An Information Steganography Algorithm Based on Double Perturbation Scoring of Binary Image Based on STC Code

A binary image, dual technology, applied in the field of information hiding, to achieve the effect of small embedding disturbance, good imperceptibility, and high security performance

Active Publication Date: 2021-05-04
SUN YAT SEN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the formulation of the distortion measurement function is often based on the nature of the carrier image. After embedding the secret information, when evaluating the secret image according to the same rules, the disturbance score of the pixels in the neighborhood of the embedded position is different from the disturbance score of the carrier image, and it is easy to be analyzed by the corresponding steganalysis. Algorithm detection, the undetectability of steganographic algorithms is facing severe challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Information Steganography Algorithm Based on Double Perturbation Scoring of Binary Image Based on STC Code
  • An Information Steganography Algorithm Based on Double Perturbation Scoring of Binary Image Based on STC Code
  • An Information Steganography Algorithm Based on Double Perturbation Scoring of Binary Image Based on STC Code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Such as figure 1 , figure 2 as well as image 3 As shown, the embedding process of an information steganography algorithm based on STC-coded binary image double perturbation scoring includes the following steps:

[0065] (1) Use the crmiLTP disturbance measurement method to calculate the disturbance score map D of the carrier image X, obtain the disturbance score score1(x,y) of each pixel, and filter the embeddable point set C 1 ;

[0066] (2) Flip the embeddable point set C sequentially 1 Pixels at the included positions, recalculate the image S 1 Disturb the map D' to get the perturbation score score2(x,y) of each pixel;

[0067] (3) Set the threshold T 2 , when both score1(x,y) and score2(x,y) are less than T 2 , from the steganographic image S 1 Filtering embeddable point sets in C 2 ;

[0068] (4) Remove point set C 2 Neighborhood pixels, filter out the embeddable point set C 3 ;

[0069] (5) Set the threshold T 3 , make the difference between score1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an information steganography algorithm based on STC-coded binary image double disturbance scoring. The algorithm uses the improved crmiLTP distortion measurement method to perform disturbance scoring on the image, and considers the effect of pixel point flipping before and after steganography. Based on the influence of the perturbation map, on the basis of block hiding, the secret information is embedded with high-efficiency STC encoding, and finally a steganography algorithm with small visual distortion and high security is designed. On the basis of considering the nature of the carrier image, the present invention sets the double disturbance scoring criterion, conducts bidirectional evaluation and analysis on the reversible points in the edge area of ​​the image, and combines STC coding, so that the algorithm has higher image quality, less visual distortion and certain The anti-steganalysis detection performance has a very important effect on secure and secret communication.

Description

technical field [0001] The present invention relates to the field of information hiding, and more specifically, relates to an information steganography algorithm based on STC coded binary image double disturbance scoring. Background technique [0002] Information hiding technology is to embed secret information into the public carrier, and achieve the purpose of secret information transmission through the transmission of the carrier. Its essence is to use the visual masking effect and carrier redundancy to hide information. Compared with traditional encryption technology, information hiding has better undetectability, and it is difficult to distinguish the original carrier from the secret carrier only by visual senses, that is, this technology hides the fact of communication while protecting secret information. Coupled with the characteristics of various information hiding processing methods, abundant available carriers, and good security, this technology has broad applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N19/467
CPCH04N19/467
Inventor 修长振孙伟张宇
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products