CN114598529A - Image information hiding method fusing encryption - Google Patents

Image information hiding method fusing encryption Download PDF

Info

Publication number
CN114598529A
CN114598529A CN202210231629.1A CN202210231629A CN114598529A CN 114598529 A CN114598529 A CN 114598529A CN 202210231629 A CN202210231629 A CN 202210231629A CN 114598529 A CN114598529 A CN 114598529A
Authority
CN
China
Prior art keywords
information
hidden
image
hiding
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210231629.1A
Other languages
Chinese (zh)
Inventor
朱和贵
鲁潇蔓
陆冉
马二斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN202210231629.1A priority Critical patent/CN114598529A/en
Publication of CN114598529A publication Critical patent/CN114598529A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an image information hiding method fusing encryption, relating to the technical field of (communication technology) image information encryption, comprising S1, preparing original information to be hidden; s2, encrypting the hidden information; s3, embedding the hidden file; s4, encrypting the original carrier image; s5, decoding hidden information; s6, extracting hidden information; s7, unlocking and recovering the hidden information: the invention has the beneficial effects that: firstly, through using multilayer encryption technology, place the higher information of secret level in the deep, and place the lower information of secret level on the top layer to make the authorized personnel of different grades see the encrypted information of corresponding grade, improved the security of information transmission, also increased the freedom and the suitability of watching the object when information encryption simultaneously, secondly, through adopting dynamic encryption's technique, can set up the time of taking effect and the dead time of information and key according to the operation requirement, in order to be applicable to some special scenes, promote the timeliness of information transmission.

Description

Image information hiding method fusing encryption
Technical Field
The invention relates to the technical field of image information encryption (communication technology), in particular to an image information hiding method fusing encryption.
Background
With the progress of the era and the development of science and technology, information becomes an important part in daily life, information is not generated in daily life at all times, the information is various and comprises character information, digital form information, picture information and the like, important information, unimportant information and the like can exist in information summary, and in order to ensure the confidentiality of some important information, certain information generally needs to be hidden and encrypted to ensure that the information is only watched by specific authorized people.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for hiding image information by fusing encryption, which solves the problems in the background technology.
In order to achieve the purpose, the invention is realized by the following technical scheme: a fusion encrypted image information hiding method comprises the following steps,
s1, preparing original information to be hidden: processing the information to be hidden, including deleting redundancy and layering the information to be hidden according to the importance degree;
s2, encrypting the hidden information: encrypting and hiding original information;
s3, processing the original carrier image: selecting a data block area insensitive to the image by human eyes by a matrix analysis method;
s4, embedding the processed information to be hidden into the carrier image: realizing the fusion of the image and the information to be hidden, encrypting and generating a secret key;
s5, decoding hidden information: a step of decoding the information hidden in the original carrier image;
s6, hidden information extraction: a step of extracting hidden information from the original carrier image;
s7, layered recovery of hidden information: a step of unlocking and recovering information in the original carrier image;
generating a key for unlocking the hidden information in the step S2;
extracting the hidden file by using the key generated in the step S4 in the step S6;
the key is set with an effective time and an invalid time when being generated.
Preferably, in the step S2, different security levels are set according to different importance levels when the file is encrypted.
Preferably, the keys generated in S4 are classified into a primary key, a middle key, and an advanced key according to their security levels.
Preferably, the S3 uses a zigzag algorithm to embed hidden information into the original carrier image.
Preferably, in S2, the hidden file is encrypted by using a convolutional neural network, an SVD decomposition method and a cat mapping method.
Preferably, an effective time and an ineffective time for hiding the information are set in S2.
The invention provides an image information hiding method fusing encryption, which has the following beneficial effects:
1. according to the image information hiding encryption method, the information with higher confidentiality grade is placed on the inner layer and the information with lower confidentiality grade is placed on the outer layer by using the multilayer encryption technology, so that authorized persons with different grades can see the encrypted files with corresponding grades, the security of information transmission is improved, and the viewing freedom and the applicability of the files during confidentiality are also improved.
2. According to the image information hiding encryption method, the dynamic encryption technology is adopted, the information and the effective time and the invalid time of the key can be set according to the use requirement, the method is suitable for most of special scenes and aiming at various special information, so that the timeliness and the confidentiality of information hiding are improved, meanwhile, expired information to be hidden can be automatically cleaned, the efficiency is improved, and the storage space occupied by the information can be reduced.
Drawings
FIG. 1 is a schematic flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1, the present invention provides a technical solution: a fusion encrypted image information hiding method comprises the following steps,
s1, preparing original information to be hidden: processing the information to be hidden, including deleting redundancy and layering the information to be hidden according to importance degree;
s2, encrypting the hidden information: encrypting and hiding original information;
s3, processing the original carrier image: selecting a data block area insensitive to the image by human eyes by a matrix analysis method;
s4, embedding the processed information to be hidden into the carrier image: realizing the fusion of the image and the information to be hidden, encrypting and generating a secret key;
s5, decoding hidden information: a step of decoding the information hidden in the original carrier image;
s6, hidden information extraction: a step of extracting hidden information from the original carrier image;
s7, layered recovery of hidden information: a step of unlocking and recovering information in the original carrier image;
generating a key for unlocking the hidden information in the step S2;
extracting the hidden file by using the key generated in the step S4 in the step S6;
the key is set with an effective time and an invalid time when being generated.
Preferably, different security levels are set according to different importance levels when the file is encrypted in S2, and multiple different permissions can be set during use, so that a user can open different levels of information and materials to different people or individuals according to the importance level of the information.
Preferably, the keys generated in S4 are classified into a primary key, a middle key and a high key according to their security levels, and different documents can be extracted according to their security classification conditions.
Preferably, the S3 uses a zigzag algorithm to embed hidden information into the original carrier image.
Preferably, in S2, the hidden file is encrypted by using a convolutional neural network, an SVD decomposition method and a cat mapping method, and different encryption methods may be freely selected or combined according to different usage situations.
Preferably, the S2 is provided with effective time and ineffective time for information hiding, and is applicable to most of special scenes and for a plurality of kinds of special information, so that timeliness and confidentiality of information hiding are improved, and meanwhile, expired information to be hidden can be automatically cleaned, and efficiency is improved.
In summary, when the image information hiding encryption method is used, firstly, information to be hidden is prepared, then, original information is encrypted and hidden, a plurality of keys with different levels are generated, the encrypted hidden information is embedded into image information, then, the original carrier image hidden with the encrypted information is encrypted, the information hidden in the original carrier image is decoded when unlocking is carried out, the hidden information is extracted from the original carrier image, when extraction is carried out, the information with different levels is displayed according to different keys used by the original carrier image, the information which does not reach the key level is not extracted, and the information in the original carrier image is unlocked and restored after extraction.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (6)

1. A fusion encrypted image information hiding method comprises the following steps:
s1, preparing original information to be hidden: processing the information to be hidden, including deleting redundancy and layering the information to be hidden according to the importance degree;
s2, encrypting the hidden information: encrypting and hiding original information;
s3, processing the original carrier image: selecting a data block area insensitive to the image by human eyes by a matrix analysis method;
s4, embedding the processed information to be hidden into the carrier image: realizing the fusion and encryption of the image and the information to be hidden and generating a secret key
S5, decoding hidden information: decoding the information hidden in the original carrier image;
s6, hidden information extraction: a step of extracting hidden information from the original carrier image;
s7, layered recovery of hidden information: a step of unlocking and recovering information in the original carrier image;
generating a key for unlocking the hidden information in the step S2;
extracting the hidden file by using the key generated in the step S4 in the step S6;
the key is set with an effective time and an invalid time when being generated.
2. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: in the S2, different security levels are set according to different importance levels when the file is encrypted.
3. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: the keys generated in S4 are classified into a primary key, a middle key, and an advanced key according to their security levels.
4. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: said S3 uses the zigzag algorithm to embed the hidden information into the original carrier image.
5. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: in S2, the hidden file is encrypted by using a convolutional neural network, an SVD decomposition method, and a cat mapping method.
6. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: the S2 is set with an effective time and an ineffective time for information hiding.
CN202210231629.1A 2022-03-09 2022-03-09 Image information hiding method fusing encryption Pending CN114598529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210231629.1A CN114598529A (en) 2022-03-09 2022-03-09 Image information hiding method fusing encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210231629.1A CN114598529A (en) 2022-03-09 2022-03-09 Image information hiding method fusing encryption

