CN113095992A - Novel bar code screenshot steganography traceability combined algorithm - Google Patents

Novel bar code screenshot steganography traceability combined algorithm Download PDF

Info

Publication number
CN113095992A
CN113095992A CN202110416891.9A CN202110416891A CN113095992A CN 113095992 A CN113095992 A CN 113095992A CN 202110416891 A CN202110416891 A CN 202110416891A CN 113095992 A CN113095992 A CN 113095992A
Authority
CN
China
Prior art keywords
picture
steganography
image
screenshot
bar code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110416891.9A
Other languages
Chinese (zh)
Inventor
潘瑞哲
钭兰朵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110416891.9A priority Critical patent/CN113095992A/en
Publication of CN113095992A publication Critical patent/CN113095992A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a novel bar code screenshot steganography traceability combined algorithm, which belongs to the technical field of information identification, and comprises the following specific steps: (1) starting; (2) analyzing image compatibility; (3) generating a fingerprint; (4) image segmentation and steganography; (5) merging and adjusting; (6) finishing; according to the method, through Fourier steganography, LSB steganography and color superposition steganography technologies, under the premise that the bar code is not modified and the image change recognizable by human eyes is not generated, the appointed text information is written into the image containing the bar code, the corresponding information can be traced back according to the screenshot after the screenshot is captured, and the method has the advantages of strong robustness and strong compression resistance, is beneficial to being applied to a platform with confidential requirements, and therefore information leakage is effectively prevented and blocked.

Description

Novel bar code screenshot steganography traceability combined algorithm
Technical Field
The invention relates to the technical field of information identification, in particular to a novel bar code screenshot steganography traceability combined algorithm.
Background
Through retrieval, the Chinese patent No. CN108898537A discloses a digital image steganography method, which can minimize distortion caused to a carrier image after embedding secret information, but can not trace back to source corresponding information according to a screenshot after being screenshot; steganography is hidden communication realized by hiding information in multimedia such as text, sound, image, video and the like and transmitting the information through a public network by utilizing redundancy in the multimedia and human sensory redundancy; steganography hides not only the content of communication but also the fact of communication; because of the characteristics of a large number of images on a network, large redundancy of image data, large capacity of embeddable secret information and the like, the current mainstream steganography takes the images as carriers; imperceptibility is an important characteristic of steganography, and is also called transparency or anti-detection performance, and comprises visual imperceptibility or statistical imperceptibility, and the imperceptibility of steganography can be improved by improving a steganography implementation method, or selecting a proper steganography carrier, or improving the matching relation between a carrier image and secret information; therefore, the invention of a novel bar code screenshot steganography traceability combined algorithm becomes particularly important;
the existing image steganography method mostly adopts an LSB method, the method divides pixel values of an image into 8 planes, the influence of each plane on the image quality is different, the planes respectively represent that the binary pixel values of 8 bits from high to low from the highest bit to the lowest bit, the influence on the image quality is reduced from high to low in sequence, and the change effect of the lowest bits on the overall image quality is small; therefore, the pixel values of the unimportant bits in the image are replaced by the secret information, but due to the characteristic of single parity value transformation of the LSB algorithm, the robustness and the compression resistance are weak, and the corresponding information cannot be traced back according to the screenshot after the screenshot is captured; therefore, a novel bar code screenshot steganography traceability combination algorithm is provided.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a novel bar code screenshot steganography traceability combined algorithm.
In order to achieve the purpose, the invention adopts the following technical scheme:
a novel bar code screenshot steganography traceability combined algorithm comprises the following specific steps:
(1) beginning: after the webpage is loaded, firstly acquiring a webpage background image, converting the webpage background image into png format, if the webpage background image is a pure background color, generating a background image with a corresponding color, compressing the volume of the background image to be within width-byte-height, and marking the background image as a picture P0;
(2) image compatibility analysis: performing discrete Fourier transform on the picture P0, deleting a color mutation part in the background color of the page to obtain a frequency domain picture of the picture P0, and performing leaf transform on the frequency domain picture to obtain an original picture; analyzing the least significant bit of the picture P0, setting the least significant bit of all channels of all pixels of the picture P0 to 0;
(3) fingerprint generation: using the information in the system to generate different fingerprint characters for different users;
(4) image segmentation and steganography: dividing the picture P0 according to the longitudinal axis and the transverse axis to obtain four parts of 0-1/4, 1/4-2/4, 2/4-3/4 and 3/4-4/4, combining the first two parts into 0-1/2, and performing Fourier steganography on the 0-1/2 to obtain a picture P1; carrying out LSB steganography and color superposition steganography on the two parts respectively to obtain a picture P2 and a picture P3;
(5) merging and adjusting: recombining the picture P1, the picture P2 and the picture P3, converting the format into the png format, writing coded character information at the end of a DEFLATE stream of the png picture format according to the principle of image compression, and additionally writing uncoded plaintext character information at the end of the png file;
(6) and (4) ending: setting the background of the webpage as P4, and saving the screenshot to a mobile phone album, namely an image P4 or a compressed version P4' of the image.
Further, the least significant bit is determined by the parity of the last bit of its RGB three-channel binary representation.
Further, the fingerprint characters are composed of English, numbers and semi-angle symbols, and the form of the fingerprint characters is user name + user id.
Further, the specific processes of image segmentation and steganography are as follows:
the method comprises the following steps: firstly, quartering the picture P0, analyzing the part where the bar code in the four parts is located, and merging the part with another 1/4 part which is adjacent to the part, wherein the part is marked as S1;
step two: setting the area where the barcode is located as A0, performing image black-and-white operation on the A0 part of S1, and recording the obtained picture as S2;
step three: writing characters into a low-frequency domain of the upper half part of an A0 region of an S2 picture by utilizing discrete Fourier transform, and marking 1/4 pictures as S3;
step four: replacing the corresponding part of P0 with S3 to obtain a picture which is marked as P1;
step five: the remaining two 1/4 sections are denoted as S4 and S5, and for the first section S4, the least significant bits of the pixels of that section are edited so that the binary least significant bits of the pixels in a shape similar to the text to be written are all 1 'S, and the least significant bits of the average of the RGB color values of any 3x3 pixel group in the shape are also all 1' S;
step six: recording the modified part as S6, and replacing the corresponding part in P1 with S6 to obtain a picture as P2;
step seven: and superposing the image watermark with the transparency of 0.02 on the pure color background of the part S5, performing Gaussian blur operation on the edge of the image layer by using a Gaussian kernel with the radius of 3 to obtain the image layer, and superposing the image layer on the P2, wherein the image layer is marked as P3.
Further, the principles of image compression include deleting high frequency information in the frequency domain, deleting METADATA, and reducing the size.
Compared with the prior art, the invention has the beneficial effects that:
1. the novel bar code screenshot steganography traceability combined algorithm divides a picture P0 according to the longitudinal axis and the transverse axis to obtain four parts of 0-1/4, 1/4-2/4, 2/4-3/4 and 3/4-4/4, combines the first two parts into 0-1/2, and performs Fourier steganography on the two parts; carrying out LSB steganography and color superposition steganography on the two parts respectively; under the precondition that the bar code itself is not modified and the image change recognizable by human eyes is not generated, the appointed text information is written into the image containing the bar code, and the corresponding information can be traced back according to the screenshot after the screenshot is captured, so that the method has the effects of strong robustness and strong compression resistance;
2. according to the novel bar code screenshot steganography traceability combined algorithm, the background of a webpage is set to be P4, so that after screenshot is performed, the source of the screenshot can be found through reverse traceability according to analyzed information; therefore, the method is favorable for being applied to a platform with confidential requirements, and information leakage is effectively prevented and blocked.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is an overall flowchart of a novel bar code screenshot steganography traceability combined algorithm provided by the present invention;
fig. 2 is a schematic diagram of png pictures in the novel barcode screenshot steganography traceability combined algorithm provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
Referring to fig. 1-2, a novel barcode screenshot steganography traceability combined algorithm specifically comprises the following steps:
(1) beginning: after the webpage is loaded, firstly acquiring a webpage background image, converting the webpage background image into png format, if the webpage background image is a pure background color, generating a background image with a corresponding color, compressing the volume of the background image to be within width-byte-height, and marking the background image as a picture P0;
(2) image compatibility analysis: performing discrete Fourier transform on the picture P0, deleting a color mutation part in the background color of the page to obtain a frequency domain picture of the picture P0, and performing leaf transform on the frequency domain picture to obtain an original picture; analyzing the least significant bit of the picture P0, setting the least significant bit of all channels of all pixels of the picture P0 to 0;
(3) fingerprint generation: using the information in the system to generate different fingerprint characters for different users;
(4) image segmentation and steganography: dividing the picture P0 according to the longitudinal axis and the transverse axis to obtain four parts of 0-1/4, 1/4-2/4, 2/4-3/4 and 3/4-4/4, combining the first two parts into 0-1/2, and performing Fourier steganography on the 0-1/2 to obtain a picture P1; carrying out LSB steganography and color superposition steganography on the two parts respectively to obtain a picture P2 and a picture P3;
(5) merging and adjusting: recombining the picture P1, the picture P2 and the picture P3, converting the format into the png format, writing coded character information at the end of a DEFLATE stream of the png picture format according to the principle of image compression, and additionally writing uncoded plaintext character information at the end of the png file;
(6) and (4) ending: setting the background of the webpage as P4, and saving the screenshot to a mobile phone album, namely an image P4 or a compressed version P4' of the image.
The specific scheme of the embodiment is as follows: the least significant bit is determined by the parity of the last bit of its RGB three-channel binary representation.
The fingerprint characters are composed of English, numbers and semi-angle symbols, and the form of the fingerprint characters is user name + user id.
The principles of image compression include deleting high frequency information in the frequency domain, deleting METADATA, and downsizing.
The specific scheme of the embodiment is as follows: the image segmentation and steganography specific process is as follows:
the method comprises the following steps: firstly, quartering the picture P0, analyzing the part where the bar code in the four parts is located, and merging the part with another 1/4 part which is adjacent to the part, wherein the part is marked as S1;
step two: setting the area where the barcode is located as A0, performing image black-and-white operation on the A0 part of S1, and recording the obtained picture as S2;
step three: writing characters into a low-frequency domain of the upper half part of an A0 region of an S2 picture by utilizing discrete Fourier transform, and marking 1/4 pictures as S3;
step four: replacing the corresponding part of P0 with S3 to obtain a picture which is marked as P1;
step five: the remaining two 1/4 sections are denoted as S4 and S5, and for the first section S4, the least significant bits of the pixels of that section are edited so that the binary least significant bits of the pixels in a shape similar to the text to be written are all 1 'S, and the least significant bits of the average of the RGB color values of any 3x3 pixel group in the shape are also all 1' S;
step six: recording the modified part as S6, and replacing the corresponding part in P1 with S6 to obtain a picture as P2;
step seven: and superposing the image watermark with the transparency of 0.02 on the pure color background of the part S5, performing Gaussian blur operation on the edge of the image layer by using a Gaussian kernel with the radius of 3 to obtain the image layer, and superposing the image layer on the P2, wherein the image layer is marked as P3.
Specifically, through Fourier steganography, LSB steganography and color superposition steganography, under the precondition of not modifying the bar code and not generating image change recognizable by human eyes, the appointed text information is written into the picture containing the bar code, so that the method is favorably applied to a platform with confidential requirements, and information leakage is effectively prevented and blocked.
The working principle and the using process of the invention are as follows: this novel bar code screenshot steganography traceability combination algorithm, when using, at first begins: after the webpage is loaded, firstly acquiring a webpage background image, converting the webpage background image into png format, if the webpage background image is a pure background color, generating a background image with a corresponding color, compressing the volume of the background image to be within width-byte-height, and marking the background image as a picture P0; then, image compatibility analysis: performing discrete Fourier transform on the picture P0, deleting a color mutation part in the background color of the page to obtain a frequency domain picture of the picture P0, and performing leaf transform on the frequency domain picture to obtain an original picture; analyzing the least significant bit of the picture P0, setting the least significant bit of all channels of all pixels of the picture P0 to 0; then, fingerprint generation: using the information in the system to generate different fingerprint characters for different users; then, image segmentation and steganography: dividing the picture P0 according to the longitudinal axis and the transverse axis to obtain four parts of 0-1/4, 1/4-2/4, 2/4-3/4 and 3/4-4/4, combining the first two parts into 0-1/2, and performing Fourier steganography on the 0-1/2 to obtain a picture P1; carrying out LSB steganography and color superposition steganography on the two parts respectively to obtain a picture P2 and a picture P3; then merging and adjusting: recombining the picture P1, the picture P2 and the picture P3, converting the format into the png format, writing coded character information at the end of a DEFLATE stream of the png picture format according to the principle of image compression, and additionally writing uncoded plaintext character information at the end of the png file; and finally, finishing: setting the background of the webpage as P4, and saving the screenshot into a mobile phone album by the user as an image P4 or a compressed version P4'; according to the method, through Fourier steganography, LSB steganography and color superposition steganography technologies, under the premise that the bar code is not modified and the image change recognizable by human eyes is not generated, the appointed text information is written into the image containing the bar code, the corresponding information can be traced back according to the screenshot after the screenshot is captured, and the method has the advantages of strong robustness and strong compression resistance, is beneficial to being applied to a platform with confidential requirements, and therefore information leakage is effectively prevented and blocked.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (5)

1. A novel bar code screenshot steganography traceability combined algorithm is characterized by comprising the following specific steps:
(1) beginning: after the webpage is loaded, firstly acquiring a webpage background image, converting the webpage background image into png format, if the webpage background image is a pure background color, generating a background image with a corresponding color, compressing the volume of the background image to be within width-byte-height, and marking the background image as a picture P0;
(2) image compatibility analysis: performing discrete Fourier transform on the picture P0, deleting a color mutation part in the background color of the page to obtain a frequency domain picture of the picture P0, and performing leaf transform on the frequency domain picture to obtain an original picture; analyzing the least significant bit of the picture P0, setting the least significant bit of all channels of all pixels of the picture P0 to 0;
(3) fingerprint generation: using the information in the system to generate different fingerprint characters for different users;
(4) image segmentation and steganography: dividing the picture P0 according to the longitudinal axis and the transverse axis to obtain four parts of 0-1/4, 1/4-2/4, 2/4-3/4 and 3/4-4/4, combining the first two parts into 0-1/2, and performing Fourier steganography on the 0-1/2 to obtain a picture P1; carrying out LSB steganography and color superposition steganography on the two parts respectively to obtain a picture P2 and a picture P3;
(5) merging and adjusting: recombining the picture P1, the picture P2 and the picture P3, converting the format into the png format, writing coded character information at the end of a DEFLATE stream of the png picture format according to the principle of image compression, and additionally writing uncoded plaintext character information at the end of the png file;
(6) and (4) ending: setting the background of the webpage as P4, and saving the screenshot to a mobile phone album, namely an image P4 or a compressed version P4' of the image.
2. The new barcode screenshot steganography traceability combined algorithm as claimed in claim 1, wherein the least significant bit is determined by the parity of the last bit of its RGB three channel binary representation.
3. The novel bar code screenshot steganography traceability combined algorithm as claimed in claim 1, wherein the fingerprint text is composed of English, numeric and semi-angular symbols in the form of user name + user id.
4. The novel bar code screenshot steganography traceability combined algorithm according to claim 1, wherein the specific image segmentation and steganography process comprises the following steps:
the method comprises the following steps: firstly, quartering the picture P0, analyzing the part where the bar code in the four parts is located, and merging the part with another 1/4 part which is adjacent to the part, wherein the part is marked as S1;
step two: setting the area where the barcode is located as A0, performing image black-and-white operation on the A0 part of S1, and recording the obtained picture as S2;
step three: writing characters into a low-frequency domain of the upper half part of an A0 region of an S2 picture by utilizing discrete Fourier transform, and marking 1/4 pictures as S3;
step four: replacing the corresponding part of P0 with S3 to obtain a picture which is marked as P1;
step five: the remaining two 1/4 sections are denoted as S4 and S5, and for the first section S4, the least significant bits of the pixels of that section are edited so that the binary least significant bits of the pixels in a shape similar to the text to be written are all 1 'S, and the least significant bits of the average of the RGB color values of any 3x3 pixel group in the shape are also all 1' S;
step six: recording the modified part as S6, and replacing the corresponding part in P1 with S6 to obtain a picture as P2;
step seven: and superposing the image watermark with the transparency of 0.02 on the pure color background of the part S5, performing Gaussian blur operation on the edge of the image layer by using a Gaussian kernel with the radius of 3 to obtain the image layer, and superposing the image layer on the P2, wherein the image layer is marked as P3.
5. The new barcode screenshot steganography traceability combined algorithm as claimed in claim 1, wherein the image compression principle comprises deleting high frequency information in frequency domain, deleting METADATA and reducing size.
CN202110416891.9A 2021-04-19 2021-04-19 Novel bar code screenshot steganography traceability combined algorithm Pending CN113095992A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110416891.9A CN113095992A (en) 2021-04-19 2021-04-19 Novel bar code screenshot steganography traceability combined algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110416891.9A CN113095992A (en) 2021-04-19 2021-04-19 Novel bar code screenshot steganography traceability combined algorithm

Publications (1)

Publication Number Publication Date
CN113095992A true CN113095992A (en) 2021-07-09

Family

ID=76678879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110416891.9A Pending CN113095992A (en) 2021-04-19 2021-04-19 Novel bar code screenshot steganography traceability combined algorithm

Country Status (1)

Country Link
CN (1) CN113095992A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469869A (en) * 2021-09-03 2021-10-01 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN116823599A (en) * 2023-08-29 2023-09-29 湖北微模式科技发展有限公司 Operation record traceability method based on picture steganography
CN116823598A (en) * 2023-08-29 2023-09-29 湖北微模式科技发展有限公司 Operation record backtracking method based on image steganography and fuzzy comparison

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469869A (en) * 2021-09-03 2021-10-01 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN113469869B (en) * 2021-09-03 2021-11-12 武汉华工安鼎信息技术有限责任公司 Image management method and device
CN116823599A (en) * 2023-08-29 2023-09-29 湖北微模式科技发展有限公司 Operation record traceability method based on picture steganography
CN116823598A (en) * 2023-08-29 2023-09-29 湖北微模式科技发展有限公司 Operation record backtracking method based on image steganography and fuzzy comparison
CN116823599B (en) * 2023-08-29 2023-11-17 湖北微模式科技发展有限公司 Operation record traceability method based on picture steganography
CN116823598B (en) * 2023-08-29 2023-11-17 湖北微模式科技发展有限公司 Operation record backtracking method based on image steganography and fuzzy comparison

Similar Documents

Publication Publication Date Title
CN113095992A (en) Novel bar code screenshot steganography traceability combined algorithm
US6697498B2 (en) Method and computer program product for hiding information in an indexed color image
Lu et al. Multipurpose image watermarking algorithm based on multistage vector quantization
Chang et al. Reversible steganographic method using SMVQ approach based on declustering
TWI507909B (en) Data-bearing encoding system and data-bearing decoding system
Laishram et al. A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (BEASS)
CN115311720B (en) Method for generating deepfake based on transducer
TWI514840B (en) Halftone data-bearing encoding system and halftone data-bearing decoding system
CN111340047A (en) Image semantic segmentation method and system based on multi-scale feature and foreground and background contrast
CN109684857A (en) A kind of information concealing method, terminal device and storage medium
CN114157773B (en) Image steganography method based on convolutional neural network and frequency domain attention
CN114140786A (en) Scene text recognition method based on HRNet coding and double-branch decoding
US20090174910A1 (en) Digital watermark embedding apparatus and digital watermark detecting apparatus
Yang et al. Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes
Liao et al. GIFMarking: The robust watermarking for animated GIF based deep learning
Tang et al. Color image reversible data hiding with double-layer embedding
Liu et al. JPEG robust invertible grayscale
CN109859090A (en) Reversible water mark method and device based on human visual system
Yang et al. Language universal font watermarking with multiple cross-media robustness
Liu et al. Residual-guided multiscale fusion network for bit-depth enhancement
Liu et al. Application of QR code watermarking and encryption in the protection of data privacy of intelligent mouth-opening trainer
CN113628090A (en) Anti-interference message steganography and extraction method and system, computer equipment and terminal
CN110086955B (en) Large-capacity image steganography method
Nithyanandam et al. An image steganography for colour images using lossless compression technique
CN114549270A (en) Anti-shooting monitoring video watermarking method combining depth robust watermarking and template synchronization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination