CN111327786A - Robust steganography method based on social network platform - Google Patents

Robust steganography method based on social network platform Download PDF

Info

Publication number
CN111327786A
CN111327786A CN202010118578.2A CN202010118578A CN111327786A CN 111327786 A CN111327786 A CN 111327786A CN 202010118578 A CN202010118578 A CN 202010118578A CN 111327786 A CN111327786 A CN 111327786A
Authority
CN
China
Prior art keywords
image
carrier
distortion
carrier image
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010118578.2A
Other languages
Chinese (zh)
Other versions
CN111327786B (en
Inventor
张卫明
俞能海
于心智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology of China USTC
Original Assignee
University of Science and Technology of China USTC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology of China USTC filed Critical University of Science and Technology of China USTC
Priority to CN202010118578.2A priority Critical patent/CN111327786B/en
Publication of CN111327786A publication Critical patent/CN111327786A/en
Application granted granted Critical
Publication of CN111327786B publication Critical patent/CN111327786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32165Transform domain methods using cosine transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking

Abstract

The invention discloses a robust steganography method based on a social network platform, which comprises the following steps: for a given carrier image X, calculating the symmetric distortion of the carrier image X by using a steganography algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion; for a given carrier image X, extracting carrier elements from a specified embedded domain, and calculating modification distances of the carrier elements according to a generalized jitter modulation mechanism; obtaining the modified distortion of the carrier element by combining the asymmetric distortion and the modified distance of the carrier element; and based on the modification distortion of the carrier element, embedding the coded secret information into the carrier image with the modification distortion to obtain the secret image. The method can be suitable for a real social network platform scene, meets the requirements in practical application, and has good performance in the aspects of safety, robustness and capacity.

Description

Robust steganography method based on social network platform
Technical Field
The invention relates to the technical field of social network security and steganography, in particular to a robust steganography method based on a social network platform.
Background
Steganography is a technology of covert communication, and aims to realize covert communication by using digital multimedia (such as images) as a carrier to cover secret information. Because the complex texture region of the image is difficult to model, the fluctuation caused by the high-dimensional statistical features of the image is small when the complex texture region is modified, and therefore high safety performance can be achieved when the complex texture region of the image is modified. At present, the mainstream adaptive steganography technology is to reasonably define a distortion function based on image texture and further utilize the minimized distortion steganography STC to achieve high security. In order to further improve the security of the steganography algorithm, Zichi Wang et al adjust a distortion function by estimating JPEG image side information to obtain asymmetric distortion, thereby greatly improving the security of steganography.
Although current steganographic algorithms can achieve high security, they are not applicable to practical social networking platforms. Due to the limitations of memory and bandwidth, the social network platform performs lossy processing on the uploaded image, such as JPEG recompression, and the current steganographic algorithm performs laboratory environment communication based on an ideal channel, so that the current steganographic algorithm cannot be applied to the actual social network platform. With the rapid development and popularization of intelligent mobile terminals, sharing images on a social network platform gradually becomes a popular living habit, which provides a favorable application environment for covert communication, and therefore, designing a steganographic algorithm applicable to the social network platform is urgent. Different from a laboratory environment steganography algorithm based on an ideal channel, the steganography algorithm based on a lossy channel is called a robust steganography algorithm.
Because the main lossy processing mode of the mainstream social network platform on the uploaded image is JPEG recompression, the current robust steganography mainly aims at JPEG recompression expansion. In 2016, Yi Zhang proposes a robust steganography framework based on the construction of an anti-compression domain and the combination of RS and STC coding, and the framework obtains stronger robustness by constructing the anti-compression domain and utilizing RS error correction codes. They then propose a robust steganographic algorithm based on the relative relationship between four adjacent DCT coefficients. In order to fully utilize the characteristics of quantization operation, Yi Zhang et al propose a DMAS robust steganography algorithm by modifying the intermediate frequency DCT coefficients of JPEG images by using the idea of dither modulation, wherein the algorithm can obtain stronger robust performance, but has poorer safety and capacity. In 2018, Jinyuan Tao proposed an indirectly modified robust steganography algorithm based on a simplified JPEG recompression process, and although the algorithm can theoretically achieve zero bit error rate, the Jinyuan Tao cannot be applied to an actual social network platform because a real JPEG recompression process is not considered. In order to reduce the influence of the social network platform, the Zengzhen Zhao uploads and downloads the carrier for multiple times through the social network platform in advance so that the carrier image is adapted to the social channel, and then stronger robustness is obtained by combining an error correction code, but the behavior violates the nature of steganography, namely, a behavior safety criterion.
As described above, the existing robust steganographic algorithms have respective problems in terms of security, capacity, or practical application capability, etc. only for making the steganographic algorithms robust. In order to meet the requirements in practical application, the robust steganographic algorithm must have good performance in terms of security, robustness and capacity. Therefore, it is necessary to provide a robust steganography algorithm that can be applied to real social network platform scenarios.
Disclosure of Invention
The invention aims to provide a robust steganography method based on a social network platform, which can be suitable for a real social network platform scene.
The purpose of the invention is realized by the following technical scheme:
a robust steganography method based on a social network platform comprises the following steps:
for a given carrier image X, calculating the symmetric distortion of the carrier image X by using the existing steganography algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion;
for a given carrier image X, extracting carrier elements from a specified embedded domain, and calculating modification distances of the carrier elements according to a generalized jitter modulation mechanism;
obtaining the modified distortion of the carrier element by combining the asymmetric distortion and the modified distance of the carrier element;
and based on the modification distortion of the carrier element, embedding the coded secret information into the carrier image to obtain the carrier image.
The technical scheme provided by the invention can meet the requirements in practical application and has better performance in the aspects of safety, robustness and capacity.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a robust steganography method based on a social network platform according to an embodiment of the present invention;
FIG. 2 is a flow chart for obtaining asymmetric distortion according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating designated anti-compression domains provided by an embodiment of the present invention;
FIG. 4 is a diagram illustrating a generalized dithering modulation scheme according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an experimental result provided in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a robust steganography method based on a social network platform, which mainly comprises the following steps of:
1. for a given JPEG carrier image X, calculating the symmetric distortion of the carrier image X by using a steganographic algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion.
In the embodiment of the invention, the carrier image takes a JPEG image as an example, and the invention can be applied after other format images are converted into JPEG format images.
As shown in fig. 2, in the embodiment of the present invention, an improved asymmetric distortion framework is used, and the steganography algorithm may use an existing algorithm, for example, an existing distortion function (e.g., J-UNIWARD, UERD, etc.).
The preferred embodiment of this step is as follows:
1) for a given carrier image X, its quantization table Q is obtained.
2) Calculating the symmetric distortion rho of the carrier image X by using a steganographic algorithm, and decompressing the carrier image X to a space domain to obtain a space domain image J-1(X)。
3) Using the mean filter F to the spatial domain image J-1(X) filtering to obtain a filtered spatial domain image S (smoothed spatial domain image):
Figure BDA0002392261430000031
illustratively, the mean filter F may be of the form:
Figure BDA0002392261430000032
4) converting the filtered spatial domain image S into DCT domain by DCT transform to obtain non-quantized DCT coefficient
Figure BDA0002392261430000033
5) Using non-quantized DCT coefficients
Figure BDA0002392261430000041
Calculating asymmetric distortion rho from symmetric distortion rho+And ρ-
Figure BDA0002392261430000042
Figure BDA0002392261430000043
Where the subscript ij denotes the (i, j) position in the carrier image.
In an embodiment of the invention, capital letters correspond to lowercase letters, and if X represents the carrier image, i.e. X represents all coefficients of the carrier image, then XijIs the coefficient at the (i, j) position in the carrier image; q represents a quantization table, Q represents a quantization step size at any position, and Q represents a quantization step size at any positionijIt represents the quantization step size at the (i, j) position in the carrier image.
Figure BDA0002392261430000044
Representing non-quantized DCT coefficients, then
Figure BDA0002392261430000045
Representing the non-quantized DCT coefficients at the (i, j) position in the carrier image; d represents a non-quantized DCT coefficient matrix, D in the following formula represents a non-quantized DCT coefficient at an arbitrary position, DijIt represents the non-quantized DCT coefficients at the (i, j) position. Rho+、ρ-Positive and negative asymmetric distortions, respectively, then ρij +、ρij -Corresponding to the positive and negative polarity asymmetric distortions at the (i, j) position in the carrier image.
2. For a given carrier image X, carrier elements are extracted from the specified embedded domain, and the modification distances of the carrier elements are calculated according to a generalized dither modulation scheme.
Taking fig. 3 as an example, an example of carrier element extraction from a compression-resistant domain is shown.
The preferred embodiment of this step is as follows:
1) obtaining a non-quantization DCT coefficient matrix D of the carrier image X, and selecting a standard quantization table according to the social network platform environment
Figure BDA0002392261430000046
Standard quantization table
Figure BDA0002392261430000047
As long as it corresponds toAnd the quality factor is not more than the quality factor corresponding to JPEG recompression of the social network platform.
2) Calculating the positive polarity modification distance h of the carrier element according to the generalized jitter modulation mechanism+And negative polarity modification distance h-
In the generalized jitter modulation mechanism, non-quantized DCT coefficients of carrier elements are quantized according to a selected quantization step size
Figure BDA0002392261430000048
Dividing into odd class and even class, respectively representing message bits 1 and 0, and using standard quantization table
Figure BDA0002392261430000049
Realizing message embedding in the quantization process of the non-quantization DCT coefficient d;
positive polarity modification distance h+And negative polarity modification distance h-The calculation formula of (2) is as follows:
Figure BDA00023922614300000410
Figure BDA00023922614300000411
where k is a natural number, subscript ij denotes the (i, j) position in the carrier image X, dijRepresenting the non-quantized DCT coefficients at the (i, j) position in the carrier image X,
Figure BDA0002392261430000051
each being a positive polarity modification distance, a negative polarity modification distance of the carrier element at the (i, j) position in the carrier image X.
It should be noted that, in the embodiment of the present invention, the execution sequence of the step 1 and the step 2 is not limited, and the steps may be executed synchronously, or executed in tandem (for example, execute the step 1 and then execute the step 2, or execute the step 2 and then execute the step 1).
3. The modified distortion of the carrier element is obtained by combining the asymmetric distortion with the modified distance of the carrier element.
Taking FIG. 4 as an example, the positive polarity modified distortion is ξ+=ρ+/q×h+Negative polarity modified distortion of ξ-=ρ-/q×h-(wherein q is the quantization step corresponding to the carrier X), the specific calculation formula is:
Figure BDA0002392261430000052
Figure BDA0002392261430000053
wherein h is+And h-Indicating the modification distance and the index ij indicates the (i, j) position in the carrier image.
To minimize the embedding distortion, the proposed modification rule is:
Figure BDA0002392261430000054
wherein the content of the first and second substances,
Figure BDA0002392261430000055
is the DCT coefficient corresponding to the secret image. For any carrier element dijWherein
Figure BDA0002392261430000056
4. And embedding the coded secret information into the carrier image based on the modification distortion of the carrier element to obtain the carrier image.
The original secret message m is encoded by an error correcting code to obtain an encoded secret message
Figure BDA0002392261430000057
Illustratively, the original secret message m may be encoded using an RS (31,15) error correction code.
Encoding the encoded secret information message using ternary STCs encoding based on modified distortion of the carrier element
Figure BDA0002392261430000058
And embedding the image into a carrier image to obtain a secret carrier image Y.
The embodiment of the invention also comprises the following steps: the method for decoding the secret-carrying image by the receiving party comprises the following steps:
when the secret information is extracted at the receiving end, the receiving end receives the secret-carrying image obtained by recompressing the secret-carrying image Y by the social network platform
Figure BDA0002392261430000059
The receiver obtains the secret-carrying image by calculation
Figure BDA00023922614300000510
Then using a standard quantization table agreed with the sender
Figure BDA00023922614300000511
Extracting information to obtain secret information coded by error correcting code
Figure BDA00023922614300000512
The bit information represented by each secret-carrying element is the bit information represented by the odd-class or even-class interval in which the secret-carrying element is located, and then the original secret information m can be obtained by decoding the bit information by using an error correcting code (for example, RS (31, 15)).
In order to illustrate the effects of the above-described scheme of the embodiment of the present invention, a related experiment was also performed. The results of the experiment are shown in FIG. 5.
The performance of the robust steganography method based on the social network platform and the robust steganography method proposed by Zhang Yi et al are shown in FIG. 5. The robust steganography method proposed by Zhang Yi et al mainly combines the traditional jitter modulation with binary STCs coding for message embedding, and because only the intermediate frequency region is used as an embedded domain and the binary STCs coding efficiency is low, the security and the capacity are relatively poor.
The left graph in fig. 5 is a safety performance comparison of the two methods, and the experimental setup is: experiments are carried out by using a BOSSbase1.01 image library with a quality factor of 75, steganalysis is characterized by CCPEV (PEV features enhanced by cardboard calibration), embedding rate is 0.05bpnzac to 0.15bpnzac, 5000 images in the image library are used for training a classifier, 5000 images are used for testing, and 10 experiments are carried out to obtain average detection error rate.
The right graph in fig. 5 is a comparison of the robustness of the two methods, and the experimental settings are as follows: 1000 images are randomly selected from a BOSSbase1.01 image library with the quality factor of 65 for experiment, the quality factor of channel compression is set to be 95, and the average error rate of the 1000 images is taken.
Therefore, the effect of the scheme of the embodiment of the invention is obviously better than that of the existing scheme.
Through the above description of the embodiments, it is clear to those skilled in the art that the above embodiments can be implemented by software, and can also be implemented by software plus a necessary general hardware platform. With this understanding, the technical solutions of the embodiments can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (6)

1. A robust steganography method based on a social network platform is characterized by comprising the following steps:
for a given carrier image X, calculating the symmetric distortion of the carrier image X by using the existing steganography algorithm, and adjusting by using an asymmetric distortion frame to obtain asymmetric distortion;
for a given carrier image X, extracting carrier elements from a specified embedded domain, and calculating modification distances of the carrier elements according to a generalized jitter modulation mechanism;
obtaining the modified distortion of the carrier element by combining the asymmetric distortion and the modified distance of the carrier element;
and based on the modification distortion of the carrier element, embedding the coded secret information into the carrier image to obtain the carrier image.
2. The robust steganography method based on the social network platform as claimed in claim 1, wherein the calculating the symmetric distortion of the carrier image by using the existing steganography algorithm, and the obtaining the asymmetric distortion by the asymmetric distortion framework adjustment comprises:
for a given carrier image X, obtaining a quantization table Q thereof;
calculating the symmetric distortion rho of the carrier image X by using a steganographic algorithm, and decompressing the carrier image X to a space domain to obtain a space domain image J-1(X);
Using the mean filter F to the spatial domain image J-1(X) filtering to obtain a filtered spatial domain image S:
Figure FDA0002392261420000011
converting the filtered spatial domain image S into DCT domain by DCT transform to obtain non-quantized DCT coefficient
Figure FDA0002392261420000012
Using non-quantized DCT coefficients
Figure FDA0002392261420000013
Calculating asymmetric distortion rho from symmetric distortion rho+And ρ-
Figure FDA0002392261420000014
Figure FDA0002392261420000015
Wherein the subscript ij denotes the (i, j) position in the carrier image X, XijIs the coefficient at the (i, j) position in the carrier image, qijThen represents the quantization step size at the (i, j) position in the carrier image,
Figure FDA0002392261420000016
representing the unquantized DCT coefficients at the (i, j) position in the carrier image, p+、ρ-Asymmetric distortion of positive and negative polarity, respectively, rhoij +、ρij -Representing positive and negative polarity asymmetric distortions at the (i, j) position in the carrier image.
3. The social network platform-based robust steganography method according to claim 1, wherein the calculating the modification distance of the carrier element according to the generalized jitter modulation scheme comprises:
obtaining a non-quantization DCT coefficient matrix D of the carrier image X, and selecting a standard quantization table according to the social network platform environment
Figure FDA0002392261420000021
Then calculating the positive polarity modification distance h of the carrier element according to a generalized jitter modulation mechanism+And negative polarity modification distance h-
In the generalized jitter modulation mechanism, non-quantization DCT coefficients of carrier elements are subjected to quantization step size selection
Figure FDA0002392261420000022
Dividing into odd class and even class, respectively representing message bits 1 and 0, and using standard quantization table
Figure FDA0002392261420000023
Realizing message embedding in the quantization process of the non-quantization DCT coefficient d;
positive polarity modification distance h+And negative polarity modification distance h-Is calculated by the formula:
Figure FDA0002392261420000024
Figure FDA0002392261420000025
Where k is a natural number, subscript ij denotes the (i, j) position in the carrier image X, dijRepresenting the non-quantized DCT coefficients at the (i, j) position in the carrier image X,
Figure FDA0002392261420000026
each being a positive polarity modification distance, a negative polarity modification distance of the carrier element at the (i, j) position in the carrier image X.
4. The social network platform-based robust steganography method as claimed in claim 1, wherein the step of combining the asymmetric distortion and the modification distance of the carrier element to obtain the modified distortion of the carrier element comprises a step of modifying the distortion with positive polarity ξ+And negative polarity modification distortion ξ-
Positive polarity modified distortion is ξ+=ρ+/q×h+Negative polarity modified distortion of ξ-=ρ-/q×h-The specific calculation formula is as follows:
Figure FDA0002392261420000027
Figure FDA0002392261420000028
wherein h is+And h-Representing the positive and negative modification distances, the subscript ij representing the (i, j) position in the carrier image, pij +、ρij -Representing positive and negative asymmetric distortions at the (i, j) position in the carrier image, qijThen (i, j) in the carrier image is represented) Quantization step size at a location.
5. The robust steganography method based on a social networking platform of claim 1, wherein the first and second sets of data are stored in a memory,
the original secret message m is encoded by an error correcting code to obtain an encoded secret message
Figure FDA0002392261420000029
Encoding the encoded secret information message using ternary STCs encoding based on modified distortion of the carrier element
Figure FDA00023922614200000210
And embedding the image into a carrier image to obtain a secret carrier image Y.
6. The robust steganography method based on a social network platform as claimed in claim 1, wherein the method further comprises: the method for decoding the secret-carrying image by the receiving party comprises the following steps:
the receiver receives the secret-carrying image which is obtained by recompressing the secret-carrying image Y by the social network platform
Figure FDA00023922614200000211
Obtaining secret-carrying image by calculation
Figure FDA0002392261420000031
Then using a standard quantization table agreed with the sender
Figure FDA0002392261420000032
Extracting information to obtain secret information coded by error correcting code
Figure FDA0002392261420000033
The bit information represented by each secret-carrying element is the bit information represented by the odd-class or even-class interval in which the secret-carrying element is positioned,and then decoding by using an error correcting code to obtain the original secret information m.
CN202010118578.2A 2020-02-26 2020-02-26 Robust steganography method based on social network platform Active CN111327786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010118578.2A CN111327786B (en) 2020-02-26 2020-02-26 Robust steganography method based on social network platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010118578.2A CN111327786B (en) 2020-02-26 2020-02-26 Robust steganography method based on social network platform

Publications (2)

Publication Number Publication Date
CN111327786A true CN111327786A (en) 2020-06-23
CN111327786B CN111327786B (en) 2021-10-01

Family

ID=71168907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010118578.2A Active CN111327786B (en) 2020-02-26 2020-02-26 Robust steganography method based on social network platform

Country Status (1)

Country Link
CN (1) CN111327786B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112634118A (en) * 2020-12-24 2021-04-09 中国科学技术大学 Batch-resistant steganography method
CN114553811A (en) * 2022-01-07 2022-05-27 中国人民解放军战略支援部队信息工程大学 High-capacity behavior steganography method based on timestamp modulation and carrier selection
CN114612317A (en) * 2022-02-07 2022-06-10 中国人民解放军国防科技大学 Secret image sharing method and system for resisting mean filtering

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040228502A1 (en) * 2001-03-22 2004-11-18 Bradley Brett A. Quantization-based data embedding in mapped data
CN104052658A (en) * 2014-07-05 2014-09-17 中国科学技术大学 Privacy protection system and method based on social network
CN105791854A (en) * 2016-03-09 2016-07-20 中国人民武装警察部队工程大学 Singular value modification video steganographic algorithm based on combination with improved matrix coding
CN107944282A (en) * 2017-11-08 2018-04-20 安徽大学 A kind of reversible information hidden method based on asymmetric prediction histogram of error modification
CN108632138A (en) * 2018-03-29 2018-10-09 东华大学 A kind of commodity network safety communicating method based on image latent writing art
CN110009547A (en) * 2019-03-15 2019-07-12 中山大学 A kind of JPEG asymmetrical digital image latent writing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040228502A1 (en) * 2001-03-22 2004-11-18 Bradley Brett A. Quantization-based data embedding in mapped data
CN104052658A (en) * 2014-07-05 2014-09-17 中国科学技术大学 Privacy protection system and method based on social network
CN105791854A (en) * 2016-03-09 2016-07-20 中国人民武装警察部队工程大学 Singular value modification video steganographic algorithm based on combination with improved matrix coding
CN107944282A (en) * 2017-11-08 2018-04-20 安徽大学 A kind of reversible information hidden method based on asymmetric prediction histogram of error modification
CN108632138A (en) * 2018-03-29 2018-10-09 东华大学 A kind of commodity network safety communicating method based on image latent writing art
CN110009547A (en) * 2019-03-15 2019-07-12 中山大学 A kind of JPEG asymmetrical digital image latent writing method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
K. CHEN, H. ZHOU, W. LI, K. YANG, W. ZHANG AND N. YU: "Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio", 《IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY》 *
熊金波,马蓉,张媛媛,戴睿煜: "面向社交网络的图片信息隐藏方法与实现", 《信息网络安全》 *
王子驰,张新鹏,秦川: "非对称失真的空域自适应隐写", 《应用科学学报》 *
程森,张卫明,包震坤,米顺强,俞能海: "基于DCT系数大小关系的自适应JPEG隐写", 《武汉大学学报(理学版)》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112634118A (en) * 2020-12-24 2021-04-09 中国科学技术大学 Batch-resistant steganography method
CN112634118B (en) * 2020-12-24 2022-09-30 中国科学技术大学 Anti-batch steganography method
CN114553811A (en) * 2022-01-07 2022-05-27 中国人民解放军战略支援部队信息工程大学 High-capacity behavior steganography method based on timestamp modulation and carrier selection
CN114553811B (en) * 2022-01-07 2023-04-28 中国人民解放军战略支援部队信息工程大学 High-capacity behavior steganography method based on timestamp modulation and carrier selection
CN114612317A (en) * 2022-02-07 2022-06-10 中国人民解放军国防科技大学 Secret image sharing method and system for resisting mean filtering

Also Published As

Publication number Publication date
CN111327786B (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN111327786B (en) Robust steganography method based on social network platform
Yu et al. Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
CN103607591A (en) Image compression method combining super-resolution reconstruction
TWI222327B (en) Image encoding device, image encoding method, and image processing device
EP3085089B1 (en) Optimised video coding involving transform and spatial domain weighting
CN111064958A (en) Low-complexity neural network filtering algorithm for B frame and P frame
CN112333348A (en) Reversible data hiding method and system based on prediction error
CN109447885A (en) A kind of robust image steganography method based on DCT coefficient difference
Zeng et al. Improving robust adaptive steganography via minimizing channel errors
Wu et al. DAC-Mobi: Data-assisted communications of mobile images with cloud computing support
CN113612898B (en) Robust covert communication device for resisting JPEG image downsampling
CN109584139B (en) Safety embedding method suitable for batch self-adaptive steganography
Zeng et al. Upward robust steganography based on overflow alleviation
CN117041442A (en) Image robust steganography method based on adaptive STC-ECC strategy
CN108024114B (en) High-capacity lossless HEVC information hiding method based on flag bit parameter modification
Pan et al. Novel reversible data hiding scheme for AMBTC-compressed images by reference matrix
JP4645948B2 (en) Decoding device and program
CN111343466B (en) Reversible video data hiding method based on two-dimensional histogram translation
EP3154021A1 (en) Method and apparatus for de-noising an image using video epitome
Tang et al. Reversible data hiding for JPEG images based on block difference model and Laplacian distribution estimation
Zeng et al. Improving dither modulation based robust steganography by overflow suppression
Yang et al. Quad-tree Structure-Preserving Adaptive Steganography for HEVC
Kumar et al. A Resilient Approach to Robust JPEG Steganography: Ensuring Hidden Data Integrity
CN115330890B (en) Secret image sharing method and system based on global adjustment and stable block conditions
CN113766084B (en) Reversible information hiding method and system for enhancing image smoothness

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant