment;It executes repeatedly Until all elements in blank image KAssignment is completed, then blank image K is exported and contains fine groove as what is generated Manage image.
Such as: by taking γ × γ=3 × 3 as an example, if Assuming thatMost It is small, i.e.,Then pressTo kI, jAssignment, similarly all elements in achievable blank image K Assignment.
Referring to fig. 2, information recovering method of the present invention, comprising the following steps:
Step 1: the figure containing close grain that receives of input channel firstPass through preset-key k2Generate length For 3l3Random coordinates sequenceWherein (xi, yi)∈h3×w3And coordinate two neither etc., is containing fine groove in C In reason figure K ', to each (xi, yi) ∈ C, find (x3·i+k, y3·i+k), i ∈ [0, l3- 1], k=0, all elements of 1,2 positionFinally obtain colour sequential V ';
Such as: if the K ' of figure containing close grain=(k that input channel receivesI, j)512×512, then h3=w3=512;
Still take the random number seed of linear congruence random generator as key k2, then k is pressed2=7653, l3=4, it produces Length is 3l3The random coordinates sequence of=34=12 are as follows: C=((55,64), (49,74), (82,84), (228,113), (89,73), (169,196), (170,165), (253,129), (104,222), (116,62), (235,246), (235, 161));
In the K ' of figure containing close grain, to each (xi, yi) ∈ C, such as (x3·i+k, y3·i+k)=(x3·0+0, y3·0+0) =(55,64) can find elementFor (x1, y1)=(49,74) it can findFor (x11, y11)=(235,161) it can findColour sequential can finally be obtained
Step 2: first from texture sample figureIn pick out m+t kind color constitute palette sequence V= (vi)m+t, then by the mapping relations of element and element index in palette sequence V, colour sequential V ' is decoded as coordinate Sequence b, specific method are:
1) it is found out according to palette sequence VIndex positionRight back-pushed-type (9) calculates
2) rememberNumber of elements positioned at section [0, m-1] is denoted as Ec, then d is calculated by following 5 kinds of situationsi:
1. if Ec=0, then it sets
2. if Ec=1 andElement value positioned at section [0, m-1] is v, then sets di=v;
3. if Ec=2 andElement value positioned at section [0, m-1] is v1, v2, then d is seti=(v1+v2)/2;
4. if Ec=3 andThere are two and more than two values are equal, and note equal value is v, then sets di=v;
5. if Ec=3 andTwo neither etc., then sets
3) it repeats 2) until all coordinates are disposed in random coordinates sequence C, right back-pushed-type (10) obtains length For l22 value coordinate sequence b:
In formula (10), Left () is 2 value bit string cutted functions, wherein the 1st parameter is the 2 value bits to be intercepted String, the 2nd parameter is from the length intercepted from left to right, l2It is determined by formula (11):
Such as: take h2=w2=64, m=16, t=2, then can be from T=(tX, y)64×64In select the frequency of occurrences highest 18 Kind color constitutes palette sequence V=(vi)18
If 1) according to V=(vi)18It finds outIndex position beIndex position be's Index position isIndex position beIndex position beIndex position ForIndex position beIndex position beIndex position beIndex position beIndex position beIndex position beThen It can be obtained by formula (9):
Together It manages
If 2) rememberThenNumber of elements positioned at section [0,15] is Ec=3, by Ec=3 andThere are two and more than two values are equal, equal value v=4 remembered, so d0=4;
If 3) rememberThenNumber of elements positioned at section [0,15] is Ec=3, by Ec=3 andThere are two and more than two values are equal, remember equal value v=6, obtain d1=6;If noteThenNumber of elements positioned at section [0,15] is Ec=3, by Ec=3 andThere are two and more than two values are equal, remember equal value v=5, obtain d2=5;If noteThenNumber of elements positioned at section [0,15] is Ec=3, by Ec=3 andThere are two and more than two values are equal, remember equal value v=2, obtain d3=2;Assuming that l1=2, Obtaining length by formula (10) is2 value coordinate sequence b=Left (bin (d0)||bin(d1) ||bin(d2)||bin(d3), l2)=Left (bin (4) | | bin (6) | | bin (5) | | bin (2), 8)= (0100011001010010)2
Step 3: pass through preset-key k first1The specific method for generating R rank key graph S is by key k1Generating resolution ratio is h1×w1R rank key graphsI, j∈ [0,2R- 1], mentioned in R rank key graph S then in conjunction with 2 value bit bit string b Secret information B is taken out, specific method is:
1) by the 2 value bits of 2 value bit bit string b withIt is 1 group, is divided into l1Group is denoted asPoint Not An formula (12) and formula (13) from each groupingBefore middle interceptionA 2 value bit is with afterA 2 value bit is as coordinate (ui, vi), then by (u in Si, vi) the corresponding element in position is assigned to riAs shown in formula (14), wherein i=0,1 ..., l1-1;
2) by ri, i=0,1 ..., l1- 1 to be respectively converted into the 2 system bit bit strings that length is R and connected be length For the 2 system bit bit string B=(B of Ni)NOutput.
Such as: take the random seed of linear congruential random number generator as key k1, such as take k1=6546, R=8, h1 =w1=16, then produce the 8 rank key graph S that resolution ratio is 16 × 16, it is assumed that b=(0 10001100102
1) l is taken1=2,By the 2 value ratios of b Spy withIt is 1 group, is divided into l1=2 groups, respectivelyBy formula (11) it interceptsBeforeA 2 value bit obtainsBy formula (12) it interceptsAfterA 2 value bit obtainsTogether Reason can be byObtain u1=(0101)2, v1=(0010)2, it is assumed that the upper element s of S4,6=214, s5,2=178, then by (u in S0, v0) The corresponding element in=(4,6) position is assigned to r0, r can be obtained0=s4,6=214, by (u in S1, v1)=(5,2) the corresponding member in position Element is assigned to r1, r can be obtained1=s5,2=178;
2) by r0=214, r1=178 to be respectively converted into the 2 system bit bit strings that length is R=8 and connected be length For the 2 system bit bit string B=(bin (r of N=160)||bin(ri))=((bin (214) | | bin (178)))= (1101011010110010)2Output.
Referring to Fig. 3~Figure 31, Fig. 8~Figure 11 be using Fig. 3~Fig. 6 as texture sample figure, with Fig. 7 be close figure, user key Key is taken respectively1=6546, key2=7653, key1=6548, key2=7659, key1=6546, key2=7653, key1= 6548、key2=7659, disclosed image containing close grain is obtained by the corresponding insertion process of Fig. 1.Figure 12~Figure 15 is mentioned by Fig. 2 Process is taken, correct key is provided, the close figure successively extracted from Fig. 8~Figure 11, the bit error rate BR relative to Fig. 7 is 0%, therefore close figure can be extracted correctly.Figure 16~Figure 19 is to carry out 1.9%, 3.4%, 4.1%, 2.6% respectively to Fig. 8~Figure 11 Cut out attack after image containing close grain.Figure 24~Figure 27 is to extract process according to Fig. 2, is extracted from Figure 16~Figure 19 Close figure, Figure 24 are 0.63%, PSNR=30.7281dB, bit error rate BR of the Figure 25 relative to Fig. 7 relative to the bit error rate BR of Fig. 7 For 1.12%, PSNR=28.1291dB, Figure 26 is 1.37%, PSNR=26.7750dB, Figure 27 relative to the bit error rate BR of Fig. 7 Bit error rate BR relative to Fig. 7 is 0.85%, PSNR=29.8146dB, therefore the close figure of reconstruct and former close figure are similar enough, explanation Method of the invention has certain shearing resistance to cut out attacking ability.Figure 20~Figure 23 be carry out 8% respectively to Fig. 8~Figure 11,20%, 15%, the image containing close grain after 10% random noise attack.Figure 28~Figure 31 be according to Fig. 2 extract process, from Figure 20~ The close figure extracted in Figure 23, Figure 28 relative to Fig. 7 bit error rate BR be 2.66%, PSNR=24.3136dB, Figure 29 relative to The bit error rate BR of Fig. 7 is 6.35%, PSNR=20.1874dB, and Figure 30 is 4.79%, PSNR=relative to the bit error rate BR of Fig. 7 21.7039dB, Figure 31 are 3.13%, PSNR=23.7018dB relative to the bit error rate BR of Fig. 7, therefore the close figure of reconstruct and original are close Figure is similar enough, illustrates that method of the invention has certain anti-random noise attacking ability.
If information disguising method of the present invention and information recovering method are realized in the form of SFU software functional unit and as only Vertical product when selling or using, can store in a computer readable storage medium.Based on this understanding, this hair All or part of the process in bright realization above-described embodiment method, can also be instructed by computer program relevant hardware come It completes, the computer program can be stored in a computer readable storage medium, which holds by processor When row, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, institute Stating computer program code can be source code form, object identification code form, executable file or certain intermediate forms etc..It calculates Machine readable storage medium storing program for executing include permanent and non-permanent, removable and non-removable media can by any method or technique Lai Realize information storage.Information can be computer readable instructions, data structure, the module of program or other data.It needs to illustrate , the content that the computer-readable medium includes can be according to the requirement progress made laws in jurisdiction with patent practice Increase and decrease appropriate, such as do not include electric carrier wave according to legislation and patent practice, computer-readable medium in certain jurisdictions Signal and telecommunication signal.
In the exemplary embodiment, a kind of computer readable storage medium, the computer-readable storage medium are additionally provided Matter is stored with computer program, and the computer program realizes the information disguising method or Information recovering when being executed by processor The step of method.Wherein, the computer storage medium can be any usable medium that computer can access or data are deposited Store up equipment, including but not limited to magnetic storage (such as floppy disk, hard disk, tape, magneto-optic disk (MO) etc.), optical memory (example Such as CD, DVD, BD, HVD) and semiconductor memory (such as ROM, EPROM, EEPROM, nonvolatile memory (NANDFLASH), solid state hard disk (SSD)) etc..
In the exemplary embodiment, it additionally provides a kind of computer equipment, including memory, processor and is stored in institute The computer program that can be run in memory and on the processor is stated, the processor executes real when the computer program The step of existing information disguising method or information recovering method.Processor may be central processing unit (CentralProcessingUnit, CPU) can also be other general processors, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit (ApplicationSpecificIntegratedCircu It, ASIC), ready-made programmable gate array (Field-ProgrammableGateArray, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..
The present invention is generated using point texture synthetic method pixel-by-pixel containing close grain, and image containing close grain is pixel-level generation Rather than the splicing of texture fritter generates, so avoiding solid existing for the block splicing production Information hiding based on suture algorithm There is splicing trace and reduce the generation of repeat pattern, safety is higher, and is not easy to cause the suspection of attacker.It efficiently solves Tradition is spliced in the information concealing method of textures synthesis based on block since image containing close grain uses suture algorithm come to overlapping The texture in region is spliced, and is inevitably resulted from suture trace and is repeated texture pattern, thus cannot be to secret information The problem of being covered.Secret information is expressed by the key graph coordinate of key generation, is secret containing what is be embedded in close blindage figure Coordinate information of the confidential information in key graph rather than secret information, avoid the direct channels transmission of secret information, and secret The insertion of information and extraction process place one's entire reliance upon key, safety with higher.It efficiently solves existing based on block splicing Due to using the small block coding secret information of sample, secret information transmits the information concealing method of textures synthesis in the channel, safety The not high problem of property.Invention introduces the certification policies based on prepare more part and interval extension, and more parts of secrets are embedded in when embedding close Information at the extraction all extracts more parts of secret informations, then compares more parts of secret informations, and secret information is identical The secret information of most parts takes mean value as secret information, the plan as the secret information correctly extracted if being different from Summary can effectively improve the anti-attack ability for extracting secret information.Efficiently solve the existing letter based on block splicing textures synthesis Hidden method is ceased due to lacking authentication information, if can not determine after being attacked containing close blindage figure, the secret information extracted is It is no be correct secret information the problem of.
The above content is merely illustrative of the invention's technical idea, and this does not limit the scope of protection of the present invention, all to press According to technical idea proposed by the present invention, any changes made on the basis of the technical scheme each falls within claims of the present invention Protection scope within.

Claims (10)

1. a kind of information disguising method, which comprises the following steps:
S1: pass through preset-key k1R rank key graph S is generated, 2 value secret information bit sequence B are inputted, by 2 value secret information bits Sequence B is encoded to 2RSystem Number Sequence R;
S2: by R rank key graph S with 2RThe pixel coordinate of element same pixel value in system Number Sequence R, by 2RSystem number sequence Column R is encoded to 2 value bit bit string b;
S3: m+t kind color is picked out in default texture sample figure T and constitutes palette sequence V, blank image K is initialized, passes through Preset-key k2Generate random coordinates sequence C;
S4: by the mapping relations of element and element index in palette sequence V, the 3 of 2 value bit bit string b is backed up again and is encoded For colour sequential V ', all elements in colour sequential V ' are placed on blank image K in conjunction with random coordinates sequence C;
S5: texture padding is carried out to rest position in blank image K by point texture generation strategy pixel-by-pixel, is obtained containing close grain Image K.
2. information disguising method according to claim 1, which is characterized in that the S1's method particularly includes:
S1-1: pass through preset-key k1Generation resolution ratio is h1×w1R rank key graph
S1-2: 2 value secret information bit sequence B of input, being one group for every R bit in B, to be converted to length be l12RSystem Number SequenceWherein l1It is determined by formula (1);
Wherein, symbolExpression rounds up;
The S2's method particularly includes:
By in R rank key graph S with 2RThe pixel coordinate of element same pixel value in system Number Sequence R, by 2RSystem Number Sequence R It is encoded to 2 value bit bit stringsWherein l2It is determined by formula (2);
3. information disguising method according to claim 2, which is characterized in that the S2's method particularly includes:
S2-1: to 2RSystem Number SequenceIn each element ri, random selection and r in R rank key graph SiIt is worth equal ElementAnd record its corresponding coordinate position (ui,vi), by formula (3) by uiAnd viBeing converted to length is2 systems Bit bit string
Wherein, bin (ui) it is 2 value transfer functions, it is used for ui2 value bit bit strings are converted to, for ui∈[0,h1- 1], bin (ui) by uiBeing converted to length is2 value bit bit strings, for vi∈[0,w1- 1], bin (vi) by viBeing converted to length is 2 value bit bit strings, symbol " | | " is that bit bit string is connected function;
S2-2: S2-1 is repeated extremelyBe converted to l1A 2 system bit bit stringBy formula (4) by l1A 2 into Bit bit string processedSeries connection obtains 2 value bit bit strings
The S3's method particularly includes:
S3-1: in resolution ratio h2×w2Default texture sample figureIn select the highest m+t kind color of the frequency of occurrences Constitute palette sequence V=(vi)m+t
S3-2: initialization resolution ratio is h3×w3R rank blank image
S3-3: pass through preset-key k2Generation length is 3l3Random coordinates sequenceWherein (xi,yi)∈ h3×w3And in random coordinates sequence C coordinate two neither etc., l3It is determined by formula (5):
Wherein, symbolIt indicates to be rounded downwards;
The S4's method particularly includes:
S4-1: by 2 value bits in 2 value bit bit string b withA bit is 1 group, and to be converted to length be l3Sequence
S4-2: by sequenceEach of element di, d is encoded to by formula (6)iBackup
S4-3: it repeats S4-2 and D is extremely encoded to 3l3A elementPass through formula (7) colour sequential V ' is obtained;
S4-4: willAs (x in blank image K3·i+k,y3·i+k), i=0,1 ..., l3The element of the position -1, k=0,1,2;
The S5's method particularly includes:
S5-1: in blank image K, to any ki,jAndNote is with ki,jCentered on γ × γ neighborhood be N (ki,j), All elements t is traversed in texture sample figure Tx,yCentered on γ × γ neighborhood N ' (tx,y), N (k is obtained by formula (8)i,j) with N′(tx,y) similarity and therefrom choose with N (ki,j) most like neighborhoodIt pressesTo ki,jAssignment;
Wherein, p, q are corresponding 8 neighborhood N (ki,j), N ' (tx,y) in corresponding position pixel, R (x), G (x), B (x) generation respectively The R of table pixel x, G, B component value, d (N (ki,j),N′(tx,y)) smaller show N (ki,j) and N ' (tx,y) more similar;
S5-2: S5-1 all elements into blank image K are repeatedAssignment is completed, the K of image containing close grain is obtained.
4. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claims 1 to 3 of realization the method.
5. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 3 the method.
6. a kind of information recovering method based on camouflage method described in claim 1, which comprises the following steps:
R1: pass through preset-key k2Random coordinates sequence C is generated, through random coordinates sequence C from the K ' of figure containing close grain of input Extract colour sequential V ';
R2: m+t kind color is picked out in default texture sample figure T and constitutes palette sequence V, by palette sequence V Colour sequential V ' is decoded as 2 value bit bit string b by the mapping relations of element and element index;
R3: pass through preset-key k1R rank key graph S is generated, extracts secret information in key graph S in conjunction with 2 value bit bit string b B。
7. information recovering method according to claim 6, which is characterized in that the R1's method particularly includes:
R1-1: pass through preset-key k2Generation length is 3l3Random coordinates sequenceWherein (xi,yi)∈ h3×w3And coordinate two is neither etc. in random coordinates sequence C;
R1-2: by random coordinates sequence C from the figure containing close grain of inputIn, to each (xi,yi) ∈ C, it finds (x3·i+k,y3·i+k),i∈[0,l3- 1], all elements of the position k=0,1,2And combine, obtain colour sequential V′;
The R2's method particularly includes:
R2-1: in resolution ratio h2×w2Texture sample figureIn select the highest m+t kind color of the frequency of occurrences and constitute Palette sequence V=(vi)m+t
R2-2: it is found out according to palette sequence VIndex positionIt is calculated by formula (9)
NoteNumber of elements positioned at section [0, m-1] is denoted as Ec, d is calculated by following 5 kinds of situationsi:
1. if Ec=0, it sets
2. if Ec=1 andElement value positioned at section [0, m-1] is v, sets di=v;
3. if Ec=2 andElement value positioned at section [0, m-1] is v1,v2, set di=(v1+v2)/2;
4. if Ec=3 andThere are two and more than two values are equal, and note equal value is v, sets di=v;
5. if Ec=3 andTwo neither etc., sets
R2-3: repeating R2-2 all coordinates into random coordinates sequence C and be disposed, and obtaining length by formula (10) is l22 values Bit bit string b:
B=Left (bin (d0)||bin(d1)||…||bin(dl3-1),l2) (10)
Wherein, Left () is 2 value bit string cutted functions, and the 1st parameter is the 2 value bit bit strings to be intercepted, the 2nd parameter It is from the length intercepted from left to right;l2It is determined by formula (11);
8. information recovering method according to claim 6, which is characterized in that the R3's method particularly includes:
R3-1: pass through preset-key k1Generation resolution ratio is h1×w1R rank key graph
R3-2: by the 2 value bits of 2 value bit bit string b withIt is 1 group, is divided into l1Group is denoted asPoint Not Tong Guo formula (12) and formula (13) from each groupingBefore middle interceptionA 2 value bit is with afterA 2 value bit is as coordinate (ui,vi), then pass through formula (14) for (u in R rank key graph Si,vi) the corresponding element in position is assigned to ri, wherein i=0, 1,…,l1-1;
Wherein, Right () is 2 value bit string cutted functions, and the 1st parameter is the 2 value bit bit strings to be intercepted, the 2nd ginseng It counts from the length intercepted from right to left;
R3-3: by ri, i=0,1 ..., l1- 1 is respectively converted into the 2 system bit bit strings that length is R, is the 2 of R by all length The series connection of system bit bit string is the 2 system bit bit strings that length is N, obtains secret information B=(Bi)N
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 6 to 8 of realization the method.
10. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 6 to The step of any one of 8 the method.
CN201910711927.9A 2019-08-02 2019-08-02 Information disguising and recovering method, equipment and storage medium Active CN110430335B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910711927.9A CN110430335B (en) 2019-08-02 2019-08-02 Information disguising and recovering method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910711927.9A CN110430335B (en) 2019-08-02 2019-08-02 Information disguising and recovering method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110430335A true CN110430335A (en) 2019-11-08
CN110430335B CN110430335B (en) 2021-05-11

Family

ID=68412323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910711927.9A Active CN110430335B (en) 2019-08-02 2019-08-02 Information disguising and recovering method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110430335B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235291A (en) * 2020-10-13 2021-01-15 陕西师范大学 Pixel-by-pixel texture generation type information hiding and recovering method, equipment and medium
CN113992327A (en) * 2021-11-16 2022-01-28 陕西师范大学 Lossless approximate memory-sharing recovery method and system based on prime number decomposition

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004079980A2 (en) * 2003-03-05 2004-09-16 Xsides Corporation System and method for data encryption
CN106998471A (en) * 2017-03-16 2017-08-01 中国人民武装警察部队工程大学 A kind of video hidden method and video extraction method for changing predictive mode
CN107613304A (en) * 2017-09-11 2018-01-19 西安电子科技大学 The hidden close transmission method of mobile terminal video stream based on Android platform
CN107846530A (en) * 2017-09-28 2018-03-27 四川长虹电器股份有限公司 Digital watermarking algorithm
CN108537049A (en) * 2018-03-14 2018-09-14 中山大学 A kind of adaptive steganographic algorithm based on bianry image
CN108898537A (en) * 2018-04-03 2018-11-27 宁波大学 A kind of digital picture steganography method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004079980A2 (en) * 2003-03-05 2004-09-16 Xsides Corporation System and method for data encryption
CN106998471A (en) * 2017-03-16 2017-08-01 中国人民武装警察部队工程大学 A kind of video hidden method and video extraction method for changing predictive mode
CN107613304A (en) * 2017-09-11 2018-01-19 西安电子科技大学 The hidden close transmission method of mobile terminal video stream based on Android platform
CN107846530A (en) * 2017-09-28 2018-03-27 四川长虹电器股份有限公司 Digital watermarking algorithm
CN108537049A (en) * 2018-03-14 2018-09-14 中山大学 A kind of adaptive steganographic algorithm based on bianry image
CN108898537A (en) * 2018-04-03 2018-11-27 宁波大学 A kind of digital picture steganography method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
毛炳华等: "基于DCT域相关性的非对称JPEG隐写", 《计算机科学》 *
潘琳等: "基于构造纹理图像的数字隐写", 《应用科学学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235291A (en) * 2020-10-13 2021-01-15 陕西师范大学 Pixel-by-pixel texture generation type information hiding and recovering method, equipment and medium
CN112235291B (en) * 2020-10-13 2023-04-07 陕西师范大学 Pixel-by-pixel texture generation type information hiding and recovering method, equipment and medium
CN113992327A (en) * 2021-11-16 2022-01-28 陕西师范大学 Lossless approximate memory-sharing recovery method and system based on prime number decomposition
CN113992327B (en) * 2021-11-16 2023-10-20 陕西师范大学 Lossless approximate split-memory recovery method and system based on prime number decomposition

Also Published As

Publication number Publication date
CN110430335B (en) 2021-05-11

Similar Documents

Publication Publication Date Title
Mahto et al. A survey of color image watermarking: State-of-the-art and research directions
CN108648133B (en) Non-embedded camouflage method combining block rotation and mosaic
CN110430336B (en) Method, apparatus and storage medium for image hiding and restoring
CN110430335A (en) A kind of method, equipment and the storage medium of information disguising and recovery
CN110475039A (en) Lines, Artss draw method, equipment and the storage medium hidden and restored
CN111327785A (en) Information steganography communication method based on automatic image construction of countermeasure generation network
Ye et al. Research on reversible image steganography of encrypted image based on image interpolation and difference histogram shift
CN113014742B (en) Image tampering detection positioning and self-recovery method based on fragile watermark
Li et al. Coverless image steganography using morphed face recognition based on convolutional neural network
CN113313621B (en) Image encryption watermark embedding method based on hybrid chaotic system and closed-loop diffusion
CN110706145B (en) Reversible remote sensing image information hiding processing method and device
CN112184841A (en) Block replacement generating type information hiding and recovering method, device and medium
CN112235291B (en) Pixel-by-pixel texture generation type information hiding and recovering method, equipment and medium
Latha et al. An efficient wavelet transform based steganography technique using chaotic map
CN111383290A (en) Optical information hiding technology based on visual password and speckle
Wu et al. Image reversible visual transformation based on MSB replacement and histogram bin mapping
CN109920015B (en) Image visual meaningful encryption method based on fractal graph generation
Banu et al. Secure reversible data hiding technique on textures using double encryption
CN110417551A (en) A kind of the character picture production camouflage and restoration methods of the diffusion of combination error
CN114979402B (en) Shared image storage method based on matrix coding embedding
CN112288617B (en) Information hiding and recovering method, equipment and medium based on mosaic jigsaw
CN115222575B (en) Vector data watermark embedding and extracting method using frequency domain coefficient ratio
Sainudeen REVERSIBLE TEXTURE COMBINATION STEGANOGRAPHY
Wen et al. Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages
Moon Forensic multi-dimensional Ary exploited modified direction data embedding approach to increase imperceptibility and robustness of secured data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231214

Address after: No. 546, Luoyu Road, Hongshan District, Wuhan, Hubei Province, 430000

Patentee after: HUBEI CENTRAL CHINA TECHNOLOGY DEVELOPMENT OF ELECTRIC POWER Co.,Ltd.

Address before: 710119 No. 620 West Chang'an Street, Chang'an District, Xi'an City, Shaanxi Province

Patentee before: Shaanxi Normal University