TWI375190B - - Google Patents

Download PDF

Info

Publication number
TWI375190B
TWI375190B TW97150615A TW97150615A TWI375190B TW I375190 B TWI375190 B TW I375190B TW 97150615 A TW97150615 A TW 97150615A TW 97150615 A TW97150615 A TW 97150615A TW I375190 B TWI375190 B TW I375190B
Authority
TW
Taiwan
Prior art keywords
hidden
secret
information
value
pixel
Prior art date
Application number
TW97150615A
Other languages
Chinese (zh)
Other versions
TW201025225A (en
Original Assignee
Hsiuping Inst Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hsiuping Inst Technology filed Critical Hsiuping Inst Technology
Priority to TW97150615A priority Critical patent/TW201025225A/en
Publication of TW201025225A publication Critical patent/TW201025225A/en
Application granted granted Critical
Publication of TWI375190B publication Critical patent/TWI375190B/zh

Links

Description

、發明說明: 【發明所屬之技術領域】 本發明係關於資訊隱藏方法,特別是指一種以直接壓縮及 隱藏大量重複隱藏位元區塊到覆蓋像素的最後二有效位元上 的資訊緊密隱藏方法。 【先前技術】 衫像fe藏(image steganography)在資訊隱藏 (information hiding)應用中,屬於廣受重視的技術領域之 一;其係利用覆蓋函數(covering functi〇n)來隱藏秘密資訊 到覆蓋影像内,以使第三者在覆蓋影像傳遞過程中無法發現覆 蓋的秘密資訊。 . 一般資訊隱藏技術必須具備以下特性: ⑴不可察覺性(Imperc印tibility):覆蓋影像在隱藏 秘密資訊的偽裝影像,在人類的感官視覺上變化不 大,而不容易察1覺與覆蓋影像的差異存在,簡言之, 即隱藏秘密資訊之後,對於覆蓋影像應有良好的通透 性(Transparency); (2)隱藏資訊容量(Capacity):資訊隱藏技術助要是追 求資訊隱藏量大,且能隱藏的秘密資訊容量越高越 好,越高表示有較佳的隱藏性;亦即在維持相同的影 像品質條件下’能夠隱藏更多的秘密資訊是較佳的隱 1375190 藏技術; (3) 效率性(Efficiency):資訊隱藏技術是要簡單且有 效率’秘密資料的隱藏與擷取是要快速省時; (4) 可回復性的還原能力(Recoverability):在偽裝影 像移除所隱藏的秘密資訊後’會將偽裝影像作回復動 作’使得偽裝影像回復到覆蓋影像而無失真;以及 (5) 低失真:一張已隱藏秘密資訊的偽裝影像,在人類 感吕上必須沒有過度的失真’而一般通常會隨著所隱 藏的秘密資訊容量增加而導致較高的失真。 在隱藏過程中,覆蓋函數是減少隱藏修改程度(the degree of steganographic modifications)及維持良好隱藏 影像(stego images)品質的重要關鍵。先前專家學者所提的覆 蓋方法(covering schemes)已嘗試於產生高隱藏率(high embedding rate)及高效能(high efficiency)的隱藏影像;然 而’增加高隱藏率卻也會減少隱藏的效能。 在影像的隱藏技術的研究中,I?. Crandall, “Some notes on steganography,,5 Posted on steganography mailing list 及 A. Westfield, “F5:asteganography algorithm”,Proc. of 4th Int. Workshop Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001,提出一 種以矩陣編碼的方法,利用位元區塊(block-wise)來作為隱 4 藏資訊的處理單元,以增加隱藏效能(embeddingefficiency) 並保持低覆蓋影像失真(distortion)。另外,D. Sctoifeld and[Technical Field] The present invention relates to an information hiding method, and more particularly to a method for directly hiding and hiding a large number of repeatedly hidden bit blocks to cover the last two significant bits of a pixel. . [Prior Art] Image steganography is one of the most widely recognized technical fields in information hiding applications; it uses cover function (covering functi〇n) to hide secret information to cover images. Therefore, the third party cannot find the covered secret information during the overlay image transmission process. The general information hiding technology must have the following characteristics: (1) Impercity: The camouflage image that covers the hidden information of the image, which has little change in the human sensory vision, and is not easy to detect and cover the image. Differences exist, in short, after hiding secret information, there should be good transparency for overlay images; (2) hidden information capacity (Capacity): information hiding technology helps to capture large amounts of information and can The higher the hidden secret information capacity, the better, the higher the better the hiddenness; that is, the ability to hide more secret information while maintaining the same image quality is the preferred hidden 1375190 technology; (3) Efficiency: Information hiding technology is simple and efficient. 'Hidden data capture and capture is fast and time-saving; (4) Recoverability: Recoverability hidden in camouflage image removal After the secret information, 'will disguise the image as a reply action' to make the camouflage image return to the overlay image without distortion; and (5) low distortion: a hidden secret Camouflage image information, in the human sense of Lu must be no undue distortion 'and shall generally increases as the hidden secret information capacity leads to higher distortion. In the hiding process, the cover function is an important key to reducing the degree of steganographic modifications and maintaining the quality of good stego images. Previous approaches by experts and scholars have attempted to produce high embedding rates and high efficiency hidden images; however, increasing the high hiding rate also reduces the hidden performance. In the study of image hiding techniques, I?. Crandall, “Some notes on steganography,, 5 Posted on steganography mailing list and A. Westfield, “F5: asteganography algorithm”, Proc. of 4th Int. Workshop Information Hiding 2001, Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001, proposes a matrix coding method that uses block-wise as a processing unit for hidden information to increase hidden performance. (embeddingefficiency) and maintain low coverage image distortion. In addition, D. Sctoifeld and

A. Winkler, “Embedding with syndrome coding based on BCH codes Proc. 8th ACM Workshop on Multimedia and Security, PP. 214-223,2006 ’ 提出一種以 BCH 編碼(Bose、Chaudhuri、A. Winkler, “Embedding with syndrome coding based on BCH codes Proc. 8th ACM Workshop on Multimedia and Security, PP. 214-223, 2006 ’ proposes a BCH code (Bose, Chaudhuri,

HocquenghemCode)為主的覆蓋方法,此種方法可達到平衡分 析(tradeoff)轉換負擔(converting overhead)及隱藏效 能的目的。 而為了改善二元覆蓋碼(binary covering codes)的隱 藏效能 ’ F. Willems and M. Dijk,“Capacity and codes for embedding information in gray-scale signals”,IEEE Trans. Inf. Theory, vol· 51,no. 3,pp. 1209-1214,Mar. 2005 , X. Zhang .and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Commun. Letter, vol. 10, no. 11, pp. 78卜783,Nov. 2006, 及 W. Zhang, S. Wang, and X. Zhang, “Improving Embedding efficiency of covering codes for applications in steganography, ” IEEE Commun. Letter, vol. 11,no. 8, pp. 680-682, Aug. 2007,係嘗試利用加/減1的策略(或簡稱±i方 法)來開發覆蓋影像的隱藏資訊容量;其中?.\^1^1115 311(1肘· Dijk, ^Capacity and codes for embedding information in gray-scale signals”,IEEE Trans. Inf. Theory, vol. 51, no. 3,pp. 1209-1214, Mar. 2005,與 X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction, ” IEEE Commun. Letter, vol. 10, no. 11,pp. 781-783, Nov. 2006,係運用漢明編碼(Hamming Code)方法來隱藏三元資訊(ternary information)到覆蓋 像素内’然而此種方法需要先將二元秘密資訊轉換成三元資 訊’係具有轉換的負擔;而W. Zhang, S. Wang, and X. Zhang, 44Improving Embedding efficiency of covering codes for applications in steganography,,,IEEE Commun. Letter,vol. 11,no· 8,pp· 680-682,Aug· 2007,係設計出 轉換方法’能直接隱藏二元秘密資訊而無需先行轉換成三元資 訊,然而,假使被處理的二元秘密資訊係屬於未壓缩型式,且 可能包含高頻率的重複隱藏區塊者,則相同的隱藏處理操作即 會重複執行多次,因而必須改變多個覆蓋像素(c〇vering pixels)° 基於上述問題,發明人提出了一種如何減少覆蓋像素被 改變的數量和數值’且減少隱藏處理操作次數的直接資訊緊密 隱藏方法’以克服現有技術的缺陷。 【發明内容】 本毛月目的在於提供一種減少覆蓋像素被改變的數量, 13/5190HocquenghemCode) is the main coverage method, which can achieve the purpose of balanceoff (converting overhead) and hidden effects. In order to improve the hidden performance of binary covering codes, F. Willems and M. Dijk, "Capacity and codes for embedding information in gray-scale signals", IEEE Trans. Inf. Theory, vol· 51, no 3, pp. 1209-1214, Mar. 2005, X. Zhang . and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Commun. Letter, vol. 10, no. 11, pp. 78 783 , Nov. 2006, and W. Zhang, S. Wang, and X. Zhang, "Improving Embedding efficiency of covering codes for applications in steganography," IEEE Commun. Letter, vol. 11, no. 8, pp. 680-682 , Aug. 2007, is trying to use the plus/minus 1 strategy (or the ±i method for short) to develop hidden information capacity for overlay images; .\^1^1115 311 (1 肘 · Dijk, ^Capacity and codes for embedding information in gray-scale signals", IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 1209-1214, Mar. 2005, and X. Zhang and S. Wang, "Efficient steganographic embedding by exploiting modification direction," IEEE Commun. Letter, vol. 10, no. 11, pp. 781-783, Nov. 2006, using Hamming coding ( Hamming Code) method to hide ternary information into the coverage pixel 'however, this method needs to convert binary secret information into ternary information first' has the burden of conversion; and W. Zhang, S. Wang, And X. Zhang, 44Improving Embedding efficiency of covering codes for applications in steganography,,, IEEE Commun. Letter, vol. 11, no. 8, pp. 680-682, Aug·2007, designed to convert methods can be directly hidden Binary secret information without first converting to ternary information, however, if the processed binary secret information is uncompressed and may contain high frequency repeated hidden blocks, then the same hidden processing operation It is repeated many times, so it is necessary to change a plurality of overlay pixels (c〇vering pixels). Based on the above problem, the inventors have proposed a direct information on how to reduce the number and value of the covered pixels to be changed and to reduce the number of hidden processing operations. The method of hiding is to overcome the drawbacks of the prior art. [Invention] The purpose of the present invention is to provide a reduction in the number of coverage pixels that are changed, 13/5190

cj-i ^Cj^oj Cj +1, ^Cj ^25^y, 3·㊉V,其他條件下Cj-i ^Cj^oj Cj +1, ^Cj ^25^y, 3·10 V, under other conditions

【實施方式】 雖然本發明使用了幾個較佳實施例進行解釋,但是下列 ,式及具體實施方式僅僅是本發明的較佳實_;應說明的[Embodiment] Although the present invention has been explained using several preferred embodiments, the following, formula and specific embodiments are merely preferred embodiments of the present invention;

是’下面_示的具體實施方式健是本㈣賴子,並不表 示本發明限於下列圖式及具體實施方式。 在下文中,將具體地描述本發明之方法的實施例。 矩陣編碼是以線性覆蓋碼(linear c〇vering c〇de)的同 位檢查矩陣(parity Check matrix)來用於隱藏數個秘密位元, 此種編碼方法可隱藏一個M立元的秘密資料區塊到〃個覆蓋像 素的最後有效位元(Least Signification Bit,LSB),其中ΑIt is to be understood that the present invention is limited to the following drawings and specific embodiments. Hereinafter, embodiments of the method of the present invention will be specifically described. The matrix coding is used to hide a number of secret bits by a linear check code (linear parity code), which can hide a secret data block of an M-ary element. To the last significant bit (LSB) of the covered pixels, where Α

位元的秘密資料區塊表示為··,〜),而"個覆蓋像素可以 C = (C|,C2,...’c„)表示’且„與々具有的關係及覆蓋半徑 (covering radius)設定為/?’覆蓋半徑是用來限制轉換碼時 的最大可能改變的數目。同位檢查矩陣(以"表示)係可以用 來貫現一種覆蓋函數(covering function),以表 示,並以下式達到矩陣編碼的目的: K=(//xC;T)T@·?; 上式中的I’、『及㊉分別代表特徵向量(Syndr〇me vector)及轉 9 i(transpose)與互斥或(exciusive-〇R)之邏輯運算。 令好代表一個具有g列及a行的同位檢查矩陣,且同位檢 查矩陣元素//(,,y)是以〜表示,而同位檢查矩陣"的第7行向量 可以被定義為〜.”aj7.。若W相等於//;,其中丨旬“, 則覆蓋像素的最後有效位元LSB將被修改成c@v其中^代表 ^個單元向量;’不會改變任何覆蓋像素的最後有效位 疋LSB。舉例而言,令々:3、5 = (i〇i)、C| = _,u,〇,〇,及同位 檢查矩陣為//設定如下: 〔10 0 11 Η ~ 〇1〇〇1 ,00111 1 0\ (1);The secret data block of the bit is represented as ··, ~), and the "covering pixels can be C = (C|, C2,...'c„) indicating 'and the relationship with 々 and the radius of coverage ( Covering radius) is set to /? 'The coverage radius is the number of maximum possible changes used to limit the conversion code. The parity check matrix (indicated by ") can be used to implement a covering function to represent and achieve the purpose of matrix coding: K=(//xC;T)T@·?; I', "and ten" in the equation represent the symmetry vector (Syndr〇me vector) and the logical operation of the transition 9 i (transpose) and the mutual exclusion or (exciusive-〇R). Let a good representation of a parity check matrix with g columns and a rows, and the parity check matrix elements //(,, y) are represented by 〜, and the 7th row vector of the parity check matrix " can be defined as ~." Aj7. If W is equal to / /;, where 丨 “, then the last significant bit LSB of the overlay pixel will be modified to c@v where ^ represents ^ unit vector; 'will not change the last valid of any covered pixel Located in the LSB. For example, let 々:3,5 = (i〇i), C| = _, u, 〇, 〇, and the parity check matrix be set as follows: [10 0 11 Η ~ 〇1〇〇1 , 00111 1 0\ (1);

特徵向鈔可以下式所計算出來: 因為 Φ5 :㈣,1)㊉ _=_); 示)即可^7式象素的隱藏最後有效位元LSBs(以c,表 C| ~ C Θ (丨,G,〇,0,0,0,0) = (1,0,0,1,:,0,1)。 在隱藏資訊要被擷取時,所隱藏的秘密位元^可以下列計 异自C,中擷取出來:The characteristic to the banknote can be calculated as follows: Since Φ5: (4), 1) ten _=_); shows) the hidden last significant bit LSBs of the ^7-type pixel (with c, table C| ~ C Θ (丨, G, 〇, 0, 0, 0, 0) = (1,0,0,1,:,0,1). When the hidden information is to be retrieved, the hidden secret bit ^ can be counted as follows Different from C, the lieutenant is taken out:

SS

Η X C 令—個連續,個重覆區塊的秘密位元 係代表w個覆蓋像素的最後二有效位 所接Γ射〜是駐像素〜的最後二有效位元㈣。本發 的隱藏方法是發展用以㈣直接隱藏到c内,且因此 假若《等於G,則表示秘密資料會是s,;否則,秘密資料則是^ 且可以藉由重覆,次的5·1而獲得。 舉例來說’令W,^_,c+=(1_綱喻),且同 位檢查矩陣//如公式⑴所示;先設旗標位元卜為1,則可以利 用公式(2)計算獲得特徵向量v = _,因為ν' =(1鱗會等於矩 陣行向量% ’故秘密資料f可以被直接隱藏人覆蓋像素c+中 的9,而隱藏後的結果可藉由緊密函數的計算得到,即 ci= £/(cP〇〇〇〇 0011); 其中向量v中的位元〜及〜分別是m(c+ 6,)結果及1。 請參考圖卜係表示本發明智慧型直接資訊緊密隱藏法之 較佳貫施綱餘方塊圖。在—般型的直接資崎密隱藏法 (CCS)中,秘密資料y的,值只能採用固定的正整數;然而,採 用合適的,值卻高度取決於重覆區塊的出現頻率,請再參考圖 2 ’係表示顯示出全〇或全i的重覆區塊對全部區塊的平均比 率比較圖,射全0或全1的重输歧職影像中出現頻率 最高的兩《覆區塊。因此,藉由全G及全丨出現的平均比率, 以下將提出本發明-種智慧型的緊密隱藏法(las)以緊密壓 縮全〇或全1的重覆隱齡塊到覆蓋影像中,並儘可能地增加 所能一次壓縮隱藏的區塊數目。 智慧型直接資訊緊密隱藏法採用數個覆蓋函數 重複區塊數目W值為+ l者,再進行判 斷秘密資料是否屬於一全1的隱藏區塊S;', 且重複區塊數目w值為2^^2(^) + 1 ; 步驟SA6:若是秘密資料屬於全1的隱藏區塊π,且重複 區塊數目W值為+ 1者,則設定旗標位 元= 1,且覆盖像素c,.的/值即設定為 / = (w-1)+2㈣; 步驟SA7:若是秘密資料並不屬於全1的隱藏區塊y,且 重複區塊數目《值為2^^2(Μ + 1者,則設定旗 標位元6/=0,且計算特徵向量。(/^(:/了㊉兄; 步驟SA8 :判斷覆蓋像素C,的/值是否/ = 2λ ; 步驟SA9 :若是覆蓋像素的/值是者,則計算特徵 步驟SA10 :若是覆蓋像素c,的/值並非是/ = 2*者,則計算 特徵向量F = (//xC/了㊉///' ; 步驟SA11 :判斷特徵向量r之轉置矩陣π是否等於同位 檢查矩陣//的第./行向量//,,亦即判斷是否Η X C is a continuous, repeated block of secret bits representing the last two significant bits of the w-covered pixels. The last two significant bits (four) of the resident pixels are. The hidden method of this method is developed to (4) directly hidden into c, and therefore if "equal to G, it means that the secret data will be s; otherwise, the secret data is ^ and can be repeated by the second. 1 and get. For example, 'make W, ^_, c+=(1_import), and the parity check matrix // as shown in formula (1); first set the flag bit to 1, then you can use formula (2) to calculate The eigenvector v = _, because ν' = (1 scale will be equal to the matrix row vector % ', so the secret data f can be directly hidden by the person covering the 9 in the pixel c+, and the hidden result can be obtained by the calculation of the compact function. That is, ci= £/(cP〇〇〇〇0011); where the bits ~ and ~ in the vector v are m(c+ 6,) results and 1. respectively. Please refer to the diagram to show that the smart direct information of the present invention is closely hidden. The preferred method of the law is the block diagram. In the general-type direct Zisaki secret concealment method (CCS), the value of the secret data y can only be a fixed positive integer; however, the appropriate value is high. Depending on the frequency of occurrence of the repeated block, please refer to Figure 2 again. The system shows the average ratio of the repeated blocks of all blocks or all i, and the total ratio of all blocks is 0 or all 1s. The two most frequently covered blocks appear in the job image. Therefore, the present invention will be presented below by the average ratio of total G and full 丨. - A smart close-in method (las) to tightly compress the full-length or all-one repeating block to cover the image, and increase the number of hidden blocks that can be compressed as much as possible. The hiding method uses a number of overlapping functions to repeat the number of blocks W value is + l, and then determines whether the secret data belongs to a hidden block S of all ones; ', and the number of repeated blocks w is 2^^2 (^ + 1 ; Step SA6: If the secret data belongs to the hidden block π of all 1, and the number of repeated blocks W is + 1, the flag bit = 1 is set, and the value of the pixel c, Set to / = (w-1) + 2 (four); Step SA7: If the secret data does not belong to the hidden block y of all 1, and the number of repeated blocks "value is 2^^2 (Μ + 1), then set the flag The locator 6/=0, and the eigenvector is calculated. (/^(:/ ten brothers; step SA8: judging whether the value of the overlay pixel C, / = 2λ; step SA9: if the value of the overlay pixel is Then, the feature step SA10 is calculated: if the value of the covered pixel c is not /= 2*, the feature vector F = (//xC/ten///' is calculated; step SA11: determining the turn of the feature vector r ./ matrix π is equal to the first row vector of the parity check matrix // // ,, i.e. determines whether

Vr =Η.; 步驟SA12 :若是κ7 =//,成立者,則設定8位元向量的最 後有效位元v,=l ; 步驟SA13 :若是不成立者,則設定8位元向量的 1375190 最後有致位元a =9 ’且覆蓋像素。的)值係由 數值1到„作隨機選取;以及 步驟SA14:以一標示函數¥(〇:+〜)計算8位元向量的最後 第二有效位元’及以一緊密函數£,(c,v)計算 覆盆像素cy被隱藏修改後的像素c,.,亦即 ,且c; = £:U,其中, ❿ 从(C+,6,)=之mod 2,且 、is| &gt; -;,5卜 0)且卜=0)及(v2V,=1〇 ,1右^ 255)且(〜=1)及(¥1=11) ~®v,其他條件下 } C 4* EAcj^)- 明參考圖3 ’係表示從本發明的從覆蓋影像中掏取 的秘密資訊的流程方塊圖。當要自覆蓋舉擷取出秘密7 時’令&lt;代表覆蓋像素4隱藏修改後的結果。旗標位元貝— 以利用上述的公式⑶树算得知。假使旗標位元㈣^可 『:秘密資料會是單一隱藏區…而它可以經由= (叫)簡取獲得;侧,秘_料.由# 的單-區塊的咏I,而盆 疋屬於連、,重覆-欠 得: ,、中I值料從下触驟的執行獲 ⑴假若(,相等於〜,其中叫,則w值將卜 r值;若咸不大於2('則表示秘密資料是 則,秘密資料是《&quot;且&quot;值是(川μ2Μ. ⑵假若(&quot;喻一,職神麵是仏值 17 又2 Μ ’秘岔貧料可藉由重覆《次的單一區塊扣或s/ 而獲得。 _ ? = 3,5〇 =(0,0,0)5 ^ c+=(10^10^^01^^01) f 5 k一矩陣//如前述公式⑴所示;先設定旗標位元〜為卜 特徵向量嗜可依公式⑷計算獲得,其中: ΜΜ__'μ、=(10,0); 為Ζ曰相等於&quot;,,則表示秘密資料是《可以透過直接被隱藏 到C+的覆i像素£|内,隱藏顧蓋像素一結果為: C; = JMC丨,0000 0011); 其中位元向量V的〜位元可以藉由計算標示函數从(c+,~)獲得 且V,位元則設為1。 因此經L前述的智慧型直接資訊隱藏方法之後,再從覆蓋 衫像中擷取出秘密資料的方法可歸納為下列步驟: 步驟SB1:定義一單一A位元隱藏資料區塊,&amp;), 同位檢查矩陣為/^,其中„ = 2*_1, C+^cApC^Cw.,^”,)’係表示”個覆蓋像素的 各最後二有效位元’而c;2即表示C+中位元C z 被修改後的值’以及修改覆蓋像素c,後所得的 結果C; ’而cn即表示覆蓋像素。,最後有效位 元; 步驟SB2 :輸入a:值; 1375190 步驟SB3 :計算一旗標位元%,其中mod 2 ; \/=l ) 步驟SB4 :判斷旗標位元&amp;是否等於數值1 ; 步驟SB5 :若是旗標位元%不等於數值1者,則單一女位 元隱藏區塊义二(Z/xC;7了,以擷取秘密資料; 步驟SB6 :若是旗標位元巧等於數值1者,則再判斷 (// X c;7) = .是否成立,其中//〆系表示同位檢查 矩陣//的第j行向量; 步驟SB7 :若是(//&gt;&lt;〇//,不成立者,則秘密資料屬於一 全1的隱藏區塊β,且其重複區塊數目《值為 w = 2(*_|) +1,以揣取秘密貧料, 步驟SB8 :若是成立者,則進行判斷y值是否 j&lt;2{k-]); 步驟SB9 :若是㈣不成丘者,則秘密資料屬於全1的 隱藏區塊V,且其重複區塊數目w值為 w = (y + i)-2(*-1) ’以操取秘密育料,以及 步驟SB10 :若是成立者,則秘密資料屬於一全0 的隱藏區塊β,且其重複區塊數目《值為 w = y +1,以操取秘密貧料。 因此,藉由上述的方法,係以緊密壓縮全0或是全1的 重複隱藏區塊到覆蓋影像中,並盡可能地增加所能一次壓縮隱 藏的區塊數目,以達到減少覆蓋像素被改變的數目並減少隱藏 19 丄J/二)丄 處理的操作次數,以及直接緊密隱藏的功效。 雖然本發明以相關的較佳實施例進行解釋 曰k 構成對本發明的限去丨 〜心這並不 發明的田、相能夠揋1說明的是’本領域的技術人員根據本 坆出偎多其他類似實施例’這些均在本發明 的保護範圍之中。Vr = Η.; Step SA12: If κ7 = / /, the founder sets the last significant bit of the octet vector v, = l; Step SA13: If it is not true, then set the octet vector of 1375190 Bit a = 9 ' and covers the pixel. The value is determined by a random value from 1 to „; and step SA14: the last second significant bit of the 8-bit vector is calculated by a labeling function ¥(〇:+~) and a compact function £, (c , v) Calculate the pixel cy to be hidden from the modified pixel c,., that is, and c; = £:U, where ❿ from (C+,6,)=the mod 2, and, is| &gt;-;, 5 Bu 0) and Bu = 0) and (v2V, = 1 〇, 1 right ^ 255) and (~=1) and (¥1=11) ~®v, under other conditions} C 4* EAcj ^) - Referring to Figure 3' is a flow block diagram showing the secret information extracted from the overlay image of the present invention. When the secret 7 is to be retrieved from the overlay, the <received overlay pixel 4 is hidden and modified. The result is that the flag bit is - calculated by using the above formula (3). If the flag bit (4) ^ can be ": the secret data will be a single hidden area... and it can be obtained by = (call) simple; side,秘_料. By the single-block #I of #, and the basin 疋 is connected, and the repeat- owed: ,, the medium I value is obtained from the execution of the lower touch (1) if (, equal to ~, where Call, then w value will be r value; if salt is not greater than 2 (' The secret information is, the secret information is "&quot; and the value is (Chuan μ2Μ. (2) If (&quot;Yu Yi, the professional face is depreciated 17 and 2 Μ 'The secret of the poor can be repeated by Obtained by a single block deduction or s/. _ ? = 3,5〇=(0,0,0)5 ^ c+=(10^10^^01^^01) f 5 k-matrix // The above formula (1); first set the flag bit ~ for the feature vector can be calculated according to the formula (4), where: ΜΜ __ 'μ, = (10, 0); Ζ曰 equal to &quot;,, then the secret The data is "can be hidden directly into the C+ overlay i pixel £|, hiding the pixel pixel result as: C; = JMC丨, 0000 0011); where the bit vector V of the ~ bit can be calculated by calculation The function is obtained from (c+,~) and V, and the bit is set to 1. Therefore, after the aforementioned intelligent direct information hiding method of L, the method of extracting secret data from the cover shirt image can be summarized as the following steps: SB1: Define a single A-bit hidden data block, &amp;), the parity check matrix is /^, where „ = 2*_1, C+^cApC^Cw.,^”,)' indicates “overlay pixels” The last two have The bit 'and c; 2 means the value of the modified C + median C z' and the modified cover pixel c, and the result C is obtained; and cn means the cover pixel. The last valid bit; Step SB2: Enter a: value; 1375190 Step SB3: Calculate a flag bit %, where mod 2 ; \/=l ) Step SB4: Determine if the flag bit &amp; is equal to the value 1; Step SB5: If the flag bit % If the value is not equal to 1, the single female bit hides the block meaning 2 (Z/xC; 7 to capture the secret data; Step SB6: If the flag bit is equal to the value 1, then judge (// X c;7) = . Is it true, where / / indicates the j-th row vector of the parity check matrix //; Step SB7: If (//&gt;&lt;〇//, does not hold, the secret data belongs to All 1 hidden block β, and its number of repeated blocks "value = w = 2 (*_|) +1, in order to extract secret poor material, step SB8: If it is the founder, then determine whether the value of y is j&lt;2{k-]); Step SB9: If (4) is not a hill, the secret data belongs to the hidden block V of all 1, and the number of repeated blocks w is w = (y + i) - 2 (*-1) ) 'to take secret education , And step SB10: If the founders, to hide the confidential information belonging to a whole block β 0, and the number of repeating block "value w = y +1, to take the secret-lean operation. Therefore, by the above method, the hidden blocks are tightly compressed to all 0s or all 1s to cover the image, and the number of hidden blocks that can be compressed at one time is increased as much as possible to reduce the coverage pixels being changed. The number of operations is reduced and the number of operations that are hidden by 19 丄J/B) is handled, as well as the effect of direct tight concealment. Although the present invention has been explained in connection with the preferred embodiments, the present invention is not limited to the invention, and the field is not invented. Similar embodiments 'all of these are within the scope of the invention.

20 1375190 - 【圖式簡單說明】 圖1係表示本發明智慧型直接資訊緊密隱藏法之一較佳實施 例的流程方塊圖; .圖2係表示顯示出全0或全1的重覆區塊對全部區塊的平均比 •率比較圖;以及 圖3係表示從本發明的從覆蓋影像中擷取出隱藏的秘密資訊 的流程方塊圖。 【主要元件符號說明】20 1375190 - [Simplified description of the drawings] Fig. 1 is a flow block diagram showing a preferred embodiment of the smart direct information close concealment method of the present invention; Fig. 2 is a diagram showing repeated blocks showing all 0s or all 1s. An average ratio comparison graph for all blocks; and Fig. 3 is a block diagram showing the flow of hidden secret information from the overlay image of the present invention. [Main component symbol description]

Claims (1)

1375190 若是不成立者,則該秘密資料屬於該全1的隱 藏區塊V,且其該重複區塊數目》值為《 = 〇· + 1)-2(*-&quot;,以擷 取該秘密資料;以及 若是β2㈣成立者,.則該秘密資料屬於一全0的隱藏 區塊β,且該重複區塊數目《值為《 = 7 + 1,以擷取該秘密資 料。1375190 If it is not established, the secret data belongs to the all-hidden block V, and the number of the repeated blocks is "= 〇· + 1)-2 (*-&quot; to capture the secret data. And if β2(4) is established, the secret data belongs to a hidden block β of all 0s, and the number of the repeated blocks is “= 7 + 1, to capture the secret data. 2525
TW97150615A 2008-12-25 2008-12-25 Method of hiding information in direct and compact way TW201025225A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97150615A TW201025225A (en) 2008-12-25 2008-12-25 Method of hiding information in direct and compact way

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97150615A TW201025225A (en) 2008-12-25 2008-12-25 Method of hiding information in direct and compact way

Publications (2)

Publication Number Publication Date
TW201025225A TW201025225A (en) 2010-07-01
TWI375190B true TWI375190B (en) 2012-10-21

Family

ID=44852523

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97150615A TW201025225A (en) 2008-12-25 2008-12-25 Method of hiding information in direct and compact way

Country Status (1)

Country Link
TW (1) TW201025225A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI587133B (en) * 2016-05-20 2017-06-11 慧榮科技股份有限公司 A page alignment method for data storage device and a look up table production method thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201135663A (en) 2010-04-13 2011-10-16 Univ Nat Chiao Tung A covert communication method via PNG images based on the information sharing technique
US9313021B2 (en) 2013-08-29 2016-04-12 National Chiao Tung University Secret communication method with self-authentication capability

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI587133B (en) * 2016-05-20 2017-06-11 慧榮科技股份有限公司 A page alignment method for data storage device and a look up table production method thereof
US10338836B2 (en) 2016-05-20 2019-07-02 Silicon Motion, Inc. Page aligning method and lookup table generating method of data storage device

Also Published As

Publication number Publication date
TW201025225A (en) 2010-07-01

Similar Documents

Publication Publication Date Title
Chang et al. A novel turtle shell based scheme for data hiding
Guo et al. An efficient JPEG steganographic scheme using uniform embedding
CN108537049B (en) Adaptive steganography algorithm based on binary image
Lee et al. A steganographic method with high embedding capacity by improving exploiting modification direction
Hong et al. Data embedding using pixel value differencing and diamond encoding with multiple-base notational system
Peng et al. Image authentication scheme based on reversible fragile watermarking with two images
Ulutas et al. Invertible secret image sharing for gray level and dithered cover images
TW201610742A (en) Encrypting and decrypting information
Hou et al. An optimal data hiding scheme with tree-based parity check
CN101105832B (en) Relational database water mark embed and extraction method based on (t,n) threshold
CN101527030B (en) Safe watermark method based on side information
CN103593590B (en) Based on mixing additivity repeatedly watermark embedding method and the coding/decoding method of cloud environment
TWI375190B (en)
Rifà-Pous et al. Product perfect codes and steganography
CN108735223B (en) Method and system for embedding and extracting digital watermark of audio file
Gulve et al. An image steganography algorithm with five pixel pair differencing and gray code conversion
Rifa et al. Product perfect Z 2 Z 4-linear codes in steganography
Sun et al. Data embedding in image-media using weight-function on modulo operations
Li et al. Data hiding in images by adaptive LSB substitution based on the pixel-value differencing
Chou et al. A (2, 3) Threshold secret sharing scheme using sudoku
CN111400731B (en) Quantum image encryption method based on DNACNot
Chang et al. A large payload information hiding scheme using two-level exploiting modification direction
Molaei et al. Steganography scheme based on Reed-Muller Code with improving payload and ability to Retrieval of Destroyed data for digital images
CN112199693A (en) Steganography method based on cartoon image
Winasih et al. Implementation of LSB-RSA Algorithm for the Authenticity of the JPG File Certificate

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees