CN114390153A - Lossless transmission, hiding and reading method of secret information and computer system - Google Patents

Lossless transmission, hiding and reading method of secret information and computer system Download PDF

Info

Publication number
CN114390153A
CN114390153A CN202111456555.3A CN202111456555A CN114390153A CN 114390153 A CN114390153 A CN 114390153A CN 202111456555 A CN202111456555 A CN 202111456555A CN 114390153 A CN114390153 A CN 114390153A
Authority
CN
China
Prior art keywords
binary
information
secret information
image
residual error
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111456555.3A
Other languages
Chinese (zh)
Other versions
CN114390153B (en
Inventor
刘熙尧
马隽星
李召英
马子平
张昊
张健
张伟
贺建飙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN202111456555.3A priority Critical patent/CN114390153B/en
Publication of CN114390153A publication Critical patent/CN114390153A/en
Application granted granted Critical
Publication of CN114390153B publication Critical patent/CN114390153B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a lossless transmission, hiding and reading method of secret information and a computer system.A sending end synthesizes original binary secret information into a synthetic image of hidden secret information, and extracts lossy binary secret information from the synthetic image according to a first rule; carrying out XOR operation on the lossy binary secret information and the original binary secret information to obtain binary residual error information, and sending the binary residual error information and the synthetic image to a receiving end; and after receiving, the receiving end converts the synthetic image into lossy binary secret information according to a first rule, and compares and combines the lossy binary secret information and the binary residual error information to obtain binary original secret information. The original binary secret information is obtained by comparing and combining the lossy binary secret information and the received binary residual error information, so that lossless transmission of the secret information is realized, the binary residual error information is encrypted before lossless transmission of the secret information, and the security of lossless transmission of the secret information is improved.

Description

Lossless transmission, hiding and reading method of secret information and computer system
Technical Field
The invention relates to the technical field of information hiding, in particular to a lossless transmission, hiding and reading method of secret information and a computer system.
Background
Steganography is a method for hiding secret information in public digital media, and hidden media can be pictures, videos, audios and the like. Conventional image steganography techniques typically find a carrier picture and embed secret information into the carrier picture by slightly modifying the carrier picture. Such methods leave easily perceptible traces on the image due to the modification of the features of the image itself, and are therefore easily detected by steganalysis techniques.
To solve this problem, a "bearer-less" steganography method is proposed. The carrier-free technology has the advantage that the effect of the steganography analysis technology for judging whether the image has hidden information or not based on the analysis of image characteristics is greatly reduced because the content of the carrier is not directly modified. At present, "carrier-free" steganography is mainly divided into two categories: image synthesis based methods and secret information mapping based methods. The two methods solve the problem that the traditional image steganography is easy to detect by a steganography analysis algorithm because the statistical information of the image is modified, but certain defects exist in the traditional image steganography. In the secret information mapping-based carrier-free steganography method, binary secret information is generally transmitted, and although lossless transmission of the secret information can be realized, each secret information needs a corresponding image to be hidden, and the number of the required corresponding images is exponentially increased when each secret information is increased by one bit; if long secret information is segmented, the problem that many pictures are needed for transmitting one group of secret information exists, and the behavior is possibly unsafe and suspected; in the image synthesis-based 'carrier-free' steganography method, because an image carrying secret information is artificially generated, the image may have the problem of unreality; moreover, since the hiding and extraction of the secret information generally use a pre-trained deep learning model, the extraction of the secret information may have certain errors.
Therefore, how to develop a method for lossless transmission of secret information becomes a problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The invention provides a lossless transmission, hiding and reading method of secret information and a computer system, which are used for solving the technical problem of error rate of the secret information when the secret information is extracted by using an information hiding method in the prior art.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
a lossless transmission of secret information, comprising:
the sending end synthesizes the original binary secret information into a synthesized image of hidden secret information, and extracts lossy binary secret information from the synthesized image according to a first rule; carrying out XOR operation on the lossy binary secret information and the original binary secret information to obtain binary residual error information, and sending the binary residual error information and the synthetic image to a receiving end;
a receiving end receives binary residual error information and a synthetic image; and converting the synthetic image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information.
Preferably, before the sending end sends the binary residual error information and the synthetic image to the receiving end, the binary residual error information is mapped into a mapping image containing the binary residual error information, and then the mapping image and the synthetic image are sent to the receiving end together;
and after receiving the mapping image containing the binary residual error information, the receiving end maps the mapping image into the binary residual error information.
Preferably, before mapping the binary residual error information into a mapping image containing the binary residual error information, the sending end further performs lossless compression on the binary residual error information; secondly, mapping the binary residual error information after lossless compression into a mapping image containing the binary residual error information after lossless compression, and then sending the mapping image and the synthetic image to a receiving end;
after receiving the mapping image containing the lossless compressed binary residual error information, the receiving end firstly maps the mapping image into the lossless compressed binary residual error information, and then carries out decompression operation corresponding to lossless compression to obtain the binary residual error information.
The embodiment of the invention also provides a method for hiding the secret information, which comprises the steps of synthesizing the binary original secret information into a synthesized image for hiding the secret information, and extracting the lossy binary secret information from the synthesized image according to a first rule; and carrying out XOR operation on the lossy binary secret information and the original binary secret information to obtain binary residual error information, and transmitting the binary residual error information and the synthetic image together as encrypted secret information.
Preferably, the binary residual information is mapped into a mapped image containing the binary residual information before being transmitted together with the synthetic image as the encrypted secret information, and is then transmitted together with the synthetic image as the encrypted secret information.
Preferably, before the binary residual information is mapped into the mapped image containing the residual information, lossless compression is also performed on the binary residual information; and then the binary residual error information after lossless compression is mapped into a mapping image containing the binary residual error information after lossless compression, and the mapping image and the synthetic image are used as encrypted secret information to be transmitted.
The embodiment of the invention also provides a method for reading the secret information, which comprises the steps of obtaining binary residual error information and a synthetic image; and converting the synthetic image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information.
Preferably, when the obtained binary residual information is a mapping image containing the binary residual information, the mapping image is mapped to the binary residual information.
Preferably, when the obtained mapping image containing the binary residual error information is a mapping image containing the lossless compressed binary residual error information, the mapping image containing the lossless compressed binary residual error information is mapped into the lossless compressed binary residual error information, and then decompression operation of lossless compression is performed to obtain the binary residual error information.
Embodiments of the present invention also provide a computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of any of the above methods when executing the computer program.
The invention has the following beneficial effects:
the sending end synthesizes the original binary secret information into a synthesized image of hidden secret information, and extracts lossy binary secret information from the synthesized image according to a first rule; carrying out XOR operation on the lossy binary secret information and the original binary secret information to obtain binary residual error information, and sending the binary residual error information and the synthetic image to a receiving end; a receiving end receives binary residual error information and a synthetic image; and converting the synthetic image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information. The original binary secret information is obtained by comparing and combining the lossy binary secret information and the received binary residual error information, so that lossless transmission of the secret information is realized, and meanwhile, the binary residual error information is encrypted before lossless transmission of the secret information, so that the security of lossless transmission of the secret information is improved.
In addition to the objects, features and advantages described above, other objects, features and advantages of the present invention are also provided. The present invention will be described in further detail below with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic diagram of a lossless transmission, hiding and reading method of secret information and a computer system according to a preferred embodiment of the present invention.
Detailed Description
The embodiments of the invention will be described in detail below with reference to the drawings, but the invention can be implemented in many different ways as defined and covered by the claims.
Example 1:
referring to fig. 1, a lossless information hiding method of the present invention includes:
the method comprises the steps that a sending end synthesizes original binary secret information into a synthesized image of hidden secret information, the binary secret has 256 bits, lossy binary secret information is extracted from the synthesized image according to a first rule, and exclusive or operation is carried out on the lossy binary secret information and the original binary secret information to obtain binary residual error information as follows: [ 0000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100001000000000000000100000100000000000000000000000000000000000000000000000000000000000000 ];
wherein "0" represents a correct bit of the pseudo binary secret information and the original binary secret information, and "1" represents an incorrect bit of the pseudo binary secret information and the original binary secret information.
The first rule is a rule of an inverse operation of synthesizing the original secret information of the binary into a synthesized image of the hidden secret information.
Performing lossless compression on the binary residual error information: acquiring the number and the position of '1' in binary residual error information; the position of "1" in the binary residual information is represented using position coding, i.e., binary numbers, the position of "1" is represented starting from binary number 0, for example, binary number 0 represents that the 1 st bit of the binary residual information is "1", binary number 1 represents that the 2 nd bit of the binary residual information is "1", the bits of each binary number representing "1" are the same, and are complemented to the maximum bit of the binary number that can represent the last bit position of the binary residual information. In particular, the bits of each binary number representing a "1" are determined by the length of the binary residual information. And splicing the binary numbers representing the positions of the '1' front and back to obtain the binary residual information after lossless compression. In specific implementation, binary residual information has the characteristic that '0' is more and '1' is less, so that the lossless compression method can ensure that the residual information can be decompressed and improve the compression ratio and the compression efficiency.
In the binary residual information, the number of "1" is 5, and the bits are 51, 167, 172, 188, and 194;
so a "1" located at bit 51 of the binary residual information is denoted as "00110010";
a "1" located at the 167 th bit of the binary residual information is denoted as "10100110";
"1" located at the 172 th bit of binary residual information is denoted as "10101011";
a "1" at bit 188 of binary residual information is denoted as "10111011";
a "1" located at the 194 th bit of the binary residual information is denoted as "11000001".
Splicing the binary numbers representing the position of each '1' sequentially to obtain the compressed binary residual error information as follows: [0011001010100110101010111011101111000001].
Secondly, mapping the binary residual error information after lossless compression into a mapping image containing the binary residual error information after lossless compression, and sending the mapping image and the synthetic image to a receiving end;
after receiving a mapping image containing lossless compressed binary residual error information, a receiving end firstly maps the mapping image into lossless compressed binary residual error information, and then carries out decompression operation corresponding to lossless compression to obtain binary residual error information; and converting the synthetic image into the lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information.
Example 2:
referring to fig. 1, a method for hiding secret information includes: the method comprises the steps that a sending end synthesizes binary original secret information into a synthesized image of hidden secret information, the binary original secret information has 256 bits, lossy binary secret information is extracted from the synthesized image according to a first rule, and exclusive or operation is carried out on the lossy binary secret information and the original binary secret information to obtain binary residual error information as follows: [ 0000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100001000000000000000100000100000000000000000000000000000000000000000000000000000000000000 ];
wherein "0" represents a correct bit of the pseudo binary secret information and the original binary secret information, and "1" represents an incorrect bit of the pseudo binary secret information and the original binary secret information.
The first rule is a rule of an inverse operation of synthesizing the original secret information of the binary into a synthesized image of the hidden secret information.
Performing lossless compression on the binary residual error information: acquiring the number and the position of '1' in binary residual error information; the position of "1" in the binary residual information is represented using position coding, i.e., binary numbers, the position of "1" is represented starting from binary number 0, for example, binary number 0 represents that the 1 st bit of the binary residual information is "1", binary number 1 represents that the 2 nd bit of the binary residual information is "1", the bits of each binary number representing "1" are the same, and are complemented to the maximum bit of the binary number that can represent the last bit position of the binary residual information. In particular, the bits of each binary number representing a "1" are determined by the length of the binary residual information. And splicing the binary numbers representing the positions of the '1' front and back to obtain the binary residual information after lossless compression. In specific implementation, binary residual information has the characteristic that '0' is more and '1' is less, so that the lossless compression method can ensure that the residual information can be decompressed and improve the compression ratio and the compression efficiency.
In the binary residual information, the number of "1" is 5, and the bits are 51, 167, 172, 188, and 194;
so a "1" located at bit 51 of the binary residual information is denoted as "00110010";
a "1" located at the 167 th bit of the binary residual information is denoted as "10100110";
"1" located at the 172 th bit of binary residual information is denoted as "10101011";
a "1" at bit 188 of binary residual information is denoted as "10111011";
a "1" located at the 194 th bit of the binary residual information is denoted as "11000001".
Splicing the binary numbers representing the position of each '1' sequentially to obtain the compressed binary residual error information as follows: [0011001010100110101010111011101111000001].
And then the binary residual error information after lossless compression is mapped into a mapping image containing the binary residual error information after lossless compression, and the mapping image and the synthetic image are used as encrypted secret information to be transmitted.
Example 3:
referring to fig. 1, a method of reading secret information includes: after the binary residual information received by the receiving end is a mapping image and a synthetic image which contain the binary residual information after lossless compression, firstly mapping the mapping image into the binary residual information after lossless compression, and then carrying out decompression operation corresponding to the lossless compression to obtain the binary residual information; and converting the synthetic image into the lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information.
Example 4:
a computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the methods described above when executing the computer program.
The invention relates to a lossless transmission, hiding and reading method of secret information and a computer system.A sending end synthesizes binary original secret information into a synthetic image of hidden secret information, and extracts lossy binary secret information from the synthetic image according to a first rule; carrying out XOR operation on the lossy binary secret information and the original binary secret information to obtain binary residual error information, and sending the binary residual error information and the synthetic image to a receiving end; a receiving end receives binary residual error information and a synthetic image; and converting the synthetic image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information. The original binary secret information is obtained by comparing and combining the lossy binary secret information and the received binary residual error information, so that lossless transmission of the secret information is realized, and meanwhile, the binary residual error information is encrypted before lossless transmission of the secret information, so that the security of lossless transmission of the secret information is improved. Therefore, the invention realizes the lossless transmission of the secret information and has higher confidentiality.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for lossless transmission of secret information, comprising:
the method comprises the steps that a sending end synthesizes original binary secret information into a synthesized image of hidden secret information, and lossy binary secret information is extracted from the synthesized image according to a first rule; performing exclusive-or operation on the lossy binary secret information and the original binary secret information to obtain binary residual error information, and sending the binary residual error information and the synthetic image to a receiving end;
receiving the binary residual error information and the synthetic image by a receiving end; and converting the synthetic image into the lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information.
2. The method according to claim 1, wherein before the sending end sends the binary residual information and the composite image to a receiving end, the sending end maps the binary residual information into a mapped image containing the binary residual information, and sends the mapped image and the composite image to the receiving end;
and after receiving the mapping image containing the binary residual error information, the receiving end maps the mapping image into the binary residual error information.
3. The method of lossless transmission of secret information according to claim 1, wherein the transmitting end further performs lossless compression on the binary residual information before mapping the binary residual information into a mapped image containing the binary residual information; secondly, mapping the binary residual error information after lossless compression into a mapping image containing the binary residual error information after lossless compression, and then sending the mapping image and the synthetic image to a receiving end;
after the receiving end receives the mapping image containing the binary residual error information after lossless compression, the mapping image is mapped into the binary residual error information after lossless compression, and then decompression operation corresponding to lossless compression is carried out to obtain the binary residual error information.
4. A method for hiding secret information is characterized in that original binary secret information is synthesized into a synthesized image of the hidden secret information, and lossy binary secret information is extracted from the synthesized image according to a first rule; and carrying out exclusive OR operation on the damaged binary system secret information and the original binary system secret information to obtain binary system residual error information, and transmitting the binary system residual error information and the synthetic image together as encrypted secret information.
5. The method according to claim 4, wherein the binary residual information is mapped into a mapped image containing the binary residual information before being transmitted together with the composite image as the encrypted secret information, and is transmitted together with the composite image as the encrypted secret information.
6. The concealment method for secret information according to claim 5, wherein said binary residual information is further subjected to lossless compression before being mapped into a mapped image containing residual information; and mapping the binary residual error information after lossless compression into a mapping image containing the binary residual error information after lossless compression, and transmitting the mapping image and the synthetic image together as encrypted secret information.
7. A method for reading secret information is characterized in that binary residual error information and a synthetic image are obtained; and converting the synthetic image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information.
8. The secret information reading method according to claim 7, wherein when the obtained binary residual information is a mapped image containing binary residual information, the mapped image is mapped to the binary residual information.
9. The method according to claim 8, wherein when the obtained mapped image containing the binary residual information is a mapped image containing lossless compressed binary residual information, the mapped image containing lossless compressed binary residual information is mapped to lossless compressed binary residual information, and then decompression operation of lossless compression is performed to obtain the binary residual information.
10. A computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method of any one of claims 1 to 9 are performed when the computer program is executed by the processor.
CN202111456555.3A 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system Active CN114390153B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111456555.3A CN114390153B (en) 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111456555.3A CN114390153B (en) 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system

Publications (2)

Publication Number Publication Date
CN114390153A true CN114390153A (en) 2022-04-22
CN114390153B CN114390153B (en) 2023-07-11

Family

ID=81195069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111456555.3A Active CN114390153B (en) 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system

Country Status (1)

Country Link
CN (1) CN114390153B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040022443A1 (en) * 2002-08-05 2004-02-05 Umax Data Systems Inc. Image processing method for facilitating data transmission
CN101668018A (en) * 2009-10-13 2010-03-10 金蝶软件(中国)有限公司 Network transmission method and system therefor
JP2011130410A (en) * 2009-12-21 2011-06-30 Mtekvision Co Ltd Encoding method, decoding method and apparatus thereof
WO2011090359A2 (en) * 2010-01-25 2011-07-28 고려대학교 산학협력단 Data compression/decompression device and method
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
CN107197286A (en) * 2017-05-15 2017-09-22 华中科技大学 A kind of Lossless Image Compression Algorithm method and system based on reversible long code
CN109936745A (en) * 2017-11-21 2019-06-25 辉达公司 For improving the method and system of the decompression of original video data
CN110175470A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data and deep learning
CN110188552A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and difference

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040022443A1 (en) * 2002-08-05 2004-02-05 Umax Data Systems Inc. Image processing method for facilitating data transmission
CN101668018A (en) * 2009-10-13 2010-03-10 金蝶软件(中国)有限公司 Network transmission method and system therefor
JP2011130410A (en) * 2009-12-21 2011-06-30 Mtekvision Co Ltd Encoding method, decoding method and apparatus thereof
WO2011090359A2 (en) * 2010-01-25 2011-07-28 고려대학교 산학협력단 Data compression/decompression device and method
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
CN107197286A (en) * 2017-05-15 2017-09-22 华中科技大学 A kind of Lossless Image Compression Algorithm method and system based on reversible long code
CN109936745A (en) * 2017-11-21 2019-06-25 辉达公司 For improving the method and system of the decompression of original video data
CN110175470A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data and deep learning
CN110188552A (en) * 2019-05-29 2019-08-30 华南师范大学 Information concealing method and robot system based on big data and difference

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
JUN-XIANG WANG等: "A path optional lossless data hiding scheme based on VQ joint neighboring coding", INFORMATION SCIENCES: AN INTERNATIONAL JOURNAL, vol. 179, no. 19, XP026350461 *
李晓博等: "基于图像块像素差的大容量无损信息隐藏算法", 计算机工程, vol. 38, no. 17 *
苏圣琦: "基于CNN的图像风格迁移及其在无载体信息隐藏中的应用", 《中国优秀博硕士学位论文全文数据库(硕士) 信息科技辑》 *
苏圣琦: "基于CNN的图像风格迁移及其在无载体信息隐藏中的应用", 《中国优秀博硕士学位论文全文数据库(硕士) 信息科技辑》, 15 April 2021 (2021-04-15), pages 20 *
谢于明等: "一种基于图像的无损隐秘传输方法", 光电子.激光, vol. 18, no. 9 *

Also Published As

Publication number Publication date
CN114390153B (en) 2023-07-11

Similar Documents

Publication Publication Date Title
US7412072B2 (en) Variable message coding protocols for encoding auxiliary data in media signals
US7336802B2 (en) Digital watermarking system using scrambling method
US7058200B2 (en) Method for the prior monitoring of the detectability of a watermarking signal
US8600053B2 (en) Message key generation
US20080276089A1 (en) Content Authentication and Recovery Using Digital Watermarks
US20060159304A1 (en) Watermark orientation signals conveying payload data
US20030026453A1 (en) Repetition coding of error correction coded messages in auxiliary data embedding applications
CN110909744B (en) Multi-description coding method and system combined with semantic segmentation
CN107688731B (en) Digital watermarking algorithm based on text document protection
CN101452569A (en) Processing method of image latent writing based on auxiliary pixel
Singh et al. Robust and imperceptible spread-spectrum watermarking for telemedicine applications
CN114157773B (en) Image steganography method based on convolutional neural network and frequency domain attention
Banik et al. Review on steganography in digital media
Lu et al. Multipurpose image watermarking method based on mean-removed vector quantization
CN114390153B (en) Lossless transmission, hiding and reading method of secret information and computer system
US20020146149A1 (en) Space filling quantizers for digital watermarking
Abbasi et al. Efficient lossless based secure communication in 6G Internet-of-Things environments
CN114630130A (en) Face-changing video tracing method and system based on deep learning
Mshir et al. A New Model for Creating Layer Planes Using Steganography for Text Hiding
CN110855850A (en) Data hiding method based on matrix coding
CN117609962B (en) Image hyperlink generation method based on feature point generation
Subbulakshmi et al. Robust Reversible Watermarking Based on Normalized Correlation Combined with Cdma Techniques
Hajjaji et al. Fragile Method for Watermarking of Medical Image: Method Based LSBs
Wu et al. A coverless information hiding algorithm based on gradient matrix
Daneshmandpour et al. Region‐based scalable self‐recovery for salient‐object images

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant