CN114598529A - Image information hiding method fusing encryption - Google Patents
Image information hiding method fusing encryption Download PDFInfo
- Publication number
- CN114598529A CN114598529A CN202210231629.1A CN202210231629A CN114598529A CN 114598529 A CN114598529 A CN 114598529A CN 202210231629 A CN202210231629 A CN 202210231629A CN 114598529 A CN114598529 A CN 114598529A
- Authority
- CN
- China
- Prior art keywords
- information
- hidden
- image
- hiding
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000004927 fusion Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 5
- 241000282326 Felis catus Species 0.000 claims description 3
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000013527 convolutional neural network Methods 0.000 claims description 3
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 239000011159 matrix material Substances 0.000 claims description 3
- 238000011084 recovery Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 7
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000004891 communication Methods 0.000 abstract description 2
- 230000000694 effects Effects 0.000 abstract 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses an image information hiding method fusing encryption, relating to the technical field of (communication technology) image information encryption, comprising S1, preparing original information to be hidden; s2, encrypting the hidden information; s3, embedding the hidden file; s4, encrypting the original carrier image; s5, decoding hidden information; s6, extracting hidden information; s7, unlocking and recovering the hidden information: the invention has the beneficial effects that: firstly, through using multilayer encryption technology, place the higher information of secret level in the deep, and place the lower information of secret level on the top layer to make the authorized personnel of different grades see the encrypted information of corresponding grade, improved the security of information transmission, also increased the freedom and the suitability of watching the object when information encryption simultaneously, secondly, through adopting dynamic encryption's technique, can set up the time of taking effect and the dead time of information and key according to the operation requirement, in order to be applicable to some special scenes, promote the timeliness of information transmission.
Description
Technical Field
The invention relates to the technical field of image information encryption (communication technology), in particular to an image information hiding method fusing encryption.
Background
With the progress of the era and the development of science and technology, information becomes an important part in daily life, information is not generated in daily life at all times, the information is various and comprises character information, digital form information, picture information and the like, important information, unimportant information and the like can exist in information summary, and in order to ensure the confidentiality of some important information, certain information generally needs to be hidden and encrypted to ensure that the information is only watched by specific authorized people.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for hiding image information by fusing encryption, which solves the problems in the background technology.
In order to achieve the purpose, the invention is realized by the following technical scheme: a fusion encrypted image information hiding method comprises the following steps,
s1, preparing original information to be hidden: processing the information to be hidden, including deleting redundancy and layering the information to be hidden according to the importance degree;
s2, encrypting the hidden information: encrypting and hiding original information;
s3, processing the original carrier image: selecting a data block area insensitive to the image by human eyes by a matrix analysis method;
s4, embedding the processed information to be hidden into the carrier image: realizing the fusion of the image and the information to be hidden, encrypting and generating a secret key;
s5, decoding hidden information: a step of decoding the information hidden in the original carrier image;
s6, hidden information extraction: a step of extracting hidden information from the original carrier image;
s7, layered recovery of hidden information: a step of unlocking and recovering information in the original carrier image;
generating a key for unlocking the hidden information in the step S2;
extracting the hidden file by using the key generated in the step S4 in the step S6;
the key is set with an effective time and an invalid time when being generated.
Preferably, in the step S2, different security levels are set according to different importance levels when the file is encrypted.
Preferably, the keys generated in S4 are classified into a primary key, a middle key, and an advanced key according to their security levels.
Preferably, the S3 uses a zigzag algorithm to embed hidden information into the original carrier image.
Preferably, in S2, the hidden file is encrypted by using a convolutional neural network, an SVD decomposition method and a cat mapping method.
Preferably, an effective time and an ineffective time for hiding the information are set in S2.
The invention provides an image information hiding method fusing encryption, which has the following beneficial effects:
1. according to the image information hiding encryption method, the information with higher confidentiality grade is placed on the inner layer and the information with lower confidentiality grade is placed on the outer layer by using the multilayer encryption technology, so that authorized persons with different grades can see the encrypted files with corresponding grades, the security of information transmission is improved, and the viewing freedom and the applicability of the files during confidentiality are also improved.
2. According to the image information hiding encryption method, the dynamic encryption technology is adopted, the information and the effective time and the invalid time of the key can be set according to the use requirement, the method is suitable for most of special scenes and aiming at various special information, so that the timeliness and the confidentiality of information hiding are improved, meanwhile, expired information to be hidden can be automatically cleaned, the efficiency is improved, and the storage space occupied by the information can be reduced.
Drawings
FIG. 1 is a schematic flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1, the present invention provides a technical solution: a fusion encrypted image information hiding method comprises the following steps,
s1, preparing original information to be hidden: processing the information to be hidden, including deleting redundancy and layering the information to be hidden according to importance degree;
s2, encrypting the hidden information: encrypting and hiding original information;
s3, processing the original carrier image: selecting a data block area insensitive to the image by human eyes by a matrix analysis method;
s4, embedding the processed information to be hidden into the carrier image: realizing the fusion of the image and the information to be hidden, encrypting and generating a secret key;
s5, decoding hidden information: a step of decoding the information hidden in the original carrier image;
s6, hidden information extraction: a step of extracting hidden information from the original carrier image;
s7, layered recovery of hidden information: a step of unlocking and recovering information in the original carrier image;
generating a key for unlocking the hidden information in the step S2;
extracting the hidden file by using the key generated in the step S4 in the step S6;
the key is set with an effective time and an invalid time when being generated.
Preferably, different security levels are set according to different importance levels when the file is encrypted in S2, and multiple different permissions can be set during use, so that a user can open different levels of information and materials to different people or individuals according to the importance level of the information.
Preferably, the keys generated in S4 are classified into a primary key, a middle key and a high key according to their security levels, and different documents can be extracted according to their security classification conditions.
Preferably, the S3 uses a zigzag algorithm to embed hidden information into the original carrier image.
Preferably, in S2, the hidden file is encrypted by using a convolutional neural network, an SVD decomposition method and a cat mapping method, and different encryption methods may be freely selected or combined according to different usage situations.
Preferably, the S2 is provided with effective time and ineffective time for information hiding, and is applicable to most of special scenes and for a plurality of kinds of special information, so that timeliness and confidentiality of information hiding are improved, and meanwhile, expired information to be hidden can be automatically cleaned, and efficiency is improved.
In summary, when the image information hiding encryption method is used, firstly, information to be hidden is prepared, then, original information is encrypted and hidden, a plurality of keys with different levels are generated, the encrypted hidden information is embedded into image information, then, the original carrier image hidden with the encrypted information is encrypted, the information hidden in the original carrier image is decoded when unlocking is carried out, the hidden information is extracted from the original carrier image, when extraction is carried out, the information with different levels is displayed according to different keys used by the original carrier image, the information which does not reach the key level is not extracted, and the information in the original carrier image is unlocked and restored after extraction.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (6)
1. A fusion encrypted image information hiding method comprises the following steps:
s1, preparing original information to be hidden: processing the information to be hidden, including deleting redundancy and layering the information to be hidden according to the importance degree;
s2, encrypting the hidden information: encrypting and hiding original information;
s3, processing the original carrier image: selecting a data block area insensitive to the image by human eyes by a matrix analysis method;
s4, embedding the processed information to be hidden into the carrier image: realizing the fusion and encryption of the image and the information to be hidden and generating a secret key
S5, decoding hidden information: decoding the information hidden in the original carrier image;
s6, hidden information extraction: a step of extracting hidden information from the original carrier image;
s7, layered recovery of hidden information: a step of unlocking and recovering information in the original carrier image;
generating a key for unlocking the hidden information in the step S2;
extracting the hidden file by using the key generated in the step S4 in the step S6;
the key is set with an effective time and an invalid time when being generated.
2. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: in the S2, different security levels are set according to different importance levels when the file is encrypted.
3. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: the keys generated in S4 are classified into a primary key, a middle key, and an advanced key according to their security levels.
4. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: said S3 uses the zigzag algorithm to embed the hidden information into the original carrier image.
5. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: in S2, the hidden file is encrypted by using a convolutional neural network, an SVD decomposition method, and a cat mapping method.
6. The method for hiding the fused and encrypted image information as claimed in claim 1, wherein: the S2 is set with an effective time and an ineffective time for information hiding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210231629.1A CN114598529A (en) | 2022-03-09 | 2022-03-09 | Image information hiding method fusing encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210231629.1A CN114598529A (en) | 2022-03-09 | 2022-03-09 | Image information hiding method fusing encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114598529A true CN114598529A (en) | 2022-06-07 |
Family
ID=81816639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210231629.1A Pending CN114598529A (en) | 2022-03-09 | 2022-03-09 | Image information hiding method fusing encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114598529A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115065533A (en) * | 2022-06-14 | 2022-09-16 | 东北大学 | Information encryption method and system based on key layering |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426709A (en) * | 2015-11-12 | 2016-03-23 | 福建北卡科技有限公司 | JPEG image information hiding based private information communication method and system |
CN105825257A (en) * | 2016-03-09 | 2016-08-03 | 东北大学 | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof |
CN105847629A (en) * | 2016-03-18 | 2016-08-10 | 大连大学 | Reversible information hiding method for encrypted image |
CN106101715A (en) * | 2016-07-28 | 2016-11-09 | 西安空间无线电技术研究所 | A kind of image based on Information hiding processes by demand method |
CN107103631A (en) * | 2017-04-17 | 2017-08-29 | 西南交通大学 | Encrypted domain reversible information hidden method based on classification scramble and hiding information classification |
CN108270544A (en) * | 2016-12-30 | 2018-07-10 | 广东精点数据科技股份有限公司 | A kind of ciphertext image reversible information hidden method and device based on urDEED algorithms |
CN108566500A (en) * | 2018-03-02 | 2018-09-21 | 西南交通大学 | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism |
CN109936552A (en) * | 2017-12-19 | 2019-06-25 | 方正国际软件(北京)有限公司 | A kind of cipher key authentication method, server and system |
-
2022
- 2022-03-09 CN CN202210231629.1A patent/CN114598529A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426709A (en) * | 2015-11-12 | 2016-03-23 | 福建北卡科技有限公司 | JPEG image information hiding based private information communication method and system |
CN105825257A (en) * | 2016-03-09 | 2016-08-03 | 东北大学 | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof |
CN105847629A (en) * | 2016-03-18 | 2016-08-10 | 大连大学 | Reversible information hiding method for encrypted image |
CN106101715A (en) * | 2016-07-28 | 2016-11-09 | 西安空间无线电技术研究所 | A kind of image based on Information hiding processes by demand method |
CN108270544A (en) * | 2016-12-30 | 2018-07-10 | 广东精点数据科技股份有限公司 | A kind of ciphertext image reversible information hidden method and device based on urDEED algorithms |
CN107103631A (en) * | 2017-04-17 | 2017-08-29 | 西南交通大学 | Encrypted domain reversible information hidden method based on classification scramble and hiding information classification |
CN109936552A (en) * | 2017-12-19 | 2019-06-25 | 方正国际软件(北京)有限公司 | A kind of cipher key authentication method, server and system |
CN108566500A (en) * | 2018-03-02 | 2018-09-21 | 西南交通大学 | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115065533A (en) * | 2022-06-14 | 2022-09-16 | 东北大学 | Information encryption method and system based on key layering |
CN115065533B (en) * | 2022-06-14 | 2024-04-12 | 东北大学 | Information encryption method and system based on key layering |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Muhammad et al. | Image steganography using uncorrelated color space and its application for security of visual contents in online social networks | |
Ogiela et al. | On using cognitive models in cryptography | |
Anand et al. | SDH: Secure data hiding in fused medical image for smart healthcare | |
Anand et al. | A hybrid optimization-based medical data hiding scheme for industrial internet of things security | |
US6742712B1 (en) | Information card and information card system | |
CN103745479B (en) | A kind of coloured image steganography and the method for analysis thereof | |
Anand et al. | Health record security through multiple watermarking on fused medical images | |
CN105760722A (en) | Watermark embedding electronic signature generation method and platform | |
CN114598529A (en) | Image information hiding method fusing encryption | |
Singh et al. | Digital image watermarking: concepts and applications | |
Zhao et al. | Heterogeneous and customized cost-efficient reversible image degradation for green IoT | |
CN113382128B (en) | Bit plane compressed encrypted image reversible information hiding method | |
Kiran et al. | Secure ReversibleImage Data Hiding (SRIDH) Using LSB Prediction Method | |
Mandal | Reversible steganography and authentication via transform encoding | |
CN101989324A (en) | Information security system based on computer and mobile storage device | |
CN107169914A (en) | A kind of cipher-text information generation method for image latent writing | |
CN102413148B (en) | Biological characteristic remote authentication method based on visual codes | |
Madhavi et al. | A secure and robust digital image watermarking techniques | |
CN107169913A (en) | A kind of digital picture steganography method based on the optimal key of search | |
Singh et al. | IEEE access special section editorial: Information security solutions for telemedicine applications | |
Khadam et al. | Data aggregation and privacy preserving using computational intelligence | |
Narayana et al. | Video Frame based Prompt Compression Model with Steganography for Secure Data Transmission | |
CN105046633A (en) | Method for nondestructive image conformation | |
WO2000019365A1 (en) | Information card and information card system | |
Chen et al. | Privacy image protection using fine-grained mosaic technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220607 |
|
RJ01 | Rejection of invention patent application after publication |