Publications (1)

Publication Number Publication Date
CN114598529A true CN114598529A (en) 2022-06-07

Family

ID=81816639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210231629.1A Pending CN114598529A (en) 2022-03-09 2022-03-09 Image information hiding method fusing encryption

Country Status (1)

Country Link
CN (1) CN114598529A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065533A (en) * 2022-06-14 2022-09-16 东北大学 Information encryption method and system based on key layering

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426709A (en) * 2015-11-12 2016-03-23 福建北卡科技有限公司 JPEG image information hiding based private information communication method and system
CN105825257A (en) * 2016-03-09 2016-08-03 东北大学 Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image
CN106101715A (en) * 2016-07-28 2016-11-09 西安空间无线电技术研究所 A kind of image based on Information hiding processes by demand method
CN107103631A (en) * 2017-04-17 2017-08-29 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification
CN108270544A (en) * 2016-12-30 2018-07-10 广东精点数据科技股份有限公司 A kind of ciphertext image reversible information hidden method and device based on urDEED algorithms
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
CN109936552A (en) * 2017-12-19 2019-06-25 方正国际软件(北京)有限公司 A kind of cipher key authentication method, server and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426709A (en) * 2015-11-12 2016-03-23 福建北卡科技有限公司 JPEG image information hiding based private information communication method and system
CN105825257A (en) * 2016-03-09 2016-08-03 东北大学 Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image
CN106101715A (en) * 2016-07-28 2016-11-09 西安空间无线电技术研究所 A kind of image based on Information hiding processes by demand method
CN108270544A (en) * 2016-12-30 2018-07-10 广东精点数据科技股份有限公司 A kind of ciphertext image reversible information hidden method and device based on urDEED algorithms
CN107103631A (en) * 2017-04-17 2017-08-29 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification
CN109936552A (en) * 2017-12-19 2019-06-25 方正国际软件(北京)有限公司 A kind of cipher key authentication method, server and system
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065533A (en) * 2022-06-14 2022-09-16 东北大学 Information encryption method and system based on key layering
CN115065533B (en) * 2022-06-14 2024-04-12 东北大学 Information encryption method and system based on key layering

Similar Documents

Publication Publication Date Title
Muhammad et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks
Ogiela et al. On using cognitive models in cryptography
Anand et al. SDH: Secure data hiding in fused medical image for smart healthcare
Anand et al. A hybrid optimization-based medical data hiding scheme for industrial internet of things security
US6742712B1 (en) Information card and information card system
CN103745479B (en) A kind of coloured image steganography and the method for analysis thereof
Anand et al. Health record security through multiple watermarking on fused medical images
CN105760722A (en) Watermark embedding electronic signature generation method and platform
CN114598529A (en) Image information hiding method fusing encryption
Singh et al. Digital image watermarking: concepts and applications
Zhao et al. Heterogeneous and customized cost-efficient reversible image degradation for green IoT
CN113382128B (en) Bit plane compressed encrypted image reversible information hiding method
Kiran et al. Secure ReversibleImage Data Hiding (SRIDH) Using LSB Prediction Method
Mandal Reversible steganography and authentication via transform encoding
CN101989324A (en) Information security system based on computer and mobile storage device
CN107169914A (en) A kind of cipher-text information generation method for image latent writing
CN102413148B (en) Biological characteristic remote authentication method based on visual codes
Madhavi et al. A secure and robust digital image watermarking techniques
CN107169913A (en) A kind of digital picture steganography method based on the optimal key of search
Singh et al. IEEE access special section editorial: Information security solutions for telemedicine applications
Khadam et al. Data aggregation and privacy preserving using computational intelligence
Narayana et al. Video Frame based Prompt Compression Model with Steganography for Secure Data Transmission
CN105046633A (en) Method for nondestructive image conformation
WO2000019365A1 (en) Information card and information card system
Chen et al. Privacy image protection using fine-grained mosaic technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220607

RJ01 Rejection of invention patent application after publication