CN115278266B - Method for embedding, transmitting and extracting secret information in digital image - Google Patents

Method for embedding, transmitting and extracting secret information in digital image Download PDF

Info

Publication number
CN115278266B
CN115278266B CN202210952114.0A CN202210952114A CN115278266B CN 115278266 B CN115278266 B CN 115278266B CN 202210952114 A CN202210952114 A CN 202210952114A CN 115278266 B CN115278266 B CN 115278266B
Authority
CN
China
Prior art keywords
image
information
secret information
evaluation function
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210952114.0A
Other languages
Chinese (zh)
Other versions
CN115278266A (en
Inventor
孙文卿
许星楠
鲍海宇
郭振翔
陈宝华
王军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou University of Science and Technology
Original Assignee
Suzhou University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou University of Science and Technology filed Critical Suzhou University of Science and Technology
Priority to CN202210952114.0A priority Critical patent/CN115278266B/en
Publication of CN115278266A publication Critical patent/CN115278266A/en
Application granted granted Critical
Publication of CN115278266B publication Critical patent/CN115278266B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Abstract

The present invention relates to a method of embedding, transmitting and extracting secret information in a digital image. At the sender, the digital image is decomposed into a single bit matrix, then whether the lowest bit information of the corresponding position in the original image is replaced by the data information to be embedded is judged according to the value of the evaluation function, after all the data information to be embedded is embedded into the lowest bit matrix, the data information to be embedded is synthesized with the high bit matrix and is transmitted to the receiver through a public channel, and meanwhile, the content of the evaluation function is transmitted to the receiver through a secret channel. At the receiving side, the receiving side extracts secret information from the received image by the evaluation function. The technology is simple in implementation mode, can realize that the image embedded with secret information is mixed with common image transmission, and has good application potential.

Description

Method for embedding, transmitting and extracting secret information in digital image
Technical Field
The invention relates to the field of information security, in particular to a method for embedding, transmitting and extracting secret information in a digital image.
Background
In the present internet age, digital images are an important carrier for transmitting information, and an unlimited number of information can be transmitted through the image content. Meanwhile, in many application scenarios, there is a large amount of secret information that needs to be transmitted. One straightforward way of transmission is to encrypt secret information in some form directly and then transmit it through public channels, but the disadvantage of encrypted transmission is that often the encrypted data file has obvious statistical features, for example, the gray histograms of the encrypted images are often uniformly distributed, so that the detection program can identify and intercept these ciphertext information through various statistical features and then crack it. Alternatively, the secret information is embedded in some form into another common and public data file for transmission, which has the advantage that the carrier file embedded with the secret information is similar to the common file in statistics, is difficult to identify in a large number of files, and avoids the risk of being cracked. The two methods play respective advantages in different application scenes.
The common information recording and transmission can be regarded as "white paper communication", i.e. the information to be transmitted is written into a blank file and then transmitted. Secret information embedding technology can be regarded as "dirty paper communication", i.e., writing information to be transmitted into a file in which the information has been recorded, and thus the written paper can be regarded as "dirty".
Dirty paper communication technology is one of important issues in the field of digital information security, and how to improve the concealment of information embedding, improve the calculation speed and the information extraction method is the key point of related research.
Disclosure of Invention
The invention aims to solve the problem of providing a method for embedding, transmitting and extracting secret information in a digital image, which has the advantages of high processing speed, high concealment of embedded information, larger embedded information load and smaller image distortion degree.
The technical scheme adopted for solving the technical problems is as follows: a method of embedding, transmitting and extracting secret information in a digital image, comprising the steps of:
(1) The sender converts the secret information into a binary bit stream S, the information length of which is T.
(2) The sender selects a gray image I (x, y) as the embedding carrier, x and y being pixel coordinates, the pixel size being M x N, the gray value bit depth being B.
(3) Taking the lowest bit matrix H1 (x, y) of the image I (x, y), taking the high bit matrix Hr (x, y) of the image I (x, y) except the lowest bit matrix.
(4) Defining a local evaluation function F (p, q),
,(1)
wherein E represents the pixel mean of the image part, defining x0= [2, (M-1) ], y0= [2, (N-1) ], defining p0= [ (X-1), (x+1) ], q0= [ (Y-1), (y+1) ].
(5) Traversing all pixel coordinates in < X, Y > ∈x0×y0, calculating the value of the local evaluation function F (P, Q), where < P, Q > ∈p0×q0; if F (p, q) > = 0, the value of S (t) is used to replace the value of H1 (x, y), and t+1; if F (p, q) <0, the value of H1 (x, y) is retained.
(6) Until all values in S are replaced with H1 (x, y).
(7) The Hr (x, y) matrix and the H1 (x, y) matrix are recombined into the gray image Ir (x, y).
(8) The sender transmits the content of the evaluation function F (p, q) to the receiver through the secret channel; and Ir (x, y) is transmitted to the receiver through the common channel.
(9) The receiver decomposes Ir (x, y) into a lowest bit matrix HH1 (x, y) and a high bit matrix HHr (x, y).
(10) The secret information bit stream Sr is fetched from HH1 (x, y) according to the local evaluation function F (p, q).
The invention has the technical advantages that the secret information to be transmitted can be embedded into the common digital image, thereby realizing the function of secret transmission or digital watermarking, the secret image is very close to the common non-secret image, so that the secret image is not easy to be recognized by human sense organs, other non-secret images can be mixed through a public channel for transmission, and meanwhile, an unauthorized third party can not correctly acquire the secret information even if the image is suspected to contain the secret information due to the fact that the evaluation function is transmitted through the secret channel, and the secret information can not be acquired under the condition that the evaluation function is not acquired.
Drawings
The invention will be further described with reference to the drawings and examples.
Fig. 1 is a flowchart of secret information embedding, transmission and extraction according to the method of the present invention.
Fig. 2 shows a gray-scale image I of a carrier selected by a sender according to the invention.
Fig. 3 shows a least significant bit image H1 extracted from image I according to the present invention.
Fig. 4 is a lowest bit image H1 after embedding secret information according to the present invention.
Fig. 5 shows a gray scale image Ir recombined after embedding secret information according to the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized below, may be had by reference to the appended drawings.
Examples:
(1) The sender secret information binary bit stream is S, and the information length T is 90000 bits.
(2) The carrier gray image I (x, y) selected by the sender, as shown in fig. 1, x and y are pixel coordinates, the pixel size is 500×480, and the gray value bit depth b=8.
(3) The lowest bit matrix H1 (x, y) of the image I (x, y) is taken, and as shown in fig. 3, the high bit matrix Hr (x, y) of the image I (x, y) other than the lowest bit matrix is taken.
(4) The local evaluation function isWhere E represents the image pixel mean, defining x0= [2,499 ]],Y0=[2,479]Definition p0= [ (x-1), (x+1)],Q0=[(y-1),(y+1)]。
(5) Traversing all pixel coordinates in < X, Y > ∈x0×y0, calculating the value of the local evaluation function F (P, Q), where < P, Q > ∈p0×q0; if F (p, q) > = 0, the value of S (t) is used to replace the value of H1 (x, y), and t+1; if F (p, q) <0, the value of H1 (x, y) is retained.
(6) Until all values in S are replaced with H1 (x, y).
(7) The Hr (x, y) matrix and the H1 (x, y) matrix are recombined into a gray image Ir (x, y), as shown in fig. 5.
(8) The sender transmits the content of the evaluation function F (p, q) to the receiver through the secret channel; and Ir (x, y) is transmitted to the receiver through the common channel.
(9) The receiver decomposes Ir (x, y) into a lowest bit matrix HH1 (x, y) and a high bit matrix HHr (x, y).
(10) The secret information bit stream Sr is fetched from HH1 (x, y) according to the local evaluation function F (p, q).

Claims (1)

1. A method of embedding, transmitting and extracting secret information in a digital image, characterized by: the method comprises the following steps:
(1) The sender converts the secret information into a binary bit stream S (T), the information length of which is T,
t=1,2,…,T;
(2) The sender selects a gray image I (x, y) as an embedding carrier, wherein x and y are pixel coordinates, the pixel size is M x N, and the gray value bit depth is B;
(3) Taking the lowest bit matrix H1 (x, y) of the image I (x, y), and taking the high bit matrix Hr (x, y) of the image I (x, y) except the lowest bit matrix;
(4) Defining a local evaluation function F (p, q),
wherein E represents the pixel mean of the image part, defining x0= [2, (M-1) ], y0= [2, (N-1) ], defining p0= [ (X-1), (x+1) ], q0= [ (Y-1), (y+1) ], < P, Q > ∈p0×q0;
(5) Traversing all pixel coordinates in < X, Y > -X0X Y0, calculating the value of the local evaluation function F (p, q); if F (p, q) > = 0, the value of S (t) is used to replace the value of H1 (x, y) and t is added to 1; if F (p, q) <0, the value of H1 (x, y) is retained;
(6) Until all values in S (t) are replaced with H1 (x, y);
(7) Recombining the Hr (x, y) matrix and the H1 (x, y) matrix into a gray image Ir (x, y);
(8) The sender transmits the content of the evaluation function F (p, q) to the receiver through the secret channel; and transmitting Ir (x, y) to the receiver through the common channel;
(9) The receiver decomposes Ir (x, y) into a lowest bit matrix HH1 (x, y) and a high bit matrix HHr (x, y);
(10) The secret information bit stream Sr is fetched from HH1 (x, y) according to the local evaluation function F (p, q).
CN202210952114.0A 2022-08-10 2022-08-10 Method for embedding, transmitting and extracting secret information in digital image Active CN115278266B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210952114.0A CN115278266B (en) 2022-08-10 2022-08-10 Method for embedding, transmitting and extracting secret information in digital image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210952114.0A CN115278266B (en) 2022-08-10 2022-08-10 Method for embedding, transmitting and extracting secret information in digital image

Publications (2)

Publication Number Publication Date
CN115278266A CN115278266A (en) 2022-11-01
CN115278266B true CN115278266B (en) 2023-08-01

Family

ID=83750736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210952114.0A Active CN115278266B (en) 2022-08-10 2022-08-10 Method for embedding, transmitting and extracting secret information in digital image

Country Status (1)

Country Link
CN (1) CN115278266B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778590B (en) * 2012-10-24 2017-03-29 航天信息股份有限公司 Using digital picture storage and the method and apparatus of transmission information
CN107862646B (en) * 2017-09-27 2021-04-13 宁波大学 High dynamic range image information hiding method
CN109360141B (en) * 2018-09-11 2022-10-11 河南大学 Image encryption method based on compressed sensing and three-dimensional cat mapping
CN113067696B (en) * 2021-03-30 2022-07-29 中国科学院大学 Multi-round symmetrical digital image encryption method and system based on bit grouping

Also Published As

Publication number Publication date
CN115278266A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
Surekha et al. Sensitive digital image watermarking for copyright protection
Moon et al. Data security using data hiding
Hanafy et al. A secure covert communication model based on video steganography
KR101962275B1 (en) Encryption and decryption method for steganography data based on moving picture
Singh et al. Use of image to secure text message with the help of LSB replacement
Ahmed et al. A secure image steganography using LSB and double XOR operations
Swetha et al. Data hiding using video steganography-a survey
Bhautmage et al. Advanced video steganography algorithm
CN115278266B (en) Method for embedding, transmitting and extracting secret information in digital image
Krishna et al. Lossless embedding using pixel differences and histogram shifting technique
Sravani et al. Image steganography for confidential data communication
Almola et al. Robust method for embedding an image inside cover image based on least significant bit steganography
Ramalingam et al. A steganography approach for sequential data encoding and decoding in video images
Manoharan et al. Pixel value differencing method based on CMYK colour model
Sethy et al. A security enhanced approach for video Steganography using K-Means clustering and direct mapping
Lysenko et al. Applying of Kutter-Jordan-Bossen steganographic algorithm in video sequences
Thepade et al. Appraise of multifarious image steganography techniques
Paraskevov et al. Implementation of hidden communication channel in osn with histogram analysis
Ibrahim et al. Algorithm for Text Hiding in Digital Image for Information Security
Mazumder et al. Review of different techniques used in recent steganography researches
Maya et al. Robust steganography using bit plane complexity segmentation
Gangarde et al. Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness
Yakut Steganography Approach Based on the Least Significant Bit Technique
Shvetha et al. Visual Secret Sharing Scheme Using Encrypting Multiple Images
Bilan et al. Research of Methods of Steganographic Protection of Audio Information Based on Video Containers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant