Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block replacement generation type information hiding and recovering method, equipment and medium

An information hiding and generative technology, which is applied in the intersection of information security and information hiding without carrier, can solve the problems of low embedding capacity of single carrier, expensive retrieval and maintenance, and limited expression ability.

Pending Publication Date: 2021-01-05
SHAANXI NORMAL UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although search-based information hiding will not modify the carrier, the common problems are: 1) It is necessary to find a suitable unmodified carrier from a large-scale natural carrier dataset. With the enhancement of the expressive ability of the database text and image information, The amount of data that needs to be searched also increases geometrically. Even with the inverted index, its search, storage and maintenance costs are very high, for example: Chen X Y, 2015 (Chen X Y, Sun H Y, Yoshito T, et al.Coverless information hiding method based on the Chinese mathematical expression[C] / / International Conference on Cloud Computing and Security.Nanjing, 2015:133-143) constructed a 10.2GB text database, and established the first 50 words that appear in the text for the first time The radicals, the corresponding keywords and the inverted index structure of the corresponding path; Chen X Y, 2017 (Chen X Y, Chen S, Wu Y L.Coverless multi-keywords information hiding method based on text[J].International Journal of Security and Its Applications, 2016, 10(9): 309-320) constructed a text database of 10GB, including 2 n The inverted index file corresponding to each identifier is about 8.4MB ~ 9.5MB, so even if the inverted index is established, the cost of retrieval and maintenance is still very high; The expression ability is very limited, resulting in extremely low embedding capacity of a single vector, for example: Zhou Z L, 2015 (Zhou Z L, Sun H Y, Harit R, et al.Coverless image steganography without embedding[C] / / International Conference on Cloud Computing andSecurity.Nanjing ,2015:123-132) the embedding capacity is only 8 bits / image, Zhou Zhili, 2016 (Zhou Zhili, Cao Yi, Sun Xingming. Carrier-free information hiding based on image Bag-of-Words model[J]. Applied Science Journal, 2016, 34(5):527-536) the embedding capacity is only 1.57 and 1.86 Chinese characters / image; 3) Due to the low embedding capacity of a single carrier, such methods need to intensively transmit a large number of irrelevant text or images to express secret information, thereby easily arousing suspicion
[0008] However, the following problems still exist in the above scheme: the random embedding position is grid-aligned, which easily causes the coding space to be exposed; at the same time, the generated dense cover image has only two choices when placing the coded sample blocks, and there are obvious problems. repeating pattern of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block replacement generation type information hiding and recovering method, equipment and medium
  • Block replacement generation type information hiding and recovering method, equipment and medium
  • Block replacement generation type information hiding and recovering method, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0141]It should be noted that the terms "comprising" and "having" in the description and claims of the present invention and the above drawings, as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, including a series of steps or units A process, method, system, product or device is not necessarily limited to those steps or elements explicitly listed, but may include other steps or elements not explicitly listed or inherent to the process, method, product or device.

[0142] The present invention is described in further detail below in conjunction with accompanying drawing:

[0143] The following takes JAVA jdk1.8.0_65 as the implementation environment of the case, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, but is not limited to this implementation case, see figure 1 , in one embodiment of the present invention, a block replacement generative information hiding me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the crossing field of information security and carrier-free information hiding, and discloses a generation type information hiding and recovering method, equipment and a medium. During hiding, a blindage is converted into a binary noisy point graph as a secret-free blindage; the positions of random secret embedding sample small blocks areobtained from the secret-free blindage by the secret key, candidate random sample small blocks with the number consistent with the number of binary noisy points of the secret embedding position sample small blocks are generated, and the sample small blocks consistent or having the maximum difference are selected as coding sample small blocks; and a secret-containing blindage is generated by replacing and scrambling the secret-embedded position sample small blocks with the coded sample small blocks. During recovery, a coded sample small block and a random secret embedding position are generated by a secret key, and secret information is extracted through comparison of the secret-containing blindage graph small block, the secret-free blindage graph small block and the coded sample small block. Compared with an existing method, the method of the invention has the advantages that modification embedding is not involved, splicing traces are not generated, a secret-containing blindage repetition mode is eliminated, a secret information coding space is hidden, and good anti-attack capacity and visual quality are achieved.

Description

technical field [0001] The invention belongs to the intersecting fields of information security and carrierless information hiding, and relates to a carrierless information hiding and recovery method, in particular to a block replacement generative information hiding and recovery method, equipment and medium. Background technique [0002] Traditional information hiding usually uses modified methods to embed secret information into redundant space. Although it is difficult for human eyes to detect this, with the development of compression technology, the redundant space available for modified embedding becomes smaller and smaller. , with the continuous development of deep learning, the precision, dimensionality and performance of steganalyzers are continuously improved, making it less and less likely that the modification traces left by the modified embedding in the embedding carrier will not be discovered. The development of information hiding has fallen into a bottleneck. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T9/00G06T7/11G06F21/60G06F21/55G06F17/18
CPCG06F21/602G06T7/11G06F21/55G06F17/18G06T9/00
Inventor 邵利平赵迪任平安
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products