CN115623140A - Information processing method - Google Patents

Information processing method Download PDF

Info

Publication number
CN115623140A
CN115623140A CN202211598511.9A CN202211598511A CN115623140A CN 115623140 A CN115623140 A CN 115623140A CN 202211598511 A CN202211598511 A CN 202211598511A CN 115623140 A CN115623140 A CN 115623140A
Authority
CN
China
Prior art keywords
redundant
information
encrypted
bit
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211598511.9A
Other languages
Chinese (zh)
Other versions
CN115623140B (en
Inventor
封世刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guodian Gaoke Technology Co ltd
Original Assignee
Beijing Guodian Gaoke Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guodian Gaoke Technology Co ltd filed Critical Beijing Guodian Gaoke Technology Co ltd
Priority to CN202211598511.9A priority Critical patent/CN115623140B/en
Publication of CN115623140A publication Critical patent/CN115623140A/en
Application granted granted Critical
Publication of CN115623140B publication Critical patent/CN115623140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention provides an information processing method, which relates to the technical field of information hiding and comprises the following steps: acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information; sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data; generating an image to be transmitted according to the encrypted carrier data; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information. The invention can improve the safety of information hiding and reduce the risk of information secret cracking after the target image is intercepted.

Description

Information processing method
Technical Field
The invention relates to the technical field of information hiding, in particular to an information processing method.
Background
At present, in an information hiding technology, information is usually directly hidden on a redundant bit corresponding to a redundant dimension of image data, and no processing is carried out on the information hiding process, so that the hidden information is easy to find, and a large potential safety hazard exists.
Disclosure of Invention
The invention provides an information processing method, which is used for solving the technical problem that hidden information is easy to identify and acquire.
In a first aspect, the present invention provides an information processing method, including:
acquiring information to be encrypted according to the redundant feature information of the target image and the original encryption information;
sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data;
generating an image to be transmitted according to the encrypted carrier data;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
According to the information processing method provided by the invention, before acquiring the information to be encrypted according to the redundant feature information of the target image and the original encryption information, the method further comprises the following steps:
determining at least one redundant feature of each sample image, and acquiring the redundant total capacity of each sample image according to the sum of the redundant capacities corresponding to all the redundant features in each sample image;
determining the bearable capacity of each sample image according to the redundant total capacity of each sample image;
setting the redundant bit value of the sample redundant pixel point corresponding to each sample image to zero, and storing all the sample images after being set to zero into a carrier library;
the redundancy characteristics comprise at least one of spatial redundancy, temporal redundancy, visual redundancy, information entropy redundancy, structural redundancy and knowledge redundancy;
the redundant bit is determined according to the lowest bit of the byte corresponding to any redundant pixel point;
the bearable capacity is used for providing a bearing space for the information to be encrypted.
According to the information processing method provided by the invention, after storing all sample images after being zeroed to the carrier library and before acquiring information to be encrypted according to the redundant feature information of the target image and the original encryption information, the method further comprises the following steps:
determining the quantity of redundant features according to the encryption level of the original encryption information;
screening all images to be matched from the carrier library according to the redundant feature quantity;
screening out each image to be screened which can bear capacity larger than that of the original encryption information from all images to be matched;
determining a target image from all images to be screened;
and the quantity of the redundant features in the image to be matched corresponds to the quantity of the redundant features of the original encrypted information.
According to the information processing method provided by the invention, the step of determining the target image from all the images to be screened comprises the following steps:
determining the capacity difference value between the bearable capacity of each image to be screened and the capacity of the original encrypted information;
and determining the minimum difference value in all the capacity difference values, and determining the image to be screened corresponding to the minimum difference value as a target image.
According to the information processing method provided by the invention, the acquiring of the information to be encrypted according to the redundant feature information of the target image and the original encryption information comprises the following steps:
adding redundant characteristic information of a target image to the original encrypted information in a byte mode to obtain encrypted information containing the redundant characteristic information;
adding the length information of the original encryption information and the check information of the original encryption information into the encryption information containing the redundant characteristic information in a byte mode to obtain the information to be encrypted.
According to the information processing method provided by the invention, the generation of the image to be transmitted according to the encrypted carrier data comprises the following steps:
determining all compensating redundant bits of the un-replaced bit values from the encrypted carrier data;
and for each compensation redundant bit, adjusting the value of the compensation redundant bit according to the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point corresponding to the compensation redundant bit.
According to the information processing method provided by the present invention, the adjusting the value of the compensation redundant bit according to the value of the redundant bit of the front pixel point and the value of the redundant bit of the rear pixel point corresponding to the compensation redundant bit comprises:
under the condition that the redundant bit value of the front-bit pixel point and the redundant bit value of the rear-bit pixel point are both 1, determining the value of the compensation redundant bit to be 1;
under the condition that the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point are both 0, determining the value of the compensation redundant bit to be 0;
under the condition that the redundant bit value of the front pixel point is 0 and the redundant bit value of the rear pixel point is 1, determining the value of the compensation redundant bit to be 0;
and under the condition that the redundant bit value of the front pixel point is 1 and the redundant bit value of the rear pixel point is 0, determining that the value of the compensation redundant bit is 1.
In a second aspect, the present invention provides an information processing method, including:
analyzing an image to be transmitted, and acquiring redundant characteristic information of a target image and encrypted carrier data;
sequentially acquiring each bit value from the redundant bit of each interval redundant pixel point;
determining original encryption information according to all bit values;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting the carrier data of the target image according to the redundant features corresponding to the redundant feature information.
According to the information processing method provided by the invention, after the redundant characteristic information of the target image and the encrypted carrier data are obtained, the method comprises the following steps:
acquiring length information of original encrypted information;
and determining all redundant pixel points from the encrypted carrier data according to the length information.
According to the information processing method provided by the present invention, after determining the original encryption information from all the bit values, the method further comprises:
acquiring verification information of original encrypted information;
verifying the original encryption information according to the verification information to generate a verification result;
and the verification result is used for indicating the tampering condition of the original encryption information in the transmission process.
In a third aspect, there is provided an information processing apparatus comprising:
a first acquisition unit: the encryption device is used for acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information;
a filling unit: the redundant bits used for sequentially filling each bit value in the information to be encrypted to the redundant bits of each interval redundant pixel point to obtain encrypted carrier data;
a generation unit: the image transmission device is used for generating an image to be transmitted according to the encrypted carrier data;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In a fourth aspect, there is provided an information processing apparatus comprising:
an analysis unit: the image encryption device is used for analyzing an image to be transmitted and acquiring redundant characteristic information of a target image and encrypted carrier data;
a second acquisition unit: the redundancy pixel circuit is used for sequentially acquiring each bit value from the redundancy bit of each interval redundancy pixel point;
a determination unit: the encryption device is used for determining original encryption information according to all bit values;
the interval redundant pixel points are determined by selecting the interval preset number of pixel points from all the redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In a fifth aspect, there is provided an information processing system comprising: the information encryption terminal is in communication connection with the information decryption terminal;
the information encryption terminal comprises a first central processing unit, a first memory and a program or an instruction which is stored on the first memory and can run on the first central processing unit, and the program or the instruction is executed by the first central processing unit to execute the information processing method, and the method comprises the following steps: acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information; sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data; generating an image to be transmitted according to the encrypted carrier data; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; the redundant pixel point is determined by extracting carrier data of the target image according to the redundant feature corresponding to the redundant feature information;
the information decryption end comprises a second central processing unit, a second memory and a program or an instruction which is stored on the second memory and can be operated on the second central processing unit, and the program or the instruction is executed by the second central processing unit to execute the information processing method, and the method comprises the following steps: analyzing an image to be transmitted, and acquiring redundant characteristic information of a target image and encrypted carrier data; sequentially acquiring each bit value from the redundant bit of each interval redundant pixel point; determining original encryption information according to all bit values; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In a sixth aspect, an electronic device is further provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the information processing method when executing the program.
In a seventh aspect, there is also provided a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the information processing method.
The invention has the beneficial effects that: the invention provides an information processing method, which is characterized in that redundant characteristic information of a target image is added to original encrypted information in a byte mode, each bit value in the information to be encrypted is sequentially filled into a redundant bit of each interval redundant pixel point, encrypted carrier data is obtained, and the image to be transmitted corresponding to the encrypted carrier data is safely transmitted, so that the information hiding safety is improved in a mode of filling information through interval preset pixel points, and the risk of information secret cracking after the target image is intercepted is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flow chart of an information processing method provided by the present invention;
FIG. 2 is a second schematic flow chart of the information processing method provided by the present invention;
FIG. 3 is a third schematic flow chart of an information processing method provided by the present invention;
FIG. 4 is a schematic flow chart of determining a target image according to the present invention;
fig. 5 is a schematic flow chart of obtaining information to be encrypted according to the present invention;
FIG. 6 is a schematic flow chart of generating an image to be transmitted according to the present invention;
FIG. 7 is a fourth flowchart illustrating an information processing method according to the present invention;
FIG. 8 is a fifth flowchart illustrating an information processing method according to the present invention;
FIG. 9 is a sixth schematic flow chart of an information processing method provided by the present invention;
FIG. 10 is a schematic diagram of an information processing apparatus according to the present invention;
FIG. 11 is a second schematic view of an information processing apparatus according to the present invention;
FIG. 12 is a schematic diagram of an information handling system provided by the present invention;
fig. 13 is a schematic structural diagram of an electronic device provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow diagram of an information processing method provided by the present invention, and the present invention provides an information processing method applied to an information encryption terminal, including:
acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information;
sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data;
generating an image to be transmitted according to the encrypted carrier data;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In step 101, information to be encrypted is obtained according to redundant feature information of a target image and original encryption information, in an optional embodiment, the target image is an image carrier for information hiding, the redundant feature information is represented in a byte form and represents identification information of a specifically adopted redundant feature, the original encryption information is data information needing information hiding, and the redundant feature information of the target image and the original encryption information are combined to obtain the information to be encrypted.
In an optional embodiment, the redundant feature information of the target image is added to the information stream of the original encrypted information in a byte form, and optionally, is added in front of the information stream of the original encrypted information, so as to facilitate preferentially obtaining the redundant feature information of the target image during decryption, to extract the carrier data of the target image according to the redundant feature corresponding to the redundant feature information, and obtain the information to be encrypted after fusing the redundant feature information of the target image and the original encrypted information.
In step 102, sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data, in the invention, firstly, carrier data of the target image is extracted according to redundant features corresponding to the redundant feature information to determine all redundant pixel points, wherein the redundant features comprise at least one of space redundancy, time redundancy, visual redundancy, information entropy redundancy, structure redundancy and knowledge redundancy, and the acquisition of the corresponding redundant pixel points from the carrier data of the target image according to different redundant features is a conventional technical means at present for storing hidden information according to the redundant pixel points.
Optionally, the pixel points with the preset interval number may be 1 pixel point at an interval, or may be 2 pixel points at an interval, or may be more pixel points at an interval, taking one pixel point at an interval as an example, if there are pixel points of sequence number 1, sequence number 2, sequence number 3, sequence number 4, sequence number 5, sequence number 6, sequence number 7, sequence number 8, and sequence number 9 that are transversely arranged, the interval redundant pixel point may be a pixel point of sequence number 1, sequence number 3, sequence number 5, sequence number 7, and sequence number 9, or may be a pixel point of sequence number 2, sequence number 4, sequence number 6, and sequence number 8, that is, according to the pixel points with the preset interval number, selecting from all redundant pixel points, and determining the interval redundant pixel point.
Optionally, taking spatial redundancy in the redundancy features as an example, the spatial redundancy includes grayscale redundancy, luminance redundancy, and the like, in the grayscale redundancy, carrier data corresponding to grayscale data is determined according to a target image, each pixel identifies grayscale data of the redundancy feature when the grayscale is in gray through binary 8 bits, the grayscale redundancy is remained, one pixel is represented by one byte, and grayscale data of each pixel when the grayscale is in the redundancy is a redundant pixel.
The redundant bit is determined according to the lowest bit of the byte corresponding to any redundant pixel point, for example, if binary 8 bits are adopted to represent the byte corresponding to each redundant pixel point, the lowest bit in the binary 8 bits is the redundant bit, the redundant bit in each redundant pixel point can be used for bearing encryption information, and in the invention, the information to be encrypted is filled into the redundant bit of the interval redundant pixel points in a bit form.
In an optional embodiment, the interval redundant pixel points may be pixel points of serial number 1, serial number 3, serial number 5, serial number 7, and serial number 9, and assuming that the bitstream of the information to be encrypted is 100110110, the bitstream of the information to be encrypted is "10011 … …" is sequentially filled in the redundant bits of the pixel points of serial number 1, serial number 3, serial number 5, serial number 7, and serial number 9, specifically, a bit value "1" is filled in the redundant bit of the pixel point of serial number 1, a bit value "0" is filled in the redundant bit of the pixel point of serial number 3, a bit value "0" is filled in the redundant bit of the pixel point of serial number 5, a bit value "1" is filled in the redundant bit of the pixel point of serial number 7, and a bit value "1" is filled in the redundant bit of the pixel point of serial number 9.
In step 103, an image to be transmitted is generated according to the encrypted carrier data, in the present invention, a target image is first converted into redundant carrier data corresponding to redundant features to implement the filling of information to be encrypted, and then the encrypted carrier data is obtained, and then the target image filled with the encrypted information is restored to the target image filled with the encrypted information through the inverse processing of the above conversion operation, where the target image filled with the encrypted information is the image to be transmitted.
The invention provides an information processing method, an information processing device, an information processing system, electronic equipment and a medium, wherein redundant characteristic information of a target image is added to original encrypted information in a byte mode, each bit value in the information to be encrypted is sequentially filled into a redundant bit of each interval redundant pixel point to obtain encrypted carrier data, and an image to be transmitted corresponding to the encrypted carrier data is safely transmitted, so that the information hiding safety is improved in a mode of filling information through interval preset pixel points, and the risk of breaking the information secret after the target image is intercepted is reduced.
Fig. 2 is a second schematic flow chart of the information processing method provided by the present invention, before acquiring information to be encrypted according to the redundant feature information of the target image and the original encryption information, the method further includes:
determining at least one redundant feature of each sample image, and acquiring the redundant total capacity of each sample image according to the sum of the redundant capacities corresponding to all the redundant features in each sample image;
determining the bearable capacity of each sample image according to the redundant total capacity of each sample image;
setting the redundant bit value of the sample redundant pixel point corresponding to each sample image to zero, and storing all the sample images after being set to zero into a carrier library;
the redundancy characteristics comprise at least one of spatial redundancy, temporal redundancy, visual redundancy, information entropy redundancy, structural redundancy and knowledge redundancy;
the redundant bit is determined according to the lowest bit of the byte corresponding to any redundant pixel point;
the bearable capacity is used for providing a bearing space for the information to be encrypted.
As an optional embodiment of the present invention, before acquiring information to be encrypted according to redundant feature information of a target image and original encryption information, the present invention needs to construct a carrier library, where images in the carrier library are to be used for providing images with different redundant features and different bearable capacities, and are used for bearing encryption information.
In step 201, at least one redundant feature of each sample image is determined, the total redundant capacity of each sample image is obtained according to the sum of the redundant capacities corresponding to all the redundant features in each sample image, for example, an image a has spatial redundancy and visual redundancy, and the total redundant capacity is determined to be 220Byte according to the extraction of the redundant features; the B image has time redundancy, space redundancy and visual redundancy, the total redundancy capacity is determined to be 300byte according to the extraction of the redundancy characteristics, the C image only has visual redundancy, and the total redundancy capacity is determined to be 100Byte according to the extraction of the redundancy characteristics.
In step 202, determining the bearable capacity of each sample image according to the total redundancy capacity of each sample image, where the bearable capacity is used to provide a bearing space for the information to be encrypted, and considering that in the present invention, information hiding is implemented in a form of inserting hidden information into an interval pixel, in an actual application process, in combination with the embodiment in step 201, the bearable capacity of the image a when used in an interval is 110Byte; the bearable capacity of the B image is 150byte when the B image is used in the alternate bit, and the bearable capacity of the C image is 50Byte when the C image is used in the alternate bit.
More specifically, considering that the redundant feature information of the target image needs to be stored as one Byte, the bearable capacity of the a image actually available for the original encryption information is 109byte, the bearable capacity of the b image actually available for the original encryption information is 149byte, and the bearable capacity of the a image actually available for the original encryption information is 49Byte.
In another alternative embodiment, the length information of the original encryption information and the check information of the original encryption information may be added in front of the original encryption information, and these all occupy a certain number of bytes, and the bearer capacity of each image in the bearer library, which is available for the original encryption information, needs to take these additional factors into account, and when calculating its bearer capacity, the bearer capacity of the image in the use of the next-bit is subtracted by the number of bytes corresponding to these factors to obtain the final bearer capacity.
In step 203, the value of the redundant bit of the sample redundant pixel point corresponding to each sample image is set to zero, and all sample images after being set to zero are stored in the carrier library, wherein the redundant bit is determined according to the lowest bit of the byte corresponding to any redundant pixel point and is used for representing the redundant features in the sample images, however, the lowest bit of the byte corresponding to the redundant pixel point has the smallest influence on the sample images in each redundant feature, so that the redundant bit is used as a loading bit for bearing encrypted information, so that great change on each redundant feature is not generated on subsequent images to be transmitted, and the safety of information hiding is improved, and because the lowest bit of the byte corresponding to the redundant pixel point in the sample images originally has the value of '0' or '1', the zero setting operation needs to be performed on each redundant bit, namely the original redundant bit is kept to be '0', the value of the original redundant bit is set to zero, and all sample images after being set to zero are stored in the carrier library, so that the time for bearing the redundant features in the sample images can be selected, and the time for bearing the hidden image can be saved.
Fig. 3 is a third schematic flow chart of the information processing method provided by the present invention, after storing all sample images after zeroing in the carrier library, and before obtaining information to be encrypted according to the redundant feature information of the target image and the original encryption information, the method further includes:
determining the quantity of redundant features according to the encryption level of the original encryption information;
screening all images to be matched from the carrier library according to the redundant feature quantity;
screening out each image to be screened which can bear capacity larger than the capacity of the original encrypted information from all the images to be matched;
determining a target image from all images to be screened;
and the quantity of the redundant features in the image to be matched corresponds to the quantity of the redundant features of the original encrypted information.
In step 301, the number of redundant features is determined according to the encryption level of the original encrypted information, where the encryption level of the original encrypted information may be determined according to the complexity of the encryption required by the user, may also be determined according to the credit level of the user in the related field, and may also be determined according to the member level of the user, for example, if the encryption level of the original encrypted information is 1, the number of redundant features of the target image for hiding information is determined to be 1, and of course, the corresponding relationship may also be changed according to actual requirements, and for example, if the encryption level of the original encrypted information is 1, the number of redundant features of the target image for hiding information is determined to be 2.
In step 302, all the images to be matched are screened out from the carrier library according to the number of the redundant features, and since one or more redundant features corresponding to each sample image are already stored in the carrier library, the number of matched images to be matched can be selected according to the actual requirement in step 301, and the number of the images to be matched can be 1 or more.
In step 303, each image to be screened whose bearable capacity is greater than that of the original encrypted information is screened out from all the images to be matched, and in order to enable the original encrypted information to be completely carried in the image to be matched, it is necessary to ensure that the bearable capacity of the image to be matched is greater than that of the original encrypted information, and thus each image to be screened whose bearable capacity is greater than that of the original encrypted information in all the images to be matched is determined.
In step 304, if a plurality of images to be screened are determined, any one of the images to be screened is randomly selected as a target image, or an optimum image to be screened is selected as the target image according to the size relationship between the bearable capacity and the actual required capacity of all the images to be screened.
Fig. 4 is a schematic flow chart of determining a target image according to the present invention, where the determining of the target image from all images to be screened includes:
determining the capacity difference value between the bearable capacity of each image to be screened and the capacity of the original encrypted information;
and determining the minimum difference value in all the capacity difference values, and determining the image to be screened corresponding to the minimum difference value as a target image.
In step 3041, if there are three images to be screened, the bearable capacity of the image D to be screened is 55Byte, the bearable capacity of the image E to be screened is 110Byte, the bearable capacity of the image F to be screened is 88Byte, and the capacity of the original encrypted information is 54Byte, the corresponding capacity difference value for the image D to be screened is 1Byte, the corresponding capacity difference value for the image E to be screened is 56Byte, and the corresponding capacity difference value for the image D to be screened is 34Byte.
In step 3042, a minimum difference value among all the capacity difference values is determined, and the image to be screened corresponding to the minimum difference value is determined to be the target image, for the embodiment in step 3041, the capacity difference value corresponding to the image D to be screened is 1Byte, for the image E to be screened, the capacity difference value corresponding to the image D to be screened is 56Byte, for the image D to be screened, the capacity difference value corresponding to the image D to be screened is 34Byte, among the three capacity difference values, the minimum difference value is 1Byte, and the image D to be screened corresponding to the minimum difference value is the image D to be screened, and then the image D to be screened is determined to be the target image.
Fig. 5 is a schematic flow chart of obtaining information to be encrypted according to the present invention, where obtaining information to be encrypted according to redundant feature information of a target image and original encryption information includes:
adding redundant characteristic information of a target image to the original encrypted information in a byte mode to obtain encrypted information containing the redundant characteristic information;
adding the length information of the original encryption information and the check information of the original encryption information into the encryption information containing the redundant characteristic information in a byte mode to obtain the information to be encrypted.
In step 1011, the redundant characteristic information of the target image is added to the original encrypted information in a byte form to obtain the encrypted information containing the redundant characteristic information, the information stream of the redundant characteristic information and the information stream of the original encrypted information are formed in a form that binary 8 bits are one byte, the information stream of the redundant characteristic information is added in front of the information stream of the original encrypted information to form a new binary information stream, and the new binary information stream is the encrypted information containing the redundant characteristic information.
Alternatively, taking gray redundancy and luminance redundancy in visual redundancy as an example, the present invention can use binary 8 bits of gray scale data of a carrier image to identify the hidden type, for example: 00000001 identify grayscale redundancy hiding; 00000010 identifying redundant hiding of luminance information; 00001000 mark gray scale and brightness cross hiding, and gray scale is in front; 00001100 the gray scale and brightness are hidden alternately, and the brightness is in the front, which greatly improves the information hiding safety.
Optionally, taking temporal redundancy, spatial redundancy and entropy redundancy in redundant features as examples, the present invention can also use binary 8 bits of the carrier image to identify the hidden type, for example: 10000000 identifies temporal redundancy hiding; 01000000 mark spatial redundancy hiding; 00100000 identifies entropy redundancy of information; 11100000 marks temporal redundancy, spatial redundancy and information entropy redundancy cross concealment, and greatly improves the information concealment safety, that is, in the 8 bits, each bit represents a redundancy feature, that is, the present invention is suitable for realizing the mixed encryption of at least 8 redundancy features, and those skilled in the art understand that the present invention further adopts the redundancy feature through the "1" mark in the binary system, and the "0" mark does not adopt the redundancy feature, so that the present invention can actually realize 256 kinds by using 1byte, and can relate to concealment modes of different redundancy feature types, and greatly improve the information concealment safety.
In step 1012, adding the length information of the original encrypted information and the check information of the original encrypted information in the form of bytes to the encrypted information containing the redundant feature information to obtain the information to be encrypted, wherein the length information of the original encrypted information is used for representing the length of the original encrypted information.
The check information of the original encryption information is CRC16 check bits which are made aiming at the content of the original encryption information, and the check information of the original encryption information is added to the encryption information containing the redundant characteristic information in a byte mode, so that the original encryption information can be prevented from being tampered or damaged.
Fig. 6 is a schematic flow chart of generating an image to be transmitted according to the present invention, where the generating an image to be transmitted according to the encrypted carrier data includes:
determining all compensating redundant bits of the un-replaced bit values from the encrypted carrier data;
and for each compensation redundant bit, adjusting the value of the compensation redundant bit according to the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point corresponding to the compensation redundant bit.
In step 1041, determining all the compensation redundant bits of the bit value that is not replaced from the encrypted carrier data, in an optional embodiment, if there are pixels of sequence number 1, sequence number 2, sequence number 3, sequence number 4, sequence number 5, sequence number 6, sequence number 7, sequence number 8, and sequence number 9 that are arranged in sequence, the interval redundant pixel may be a pixel of sequence number 1, sequence number 3, sequence number 5, sequence number 7, and sequence number 9, all the compensation redundant bits of the bit value that is not replaced are the redundant bits where the pixels of sequence number 2, sequence number 4, sequence number 6, and sequence number 8 are located, and the compensation redundant bits are subjected to zeroing in the carrier library and are not filled with information to be encrypted.
In step 1042, for each compensation redundant bit, adjusting the value of the compensation redundant bit according to the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point corresponding to the compensation redundant bit, and if the compensation redundant bit is not compensated, the image of the image to be transmitted is not smooth enough relative to the original image.
Optionally, the adjusting the value of the compensation redundant bit according to the value of the redundant bit of the front-bit pixel point and the value of the redundant bit of the rear-bit pixel point corresponding to the compensation redundant bit includes:
under the condition that the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point are both 1, the value of the compensation redundant bit is determined to be 1, and if the pixel point redundant bit values of the serial number 1 and the serial number 3 are 1, the pixel point redundant bit value of the serial number 2 is 1.
Optionally, under the condition that the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point are both 0, it is determined that the value of the compensation redundant bit is 0, and if the redundant bit values of the pixel points of the serial number 1 and the serial number 3 are 0, the redundant bit value of the pixel point of the serial number 2 is 0.
Optionally, under the condition that the redundant bit value of the front-bit pixel point is 0 and the redundant bit value of the rear-bit pixel point is 1, determining that the value of the compensation redundant bit is 0, and if the redundant bit value of the pixel point with the sequence number 1 is 0 and the redundant bit value of the pixel point with the sequence number 3 is 1, determining that the redundant bit value of the pixel point with the sequence number 2 is 0.
Optionally, under the condition that the redundant bit value of the front pixel point is 1 and the redundant bit value of the rear pixel point is 0, determining that the value of the compensation redundant bit is 1, and if the redundant bit value of the pixel point of the serial number 1 is 1 and the redundant bit value of the pixel point of the serial number 3 is 0, determining that the redundant bit value of the pixel point of the serial number 2 is 1.
Fig. 7 is a fourth schematic flow chart of the information processing method provided by the present invention, and the present invention discloses an information processing method, which is applied to an information decryption side, and includes:
analyzing an image to be transmitted, and acquiring redundant characteristic information of a target image and encrypted carrier data;
sequentially acquiring each bit value from the redundant bit of each interval redundant pixel point;
determining original encryption information according to all bit values;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In step 401, an image to be transmitted is analyzed, redundant feature information of a target image and encrypted carrier data are obtained, the image to be transmitted is converted into a binary data stream after being obtained, then, according to an adding mode during encryption, an inverse operation of an encryption mode is performed during decryption, and redundant feature information of the target image and the encrypted carrier data are determined, for example, a first byte corresponds to the redundant feature information of the target image, subsequent bytes correspond to the encrypted carrier data, for example, the first three bytes correspond to the redundant feature information and other information of the target image, and the subsequent bytes correspond to the encrypted carrier data.
In step 402, sequentially obtaining each bit value from the redundant bit of each interval redundant pixel point, extracting the carrier data of the target image according to the redundant features corresponding to the redundant feature information, determining the redundant pixel points, selecting the interval redundant pixel points according to the interval preset number of the pixel points in all the redundant pixel points, determining the interval redundant pixel points, and sequentially obtaining each bit value from the redundant bit of each interval redundant pixel point.
In step 403, the original encryption information is determined from all the bit values, for example, "1", "0", "1" and "1" are extracted from the redundant bits of the pixels of sequence number 1, sequence number 3, sequence number 5, sequence number 7 and sequence number 9 in sequence, and then the bit stream of the original encryption information is determined to be "10011 … …" from all the bit values.
Fig. 8 is a fifth schematic flowchart of the information processing method provided by the present invention, and after acquiring the redundant feature information of the target image and the encrypted carrier data, the method includes:
acquiring length information of original encrypted information;
and determining all redundant pixel points from the encrypted carrier data according to the length information.
In step 501, after obtaining the redundant feature information of the target image and the encrypted carrier data, the first three bytes correspond to the redundant feature information of the target image, the length information of the original encrypted information, and other information, and the subsequent bytes correspond to the encrypted carrier data, so that the length of the original encrypted information can be determined according to the length information of the original encrypted information.
In step 502, according to the length information, all redundant pixel points are determined from the encrypted carrier data, the length information of the original encrypted information is added to the encrypted information containing the redundant characteristic information in a byte form, so that an information receiver can directly read the length of the secret information from the carrier image after the information is hidden, the possibility of information leakage and error occurrence is reduced, and even if an attacker intercepts the carrier image after the information is hidden, the attacker cannot easily acquire correct secret information.
Fig. 9 is a sixth schematic flowchart of the information processing method provided by the present invention, and after determining the original encryption information according to all bit values, the method further includes:
acquiring verification information of original encrypted information;
verifying the original encryption information according to the verification information to generate a verification result;
and the verification result is used for indicating the tampering condition of the original encryption information in the transmission process.
In step 601, after the original encryption information is determined according to all bit values, the first three bytes correspond to the redundancy feature information of the target image, the length information of the original encryption information, and the check information of the original encryption information, and the subsequent bytes correspond to the encrypted carrier data, a check bit can be determined according to the check information of the original encryption information, and the check bit is used for ensuring the integrity of the original encryption information.
In step 602, the original encrypted information is verified according to the verification information, and a verification result is generated, where the verification result is used to indicate a tampering condition of the original encrypted information in a transmission process.
Fig. 10 is a schematic structural diagram of an information processing apparatus provided by the present invention, which is applied to an information encryption side, and includes a first obtaining unit 11: for obtaining the information to be encrypted according to the redundant feature information of the target image and the original encryption information, the operation principle of the first obtaining unit 11 may refer to the foregoing step 101, which is not described herein again.
The information processing apparatus further includes a filling unit 12: for sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain the encrypted carrier data, the working principle of the filling unit 12 may refer to the foregoing step 102, which is not described herein again.
The information processing apparatus further includes a generation unit 13: for generating an image to be transmitted according to the encrypted carrier data, the operation principle of the generating unit 13 may refer to the foregoing step 103, which is not described herein again.
The interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
The invention provides an information processing method, an information processing device, an information processing system, electronic equipment and a medium, wherein redundant characteristic information of a target image is added to original encrypted information in a byte mode, each bit value in the information to be encrypted is sequentially filled into a redundant bit of each interval redundant pixel point to obtain encrypted carrier data, and an image to be transmitted corresponding to the encrypted carrier data is safely transmitted, so that the information hiding safety is improved in a mode of filling information through interval preset pixel points, and the risk of breaking the information secret after the target image is intercepted is reduced.
Fig. 11 is a second schematic structural diagram of an information processing apparatus according to the present invention, and the present invention further provides an information processing apparatus, which is applied to an information decryption side, and includes an analysis unit 21: for analyzing the image to be transmitted, and obtaining the redundant feature information of the target image and the encrypted carrier data, the operation principle of the analyzing unit 21 may refer to the foregoing step 401, which is not described herein again.
The information processing apparatus further includes a second acquisition unit 22: for sequentially obtaining each bit value from the redundant bits of each interval redundant pixel, the working principle of the second obtaining unit 22 may refer to the foregoing step 402, which is not described herein again.
The information processing apparatus further includes a determination unit 23: for determining the original encryption information according to all bit values, the operation principle of the determining unit 23 may refer to the foregoing step 403, which is not described herein again.
The interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
The invention provides an information processing method, an information processing device, an information processing system, electronic equipment and a medium, wherein redundant characteristic information of a target image is added to original encrypted information in a byte mode, each bit value in the information to be encrypted is sequentially filled into a redundant bit of each interval redundant pixel point to obtain encrypted carrier data, and an image to be transmitted corresponding to the encrypted carrier data is safely transmitted, so that the information hiding safety is improved in a mode of filling information through interval preset pixel points, and the risk of breaking the information secret after the target image is intercepted is reduced.
Fig. 12 is a schematic structural diagram of an information processing system provided by the present invention, and the present invention further provides an information processing system including: the image transmission device comprises an information encryption end 3 and an information decryption end 4, wherein the information encryption end 3 is in communication connection with the information decryption end 4, and transmission of an image to be transmitted from the information encryption end 3 to the information decryption end 4 is achieved.
Optionally, the information encryption terminal 3 includes a first central processing unit 31, and further includes a first memory 32 and a program or an instruction stored on the first memory 32 and executable on the first central processing unit 31, and the program or the instruction, when executed by the first central processing unit 31, performs the information processing method, and the method includes: acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information; sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data; generating an image to be transmitted according to the encrypted carrier data; the interval redundant pixel points are determined by selecting the interval preset number of pixel points from all the redundant pixel points; and the redundant pixel points are determined by extracting the carrier data of the target image according to the redundant features corresponding to the redundant feature information.
Optionally, the information decryption end 4 includes a second central processing unit 41, and further includes a second memory 42 and a program or an instruction stored on the second memory 42 and executable on the second central processing unit 41, and when the program or the instruction is executed by the second central processing unit 41, the method performs the information processing method, and the method includes: analyzing an image to be transmitted, and acquiring redundant characteristic information of a target image and encrypted carrier data; sequentially acquiring each bit value from the redundant bit of each interval redundant pixel point; determining original encryption information according to all bit values; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
Fig. 13 is a schematic structural diagram of an electronic device provided by the present invention. As shown in fig. 13, the electronic device may include: a processor (processor) 110, a communication Interface (communication Interface) 120, a memory (memory) 130 and a communication bus 140, wherein the processor 110, the communication Interface 120 and the memory 130 are communicated with each other via the communication bus 140. Processor 110 may call logic instructions in memory 130 to perform an information handling method comprising: acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information; sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data; generating an image to be transmitted according to the encrypted carrier data; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; and the redundant pixel points are determined by extracting the carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In addition, the logic instructions in the memory 130 may be implemented in the form of software functional units and may be stored in a computer readable storage medium when the software functional units are sold or used as products to be analyzed. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, the computer program product including a computer program, the computer program being storable on a non-transitory computer-readable storage medium, the computer program, when executed by a processor, being capable of executing an information processing method provided by the above methods, the method including: acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information; sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data; generating an image to be transmitted according to the encrypted carrier data; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
In still another aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform the above methods to provide an information processing method, the method including: acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information; sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data; generating an image to be transmitted according to the encrypted carrier data; the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points; and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An information processing method characterized by comprising:
acquiring information to be encrypted according to the redundant characteristic information of the target image and the original encryption information;
sequentially filling each bit value in the information to be encrypted to the redundant bit of each interval redundant pixel point to obtain encrypted carrier data;
generating an image to be transmitted according to the encrypted carrier data;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting carrier data of the target image according to the redundant features corresponding to the redundant feature information.
2. The information processing method according to claim 1, wherein before acquiring the information to be encrypted from the redundant feature information of the target image and the original encryption information, the method further comprises:
determining at least one redundant feature of each sample image, and acquiring the redundant total capacity of each sample image according to the sum of the redundant capacities corresponding to all the redundant features in each sample image;
determining the bearable capacity of each sample image according to the redundant total capacity of each sample image;
setting the redundant bit value of the sample redundant pixel point corresponding to each sample image to zero, and storing all the sample images after being set to zero into a carrier library;
the redundancy characteristics comprise at least one of spatial redundancy, temporal redundancy, visual redundancy, information entropy redundancy, structural redundancy and knowledge redundancy;
the redundant bit is determined according to the lowest bit of the byte corresponding to any redundant pixel point;
the bearable capacity is used for providing a bearing space for the information to be encrypted.
3. The information processing method according to claim 2, wherein after storing all sample images after zeroing in the carrier library and before acquiring information to be encrypted based on the redundant feature information of the target image and the original encryption information, the method further comprises:
determining the quantity of redundant features according to the encryption level of the original encryption information;
screening all images to be matched from the carrier library according to the redundant feature quantity;
screening out each image to be screened which can bear capacity larger than the capacity of the original encrypted information from all the images to be matched;
determining a target image from all images to be screened;
and the quantity of the redundant features in the image to be matched corresponds to the quantity of the redundant features of the original encrypted information.
4. The information processing method according to claim 3, wherein the determining the target image from all the images to be screened includes:
determining the capacity difference value between the bearable capacity of each image to be screened and the capacity of the original encrypted information;
and determining the minimum difference value in all the capacity difference values, and determining the image to be screened corresponding to the minimum difference value as a target image.
5. The information processing method according to claim 1, wherein the obtaining information to be encrypted from the redundant feature information of the target image and the original encryption information includes:
adding redundant characteristic information of a target image to the original encrypted information in a byte mode to obtain encrypted information containing the redundant characteristic information;
adding the length information of the original encryption information and the check information of the original encryption information into the encryption information containing the redundant characteristic information in a byte mode to obtain the information to be encrypted.
6. The information processing method according to claim 1, wherein the generating an image to be transmitted from the encrypted carrier data includes:
determining all compensation redundancy bits of the un-replaced bit values from the encrypted carrier data;
and for each compensation redundant bit, adjusting the value of the compensation redundant bit according to the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point corresponding to the compensation redundant bit.
7. The information processing method according to claim 6, wherein the adjusting the value of the compensation redundant bit according to the value of the redundant bit of the front-bit pixel point and the value of the redundant bit of the rear-bit pixel point corresponding to the compensation redundant bit comprises:
under the condition that the redundant bit value of the front-bit pixel point and the redundant bit value of the rear-bit pixel point are both 1, determining the value of the compensation redundant bit to be 1;
under the condition that the redundant bit value of the front pixel point and the redundant bit value of the rear pixel point are both 0, determining the value of the compensation redundant bit to be 0;
under the condition that the redundant bit value of the front pixel point is 0 and the redundant bit value of the rear pixel point is 1, determining the value of the compensation redundant bit to be 0;
and under the condition that the redundant bit value of the front pixel point is 1 and the redundant bit value of the rear pixel point is 0, determining that the value of the compensation redundant bit is 1.
8. An information processing method characterized by comprising:
analyzing an image to be transmitted, and acquiring redundant characteristic information of a target image and encrypted carrier data;
sequentially acquiring each bit value from the redundant bit of each interval redundant pixel point;
determining original encryption information according to all bit values;
the interval redundant pixel points are determined by selecting pixel points with preset number according to intervals from all redundant pixel points;
and the redundant pixel points are determined by extracting the carrier data of the target image according to the redundant features corresponding to the redundant feature information.
9. The information processing method according to claim 8, comprising, after acquiring the redundant feature information of the target image and the encrypted carrier data:
acquiring length information of original encrypted information;
and determining all redundant pixel points from the encrypted carrier data according to the length information.
10. The information processing method according to claim 8 or 9, further comprising, after determining the original encryption information from all bit values:
acquiring verification information of original encrypted information;
verifying the original encryption information according to the verification information to generate a verification result;
and the verification result is used for indicating the tampering condition of the original encryption information in the transmission process.
CN202211598511.9A 2022-12-14 2022-12-14 Information processing method Active CN115623140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211598511.9A CN115623140B (en) 2022-12-14 2022-12-14 Information processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211598511.9A CN115623140B (en) 2022-12-14 2022-12-14 Information processing method

Publications (2)

Publication Number Publication Date
CN115623140A true CN115623140A (en) 2023-01-17
CN115623140B CN115623140B (en) 2023-03-17

Family

ID=84880545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211598511.9A Active CN115623140B (en) 2022-12-14 2022-12-14 Information processing method

Country Status (1)

Country Link
CN (1) CN115623140B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033088A (en) * 2023-03-27 2023-04-28 山东爱特云翔计算机有限公司 Safe transmission method and system for video big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008005323A (en) * 2006-06-23 2008-01-10 Nippon Hoso Kyokai <Nhk> Encrypted content preparation device, its method, its program and content decoding device, its method, and its program
CN101409813A (en) * 2007-10-08 2009-04-15 陈诚 Image encoding method for preventing and identifying image tamper
CN112202984A (en) * 2020-09-25 2021-01-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
CN113034334A (en) * 2021-03-22 2021-06-25 绍兴聚量数据技术有限公司 Encryption image reversible information hiding method and device combining JPEG and Huffman coding
CN114374774A (en) * 2022-01-17 2022-04-19 太原科技大学 Separable encryption domain reversible information hiding method based on nearest neighbor pixel prediction

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008005323A (en) * 2006-06-23 2008-01-10 Nippon Hoso Kyokai <Nhk> Encrypted content preparation device, its method, its program and content decoding device, its method, and its program
CN101409813A (en) * 2007-10-08 2009-04-15 陈诚 Image encoding method for preventing and identifying image tamper
CN112202984A (en) * 2020-09-25 2021-01-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
CN113034334A (en) * 2021-03-22 2021-06-25 绍兴聚量数据技术有限公司 Encryption image reversible information hiding method and device combining JPEG and Huffman coding
CN114374774A (en) * 2022-01-17 2022-04-19 太原科技大学 Separable encryption domain reversible information hiding method based on nearest neighbor pixel prediction

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116033088A (en) * 2023-03-27 2023-04-28 山东爱特云翔计算机有限公司 Safe transmission method and system for video big data
CN116033088B (en) * 2023-03-27 2023-06-16 山东爱特云翔计算机有限公司 Safe transmission method and system for video big data

Also Published As

Publication number Publication date
CN115623140B (en) 2023-03-17

Similar Documents

Publication Publication Date Title
EP3308371B1 (en) System and method for digital watermarking
US8391599B1 (en) Systems and methods for adaptive binarization of an image
US20030128863A1 (en) Information processing device and method for processing picture data and digital watermark information
CN115623140B (en) Information processing method
US20190066254A1 (en) Image processing device, image processing method, and program
US20090313155A1 (en) Data charging system, content generator, data charging apparatus, and data charging method
CN110311886A (en) Server leak detection method, device, equipment and storage medium
CN112487365A (en) Information steganography method and information detection method and device
CN107040799A (en) The authorization check method and device of video playback
US20220156873A1 (en) Image synthesis device and method for embedding watermark
CN114880687A (en) Document security protection method and device, electronic equipment and storage medium
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN116305294B (en) Data leakage tracing method and device, electronic equipment and storage medium
KR20210035757A (en) System and method for verification of video integrity based on blockchain
CN109446827B (en) Data encryption and decryption method and system
Cao et al. Approaches to obtaining fingerprints of steganography tools which embed message in fixed positions
JP3676937B2 (en) Image processing system, image transmission system, and recording medium
CN111669477B (en) Image processing method, system, device, equipment and computer storage medium
CN113988242A (en) Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium
Chang et al. Fragile watermarking scheme for digital image authentication using pixel difference
CN113034337B (en) Image detection method and related device
Stoyanova et al. Research of the characteristics of a steganography algorithm based on LSB method of embedding information in images
JP2004179804A (en) Transmission/reception system for encrypted information, transmission/reception method therefor, and program for embedding encrypted information
CN113781287B (en) Watermark image processing method, watermark image processing device, electronic equipment and computer readable storage medium
CN115293309B (en) Graphic code verification method and device, graphic code registration method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant