Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Camouflage Method of Indirect Transmission and Random Codebook without Carrier Test Questions

A random code, indirect technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problem of interconnection damage, lack of identification ability for the source and attribution of distributed text or images, and hinder the correct extraction of secret information, etc. question

Active Publication Date: 2020-08-04
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although such methods isolate text or images as normal text or images, and cannot detect anomalies because they have not been modified, the dense transmission of large collections of text and images will inevitably arouse suspicion
The above papers Chen X Y, 2017, Chen X Y, 2015, Zhou Z L, 2016, Zhou Z L, 2015, Yuan C S, 2017 and Zhou Zhili, 2016 only verified the resistance to steganalysis of isolated text or image or the resolution of isolated image change , brightness, noise, and JPEG compression attacks, Zhou Zhili, 2016, further set the decryption time limit, so that text and images can only be decrypted after transmission within a limited period of time, which easily induces potential attackers on the channel. active and passive aggression
In addition, Chen X Y, 2017, Chen X Y, 2015, Zhou Z L, 2016, Zhou Z L, 2015, Yuan C S, 2017 and Zhou Zhili, 2016 only verified the resistance to steganalysis of isolated text or image or the resolution of isolated image change, Brightness, noise addition, and JPEG compression attack resistance capabilities. In addition, the strategy lacks effective identification capabilities for the source and attribution of distributed text or images participating in the reconstruction of secret information, so potential attackers can maliciously delete or add previous Intercept normal text or images to destroy the sequence of receiving text or images involved in the channel transmission process or the interrelationship of text and images of text collection and image collection to hinder the correct extraction of secret information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Camouflage Method of Indirect Transmission and Random Codebook without Carrier Test Questions
  • A Camouflage Method of Indirect Transmission and Random Codebook without Carrier Test Questions
  • A Camouflage Method of Indirect Transmission and Random Codebook without Carrier Test Questions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0125] Taking JAVA jdk1.8.0_20 as the case implementation environment, the implementation of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 It is a secret map camouflage flow chart, figure 2 It is the flow chart of secret image restoration.

[0126] A method for disguising non-direct transmission and random codebook test questions without a carrier, comprising the following steps:

[0127] Step 1: Note that the input image is a grayscale secret image with a resolution of m×n S=(s i,j ) m×n ,s i,j ∈{0,1,…,2 P -1}, user initial value System parameters Transient threshold parameter t ∈ (0,1) and the number of iterations IT > 0 to eliminate transient effects, the secret image S = (s i,j ) m×n According to formula (1), it is transformed into a 1-dimensional secret image sequence P s =(p k ) mn ;

[0128] p k =s i,j ,k=jm+i (1)

[0129] For example: get P=8...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password map carrier-free test question disguise method of non-direct transmission and a random codebook. The method comprises the following steps: firstly, scrambling the codebook via a pseudo-random sequence, then, performing pseudo-random encoding on password map pixels by using the scrambled codebook index to avoid direct channel transmission of the password map; then,converting the encoded index location into a 32-ary sequence, and further expressing the same through 24-ary and 9-ary numbers; and finally, indirectly expressing choice question arrangement sequencenumbers and gap filling answers randomly generated by each 24-ary and 9-ary numbers in the sequence relative to a random offset to generate random test questions. Compared with the existing method, the method has the advantages of avoiding the direct channel transmission of the password map, the problems that the additional carrier is modified, the hiding capacity of the traditional non-embeddedcarrier-free information is small, a large text or image database needs to be constructed and maintained and that the search cost is high are avoided by using a password containing test question generation mode, and the password map is restored just by a correct key.

Description

technical field [0001] The invention belongs to the intersecting field of image information security and digital image signal processing, and relates to a method for disguising and recovering a dense image without a carrier, in particular to a method for disguising a dense image without a carrier for an indirect transmission and a random codebook. Background technique [0002] With the continuous deepening of deep learning and the continued development of artificial intelligence, machine learning based on big data and the emergence of quantum computers have made the traditional multimedia information security situation with image and audio as the main transmission medium more severe. At the same time, with the continuous development of compression technology, the redundant space available for traditional modified embedding-based information hiding is getting smaller and smaller. On the other hand, the dimensionality of steganographic classifiers based on machine learning Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08G06T1/00
CPCG06T1/0021H04L9/0869H04L63/0428H04L63/10
Inventor 邵利平陆海
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products