CN112055217B - Method for carrying information in any byte data without loss - Google Patents

Method for carrying information in any byte data without loss Download PDF

Info

Publication number
CN112055217B
CN112055217B CN202010732663.8A CN202010732663A CN112055217B CN 112055217 B CN112055217 B CN 112055217B CN 202010732663 A CN202010732663 A CN 202010732663A CN 112055217 B CN112055217 B CN 112055217B
Authority
CN
China
Prior art keywords
data
information
abc
byte
hiding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010732663.8A
Other languages
Chinese (zh)
Other versions
CN112055217A (en
Inventor
周诠
刘娟妮
刘梦瑶
张怡
李琪
呼延烺
魏佳圆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Institute of Space Radio Technology
Original Assignee
Xian Institute of Space Radio Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Institute of Space Radio Technology filed Critical Xian Institute of Space Radio Technology
Priority to CN202010732663.8A priority Critical patent/CN112055217B/en
Publication of CN112055217A publication Critical patent/CN112055217A/en
Application granted granted Critical
Publication of CN112055217B publication Critical patent/CN112055217B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention provides a method for carrying information in any byte data without loss, which can carry (hide) transmission of information in byte data with any format without changing data volume; the carrier data can be recovered without loss while carrying the hiding and extracting information without loss. The redundant bit in any type of data file is searched according to the byte format, and lossless information hiding in any byte data is realized by using a small amount of mark information, and the information hiding capacity is only related to the structure of the data. The typical loading (hiding) capacity is between 3.75% and 37.5%, and the method is suitable for loading (hiding) transmission occasions of various types of data such as various original data transmission systems and compressed data.

Description

Method for lossless carrying of information in any byte data
Technical Field
The invention relates to a data communication method, in particular to a method for embedding information into any byte data for lossless transmission, belonging to the field of communication (such as data communication technology).
Background
The current society is an information society, the information security problem becomes an increasingly urgent problem, and information hiding (data hiding) is an important branch of information security, and secret information is embedded into a carrier by using human visual redundancy, so that the aim of safely transmitting the secret information or improving the data transmission efficiency is fulfilled.
With the development of science and technology, efficient transmission of image data and security of transmission become more and more important. The information hiding (also called data hiding) technology can embed the secret information into the data under the condition of not changing the size of the image data, thereby realizing the cooperative transmission of the secret information and the image data. On the other hand, for remote sensing images, medical images, legal images, and the like, it is required that the carrier image can be restored as much as possible after extracting the secret information. At present, data compression methods are widely used, and besides JPEG compression methods, JPEG2000 compression methods are also used. The JPEG2000 compression method is the latest international compression standard, after the original image is compressed by JPEG2000 data, a compressed code stream is formed, the compressed code stream is transmitted, the receiving end decompresses the code stream to recover the original image, a certain distortion exists between the recovered image and the original image, and the distortion can meet the requirement as long as the distortion is within an allowable range. However, sometimes, some data are particularly important and do not allow distortion, and some data, such as compressed data, do not allow distortion, and hiding information can not destroy data, that is, information hiding is required to be completely lossless, and both the carrier and the information are lossless. Sometimes, the obtained data is only byte data (byte stream or bit stream), the data type is not known, and the information hiding can not be performed by utilizing the type characteristics of images, voice and texts.
Disclosure of Invention
The technical problem solved by the invention is as follows: the method overcomes the defects of the prior art, carries out information carrying by utilizing the characteristics of the data, avoids the thinking trend of carrying out information hiding according to types in the traditional method, has the characteristics of lossless information, unique scheme, less realization resources and independence from the data types, can carry out self-adaptive information hiding according to the characteristics of the byte data, and has the information hiding capacity only related to the structure of the data. The typical carrying (hiding) capacity is between 3.75% and 37.5%, and the method is suitable for various original data transmission systems, compressed data and other multi-type data transmission occasions.
The technical scheme of the invention is as follows: the method for carrying information in any byte data without loss comprises the following steps:
1) for any byte of data, every 8 bits constitute a byte.
2) Setting a byte data as G, 8 bits, the high bit, namely the 8 th bit as the leftmost bit, and the low bit, namely the 1 st bit as the rightmost bit; selecting data having the following characteristics or data having the following characteristics after processing:
ABC X XABC
ABC X ABCX
ABC A BCXX
3) judging whether the data G belongs to the above data set
If G belongs to one of the above datasets, then the label P ═ 1
If G does not belong to one of the above datasets, then the label P is 0
4) Taking P as a key, and if the information S is 3-bit UVW when P is 1, changing the hidden data into ABC X UVW; when P is 0, the information is not hidden, namely S is 0 bit, the data is not changed after being hidden, and the data containing density ABC X DEF is formed and transmitted;
5) receiving ABC X DEF containing secret data
If P is 1, the extracted secret information S is DEF; if P is 0, secret information is not extracted;
6) restoring original data G
If P ═ 1, G reverts to ABC X ABC; if P is 0, G reverts to ABC X DEF.
The processing steps of the tag data P are as follows:
the mark data P of each data form a bit data stream PP, the length of the PP is set as K1, the PP is subjected to lossless compression to form QQ, the length of the QQ is K2, K2< < K1, the data QQ is transmitted and stored as a key or is used as additional information and is hidden in a selected data set, and the hiding method adopts the hiding method or other lossless information hiding methods.
Compared with the prior art, the invention has the beneficial effects that:
(1) at present, most of methods for hiding information in data hide information based on large types such as images, voice, texts, compressed data and the like, but do not hide information based on the structural characteristics of byte data of the data;
(2) Because any data is composed of binary system or bytes, the invention hides information based on the byte structure characteristics of the data, and can recover carrier data according to the data byte characteristics after information extraction, thereby realizing lossless information recovery and carrier recovery.
(3) The method carries out self-adaptive information hiding according to the internal characteristics of data, and the typical hiding capacity can be between 3.75% and 37.5%.
(4) The invention realizes lossless information hiding or lossless information carrying transmission based on a small amount of secret keys or additional information, and avoids the defect that the traditional information hiding method cannot adapt to a plurality of data types at the same time.
(5) If a small amount of secret keys or additional information is hidden in data, the method provided by the invention can also achieve the effect of improving the information hiding performance by combining with a classical hiding method.
(6) The technical scheme of the invention is unique, the realization complexity is greatly lower than that of the conventional information hiding method, and the practicability is greatly improved.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
In order to verify the performance of the algorithm provided by the invention, an 8-bit gray image H with the size of 512 multiplied by 512 is adopted in a simulation experiment, and the method is used for carrying, transmitting and recovering information.
The secret information is any data: images or other data.
Examples are:
for image format data (length is byte), each pixel is 8 bits to make up one byte, or one byte is formed every LSB of 8 bytes.
Selecting data having the following characteristics or data having the following characteristics after processing:
(1) data set 1:
000XX000
001XX001
010XX010
011XX011
100XX100
101XX101
110XX110
111XX111
the original data are:
000XX000 after 1 bit shift left for 00XX0000 cycle
01XX0010 is 001XX001 after left shift by 1
010XX010 by left shifting by 1 in 10XX0100 cycle
After 11XX0110 circularly shifts 1 bit to 011XX011
00XX1001 left shift by 1 bit and 100XX100
01XX1011 cycles left shifted by 1 bit to 101XX101
10XX1101 cycle left shift by 1 bit is 110XX110
11XX1111 cycles left shift by 1 bit to 111XX111
The characteristics of the data set 1 are satisfied after the loop is shifted left by 1 bit.
Or the data after inversion satisfies the characteristics of the data set 1, such as:
the original data are:
000XX111 last 3 bits negation 000XX000
001XX110 back 3 bit negation 001XX001
010XX101 back 3 bit negation 010XX010
011XX011 by inverting 3 bits after 011XX100
100XX011 last 3 bit negation 100XX100
101XX010 back 3 bit negation 101XX101
110XX001 later 3 bit negation 110XX110
111XX000 back 3 bit negation 111XX111
The last 3 bits are inverted to satisfy the characteristic of data set 1.
If G belongs to one of the above 32 numbers, the label P ═ 1
If G does not belong to one of the above 32 numbers, the label P is 0
(2) Data set 2
Selecting data having the following characteristics or data having the following characteristics after processing:
XX000000
XX001001
XX010010
XX011011
XX100100
XX101101
XX110110
XX111111
if G belongs to one of the above 32 numbers, the label P ═ 1
If G does not belong to one of the above 32 numbers, the label P is 0
The data processing method is similar to the left-right cyclic shift method and the negation method for the data set 1.
(3) Data 3
Selecting data having the following characteristics or data having the following characteristics after shifting:
X000X000
X001X001
X010X010
X011X011
X100X100
X101X101
X110X110
X111X111
if G belongs to one of the above 32 numbers, the label P ═ 1
If G does not belong to one of the above 32 numbers, the label P is 0
The data processing method is similar to the left-right cyclic shift method and the inversion method for the data set 1.
Hidden capacity analysis:
an image 512 x 8 bits, denoted as K bits
The number of the information S is T: 0-100%, generally 10% -100%
The hidden information capacity (relative capacity) is:
3.75%--37.5%
for example, when T is 1/8, 12.5%, 1 is 12.5%, and 0 is 87.5% in all the labeled data P, which belong to a sparse matrix, binary image.
Information hiding capacity: 1/8 × 3/8 ═ 3/64
Marking information:
the marking data P constitutes a bit stream PP, which is lossless compressed, and the compression ratio is generally R > 4
The example is given with R ═ 4.
K2=512*512/R=512*512/4
K2/K=1/32=2/64
Information hiding capacity: 1/8 × 3/8 ═ 3/64
After deducting the tagged information, the actual information hiding amount is typically 3/64-2/64 ═ 1/64
For a total of 512 × 8/64 ═ 512 × 64 bits.
Through information hiding transmission, information can be completely recovered, data can be completely recovered, and lossless carrying is achieved.
When T is 1/10, the information hiding capacity becomes
Information hiding capacity: 1/10 × 3/8 ═ 3/80 ═ 3.75%
When T is 1/8, the information hiding capacity becomes
Information hiding capacity: 1/8 × 3/8 ═ 3/64 ═ 4.69%
When T is 1/2, the information hiding capacity is increased by 1 time, and becomes
Information hiding capacity: 1/2 × 3/8 ═ 3/16 ═ 18.75%
When T is 100%, the information hiding capacity is increased by 1 time, and becomes
Information hiding capacity: 1 × 3/8 ═ 3/8 ═ 6/16 ═ 37.5%.
The invention utilizes the information hiding technology to embed information in any byte data, and a receiving end can correctly extract carried information from carrier data containing secret data stream without damaging and recovering the original carrier image. Certain amount of information can be transmitted in the byte code stream without changing the format and the rate of the byte code stream.
The method of the invention improves the utilization rate of the data transmission system, can carry out a certain amount of information carrying transmission in data with any byte format (such as original image, compressed image, voice, compressed voice, text, compressed text data, video data and compressed video data), and the typical hidden capacity can reach 3.75-37.5%.
With the development of communication and navigation technologies, data transmission technologies have been widely applied to spacecrafts such as remote sensing satellites, space detectors, communication satellites and navigation satellites and various satellite data transmission systems, and will be widely applied in the future. Space-based information network and ground internet also put higher and higher requirements on lossless information hiding of carrier data, and the application is more and more extensive.
The method can perform lossless hiding of information in any byte data, has the characteristics of strong adaptability of a hiding method, lossless recovery of information, lossless recovery of a carrier and large and small carrying capacity of information, and has the characteristics of low complexity, less resource occupation and the like, thereby having practical value in spacecraft engineering.
The invention is not described in detail and is within the knowledge of a person skilled in the art.

Claims (4)

1. The method for carrying information in any byte data without loss is characterized by comprising the following steps:
1) acquiring data in a satellite data transmission system, and forming a byte for every 8 bits of any byte data; the arbitrary byte data includes one of an original image, a compressed image, voice, compressed voice, text, compressed text data, video data, and compressed video data;
2) Setting a byte of data as G, 8 bits; wherein the high position, i.e. the 8 th position, is the leftmost position, and the low position, i.e. the 1 st position, is the rightmost position; selecting data with characteristics to form a data set; in the step 2), data with the following characteristics or data with the following characteristics after processing are selected to form a data set:
ABC X XABC,
ABC X ABCX,
ABC A BCXX;
3) judging whether the data G belongs to the data set in the step 2), and if G belongs to one of the data sets, marking P = 1; if G does not belong to one of the above datasets, then the label P = 0; recording data G as ABC X DEF;
4) taking P as a secret key, and carrying out secret hiding on data; the specific process is as follows: when P =1, if the information S is 3-bit UVW, the post-concealment data is ABC X UVW, ABC X UVW X, ABC UVW X; when P =0, the information is not hidden, namely S is 0 bit, the data is unchanged after being hidden, and ABC X DEF containing secret data is formed and transmitted;
5) after receiving the secret data, if P =1, the extracted secret information S is UVW; if P =0, secret information is not extracted;
6) recovering original data G, and if P =1, recovering G into ABC X ABC, ABC X ABC X and ABC X X; if P =0, G reverts to ABC X DEF.
2. The method for lossless piggybacking of information in arbitrary byte data according to claim 1, wherein: the processing steps of the tag data P are as follows:
The marking data P of each data is formed into a bit data stream PP, the length of the PP is set as K1, the data QQ is formed after lossless compression of the PP, the length of the data QQ is set as K2, and the data QQ is transmitted and stored as a key or is used as additional information and is hidden in a selected data set.
3. The method for lossless piggybacking of information in arbitrary byte data according to claim 2, wherein: the K2< < K1.
4. The method for lossless piggybacking of information in arbitrary byte data according to claim 2, wherein: the lossless compression ratio is R4 or more.
CN202010732663.8A 2020-07-27 2020-07-27 Method for carrying information in any byte data without loss Active CN112055217B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010732663.8A CN112055217B (en) 2020-07-27 2020-07-27 Method for carrying information in any byte data without loss

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010732663.8A CN112055217B (en) 2020-07-27 2020-07-27 Method for carrying information in any byte data without loss

Publications (2)

Publication Number Publication Date
CN112055217A CN112055217A (en) 2020-12-08
CN112055217B true CN112055217B (en) 2022-05-24

Family

ID=73601919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010732663.8A Active CN112055217B (en) 2020-07-27 2020-07-27 Method for carrying information in any byte data without loss

Country Status (1)

Country Link
CN (1) CN112055217B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410616A (en) * 2014-11-20 2015-03-11 广州日滨科技发展有限公司 Method and system for encrypting, decrypting and transmitting data
CN105141960A (en) * 2015-06-17 2015-12-09 西安空间无线电技术研究所 Method for information transmission based on JPEG2000 compressed code stream
CN107071455A (en) * 2017-05-03 2017-08-18 西安科技大学 Jpeg image information concealing method based on data flow
CN109325367A (en) * 2018-08-24 2019-02-12 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN109547797A (en) * 2019-01-02 2019-03-29 太原科技大学 A kind of separable encrypted domain information concealing method
CN110768784A (en) * 2019-10-22 2020-02-07 广州酷旅旅行社有限公司 Password transmission method, device, computer equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005020346A (en) * 2003-06-26 2005-01-20 Konica Minolta Business Technologies Inc Data encrypting device, data decrypting device, image data storage device, and image forming device
RU2010110344A (en) * 2010-03-18 2011-09-27 ЭлЭсАй Корпорейшн (US) CRYPTOGRAPHIC PROCESSING USING A PROCESSOR
KR20150090438A (en) * 2014-01-29 2015-08-06 한국전자통신연구원 White box encryption apparatus and encryption method
CN104320420A (en) * 2014-11-17 2015-01-28 国电南京自动化股份有限公司 SCADA file encryption method based on AES algorithm

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410616A (en) * 2014-11-20 2015-03-11 广州日滨科技发展有限公司 Method and system for encrypting, decrypting and transmitting data
CN105141960A (en) * 2015-06-17 2015-12-09 西安空间无线电技术研究所 Method for information transmission based on JPEG2000 compressed code stream
CN107071455A (en) * 2017-05-03 2017-08-18 西安科技大学 Jpeg image information concealing method based on data flow
CN109325367A (en) * 2018-08-24 2019-02-12 中国人民解放军国防科技大学 Information hiding method, device, equipment and computer readable storage medium
CN109547797A (en) * 2019-01-02 2019-03-29 太原科技大学 A kind of separable encrypted domain information concealing method
CN110768784A (en) * 2019-10-22 2020-02-07 广州酷旅旅行社有限公司 Password transmission method, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于隐藏容量的数字图像信息隐藏算法研究;韩佳伶;《中国博士学位论文全文数据库》;20150815;全文 *

Also Published As

Publication number Publication date
CN112055217A (en) 2020-12-08

Similar Documents

Publication Publication Date Title
Zhang et al. Reference sharing mechanism for watermark self-embedding
Xiang et al. A novel linguistic steganography based on synonym run-length encoding
Yang et al. Reversible data hiding of a VQ index table based on referred counts
CN101105857B (en) High capacity reversible water mark method based on predication and companding technology
CN110913092B (en) Reversible information hiding method for encrypted image
Chan et al. A HDWT-based reversible data hiding method
CN105227962A (en) A kind of lossless information concealing method based on data difference
CN111464717B (en) Reversible information hiding method with contrast ratio pull-up by utilizing histogram translation
CN114745475B (en) Robust reversible information hiding method for encrypted image
Liu et al. High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding
CN112055217B (en) Method for carrying information in any byte data without loss
CN107087086B (en) A kind of high-capacity reversible information concealing method based on code division multiplexing
Govindasamy et al. Coverless image steganography using Haar integer wavelet transform
Liu et al. Hiding multiple images into a single image via joint compressive autoencoders
CN113518079B (en) Data feature-based segmented information embedding method and system
Zhang et al. Efficient data hiding with histogram-preserving property
Lin et al. Hiding data reversibly in an image via increasing differences between two neighboring pixels
Rohith et al. Reversible Data Embedding Scheme In Encrypted Image Using Arnold Transform for Satellite Images
CN113781285A (en) Histogram movement-based contrast enhancement RDH method and system
CN111915473B (en) Reversible information hiding method based on AMBTC compression technology and Hamming distance
Lee et al. Lossless text steganography in compression coding
Devi et al. Reversible image authentication with tamper localization based on integer wavelet transform
CN117830070A (en) Image blind watermark embedding and extracting method, system, equipment and medium
CN114928681A (en) Information hiding method and system based on generation countermeasure network
Abdelmgeid et al. Enhancing Image Steganography Methods By Using New Secret Message Encoding Technique Based on PIGPEN cipher (PIGPEN Encoding)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant