CN111654707B - Information hiding method and terminal based on Russian blocks - Google Patents

Information hiding method and terminal based on Russian blocks Download PDF

Info

Publication number
CN111654707B
CN111654707B CN202010492427.3A CN202010492427A CN111654707B CN 111654707 B CN111654707 B CN 111654707B CN 202010492427 A CN202010492427 A CN 202010492427A CN 111654707 B CN111654707 B CN 111654707B
Authority
CN
China
Prior art keywords
secret information
squares
russian
secret
selecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010492427.3A
Other languages
Chinese (zh)
Other versions
CN111654707A (en
Inventor
苏国栋
张真诚
林家桢
郭永宁
李立耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN202010492427.3A priority Critical patent/CN111654707B/en
Publication of CN111654707A publication Critical patent/CN111654707A/en
Application granted granted Critical
Publication of CN111654707B publication Critical patent/CN111654707B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

According to the information hiding method and the terminal based on the Russian blocks, the squares filled by the Russian blocks according to the preset rules are constructed, and the magic matrix is constructed according to the squares; selecting a corresponding magic matrix according to the size of the secret information, and converting the secret information to obtain converted secret information; and embedding the converted secret information into the original image for hiding to obtain a secret image, thereby flexibly hiding more secret messages while ensuring the information security.

Description

Information hiding method and terminal based on Russian blocks
Technical Field
The invention relates to the technical field of information security, in particular to an information hiding method and terminal based on a Russian block.
Background
The rapid development of the information age and the complexity and changeability of the internet environment, and the problem of information security protection has become the focus of attention of researchers.
The information hiding technology, which is one of the important components in the information security field, emphasizes that the hidden information is embedded into a specific carrier by using a certain hiding means, so that not only is the hidden data protected from being damaged, but also the information security transmission is ensured, and meanwhile, the discovery of an illegal attacker is prevented. That is, the existence of the covert information is hidden. Therefore, compared with an encryption technology, the information hiding technology has more advantages.
Disclosure of Invention
Technical problem to be solved
In order to solve the above problems in the prior art, the present invention provides an information hiding method and a terminal based on a tetris, which can flexibly hide more secret messages while ensuring information security.
(II) technical scheme
In order to achieve the purpose, the invention adopts a technical scheme that:
a tetris-based information hiding method comprises the following steps:
s1, constructing squares filled by Russian squares according to a preset rule, and constructing a magic matrix according to the squares;
s2, selecting a corresponding magic matrix according to the size of the secret information, and converting the secret information to obtain converted secret information;
s3, embedding the converted secret information into the original image for hiding to obtain a secret image.
In order to achieve the purpose, the invention adopts another technical scheme as follows:
a tetris-based information hiding terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the program:
s1, constructing squares filled by Russian squares according to a preset rule, and constructing a magic matrix according to the squares;
s2, selecting a corresponding magic matrix according to the size of the secret information, and converting the secret information to obtain converted secret information;
s3, embedding the converted secret information into the original image for hiding to obtain a secret image.
(III) advantageous effects
The invention has the beneficial effects that: constructing a square grid filled by a Russian square according to a preset rule, and constructing a magic matrix according to the square grid; selecting a corresponding magic matrix according to the size of the secret information, and converting the secret information to obtain converted secret information; and embedding the converted secret information into the original image for hiding to obtain a secret image, thereby flexibly hiding more secret messages while ensuring the information security.
Drawings
FIG. 1 is a flowchart of an embodiment of a method for hiding information based on Tetris;
FIG. 2 is a schematic view of the rotation angle and shape of a basic Russian block according to an embodiment of the present invention;
FIG. 3 shows Q in an embodiment of the present invention4Schematic diagrams of filling squares and the naming of squares of (a);
FIG. 4 shows Q in an embodiment of the present invention6Schematic diagrams of filling squares and the naming of squares of (a);
FIG. 5 shows Q in an embodiment of the present invention4(Q6) Corresponding magic matrix MT4(MT6) A schematic diagram of (a);
FIG. 6 shows Q in an embodiment of the present invention4(Q6) Corresponding look-up table LUT4(LUT6) A schematic diagram of (a);
FIG. 7 illustrates an embodiment of the present invention using an MT4Embedding a secret information schematic diagram;
FIG. 8 illustrates an embodiment of the present invention using an MT6Embedding a secret information schematic diagram;
fig. 9 is a schematic structural diagram of an information hiding terminal based on a tetris according to an embodiment of the present invention.
[ description of reference ]
1: the information hiding terminal is based on a Russian square;
2: a memory;
3: a processor.
Detailed Description
For the purpose of better explaining the present invention and to facilitate understanding, the present invention will be described in detail by way of specific embodiments with reference to the accompanying drawings.
Example one
Referring to fig. 1, a tetris-based information hiding method includes the steps of:
s01, selecting a square;
s02, defining the rotation angle and the shape of different basic Tetris, wherein the basic Tetris comprises a plurality of basic units with different values.
S1, constructing squares filled by Russian squares according to a preset rule, and constructing a magic matrix according to the squares;
step S1 specifically includes:
a square completely and seamlessly filled by a plurality of basic Russian squares is constructed, and a magic matrix and a corresponding lookup table are constructed according to the square.
S2, converting the secret information according to the magic matrix to obtain converted secret information;
s3, embedding the converted secret information into the image for hiding to obtain a secret image.
Step S3 further includes:
s31, acquiring an original image with the size of H multiplied by W;
and S32, cutting the image into a plurality of non-overlapping pixel pairs.
Step S3 includes:
s33, determining a corresponding basic Russian block from the lookup table according to the converted secret information;
s34, mapping the pixel pairs into the magic matrix to obtain a plurality of candidate pixel pairs;
and S35, selecting a pixel pair from the candidate pixel pairs according to the minimum distance principle as the pixel value of the converted secret information at the corresponding position of the secret image, and obtaining the secret image after all the secret information is embedded.
Example two
The embodiment further illustrates how the tetris-based information hiding method of the present invention is implemented in combination with a specific application scenario:
1. selecting a square grid Q with the size of LQ×LQWherein L isQThe value is 4 or 6, and can be adjusted according to actual needs;
2. the rotation angle and the shape of 7 basic tetris are defined, wherein each tetris contains 4 basic unit cells.
As shown in fig. 2, the definition of the basic russian square of class 7 is shown in fig. 2(a), and it is taken as a basic shape. At the same time, the basic russian squares of each type of shape can be rotated by 4 angles 0 °,90 °,180 °,270 °. Taking Russian 'T' as an example, the rotation is performed counterclockwise to obtain four shapes derived from the Russian 'T', as shown in FIG. 2 (b). All the 7 kinds of basic Russian blocks are rotated and defined according to the rule, and the purpose is to form a unified lookup table design rule.
3. From the defined 7 basic russian squares, several russian squares are selected to completely fill the selected square Q and leave no gaps in Q.
Specifically, if LQIf the value is 4, selecting 4 squares from the defined Tetris to fill in Q; if L isQWith a value of 6,9 squares are selected from the defined tetris to fill in Q. Whether LQThe value of 4 or 6 is selected, the filling schemes meeting the conditions are all provided with a plurality of types, and Q is respectively shown in figure 3 and figure 44And Q6And for each selected Russian square named "T1”,“T2”,“T3”,“T4”,“SQ”,“RS1”,“RS2”,“LS1"and" LS2", to facilitate the discussion that follows. Meanwhile, different numbers are given to 4 basic cells of each Russian square, and the values are normalized to [0,3]]The numerical assignment rule may be performed in a pseudo-random manner.
Also worth noting is the resulting Q (Q)4Or Q6) A secure sharing of sender and receiver is required to serve the hiding and extraction of secret information.
4. And constructing a magic matrix.
Q determined according to step 34Or Q6Constructing a magic matrix MT with a size of 256 × 256 by a copy operation4(MT6) As shown in fig. 5, the following features exist:
with Q4For example, the following steps are carried out:
1) at MT4In any 4 multiplied by 4 area, 4 Russian areas with different shapes can be foundDice, and thus can be used to carry logs24-2 bits of secret information;
2) each Russian square shape contains 4 elementary cells, including the numbers (0-3), and can therefore also be used to carry the log24-2 bits of secret information.
With Q6For example, the following steps are carried out:
1) at MT 69 Russian squares of mutually different shapes can be found in any 6x 6 region in the region, and thus can be used to carry the log2Secret information of 9 bits;
2) each Russian square shape contains 4 elementary cells, including the numbers (0-3), and can therefore also be used to carry the log24-2 bits of secret information.
5. And constructing a lookup table.
Q determined according to step 34Or Q6Constructing a corresponding look-up table LUT4Or LUT6As shown in fig. 6. The rules are constructed as follows:
1) scan Q (Q)4Or Q6) All russian cubes used in (a);
2) performing a first round of sorting on all the Russian blocks derived from 1) according to the order of appearance of the various Russian blocks in FIG. 2 (a);
3) for the similar Russian diamonds, carrying out a second round of sequencing according to the rotation angles of the Russian diamonds;
4) for the arranged Russian square sequence, the longitudinal element is used as the longitudinal element of the lookup table, and longitudinal coordinate values [0, L ] are given in sequence2Q/4]。
5) For the Russian square with the same shape, the Russian squares with different numbers are disassembled into 4 Russian squares, the Russian squares are arranged from small to large according to the numerical values of the Russian squares to form the row-direction elements of the lookup table, the row coordinate values [0,3] are sequentially given, and the construction of the lookup table can be completed through the steps.
6. And (6) secret information conversion.
Taking a gray image as an example, assume that the size of an original image I is H × W, binary secret information is B, and the length is LBAccording to LBSelecting a corresponding magic matrix MT and carrying out corresponding secret information conversion, wherein the specific process is as follows:
1) if L isBLess than or equal to 2. H.W, MT will be selected4To obtain a high quality stego image. Accordingly, the bit stream B is converted into 4-ary secret numbers via a 4-ary number conversion system. Next, every two consecutive 4-ary secret numbers are paired, and are denoted as S { (S)t,st+1)|t=1,2,3,…,LB/4}, wherein stAnd st+1Are all 4-ary secret numbers.
2) If 2. H. W < LB≤(log29+ 2). H.W/2, MT will be selected6To obtain higher-stock covert images. Accordingly, the bit stream B is sequentially circulated to be converted into the secret numbers of the 9 system and the 4 system through the digital conversion system of the 9 system and the 4 system, and the circulation is performed. Then, the continuous secret numbers of 9 system and 4 system are combined into a pair and recorded as
Figure BDA0002521575070000061
Wherein s istIs a secret number of 9, st+1Is a 4-ary secret number.
7. And embedding secret information.
The method comprises the following steps:
1) cutting an original image I into a plurality of non-overlapping pixel pairs in a raster scanning order, and marking as I { (p)i,pi+1)|i=1,3,5,7,…,(H·W-1)}。
2) According to the length L of the secret informationBSelecting the corresponding magic matrix MT and converting the secret into S { (S)t,st+1)}。
3) Secret information stAnd st+1The look-up table LUT is searched and the corresponding tetris is determined as ordinate and line coordinate, respectively.
4) Couple the pixels piAnd pi+1Mapped into the MT as ordinate and line coordinate, respectively. According to the characteristics of MT, in MT (p)i,pi+1) Several candidate pixel pairs (p'i,p′i+1). Wherein the candidate imagesThe Russian square in which the pair of elements is located is the same as the Russian square determined in step 3, and MT (p'i,p′i+1) Is the same as the tetris value determined in step 3.
5) Selecting a pixel pair (p ') according to the minimum distance d'i,p′i+1) As pixel values of the stego image at corresponding positions, secret information(s) is realizedt,st+1) Is hidden. Wherein, the calculation formula of d is as follows:
Figure BDA0002521575070000071
6) and when all the secret information is completely hidden, obtaining a secret image SI, and sending the secret image SI to a receiving party.
Examples of secret information embedding:
by MT4(LUT4) For example, see FIG. 7:
suppose an original pixel pair (p)i,pi+1) The secret number to be hidden is(s) when (0,8)t,st+1) (1, 0). Will stAs LUT4Ordinate of (a), st+1As LUT (0)4Can find the definite tetris
Figure BDA0002521575070000072
Mapping (0,8) to MT4And find several candidate pixel pairs around it, e.g., (2,9), (2,5), (6,9), etc. The shape of the Russian square in which the candidate pixel pairs are located is the same as the determined Russian square (all are "T2") and their values are the same. Finally, the pixel pair (0,8) is changed to (2,9) to carry the secret information (1,0) (in binary form '0100').
By MT6(LUT6) For example, see FIG. 8:
suppose an original pixel pair (p)i,pi+1) The secret number to be hidden is(s) (6,7)t,st+1) (8,0) in binary form ('100000'). Firstly, s ist=8As LUTs6With st +1 being 0 as LUT6Finding the determined tetris
Figure BDA0002521575070000073
Mapping (6,7) to MT6And find several candidate pixel pairs around it, e.g., (6,2), (6,8), (0,8), etc. The Russian squares in which the candidate pixel pairs are located have the same shape as the determined Russian squares (all "LS2") and their values are the same. Finally, the pixel pair (6,7) is changed to (6,8) to carry the secret information (8,0) (binary form '100000').
Information extraction
After the receiving end acquires the secret image SI, the secret information can be extracted as follows.
1. From the previously shared Q, a reference magic matrix MT and a look-up table LUT are constructed according to the same method.
2. The image SI is sliced into several non-overlapping pixel pairs in raster scan order, denoted as SI { (p'i,p′i+1)|i=1,3,5,7,…,(H·W-1)}。
3. Will pixel pair (p'i,p′i+1) Mapping into MT, i.e. MT (p'i,p′i+1)。
4. According to MT (p'i,p′i+1) The shape and value of the Russian square are the same as the LUT Russian square found in the lookup table.
5. Extracting coordinates(s) of the LUT tetrist,st+1) I.e. is the hidden secret number.
6. The extracted secret number(s)t,st+1) Into a bit stream.
7. After all the pixel pairs are extracted according to the process, the secret information is connected in series, and the extracted secret information is obtained.
Example secret information extraction:
by MT4(LUT4) For example, see FIG. 7:
suppose a pixel pair (p ') of a covert image'i,p′i+1) (2,9), mapping it to MT4I.e. MT4(2,9). From FIG. 7, we can find the MT4The shape of the (2,9) seat is "T2"and its value is 0. Thus, LUT4(1,0) is locked. Extracting its ordinate and line coordinate as secret information, i.e.(s)t,st+1) The binary form is '0100' (1, 0).
By MT6(LUT6) For example, see FIG. 8:
suppose a pixel pair (p ') of a covert image'i,p′i+1) (6,8), map it to MT6I.e. MT6(6,8). From FIG. 8, we can find the MT6(6,8) the shape of the seat is "LS2"(line 8) and its value is 0. Thus, LUT6(8,0) is locked. Extracting its ordinate and line coordinate as secret information, i.e.(s)t,st+1) (8,0), binary form is '100000'.
Comparison of results
1) Compared with the existing tortoise shell-based information hiding method in the aspects of embedding capacity (ER) and image quality (PSNR)
First, 6 test images were compared for the performance of the present invention and 5 tortoise shell-based information methods [ method 1-method 5], as shown in table 1.
As can be seen from table 1, the mean ER of the stego image provided by the present invention is the same as methods 2, 4 and 5, and higher than methods 1 and 3 by 0.5bpp and 0.15bpp, respectively. Moreover, under the same ER, the quality of the covert image provided by the invention is better than that of the methods 2, 4 and 5, and the difference is 1.35dB, 1.50dB and 2.21dB respectively.
Wherein, the method 1 specifically refers to High Capacity Mobile Shell-Based Data High, which is disclosed in IET Image Processing, Liu, Y, Chang, C.C., and Nguyen, T.S.;
method 2 specifically refers to the Data high Based on Extended turbine Shell Matrix Construction Method disclosed in Multimedia Tools and Applications, Liu, L., Chang, C.C., and Wang, A.;
method 3 specifically refers to Liu, L., Wang, L., and Chang, C.C. Data Embedding Scheme Based on Multi-Matrix Structure of tube Shell to Integrated Human Eye Perception, published in Multimedia Tools and Applications;
method 4 specifically refers to the Secure High Capacity Data High Scheme base on Reference Matrix published in International Journal of Network Security, Li, X.S., Chang, C.C., He, M.X., and Lin, C.C.;
method 5 specifically refers to Data high Scheme Based on A Flower-Shaped Reference Matrix, published in Journal of Network organization, Lee, C.F., Li, Y.C., Chu, S.C., and Roddick, J.F.;
table 1 comparison of the present invention with the tortoise shell based information hiding method in terms of embedding capacity and image quality
Figure BDA0002521575070000091
Figure BDA0002521575070000101
2) Comparison of the present invention with information hiding method based on Sudoku in terms of embedding capacity (ER) and image quality (PSNR)
Secondly, the present invention and sudoku-based information hiding method [ method 6-method 8] are also compared in terms of ER and PSNR for 4 test images. These methods are all designed based on the concept of a game of chance. Table 2 shows the experimental results of the present invention and sudoku-based information hiding method. Compared with the methods 6 and 8, the invention realizes higher quality of the covert image when the embedding capacity is 1.5 bpp. In addition, both method 7 and the present invention can achieve an embedding capacity of 1.58 bpp. Although the covert image quality of method 7 was slightly higher than the present invention, their ER was limited to 1.58bpp as reported in method 7, as shown in table 2. In contrast, the present invention boosts ER to 2.56bpp while maintaining an average PSNR of 43.12 dB. It is therefore apparent that the present invention is an efficient information hiding scheme with both high embeddability and high stego image quality.
Method 6 specifically refers to An Information high schedule Using Sudoku, published In Proceedings of the 3rd International Conference on Innovative Computing Information and Control;
method 7 specifically refers to Steganograph Using Sudoku review, published In Proceedings of Second International Symposium on Intelligent Information Technology Application;
method 8 specifically refers to A replaceable Data high Scheme Using design Sudoku, disclosed In Proceedings of 2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018);
table 2 comparison of the present invention with sudoku-based information hiding method in terms of embedding capacity and image quality
Figure BDA0002521575070000111
Finally, we further summarize and compare the image quality and embedding capacity between the present invention and methods 1, 2, 4, 6 and 8-10, as shown in table 3. '-' indicates no usable or relevant data. In Table 3, it can be easily found that the PSNR of the present invention maintains considerable levels, 48.72dB and 46.38dB, respectively, when ER is 1.5bpp and 2.0 bpp. Similarly, when ER is 2.5bpp or 3.0bpp, the visual quality of the stego image provided by the invention reaches 43.22dB and 40.72dB respectively. From methods 6 and 8, it can be seen that the information hiding method based on sudoku has a drawback in embedding capability. For tortoise-shell-based information hiding methods, such as method 9, their embedding capacity and image quality depend on the angle of the octopus shell and the width and height of the octopus shell. Unfortunately, with the expansion of the octopus shell, PSNR decreases significantly, e.g., when ER reaches 3.0bpp, the cryptic image PSNR of this type of approach is about 39.33dB, lower than 40.72dB of the present invention. Likewise, the method 10 proposes an improved method based on the direction modification technique (EMD2) by extending the magic matrix. Although their schemes can achieve ER up to 3.15bpp, they are relatively poor in the visual quality of the covert image, with an average PSNR of 39.89dB (ER ═ 3.0 bpp). Only the present invention and method 4 achieves ER up to 3.0bpp while having PSNR no less than 40.00 dB. However, method 4 has a poor visual quality when ER is set to 1.5bpp, 2.0bpp and 2.5bpp, compared to the present invention. In summary, it is sufficient to see that the present invention is clearly superior to the other latest methods 1, 2, 4, 6 and 8-10.
Method 9 specifically refers to generally characterized Scheme Based on Octagon-Shaped Shell for Data Hiding in Steganographic Applications, as disclosed by Leng, H.S. in Symmetry;
the method 10 specifically refers to Extended Squared Magic Matrix for Embedding Secret Information with Large Payload, published in Multimedia Tools and Applications, Xie, X.Z., Liu, Y, and Chang, C.C.; .
TABLE 3 comparison of quality of stego images at different reserves
Figure BDA0002521575070000121
EXAMPLE III
Referring to fig. 9, an information hiding terminal based on tetris includes a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor implements the steps in the first embodiment when executing the program.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (2)

1. A tetris-based information hiding method is characterized by comprising the following steps:
s1, constructing squares filled by Russian squares according to a preset rule, and constructing a magic matrix according to the squares; step S1 specifically includes:
selecting a squareQA size ofL Q x L Q WhereinL Q A value of 4 or 6;
defining the rotation angle and the shape of 7 basic Tetris, wherein each Tetris contains 4 basic cells;
selecting from the defined 7 basic Russian squares a number of Russian squares to completely fill the selected squaresQAnd make it possible toQNo gap is left;
assigning different numbers to 4 basic cells of each Russian square, and taking the value as [0,3 ];
according to the determinationQ 4OrQ 6Constructing a magic matrix with the size of 256x256 through a copying operation;
s2, selecting a corresponding magic matrix according to the size of the secret information, and converting the secret information to obtain converted secret information;
s3, embedding the converted secret information into an original image for hiding to obtain a secret image;
step S3 specifically includes:
the original image is processedICut into non-overlapping pairs of pixels in raster-scan order, denotedI = {(p i , p i+1)| i= 1, 3, 5, 7, …, (H·W-1)};
According to the length of secret informationL B Selecting the corresponding magic matrixMTAnd converts the secret intoS = {(s t , s t+1)};
Secret informations t Ands t+1searching the lookup table as a vertical coordinate and a horizontal coordinate, respectivelyLUTAnd determining the corresponding tetris;
couple pixelsp i Andp i+1as ordinate and line coordinate, respectively, mapped toMTPerforming the following steps; according toMTIs characterized in thatMT(p i , p i+1) Several candidate pixel pairs (can be found nearbyp i , p i+1);
According to minimum distancedSelecting a pixel pair (p i , p i+1) As pixel values of the stego image at corresponding positions, secret information is realized: (s t , s t+1) Is hidden.
2. A tetris-based information hiding terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the program:
s1, constructing squares filled by Russian squares according to a preset rule, and constructing a magic matrix according to the squares; step S1 specifically includes:
selecting a squareQA size ofL Q x L Q WhereinL Q A value of 4 or 6;
defining the rotation angle and the shape of 7 basic Tetris, wherein each Tetris contains 4 basic cells;
selecting from the defined 7 basic Russian squares a number of Russian squares to completely fill the selected squaresQAnd make it possible toQNo gap is left;
assigning different numbers to 4 basic cells of each Russian square, and taking the value as [0,3 ];
according to the determinationQ 4OrQ 6Constructing a magic matrix with the size of 256x256 through a copying operation;
s2, selecting a corresponding magic matrix according to the size of the secret information, and converting the secret information to obtain converted secret information;
s3, embedding the converted secret information into an original image for hiding to obtain a secret image;
step S3 specifically includes:
the original image is processedICut into non-overlapping pairs of pixels in raster-scan order, denotedI = {(p i , p i+1)| i= 1, 3, 5, 7, …, (H·W-1)};
According to the length of secret informationL B Selecting the corresponding magic matrixMTAnd converts the secret intoS = {(s t , s t+1)};
Secret informations t Ands t+1searching the lookup table as a vertical coordinate and a horizontal coordinate, respectivelyLUTAnd determining the corresponding tetris;
couple pixelsp i Andp i+1as ordinate and line coordinate, respectively, mapped toMTPerforming the following steps; according toMTIs characterized in thatMT(p i , p i+1) Several candidate pixel pairs (can be found nearbyp i , p i+1);
According to minimum distancedSelecting a pixel pair (p i , p i+1) As pixel values of the stego image at corresponding positions, secret information is realized: (s t , s t+1) Is hidden.
CN202010492427.3A 2020-06-03 2020-06-03 Information hiding method and terminal based on Russian blocks Active CN111654707B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010492427.3A CN111654707B (en) 2020-06-03 2020-06-03 Information hiding method and terminal based on Russian blocks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010492427.3A CN111654707B (en) 2020-06-03 2020-06-03 Information hiding method and terminal based on Russian blocks

Publications (2)

Publication Number Publication Date
CN111654707A CN111654707A (en) 2020-09-11
CN111654707B true CN111654707B (en) 2022-03-15

Family

ID=72351154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010492427.3A Active CN111654707B (en) 2020-06-03 2020-06-03 Information hiding method and terminal based on Russian blocks

Country Status (1)

Country Link
CN (1) CN111654707B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113127911B (en) * 2021-05-06 2022-05-20 国网河北省电力有限公司信息通信分公司 Electric power data encryption method and device and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018414A (en) * 2017-04-28 2017-08-04 西安空间无线电技术研究所 A kind of method of hiding high quality graphic lossless in low-quality image compressed data
CN107862646A (en) * 2017-09-27 2018-03-30 宁波大学 A kind of high dynamic range images information concealing method
WO2018153800A1 (en) * 2017-02-24 2018-08-30 Thomson Licensing Method and device for decoding a high-dynamic range image
CN109818739A (en) * 2019-01-24 2019-05-28 中国人民武装警察部队工程大学 A kind of production image latent writing method based on confrontation network
CN110290390A (en) * 2019-06-06 2019-09-27 绍兴聚量数据技术有限公司 The information concealing method of Modulo-two operation and Hamming code based on AMBTC

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6094483A (en) * 1997-08-06 2000-07-25 Research Foundation Of State University Of New York Secure encryption and hiding of data and messages in images
CN109547797B (en) * 2019-01-02 2021-02-05 太原科技大学 Separable encryption domain information hiding method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018153800A1 (en) * 2017-02-24 2018-08-30 Thomson Licensing Method and device for decoding a high-dynamic range image
CN107018414A (en) * 2017-04-28 2017-08-04 西安空间无线电技术研究所 A kind of method of hiding high quality graphic lossless in low-quality image compressed data
CN107862646A (en) * 2017-09-27 2018-03-30 宁波大学 A kind of high dynamic range images information concealing method
CN109818739A (en) * 2019-01-24 2019-05-28 中国人民武装警察部队工程大学 A kind of production image latent writing method based on confrontation network
CN110290390A (en) * 2019-06-06 2019-09-27 绍兴聚量数据技术有限公司 The information concealing method of Modulo-two operation and Hamming code based on AMBTC

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Hiding data in Tetris;ZHAN-HE OU等;《Proceedings of the 2011 International Conference on Machine Learning and Cybernetics》;20110713;全文 *
互动式《俄罗斯方块》游戏安全隐写;温涛等;《电子技术应用》;20160430(第04期);全文 *
基于区域性像素等值的图像隐写算法;李兆同 等;《软件导刊》;20170831;第16卷(第8期);全文 *

Also Published As

Publication number Publication date
CN111654707A (en) 2020-09-11

Similar Documents

Publication Publication Date Title
KR101305752B1 (en) Multimedia watermarking techniques with low distortion
Chen et al. High-fidelity reversible data hiding using directionally enclosed prediction
Wang et al. Non-additive cost functions for color image steganography based on inter-channel correlations and differences
JP2000092312A (en) Method for authenticating digital image displayed on video monitor and method for composing 1st and 2nd digital images into one composite digital image
CN109785221B (en) Digital image steganography method and secret information extraction method
Bharti et al. A new approach of data hiding in images using cryptography and steganography
US20180184096A1 (en) Method and apparatus for encoding and decoding lists of pixels
CN111654707B (en) Information hiding method and terminal based on Russian blocks
Juneja et al. Application of LSB based steganographic technique for 8-bit color images
Uyyala et al. Reversible data hiding using B‐tree triangular decomposition based prediction
Albdour et al. A steganographic method based on roberts operator
US9990686B2 (en) Method for generating a data-bearing halftone image, and method for decoding the data-bearing halftone image
Liu et al. Extended exploiting-modification-direction data hiding with high capacity
Al-Shatnawi et al. An integrated image steganography system with improved image quality
CN112019699A (en) Encrypted image reversible information hiding method based on lossless compression
CN111723346B (en) Visual secret sharing method based on &#39;bamboo joint worm&#39; reference matrix authentication
Tilakaratne et al. Image steganography scheme based on reversible data embedding strategy
Bilan et al. Volume increasing of secret message in a fixed graphical stego container based on intelligent image analysis
Wu et al. Threshold visual cryptography scheme for color images with no pixel expansion
Blesswin et al. An improved grayscale visual secret sharing scheme for visual information security
Huang et al. Visual Secret Sharing for Copyright Protection and Authentication of Color Images
Moussa Advanced Encryption Standard Secured Message Steganography in Edge–Detected Pixels of 3D Images
Almola Hiding Images in the Spatial Domain
Kaur et al. Level's 4 Security in Image Steganography
Krishna et al. Pixel Value Differencing of Image Steganography in Substitution Technique: A Survey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant