CN114390153B - Lossless transmission, hiding and reading method of secret information and computer system - Google Patents

Lossless transmission, hiding and reading method of secret information and computer system Download PDF

Info

Publication number
CN114390153B
CN114390153B CN202111456555.3A CN202111456555A CN114390153B CN 114390153 B CN114390153 B CN 114390153B CN 202111456555 A CN202111456555 A CN 202111456555A CN 114390153 B CN114390153 B CN 114390153B
Authority
CN
China
Prior art keywords
binary
information
secret information
residual information
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111456555.3A
Other languages
Chinese (zh)
Other versions
CN114390153A (en
Inventor
刘熙尧
马隽星
李召英
马子平
张昊
张健
张伟
贺建飙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN202111456555.3A priority Critical patent/CN114390153B/en
Publication of CN114390153A publication Critical patent/CN114390153A/en
Application granted granted Critical
Publication of CN114390153B publication Critical patent/CN114390153B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses a lossless transmission, hiding and reading method of secret information and a computer system, wherein a sending end synthesizes binary original secret information into a synthesized image of hidden secret information, and lossy binary secret information is extracted from the synthesized image according to a first rule; performing exclusive OR operation on the lossy binary secret information and binary original secret information to obtain binary residual information, and transmitting the binary residual information and the synthesized image to a receiving end; after receiving, the receiving end converts the synthesized image into lossy binary secret information according to a first rule, and compares and combines the lossy binary secret information with binary residual information to obtain binary original secret information. The lossy binary secret information and the received binary residual information are compared and combined to obtain binary original secret information, so that lossless transmission of the secret information is realized, the binary residual information is encrypted before lossless transmission of the secret information, and the security of lossless transmission of the secret information is improved.

Description

Lossless transmission, hiding and reading method of secret information and computer system
Technical Field
The present invention relates to the field of information hiding technologies, and in particular, to a method for lossless transmission, hiding and reading of secret information, and a computer system.
Background
Steganography is a technique for hiding secret information in public digital media, which can be pictures, video, audio, etc. Conventional image steganography techniques typically find a carrier picture and embed secret information into the carrier picture by slightly modifying the carrier picture. Such methods, because of modifying the characteristics of the image itself, leave easily noticeable marks on the image that are easily detected by steganographic analysis techniques.
To solve this problem, a "no carrier" steganography method is proposed. The "no carrier" is not to directly modify the content of the carrier, so that the effect of the steganalysis technology for judging whether the image has hidden information or not based on the analysis of the image characteristics is greatly reduced. At present, the 'no carrier' steganography is mainly divided into two types: a method based on image composition and a method based on secret information mapping. The two methods solve the problem that the traditional image steganography is easy to be detected by steganalysis algorithm due to the fact that the statistical information of the image is modified, but have certain defects. In the carrier-free steganography method based on secret information mapping, binary secret information is generally transmitted, and although lossless transmission of the secret information can be realized, as each secret information needs to be hidden by a corresponding image, the number of the needed corresponding images is exponentially increased when the secret information is increased by one bit; if the long secret information is segmented, a problem that many pictures are needed for each group of secret information transmission exists, and the behaviors can be unsafe and suspected; in the "carrier-free" steganography method based on image synthesis, since an image carrying secret information is artificially generated, the image may have an unreal problem; moreover, since the hiding and extracting of secret information generally uses a pre-trained deep learning model, there may be some error in extracting secret information.
Therefore, how to develop a method for lossless transmission of secret information is a problem to be solved by those skilled in the art.
Disclosure of Invention
The invention provides a lossless transmission, hiding and reading method of secret information and a computer system, which are used for solving the technical problem that the secret information has error rate when the secret information is extracted by using an information hiding method in the prior art.
In order to solve the technical problems, the technical scheme provided by the invention is as follows:
a lossless transmission of secret information, comprising:
the sending end synthesizes the binary original secret information into a synthesized image of hidden secret information, and extracts lossy binary secret information from the synthesized image according to a first rule; performing exclusive OR operation on the lossy binary secret information and the binary original secret information to obtain binary residual information, and transmitting the binary residual information and the synthesized image to a receiving end;
the receiving end receives the binary residual information and the synthesized image; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information.
Preferably, before the sending end sends the binary residual information and the composite image to the receiving end, the sending end maps the binary residual information into a mapped image containing the binary residual information, and then sends the mapped image and the composite image to the receiving end together.
After receiving the mapping image containing the binary residual information, the receiving end maps the mapping image into the binary residual information.
Preferably, the transmitting end performs lossless compression on the binary residual information before mapping the binary residual information into a mapping image containing the binary residual information; mapping the lossless compressed binary residual information into a mapping image containing the lossless compressed binary residual information, and sending the mapping image and the synthesized image to a receiving end;
after receiving a mapping image containing lossless compressed binary residual information, the receiving end firstly maps the mapping image into lossless compressed binary residual information, and then performs decompression operation corresponding to lossless compression to obtain the binary residual information.
The embodiment of the invention also provides a method for hiding the secret information, which synthesizes the binary original secret information into a synthesized image for hiding the secret information, and extracts the lossy binary secret information from the synthesized image according to a first rule; the lossy binary secret information and the binary original secret information are subjected to exclusive OR operation to obtain binary residual information, and the binary residual information and the synthesized image are transmitted together as encrypted secret information.
Preferably, before the binary residual information is transmitted together with the composite image as the encrypted secret information, the binary residual information is mapped into a mapped image containing the binary residual information, and then transmitted together with the composite image as the encrypted secret information.
Preferably, before mapping the binary residual information into a mapped image containing residual information, lossless compression is further performed on the binary residual information; and mapping the lossless compressed binary residual information into a mapping image containing the lossless compressed binary residual information, and transmitting the mapping image and the synthesized image together as encrypted secret information.
The embodiment of the invention also provides a method for reading the secret information, which is used for acquiring the binary residual information and the synthesized image; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information.
Preferably, when the acquired binary residual information is a mapping image containing binary residual information, the mapping image is mapped to binary residual information.
Preferably, when the obtained mapping image containing the binary residual information is a mapping image containing the lossless compressed binary residual information, mapping the mapping image containing the lossless compressed binary residual information into the lossless compressed binary residual information, and then performing decompression operation of lossless compression to obtain the binary residual information.
Embodiments of the present invention also provide a computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the methods described above when executing the computer program.
The invention has the following beneficial effects:
the sending end synthesizes the binary original secret information into a synthesized image of hidden secret information, and extracts lossy binary secret information from the synthesized image according to a first rule; performing exclusive OR operation on the lossy binary secret information and the binary original secret information to obtain binary residual information, and transmitting the binary residual information and the synthesized image to a receiving end; the receiving end receives the binary residual information and the synthesized image; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information. The lossy binary secret information and the received binary residual information are compared and combined to obtain binary original secret information, so that lossless transmission of the secret information is realized, meanwhile, the binary residual information is encrypted before lossless transmission of the secret information, and the security of lossless transmission of the secret information is improved.
In addition to the objects, features and advantages described above, the present invention has other objects, features and advantages. The invention will be described in further detail with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention. In the drawings:
fig. 1 is a schematic diagram of a method for lossless transmission, hiding and reading of secret information and a computer system according to a preferred embodiment of the present invention.
Detailed Description
Embodiments of the invention are described in detail below with reference to the attached drawings, but the invention can be implemented in a number of different ways, which are defined and covered by the claims.
Example 1:
referring to fig. 1, a lossless information hiding method of the present invention includes:
the transmitting end synthesizes binary original secret information into a synthesized image of hidden secret information, the binary secret has 256 bits, lossy binary secret information is extracted from the synthesized image according to a first rule, and exclusive-or operation is carried out on the lossy binary secret information and the binary original secret information, so that binary residual information is obtained as follows: [00 00000 00000 00000 00000 00000 00000 00000 00000 00000 0001 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 000001 00001 00000 00000 000001 000001 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00 ];
where "0" indicates a bit where the pseudo binary secret information is correct with the binary original secret information, and "1" indicates a bit where the pseudo binary secret information is incorrect with the binary original secret information.
The first rule is a rule of an inverse operation of synthesizing binary original secret information into a synthesized image hiding the secret information.
Lossless compression is carried out on the binary residual information: acquiring the number and the positions of 1's in the binary residual information; the position coding is used, i.e. the binary number represents the position of "1" in the binary residual information, starting from binary number 0 representing the position of "1", for example, binary number 0 representing the 1 st bit of the binary residual information as "1", binary number 1 representing the 2 nd bit of the binary residual information as "1", each bit of the binary number representing "1" being identical and complementing the largest bit of the binary number up to the last bit position that can represent the binary residual information. In practice, the bits of each binary number representing a "1" are determined by the length of the binary residual information. And splicing binary numbers representing the position of each 1 back and forth to obtain lossless compressed binary residual information. In the implementation, the binary residual information has the characteristics of '0' and '1' with very little, so that the lossless compression method can ensure that the residual information can be decompressed and improve the compression ratio and the compression efficiency.
In the binary residual information, the number of 1's is 5, and the numbers are respectively 51, 167, 172, 188 and 194 bits;
so a "1" located at bit 51 of the binary residual information is denoted as "00110010";
"1" located at 167 th bit of the binary residual information is denoted as "10100110";
"1" located at 172 th bit of the binary residual information is denoted as "10101011";
"1" located at 188 th bit of the binary residual information is denoted as "10111011";
a "1" located at bit 194 of the binary residual information is denoted as "11000001".
The binary numbers representing the position of each 1 are spliced in sequence, and compressed binary residual information is obtained as follows: [0011001010100110101010111011101111000001].
And mapping the lossless compressed binary residual information into a mapping image containing the lossless compressed binary residual information, and sending the mapping image and the synthesized image to a receiving end.
After receiving a mapping image containing lossless compressed binary residual information, a receiving end firstly maps the mapping image into lossless compressed binary residual information, and then performs decompression operation corresponding to lossless compression to obtain binary residual information; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information.
Example 2:
referring to fig. 1, a method for hiding secret information includes: the transmitting end synthesizes binary original secret information into a synthesized image of hidden secret information, the binary original secret information has 256 bits, lossy binary secret information is extracted from the synthesized image according to a first rule, and exclusive-or operation is carried out on the lossy binary secret information and the binary original secret information to obtain binary residual information as follows: [00 00000 00000 00000 00000 00000 00000 00000 00000 00000 0001 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 000001 00001 00000 00000 000001 000001 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00000 00 ];
where "0" indicates a bit where the pseudo-binary secret information is correct to the binary original secret information, and "1" indicates a bit where the pseudo-binary secret information is incorrect to the binary original secret information.
The first rule is a rule of an inverse operation of synthesizing binary original secret information into a synthesized image hiding the secret information.
Lossless compression is carried out on the binary residual information: acquiring the number and the positions of 1's in the binary residual information; the position coding is used, i.e. the binary number represents the position of "1" in the binary residual information, starting from binary number 0 representing the position of "1", for example, binary number 0 representing the 1 st bit of the binary residual information as "1", binary number 1 representing the 2 nd bit of the binary residual information as "1", each bit of the binary number representing "1" being identical and complementing the largest bit of the binary number up to the last bit position that can represent the binary residual information. In practice, the bits of each binary number representing a "1" are determined by the length of the binary residual information. And splicing binary numbers representing the position of each 1 back and forth to obtain lossless compressed binary residual information. In the implementation, the binary residual information has the characteristics of '0' and '1' with very little, so that the lossless compression method can ensure that the residual information can be decompressed and improve the compression ratio and the compression efficiency.
In the binary residual information, the number of 1's is 5, and the numbers are respectively 51, 167, 172, 188 and 194 bits;
so a "1" located at bit 51 of the binary residual information is denoted as "00110010";
"1" located at 167 th bit of the binary residual information is denoted as "10100110";
"1" located at 172 th bit of the binary residual information is denoted as "10101011";
"1" located at 188 th bit of the binary residual information is denoted as "10111011";
a "1" located at bit 194 of the binary residual information is denoted as "11000001".
The binary numbers representing the position of each 1 are spliced in sequence, and compressed binary residual information is obtained as follows: [0011001010100110101010111011101111000001].
And mapping the lossless compressed binary residual information into a mapping image containing the lossless compressed binary residual information, and transmitting the mapping image and the synthesized image together as encrypted secret information.
Example 3:
referring to fig. 1, a method for reading secret information includes: after the binary residual information received by the receiving end is a mapping image and a synthesized image containing the lossless compressed binary residual information, mapping the mapping image into the lossless compressed binary residual information, and then performing decompression operation corresponding to the lossless compression to obtain the binary residual information; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information.
Example 4:
a computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of any of the methods described above when the computer program is executed.
According to the lossless transmission, hiding and reading method and the computer system of the secret information, a sending end synthesizes binary original secret information into a synthesized image of hidden secret information, and lossy binary secret information is extracted from the synthesized image according to a first rule; performing exclusive OR operation on the lossy binary secret information and the binary original secret information to obtain binary residual information, and transmitting the binary residual information and the synthesized image to a receiving end; the receiving end receives the binary residual information and the synthesized image; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information. The lossy binary secret information and the received binary residual information are compared and combined to obtain binary original secret information, so that lossless transmission of the secret information is realized, meanwhile, the binary residual information is encrypted before lossless transmission of the secret information, and the security of lossless transmission of the secret information is improved. Therefore, the invention realizes lossless transmission of secret information and has higher confidentiality.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A lossless transmission method of secret information, comprising:
the method comprises the steps that a sending end synthesizes binary original secret information into a synthesized image of hidden secret information, and lossy binary secret information is extracted from the synthesized image according to a first rule; performing exclusive-or operation on the lossy binary secret information and the binary original secret information to obtain binary residual information, and transmitting the binary residual information and the synthesized image to a receiving end;
the receiving end receives the binary residual information and the synthesized image; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information.
2. The lossless transmission method of secret information according to claim 1, wherein before the transmitting end transmits the binary residual information and the synthesized image to the receiving end, the transmitting end maps the binary residual information into a mapped image containing binary residual information, and then transmits the mapped image and the synthesized image to the receiving end together;
and after the receiving end receives the mapping image containing the binary residual information, mapping the mapping image into the binary residual information.
3. The lossless transmission method of secret information according to claim 1, wherein the transmitting end further performs lossless compression on the binary residual information before mapping the binary residual information into a mapped image containing binary residual information; mapping the lossless compressed binary residual information into a mapping image containing the lossless compressed binary residual information, and sending the mapping image and the synthesized image to a receiving end;
after receiving a mapping image containing lossless compressed binary residual information, the receiving end firstly maps the mapping image into lossless compressed binary residual information, and then performs decompression operation corresponding to lossless compression to obtain the binary residual information.
4. A method for hiding secret information is characterized in that binary original secret information is synthesized into a synthesized image for hiding the secret information, and lossy binary secret information is extracted from the synthesized image according to a first rule; performing exclusive-or operation on the lossy binary secret information and the binary original secret information to obtain binary residual information, and transmitting the binary residual information and the composite image together as encrypted secret information;
receiving the binary residual information and the synthetic image; and converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual information to obtain binary original secret information.
5. The method according to claim 4, wherein before transmitting the binary residual information together with the composite image as encrypted secret information, the binary residual information is mapped into a mapped image containing binary residual information, and then transmitted together with the composite image as encrypted secret information.
6. The hiding method of secret information according to claim 5, further performing lossless compression on the binary residual information before mapping the binary residual information into a mapped image containing residual information; and mapping the lossless compressed binary residual information into a mapping image containing the lossless compressed binary residual information, and transmitting the mapping image and the synthesized image together as encrypted secret information.
7. A method for reading secret information is characterized in that binary residual information and a synthetic image are obtained; converting the synthesized image into lossy binary secret information according to a first rule, and comparing and combining the lossy binary secret information with the received binary residual error information to obtain binary original secret information, wherein the synthesized image refers to a synthesized image of hidden secret information obtained by synthesizing the binary original secret information; the binary residual information refers to binary residual information obtained by extracting lossy binary secret information from the synthesized image according to a first rule and performing exclusive-or operation on the lossy binary secret information and the binary original secret information.
8. The method according to claim 7, wherein when the acquired binary residual information is a mapping image containing binary residual information, the mapping image is mapped to the binary residual information.
9. The method according to claim 8, wherein when the obtained mapping image containing binary residual information is a mapping image containing lossless compressed binary residual information, mapping the mapping image containing lossless compressed binary residual information to lossless compressed binary residual information, and performing lossless compression decompression operation to obtain binary residual information.
10. A computer system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any of the preceding claims 1 to 9 when the computer program is executed.
CN202111456555.3A 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system Active CN114390153B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111456555.3A CN114390153B (en) 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111456555.3A CN114390153B (en) 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system

Publications (2)

Publication Number Publication Date
CN114390153A CN114390153A (en) 2022-04-22
CN114390153B true CN114390153B (en) 2023-07-11

Family

ID=81195069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111456555.3A Active CN114390153B (en) 2021-12-02 2021-12-02 Lossless transmission, hiding and reading method of secret information and computer system

Country Status (1)

Country Link
CN (1) CN114390153B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
CN110175470A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data and deep learning

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7085421B2 (en) * 2002-08-05 2006-08-01 Shih-Zheng Kuo Image processing method for facilitating data transmission
CN101668018A (en) * 2009-10-13 2010-03-10 金蝶软件(中国)有限公司 Network transmission method and system therefor
KR20110071231A (en) * 2009-12-21 2011-06-29 엠텍비젼 주식회사 Encoding method, decoding method and apparatus thereof
WO2011090359A2 (en) * 2010-01-25 2011-07-28 고려대학교 산학협력단 Data compression/decompression device and method
CN107197286B (en) * 2017-05-15 2019-05-14 华中科技大学 A kind of Lossless Image Compression Algorithm method and system based on reversible long code
US11082720B2 (en) * 2017-11-21 2021-08-03 Nvidia Corporation Using residual video data resulting from a compression of original video data to improve a decompression of the original video data
CN110188552B (en) * 2019-05-29 2023-05-23 华南师范大学 Information hiding method based on big data and difference value and robot system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103226802A (en) * 2013-03-26 2013-07-31 中南大学 Chaotic-encryption-based medical image share method
CN110175470A (en) * 2019-05-29 2019-08-27 华南师范大学 Information concealing method and robot system based on big data and deep learning

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A path optional lossless data hiding scheme based on VQ joint neighboring coding;Jun-Xiang Wang等;Information Sciences: An International Journal;第179卷(第19期);全文 *
一种基于图像的无损隐秘传输方法;谢于明等;光电子.激光;第18卷(第9期);全文 *
基于图像块像素差的大容量无损信息隐藏算法;李晓博等;计算机工程;第38卷(第17期);全文 *

Also Published As

Publication number Publication date
CN114390153A (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN111491170B (en) Method for embedding watermark and watermark embedding device
US20080276089A1 (en) Content Authentication and Recovery Using Digital Watermarks
CN110909744B (en) Multi-description coding method and system combined with semantic segmentation
CN101452569B (en) Processing method of image latent writing based on auxiliary pixel
Fei et al. Supervised gan watermarking for intellectual property protection
CN103414840A (en) Data hiding method based on image set
JP2000228721A (en) Method for inserting watermark and authenticating digital signal
Pizzolante et al. Copyright protection for images on mobile devices
Bhaumik et al. Data hiding in video
CN114157773B (en) Image steganography method based on convolutional neural network and frequency domain attention
CN114390153B (en) Lossless transmission, hiding and reading method of secret information and computer system
CN110417551B (en) Character and picture generation type camouflage and recovery method combined with error diffusion
Lu et al. Multipurpose image watermarking method based on mean-removed vector quantization
CN114630130B (en) Face-changing video tracing method and system based on deep learning
Basak et al. Steganography in grey scale animated GIF using hash based pixel value differencing
Verma Review of steganography techniques
Abbasi et al. Efficient lossless based secure communication in 6G Internet-of-Things environments
Comesana et al. On a watermarking scheme in the logarithmic domain and its perceptual advantages
CN110855850B (en) Data hiding method based on matrix coding
Hajduk et al. Accelerated cover selection steganography
CN114979402B (en) Shared image storage method based on matrix coding embedding
Fu et al. Reliable information hiding based on support vector machine
CN114928681B (en) Information hiding method and system based on generation countermeasure network
CN115278266B (en) Method for embedding, transmitting and extracting secret information in digital image
CN115396676A (en) Encryption domain satellite image information hiding method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant