CN111327786A - Robust steganography method based on social network platform - Google Patents
Robust steganography method based on social network platform Download PDFInfo
- Publication number
- CN111327786A CN111327786A CN202010118578.2A CN202010118578A CN111327786A CN 111327786 A CN111327786 A CN 111327786A CN 202010118578 A CN202010118578 A CN 202010118578A CN 111327786 A CN111327786 A CN 111327786A
- Authority
- CN
- China
- Prior art keywords
- image
- carrier
- distortion
- carrier image
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
- H04N1/32165—Transform domain methods using cosine transforms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
Abstract
The invention discloses a robust steganography method based on a social network platform, which comprises the following steps: for a given carrier image X, calculating the symmetric distortion of the carrier image X by using a steganography algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion; for a given carrier image X, extracting carrier elements from a specified embedded domain, and calculating modification distances of the carrier elements according to a generalized jitter modulation mechanism; obtaining the modified distortion of the carrier element by combining the asymmetric distortion and the modified distance of the carrier element; and based on the modification distortion of the carrier element, embedding the coded secret information into the carrier image with the modification distortion to obtain the secret image. The method can be suitable for a real social network platform scene, meets the requirements in practical application, and has good performance in the aspects of safety, robustness and capacity.
Description
Technical Field
The invention relates to the technical field of social network security and steganography, in particular to a robust steganography method based on a social network platform.
Background
Steganography is a technology of covert communication, and aims to realize covert communication by using digital multimedia (such as images) as a carrier to cover secret information. Because the complex texture region of the image is difficult to model, the fluctuation caused by the high-dimensional statistical features of the image is small when the complex texture region is modified, and therefore high safety performance can be achieved when the complex texture region of the image is modified. At present, the mainstream adaptive steganography technology is to reasonably define a distortion function based on image texture and further utilize the minimized distortion steganography STC to achieve high security. In order to further improve the security of the steganography algorithm, Zichi Wang et al adjust a distortion function by estimating JPEG image side information to obtain asymmetric distortion, thereby greatly improving the security of steganography.
Although current steganographic algorithms can achieve high security, they are not applicable to practical social networking platforms. Due to the limitations of memory and bandwidth, the social network platform performs lossy processing on the uploaded image, such as JPEG recompression, and the current steganographic algorithm performs laboratory environment communication based on an ideal channel, so that the current steganographic algorithm cannot be applied to the actual social network platform. With the rapid development and popularization of intelligent mobile terminals, sharing images on a social network platform gradually becomes a popular living habit, which provides a favorable application environment for covert communication, and therefore, designing a steganographic algorithm applicable to the social network platform is urgent. Different from a laboratory environment steganography algorithm based on an ideal channel, the steganography algorithm based on a lossy channel is called a robust steganography algorithm.
Because the main lossy processing mode of the mainstream social network platform on the uploaded image is JPEG recompression, the current robust steganography mainly aims at JPEG recompression expansion. In 2016, Yi Zhang proposes a robust steganography framework based on the construction of an anti-compression domain and the combination of RS and STC coding, and the framework obtains stronger robustness by constructing the anti-compression domain and utilizing RS error correction codes. They then propose a robust steganographic algorithm based on the relative relationship between four adjacent DCT coefficients. In order to fully utilize the characteristics of quantization operation, Yi Zhang et al propose a DMAS robust steganography algorithm by modifying the intermediate frequency DCT coefficients of JPEG images by using the idea of dither modulation, wherein the algorithm can obtain stronger robust performance, but has poorer safety and capacity. In 2018, Jinyuan Tao proposed an indirectly modified robust steganography algorithm based on a simplified JPEG recompression process, and although the algorithm can theoretically achieve zero bit error rate, the Jinyuan Tao cannot be applied to an actual social network platform because a real JPEG recompression process is not considered. In order to reduce the influence of the social network platform, the Zengzhen Zhao uploads and downloads the carrier for multiple times through the social network platform in advance so that the carrier image is adapted to the social channel, and then stronger robustness is obtained by combining an error correction code, but the behavior violates the nature of steganography, namely, a behavior safety criterion.
As described above, the existing robust steganographic algorithms have respective problems in terms of security, capacity, or practical application capability, etc. only for making the steganographic algorithms robust. In order to meet the requirements in practical application, the robust steganographic algorithm must have good performance in terms of security, robustness and capacity. Therefore, it is necessary to provide a robust steganography algorithm that can be applied to real social network platform scenarios.
Disclosure of Invention
The invention aims to provide a robust steganography method based on a social network platform, which can be suitable for a real social network platform scene.
The purpose of the invention is realized by the following technical scheme:
a robust steganography method based on a social network platform comprises the following steps:
for a given carrier image X, calculating the symmetric distortion of the carrier image X by using the existing steganography algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion;
for a given carrier image X, extracting carrier elements from a specified embedded domain, and calculating modification distances of the carrier elements according to a generalized jitter modulation mechanism;
obtaining the modified distortion of the carrier element by combining the asymmetric distortion and the modified distance of the carrier element;
and based on the modification distortion of the carrier element, embedding the coded secret information into the carrier image to obtain the carrier image.
The technical scheme provided by the invention can meet the requirements in practical application and has better performance in the aspects of safety, robustness and capacity.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a robust steganography method based on a social network platform according to an embodiment of the present invention;
FIG. 2 is a flow chart for obtaining asymmetric distortion according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating designated anti-compression domains provided by an embodiment of the present invention;
FIG. 4 is a diagram illustrating a generalized dithering modulation scheme according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an experimental result provided in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a robust steganography method based on a social network platform, which mainly comprises the following steps of:
1. for a given JPEG carrier image X, calculating the symmetric distortion of the carrier image X by using a steganographic algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion.
In the embodiment of the invention, the carrier image takes a JPEG image as an example, and the invention can be applied after other format images are converted into JPEG format images.
As shown in fig. 2, in the embodiment of the present invention, an improved asymmetric distortion framework is used, and the steganography algorithm may use an existing algorithm, for example, an existing distortion function (e.g., J-UNIWARD, UERD, etc.).
The preferred embodiment of this step is as follows:
1) for a given carrier image X, its quantization table Q is obtained.
2) Calculating the symmetric distortion rho of the carrier image X by using a steganographic algorithm, and decompressing the carrier image X to a space domain to obtain a space domain image J-1(X)。
3) Using the mean filter F to the spatial domain image J-1(X) filtering to obtain a filtered spatial domain image S (smoothed spatial domain image):
illustratively, the mean filter F may be of the form:
4) converting the filtered spatial domain image S into DCT domain by DCT transform to obtain non-quantized DCT coefficient
5) Using non-quantized DCT coefficientsCalculating asymmetric distortion rho from symmetric distortion rho+And ρ-:
Where the subscript ij denotes the (i, j) position in the carrier image.
In an embodiment of the invention, capital letters correspond to lowercase letters, and if X represents the carrier image, i.e. X represents all coefficients of the carrier image, then XijIs the coefficient at the (i, j) position in the carrier image; q represents a quantization table, Q represents a quantization step size at any position, and Q represents a quantization step size at any positionijIt represents the quantization step size at the (i, j) position in the carrier image.Representing non-quantized DCT coefficients, thenRepresenting the non-quantized DCT coefficients at the (i, j) position in the carrier image; d represents a non-quantized DCT coefficient matrix, D in the following formula represents a non-quantized DCT coefficient at an arbitrary position, DijIt represents the non-quantized DCT coefficients at the (i, j) position. Rho+、ρ-Positive and negative asymmetric distortions, respectively, then ρij +、ρij -Corresponding to the positive and negative polarity asymmetric distortions at the (i, j) position in the carrier image.
2. For a given carrier image X, carrier elements are extracted from the specified embedded domain, and the modification distances of the carrier elements are calculated according to a generalized dither modulation scheme.
Taking fig. 3 as an example, an example of carrier element extraction from a compression-resistant domain is shown.
The preferred embodiment of this step is as follows:
1) obtaining a non-quantization DCT coefficient matrix D of the carrier image X, and selecting a standard quantization table according to the social network platform environmentStandard quantization tableAs long as it corresponds toAnd the quality factor is not more than the quality factor corresponding to JPEG recompression of the social network platform.
2) Calculating the positive polarity modification distance h of the carrier element according to the generalized jitter modulation mechanism+And negative polarity modification distance h-;
In the generalized jitter modulation mechanism, non-quantized DCT coefficients of carrier elements are quantized according to a selected quantization step sizeDividing into odd class and even class, respectively representing message bits 1 and 0, and using standard quantization tableRealizing message embedding in the quantization process of the non-quantization DCT coefficient d;
positive polarity modification distance h+And negative polarity modification distance h-The calculation formula of (2) is as follows:
where k is a natural number, subscript ij denotes the (i, j) position in the carrier image X, dijRepresenting the non-quantized DCT coefficients at the (i, j) position in the carrier image X,each being a positive polarity modification distance, a negative polarity modification distance of the carrier element at the (i, j) position in the carrier image X.
It should be noted that, in the embodiment of the present invention, the execution sequence of the step 1 and the step 2 is not limited, and the steps may be executed synchronously, or executed in tandem (for example, execute the step 1 and then execute the step 2, or execute the step 2 and then execute the step 1).
3. The modified distortion of the carrier element is obtained by combining the asymmetric distortion with the modified distance of the carrier element.
Taking FIG. 4 as an example, the positive polarity modified distortion is ξ+=ρ+/q×h+Negative polarity modified distortion of ξ-=ρ-/q×h-(wherein q is the quantization step corresponding to the carrier X), the specific calculation formula is:
wherein h is+And h-Indicating the modification distance and the index ij indicates the (i, j) position in the carrier image.
To minimize the embedding distortion, the proposed modification rule is:
wherein the content of the first and second substances,is the DCT coefficient corresponding to the secret image. For any carrier element dijWherein
4. And embedding the coded secret information into the carrier image based on the modification distortion of the carrier element to obtain the carrier image.
The original secret message m is encoded by an error correcting code to obtain an encoded secret messageIllustratively, the original secret message m may be encoded using an RS (31,15) error correction code.
Encoding the encoded secret information message using ternary STCs encoding based on modified distortion of the carrier elementAnd embedding the image into a carrier image to obtain a secret carrier image Y.
The embodiment of the invention also comprises the following steps: the method for decoding the secret-carrying image by the receiving party comprises the following steps:
when the secret information is extracted at the receiving end, the receiving end receives the secret-carrying image obtained by recompressing the secret-carrying image Y by the social network platformThe receiver obtains the secret-carrying image by calculationThen using a standard quantization table agreed with the senderExtracting information to obtain secret information coded by error correcting codeThe bit information represented by each secret-carrying element is the bit information represented by the odd-class or even-class interval in which the secret-carrying element is located, and then the original secret information m can be obtained by decoding the bit information by using an error correcting code (for example, RS (31, 15)).
In order to illustrate the effects of the above-described scheme of the embodiment of the present invention, a related experiment was also performed. The results of the experiment are shown in FIG. 5.
The performance of the robust steganography method based on the social network platform and the robust steganography method proposed by Zhang Yi et al are shown in FIG. 5. The robust steganography method proposed by Zhang Yi et al mainly combines the traditional jitter modulation with binary STCs coding for message embedding, and because only the intermediate frequency region is used as an embedded domain and the binary STCs coding efficiency is low, the security and the capacity are relatively poor.
The left graph in fig. 5 is a safety performance comparison of the two methods, and the experimental setup is: experiments are carried out by using a BOSSbase1.01 image library with a quality factor of 75, steganalysis is characterized by CCPEV (PEV features enhanced by cardboard calibration), embedding rate is 0.05bpnzac to 0.15bpnzac, 5000 images in the image library are used for training a classifier, 5000 images are used for testing, and 10 experiments are carried out to obtain average detection error rate.
The right graph in fig. 5 is a comparison of the robustness of the two methods, and the experimental settings are as follows: 1000 images are randomly selected from a BOSSbase1.01 image library with the quality factor of 65 for experiment, the quality factor of channel compression is set to be 95, and the average error rate of the 1000 images is taken.
Therefore, the effect of the scheme of the embodiment of the invention is obviously better than that of the existing scheme.
Through the above description of the embodiments, it is clear to those skilled in the art that the above embodiments can be implemented by software, and can also be implemented by software plus a necessary general hardware platform. With this understanding, the technical solutions of the embodiments can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (6)
1. A robust steganography method based on a social network platform is characterized by comprising the following steps:
for a given carrier image X, calculating the symmetric distortion of the carrier image X by using the existing steganography algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion;
for a given carrier image X, extracting carrier elements from a specified embedded domain, and calculating modification distances of the carrier elements according to a generalized jitter modulation mechanism;
obtaining the modified distortion of the carrier element by combining the asymmetric distortion and the modified distance of the carrier element;
and based on the modification distortion of the carrier element, embedding the coded secret information into the carrier image to obtain the carrier image.
2. The robust steganography method based on the social network platform as claimed in claim 1, wherein the calculating the symmetric distortion of the carrier image by using the existing steganography algorithm, and the obtaining the asymmetric distortion by the asymmetric distortion framework adjustment comprises:
for a given carrier image X, obtaining a quantization table Q thereof;
calculating the symmetric distortion rho of the carrier image X by using a steganographic algorithm, and decompressing the carrier image X to a space domain to obtain a space domain image J-1(X);
Using the mean filter F to the spatial domain image J-1(X) filtering to obtain a filtered spatial domain image S:
converting the filtered spatial domain image S into DCT domain by DCT transform to obtain non-quantized DCT coefficient
Using non-quantized DCT coefficientsCalculating asymmetric distortion rho from symmetric distortion rho+And ρ-:
Wherein the subscript ij denotes the (i, j) position in the carrier image X, XijIs the coefficient at the (i, j) position in the carrier image, qijThen represents the quantization step size at the (i, j) position in the carrier image,representing the unquantized DCT coefficients at the (i, j) position in the carrier image, p+、ρ-Asymmetric distortion of positive and negative polarity, respectively, rhoij +、ρij -Representing positive and negative polarity asymmetric distortions at the (i, j) position in the carrier image.
3. The social network platform-based robust steganography method according to claim 1, wherein the calculating the modification distance of the carrier element according to the generalized jitter modulation scheme comprises:
obtaining a non-quantization DCT coefficient matrix D of the carrier image X, and selecting a standard quantization table according to the social network platform environmentThen calculating the positive polarity modification distance h of the carrier element according to a generalized jitter modulation mechanism+And negative polarity modification distance h-;
In the generalized jitter modulation mechanism, non-quantization DCT coefficients of carrier elements are subjected to quantization step size selectionDividing into odd class and even class, respectively representing message bits 1 and 0, and using standard quantization tableRealizing message embedding in the quantization process of the non-quantization DCT coefficient d;
positive polarity modification distance h+And negative polarity modification distance h-Is calculated by the formula:
Where k is a natural number, subscript ij denotes the (i, j) position in the carrier image X, dijRepresenting the non-quantized DCT coefficients at the (i, j) position in the carrier image X,each being a positive polarity modification distance, a negative polarity modification distance of the carrier element at the (i, j) position in the carrier image X.
4. The social network platform-based robust steganography method as claimed in claim 1, wherein the step of combining the asymmetric distortion and the modification distance of the carrier element to obtain the modified distortion of the carrier element comprises a step of modifying the distortion with positive polarity ξ+And negative polarity modification distortion ξ-:
Positive polarity modified distortion is ξ+=ρ+/q×h+Negative polarity modified distortion of ξ-=ρ-/q×h-The specific calculation formula is as follows:
wherein h is+And h-Representing the positive and negative modification distances, the subscript ij representing the (i, j) position in the carrier image, pij +、ρij -Representing positive and negative asymmetric distortions at the (i, j) position in the carrier image, qijThen (i, j) in the carrier image is represented) Quantization step size at a location.
5. The robust steganography method based on a social networking platform of claim 1, wherein the first and second sets of data are stored in a memory,
the original secret message m is encoded by an error correcting code to obtain an encoded secret message
6. The robust steganography method based on a social network platform as claimed in claim 1, wherein the method further comprises: the method for decoding the secret-carrying image by the receiving party comprises the following steps:
the receiver receives the secret-carrying image which is obtained by recompressing the secret-carrying image Y by the social network platform
Obtaining secret-carrying image by calculationThen using a standard quantization table agreed with the senderExtracting information to obtain secret information coded by error correcting codeThe bit information represented by each secret-carrying element is the bit information represented by the odd-class or even-class interval in which the secret-carrying element is positioned,and then decoding by using an error correcting code to obtain the original secret information m.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010118578.2A CN111327786B (en) | 2020-02-26 | 2020-02-26 | Robust steganography method based on social network platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010118578.2A CN111327786B (en) | 2020-02-26 | 2020-02-26 | Robust steganography method based on social network platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111327786A true CN111327786A (en) | 2020-06-23 |
CN111327786B CN111327786B (en) | 2021-10-01 |
Family
ID=71168907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010118578.2A Active CN111327786B (en) | 2020-02-26 | 2020-02-26 | Robust steganography method based on social network platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111327786B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112634118A (en) * | 2020-12-24 | 2021-04-09 | 中国科学技术大学 | Batch-resistant steganography method |
CN114553811A (en) * | 2022-01-07 | 2022-05-27 | 中国人民解放军战略支援部队信息工程大学 | High-capacity behavior steganography method based on timestamp modulation and carrier selection |
CN114612317A (en) * | 2022-02-07 | 2022-06-10 | 中国人民解放军国防科技大学 | Secret image sharing method and system for resisting mean filtering |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040228502A1 (en) * | 2001-03-22 | 2004-11-18 | Bradley Brett A. | Quantization-based data embedding in mapped data |
CN104052658A (en) * | 2014-07-05 | 2014-09-17 | 中国科学技术大学 | Privacy protection system and method based on social network |
CN105791854A (en) * | 2016-03-09 | 2016-07-20 | 中国人民武装警察部队工程大学 | Singular value modification video steganographic algorithm based on combination with improved matrix coding |
CN107944282A (en) * | 2017-11-08 | 2018-04-20 | 安徽大学 | A kind of reversible information hidden method based on asymmetric prediction histogram of error modification |
CN108632138A (en) * | 2018-03-29 | 2018-10-09 | 东华大学 | A kind of commodity network safety communicating method based on image latent writing art |
CN110009547A (en) * | 2019-03-15 | 2019-07-12 | 中山大学 | A kind of JPEG asymmetrical digital image latent writing method |
-
2020
- 2020-02-26 CN CN202010118578.2A patent/CN111327786B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040228502A1 (en) * | 2001-03-22 | 2004-11-18 | Bradley Brett A. | Quantization-based data embedding in mapped data |
CN104052658A (en) * | 2014-07-05 | 2014-09-17 | 中国科学技术大学 | Privacy protection system and method based on social network |
CN105791854A (en) * | 2016-03-09 | 2016-07-20 | 中国人民武装警察部队工程大学 | Singular value modification video steganographic algorithm based on combination with improved matrix coding |
CN107944282A (en) * | 2017-11-08 | 2018-04-20 | 安徽大学 | A kind of reversible information hidden method based on asymmetric prediction histogram of error modification |
CN108632138A (en) * | 2018-03-29 | 2018-10-09 | 东华大学 | A kind of commodity network safety communicating method based on image latent writing art |
CN110009547A (en) * | 2019-03-15 | 2019-07-12 | 中山大学 | A kind of JPEG asymmetrical digital image latent writing method |
Non-Patent Citations (4)
Title |
---|
K. CHEN, H. ZHOU, W. LI, K. YANG, W. ZHANG AND N. YU: "Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio", 《IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY》 * |
熊金波,马蓉,张媛媛,戴睿煜: "面向社交网络的图片信息隐藏方法与实现", 《信息网络安全》 * |
王子驰,张新鹏,秦川: "非对称失真的空域自适应隐写", 《应用科学学报》 * |
程森,张卫明,包震坤,米顺强,俞能海: "基于DCT系数大小关系的自适应JPEG隐写", 《武汉大学学报(理学版)》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112634118A (en) * | 2020-12-24 | 2021-04-09 | 中国科学技术大学 | Batch-resistant steganography method |
CN112634118B (en) * | 2020-12-24 | 2022-09-30 | 中国科学技术大学 | Anti-batch steganography method |
CN114553811A (en) * | 2022-01-07 | 2022-05-27 | 中国人民解放军战略支援部队信息工程大学 | High-capacity behavior steganography method based on timestamp modulation and carrier selection |
CN114553811B (en) * | 2022-01-07 | 2023-04-28 | 中国人民解放军战略支援部队信息工程大学 | High-capacity behavior steganography method based on timestamp modulation and carrier selection |
CN114612317A (en) * | 2022-02-07 | 2022-06-10 | 中国人民解放军国防科技大学 | Secret image sharing method and system for resisting mean filtering |
Also Published As
Publication number | Publication date |
---|---|
CN111327786B (en) | 2021-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111327786B (en) | Robust steganography method based on social network platform | |
Yu et al. | Robust adaptive steganography based on generalized dither modulation and expanded embedding domain | |
CN103607591A (en) | Image compression method combining super-resolution reconstruction | |
TWI222327B (en) | Image encoding device, image encoding method, and image processing device | |
EP3085089B1 (en) | Optimised video coding involving transform and spatial domain weighting | |
CN111064958A (en) | Low-complexity neural network filtering algorithm for B frame and P frame | |
CN112333348A (en) | Reversible data hiding method and system based on prediction error | |
CN109447885A (en) | A kind of robust image steganography method based on DCT coefficient difference | |
Zeng et al. | Improving robust adaptive steganography via minimizing channel errors | |
Wu et al. | DAC-Mobi: Data-assisted communications of mobile images with cloud computing support | |
CN113612898B (en) | Robust covert communication device for resisting JPEG image downsampling | |
CN109584139B (en) | Safety embedding method suitable for batch self-adaptive steganography | |
Zeng et al. | Upward robust steganography based on overflow alleviation | |
CN117041442A (en) | Image robust steganography method based on adaptive STC-ECC strategy | |
CN108024114B (en) | High-capacity lossless HEVC information hiding method based on flag bit parameter modification | |
Pan et al. | Novel reversible data hiding scheme for AMBTC-compressed images by reference matrix | |
JP4645948B2 (en) | Decoding device and program | |
CN111343466B (en) | Reversible video data hiding method based on two-dimensional histogram translation | |
EP3154021A1 (en) | Method and apparatus for de-noising an image using video epitome | |
Tang et al. | Reversible data hiding for JPEG images based on block difference model and Laplacian distribution estimation | |
Zeng et al. | Improving dither modulation based robust steganography by overflow suppression | |
Yang et al. | Quad-tree Structure-Preserving Adaptive Steganography for HEVC | |
Kumar et al. | A Resilient Approach to Robust JPEG Steganography: Ensuring Hidden Data Integrity | |
CN115330890B (en) | Secret image sharing method and system based on global adjustment and stable block conditions | |
CN113766084B (en) | Reversible information hiding method and system for enhancing image smoothness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |