CN106961602A - A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code - Google Patents
A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code Download PDFInfo
- Publication number
- CN106961602A CN106961602A CN201710199960.9A CN201710199960A CN106961602A CN 106961602 A CN106961602 A CN 106961602A CN 201710199960 A CN201710199960 A CN 201710199960A CN 106961602 A CN106961602 A CN 106961602A
- Authority
- CN
- China
- Prior art keywords
- information
- code
- check
- hamming
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004422 calculation algorithm Methods 0.000 title claims abstract description 33
- 238000007906 compression Methods 0.000 claims abstract description 21
- 238000000034 method Methods 0.000 claims description 36
- 238000012937 correction Methods 0.000 claims description 10
- 238000000605 extraction Methods 0.000 claims description 7
- 230000035945 sensitivity Effects 0.000 claims description 7
- 230000009466 transformation Effects 0.000 claims description 7
- 230000000007 visual effect Effects 0.000 claims description 7
- 238000003064 k means clustering Methods 0.000 claims description 4
- 230000000873 masking effect Effects 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 238000012804 iterative process Methods 0.000 claims description 3
- 230000006835 compression Effects 0.000 abstract description 8
- 239000000284 extract Substances 0.000 abstract description 4
- 230000037431 insertion Effects 0.000 abstract 1
- 238000003780 insertion Methods 0.000 abstract 1
- 238000013139 quantization Methods 0.000 description 11
- 238000012360 testing method Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 9
- 229910002056 binary alloy Inorganic materials 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 238000002474 experimental method Methods 0.000 description 3
- 238000007621 cluster analysis Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 239000000654 additive Substances 0.000 description 1
- 229910045601 alloy Inorganic materials 0.000 description 1
- 239000000956 alloy Substances 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010899 nucleation Methods 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/124—Quantisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/169—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
- H04N19/17—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/20—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video object coding
- H04N19/25—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video object coding with scene description coding, e.g. binary format for scenes [BIFS] compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/40—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/44—Decoders specially adapted therefor, e.g. video decoders which are asymmetric with respect to the encoder
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Image Processing (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The present invention relates to a kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code, combining Reed Solomon code(Reed Solomon code, RS codings)Enter row information coded treatment to hiding information with hamming code, extract the DCT coefficient of JPEG carrier images and quantify its coefficient, pass through K mean clusters(K‑means)In the size of two intermediate frequency coefficients in the every 8*8 blocks of analytic statistics noise threshold adjustment, information insertion jpeg image most at last after coded treatment.The JPEG picture containing hiding information that the present invention is obtained is compressed after across the sharing and forward of heterogeneous networks platform, still can correctly, intactly extract hiding information.Therefore, the algorithm has good repellence and stronger stability to many second compressions of the anti-platforms of JPEG.
Description
Technical Field
The invention relates to the field of image processing, in particular to a cross-platform anti-compression color image information hiding algorithm based on RS and Hamming codes.
Background
With the rapid development of networks and multimedia, information hiding technology becomes a research hotspot in the field of information security. The digital image is a widely applied mode in social networks (WeChat, QQ, microblog, email and the like), and naturally becomes a good propagation carrier in information hiding.
At present, there are two main types of information hiding algorithms: a spatial domain concealment algorithm and a transform domain concealment algorithm. The spatial domain hiding algorithm is easy to realize, the hiding capacity is large, and the robustness is not strong; the transform domain hiding algorithm has strong robustness, but the embedded information quantity is small and the algorithm is complex. Such as Tamimi[1]The data embedding rate of the method proposed by the people is too low, and the plum-willow and the like[2]The proposed algorithm mainly hides the watermark pattern in the carrier image and does not solve the problem of image compression in the network transmission process well.
[1]Tamimi A A,Abdalla A M,Al-Allaf O.Hiding an Image inside anotherImage using Variable-Rate Steganography[J].International Journal of AdvancedComputer Science&Application,2013,4(10):18-21。
[2] Plum, Yangmen, YCbCr color space and DCT based color image watermarking algorithm [ J ]. computer and information technology, 2016,24(1): 10-13.
Disclosure of Invention
In view of this, the present invention provides a cross-platform anti-compression color image information hiding algorithm based on RS and hamming codes, which has stable anti-compression performance, that is, after the image with hidden information is shared and forwarded by each platform, the hidden information can still be correctly extracted.
The invention is realized by adopting the following scheme: a cross-platform anti-compression color image information hiding algorithm based on RS and Hamming codes specifically comprises the following steps:
step S1: encrypting the hidden information into binary hidden data stream by using a specific coding mode, and obtaining check bits through double coding of RS codes and Hamming codes to form hidden data;
step S2: and (3) hiding information: extracting DCT coefficients of the JPEG carrier image, quantizing the coefficients, analyzing and counting a noise threshold value through K-means, and adjusting the size of two intermediate frequency coefficients in each 8 x 8 block;
step S3: and embedding the information after the coding processing into a JPEG image to obtain a JPEG cryptograph.
Further, in step S1, the specific encoding method is a digital-letter hybrid encoding method, the information to be hidden is divided into two character groups, the first character in each group is multiplied by 45 through a character index table, the second character index data is added and converted into a binary code of 11 bits, and if only one character is in number, the 6-bit binary code is used for representing the character.
Further, the encoding process of the RS code adopts a basic method [ J ] of Liuyan, Zhang, RS encoding and decoding, a scientific and technological information technology, 2011, (32) and 3-5, and the specific steps are as follows:
step S101: according to the primitive polynomial g (x) of GF field8+x4+x3+x2+1, solving all elements in the domain;
step S102: the check code generating polynomial is:xn-1 ═ g (x) h (x), the check polynomial h (x) is determined from the operating rules in the galois field; where k is the total check code number, k0Is usually 0 or 1, α is the root of the primitive polynomial g (x);
step S103: sequentially solving check elements: cn-k-1,Cn-k-2,...,C1,C0(ii) a Wherein, the check element is the error correction data;
the decoding process of the RS code adopts a basic method [ J ] of Liuyan, Zhang Liang and RS encoding and decoding, a scientific and technological information technology, 2011, (32) and 3-5, and the specific steps are as follows:
step S111: receiving data code r (x) to obtain adjoint polynomial Sj;
Step S112: examination SjIf all the received code words are 0, the received code words are valid code words, and go to step S118;
step S113: initialization:ω0=1+S(x),t-1=0,t0=1;
wherein d isminRepresents the lowest power of the information polynomial, and S (x) represents the value of the adjoint polynomial x;
step S114: iteration:
ωk=αk-1ωk-2+αk-2xmωk-1,
tk=αk-1tk-2+αk-2xmtk-1;
therein, αk-1And αk-2Are each omegak-1And ωk-2M is ωk-1And ωk-2Until deg (ω) is reached, the iterative process of step S114 is performedk)≤t;
Step 115: from SjObtaining an error position polynomial A (x); solving the root of A (x) to obtain the number of error positions and determining the error positions; if the number of roots is less than the degree of A (x), which indicates that there is a heavy root or a root on the extension field, the decoding fails, and go to step S119; wherein,
A(x)=en-1xn-1+en-2xn-2+...+e0;
wherein e represents an error location;
step 116: solving an error value by a Forney algorithm, if the denominator is 0, failing to decode, and turning to the step S119;
step 117: subtracting the error value from the corresponding position of the received code word, and correcting errors;
step 118: outputting information bits of the correct code word;
step 119, outputting the information bits in the received code word to the decoding failure flag.
Further, the encoding rule of the hamming code includes the following steps:
step S121: calculating a check bit: n represents the data length of the added check code, K represents the effective information digit, r represents the added check code digit, and the relation is satisfied: k + r is less than or equal to 2r-1;
Step S122: all the check code positions are 2nThe power position, the available check bits are respectively: 1. positions 2, 4, 8 and 16, wherein the number of the leftmost bits is counted;
step S123: dividing each bit in the K + r bit Hamming code into r parity groups, and according to the grouping result, each group calculates the check bit according to odd or even check to form the Hamming check code.
Further, the step S2 is specifically: dividing data into preset class numbers K on the basis of a minimum error function by adopting a K-means clustering algorithm, dividing an image into a plurality of layers due to different texture complexity and color brightness of a carrier image, and introducing reasonable adjustment factors to hide information so as to balance the transparency and the robustness of the image; and calculating the noise sensitivity of the image block by adopting a human eye vision masking model to hide information.
Further, the step S3 specifically includes the following steps:
step S31: the secret information M generates binary data M1 in an encoding mode;
step S32: the M1 data are sequentially encoded by RS and Hamming to obtain data M2 containing error correction bits and check bits, namely the final content to be hidden;
step S33: extracting green channels G from the carrier image S, dividing the green channels G into 8-8 non-overlapped blocks, respectively performing DCT (discrete cosine transform) transformation on each block and quantizing DCT coefficients;
step S34: calculating a threshold jnd for each block of visual noise;
step S35: two coefficients are selected from the intermediate frequency coefficients, and are set as a and b, and the embedding process is described as follows:
when 0 is to be embedded, judging the relationship between a and b, when a-b < jnd, a-a + jnd, b-jnd; otherwise, the values of a and b are not changed;
when 1 is to be embedded, judging the relationship between a and b, when b-a < jnd, a-jnd and b-b + jnd; otherwise, the values of a and b are not changed;
step S36: DCT blocks are inversely transformed and inversely quantized, and stored as RGB color space.
Further, the method also includes step S4: the method for extracting the hidden information specifically comprises the following steps:
step S41: extracting a color RGB image G channel containing hidden information, dividing the color RGB image G channel into 8-8 non-overlapped blocks, respectively carrying out DCT (discrete cosine transform) transformation on each block and quantizing DCT coefficients;
step S42: selecting from each block a corresponding intermediate frequency coefficient pair Fij(r1,r2) And Fij(l1,l2) The extraction formula is as follows:
wherein V represents the extracted information data;
step S43: v, obtaining a binary character string through Hamming decoding and RS decoding;
step S44: and performing a reverse coding mode on the binary character string to obtain final hidden information.
Compared with the prior art, the invention has the following beneficial effects:
1. the hidden information is encrypted into binary hidden data stream by using a self-owned coding mode, and check bits are obtained by using RS and Hamming coding modes to form hidden data;
2. the invention preprocesses the carrier image, extracts the quantized DCT coefficient through the compression property of JPEG, and cuts the optimal adjusting factor through the pixel value cluster analysis of G channel, thereby achieving good image invisibility and robustness. And (4) hiding information by combining the adjustment factor and the quantized DCT coefficient.
3. The invention has good burst error correction capability based on RS codes; and the noise factor is calculated by adopting K-means clustering statistics, so that the method has a good embedding effect on images with different brightness and texture complexity. The invention has stable compression resistance, namely, after the picture with the hidden information is shared and forwarded by each platform, the hidden information can still be correctly extracted.
Drawings
FIG. 1 is a flow chart of the method principle of the present invention.
FIG. 2 is a table of character comparisons according to an embodiment of the present invention.
Fig. 3 shows the comparison result 1 of different images and different quantization factor images.
Fig. 4 shows the comparison result 2 of different images and different quantization factor images.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
As shown in fig. 1, the present embodiment provides a cross-platform anti-compression color image information hiding algorithm based on RS and hamming codes, which specifically includes the following steps:
step S1: encrypting the hidden information into binary hidden data stream by using a specific coding mode, and obtaining check bits through double coding of RS codes and Hamming codes to form hidden data;
step S2: and (3) hiding information: extracting DCT coefficients of the JPEG carrier image, quantizing the coefficients, analyzing and counting a noise threshold value through K-means, and adjusting the size of two intermediate frequency coefficients in each 8 x 8 block;
step S3: and embedding the information after the coding processing into a JPEG image to obtain a JPEG cryptograph.
In this embodiment, in step S1, the specific encoding method is a digital-letter hybrid encoding method, the information to be hidden is divided into two character groups, the first character in each group is multiplied by 45 through a character index table, the second character index data is added and converted into an 11-bit binary code, and if only one character is in number, the 6-bit binary code is used for representing the character. Fig. 2 is a numeric alphabet comparison table of the present embodiment.
For example, the input: BeiKa #
Decimal system: be: 10 × 45+13 ═ 463, iK: 17 × 45+19 is 784, a #: 9 × 45+3 ═ 408;
binary system: 00111001111, respectively; 01100010000, respectively; 00110011000, respectively;
the decoding mode, namely the reverse process of the coding mode, obtains a binary system of 11 bits, converts the binary system into a corresponding 10-system, divides the binary system by 45 and rounds the binary system to obtain a number on ten bits, and obtains a number on one bit by modulo 45, and then obtains a corresponding character through a character comparison table.
In this embodiment, regarding RS encoding and decoding, a JPEG picture is strongly compressed during a cross-platform transmission process, which affects correct extraction of hidden information. The RS code can correct random errors and burst errors and has strong error correction capability.
The generation of RS error correcting code, namely the coding process of RS, the coefficients from (n-1) th to (n-k) th times of the code word polynomial are information bits, and the rest are check bits. An information polynomial: m (x) ═ mk-1xk-1+mk-2xk-2+m1x+m0(ii) a The information bit represents: m isk-1,...,m1,m0(ii) a The check polynomial is expressed as: r (x) rn-k-1xn-k-1+...+r1x+r0(ii) a The data code polynomial is: c (x) ═ Cn-1xn-1+Cn-2xn-2+...+Cn-kxn-k+Cn-k-1xn-k-1+...+C1x+C0;
In this embodiment, the encoding process of the RS code adopts the basic method [ J ] of the "liuyan, zhang, RS codec, the scientific and technical information technology, 2011, (32): 3-5", and the specific steps are as follows:
step S101: according to the primitive polynomial g (x) of GF field8+x4+x3+x2+1, solving all elements in the domain;
step S102: check code generator polynomialComprises the following steps:xn-1 ═ g (x) h (x), the check polynomial h (x) is determined from the operating rules in the galois field; where k is the total check code number, k0Is usually 0 or 1, α is the root of the primitive polynomial g (x);
step S103: sequentially solving check elements: cn-k-1,Cn-k-2,...,C1,C0(ii) a Wherein, the check element is the error correction data;
the decoding process of the RS code adopts a basic method [ J ] of Liuyan, Zhang Liang and RS encoding and decoding, a scientific and technological information technology, 2011, (32) and 3-5, and the specific steps are as follows:
step S111: receiving data code r (x) to obtain adjoint polynomial Sj;
Step S112: examination SjIf all the received code words are 0, the received code words are valid code words, and go to step S118;
step S113: initialization:ω0=1+S(x),t-1=0,t0=1;
wherein d isminRepresents the lowest power of the information polynomial, and S (x) represents the value of the adjoint polynomial x;
step S114: iteration:
ωk=αk-1ωk-2+αk-2xmωk-1,
tk=αk-1tk-2+αk-2xmtk-1;
therein, αk-1And αk-2Are each omegak-1And ωk-2M is ωk-1And ωk-2Until deg (ω) is reached, the iterative process of step S114 is performedk)≤t;
Step 115: from SjObtaining an error position polynomial A (x); solving the root of A (x) to obtain the number of error positions and determining the error positions; if the number of roots is less than the degree of A (x), which indicates that there is a heavy root or a root on the extension field, the decoding fails, and go to step S119; wherein,
A(x)=en-1xn-1+en-2xn-2+...+e0;
wherein e represents an error location;
step 116: solving an error value by a Forney algorithm, if the denominator is 0, failing to decode, and turning to the step S119;
step 117: subtracting the error value from the corresponding position of the received code word, and correcting errors;
step 118: outputting information bits of the correct code word;
step 119, outputting the information bits in the received code word to the decoding failure flag.
In this embodiment, regarding Hamming Code, Hamming Code (Hamming Code) has multiple check bits and error correction Code for detecting and correcting one bit error Code, and this embodiment applies Hamming Code to correct RS Code due to errors in transmission process, and combines with RS Code to achieve better error correction capability.
The encoding rule of the Hamming code comprises the following steps:
step S121: calculating a check bit: n represents the data length of the added check code, K represents the effective information digit, r represents the added check code digit, and the relation is satisfied: k + r is less than or equal to 2r-1; in the present embodiment, K is 16, r is 5;
step S122: all the check code positions are 2nThe power position, the available check bits are respectively: 1. positions 2, 4, 8, 16, wherein,counting from the leftmost digit;
step S123: dividing each bit in the K + r bit Hamming code into r parity groups, and according to the grouping result, each group calculates the check bit according to odd or even check to form the Hamming check code. The present embodiment adopts odd check calculation, and the rule is as follows: the number of "1" s in each group is odd.
In this embodiment, the step S2 specifically includes: dividing data into preset class numbers K on the basis of a minimum error function by adopting a K-means clustering algorithm, dividing an image into a plurality of layers due to different texture complexity and color brightness of a carrier image, and introducing reasonable adjustment factors to hide information so as to balance the transparency and the robustness of the image; and calculating the noise sensitivity of the image block by adopting a human eye vision masking model to hide information. The method comprises the following specific steps:
1. dividing the carrier image into blocks and calculating the mean value of each block;
2. determining a reasonable K value according to the complexity of the image;
3. initial centroid selection using Arthur&Vassilvitskii(2007)k-means++:The Advantagesof Careful Seeding[5]The algorithm proposed in the method obtains an initial central value;
wherein [5] is Arthur D, Vassivskii S.k-means + +, the additives of the carboeffect cutting [ C ]// Eighteenth Acm-Simam Symposium on dispersed alloys, SODA2007, New Orleanes, Louisiana, Usa, January.2015:1027 + 1035.
4. And dividing K-means into K classes of layers, and calculating different layers and selecting different values. (numerical ranges are given below for experimental data).
The human eye vision masking model adopts 'Charebis, robust digital watermarking and encrypted digital watermarking related technology research [ D ]. Wuhan, Wuhan university of science and technology, 2005', and the specific calculation steps are as follows:
1. 8-8 blocking and DCT transformation are carried out on the carrier image:
the forward discrete cosine transform formula is as follows:
the inverse discrete cosine transform formula is as follows:
2. the contrast sensitivity of each sub-block was calculated:
C(u,v)=5.05e-0.178(u+v)(e0.1(u+v)-1);
3. visual sensitivity of individual sub-blocks to noise
Wherein u, v ∈ {0,1, 2.., n-1}, FDCTAnd (u, v) are values of the blocks subjected to DCT transform. SDCTThe visual sensitivity of human eyes to the image blocks is shown, the larger the value of the visual sensitivity, the more insensitive the human eyes to the noise in the image and the larger the intensity value of the information which can be hidden. If S is obtained by calculationDCTWhen the information is hidden, the empirical value pair S is used as 0DCTAnd carrying out assignment.
4. Calculating visual noise threshold of image, jnd- β log2(SDCT)/0.30103;
In this embodiment, regarding the loading process of information, a color image with a carrier image of 640 × 640 is used, the hidden information is a character string with any length, the information to be hidden is embedded into the quantized DCT coefficients, and the quantization factor is controlled by α. Suppose S represents the original RGB true-color image and M represents a character or character string to be hidden. The DCT domain is divided into low-frequency, medium-frequency and high-frequency regions, the low frequency is most sensitive to vision, the algorithm robustness can be increased by modifying the low frequency, and the invisibility of the algorithm is reduced; modifying the high frequency coefficient results in poor image robustness, so the present embodiment adopts modifying the intermediate frequency coefficient.
The step S3 specifically includes the following steps:
step S31: the secret information M generates binary data M1 in an encoding mode;
step S32: the M1 data are sequentially encoded by RS and Hamming to obtain data M2 containing error correction bits and check bits, namely the final content to be hidden;
step S33: extracting green channels G from the carrier image S, dividing the green channels G into 8-8 non-overlapped blocks, respectively performing DCT (discrete cosine transform) transformation on each block and quantizing DCT coefficients;
step S34: calculating a threshold jnd for each block of visual noise;
step S35: two coefficients are selected from the intermediate frequency coefficients, and are set as a and b, and the embedding process is described as follows:
when 0 is to be embedded, judging the relationship between a and b, when a-b < jnd, a-a + jnd, b-jnd; otherwise, the values of a and b are not changed;
when 1 is to be embedded, judging the relationship between a and b, when b-a < jnd, a-jnd and b-b + jnd; otherwise, the values of a and b are not changed;
step S36: DCT blocks are inversely transformed and inversely quantized, and stored as RGB color space.
In this embodiment, the method further includes step S4: extracting the hidden information, wherein the algorithm of the embodiment is a hidden technology of blind extraction, and the information extraction process and the information embedding process are mutually inverse processes; the method specifically comprises the following steps:
step S41: extracting a color RGB image G channel containing hidden information, dividing the color RGB image G channel into 8-8 non-overlapped blocks, respectively carrying out DCT (discrete cosine transform) transformation on each block and quantizing DCT coefficients;
step S42: selecting from each block a corresponding intermediate frequency coefficient pair Fij(r1,r2) And Fij(l1,l2) The extraction formula is as follows:
wherein V represents the extracted information data;
step S43: v, obtaining a binary character string through Hamming decoding and RS decoding;
step S44: and performing a reverse coding mode on the binary character string to obtain final hidden information.
Preferably, the experimental results and analysis of this embodiment are as follows.
In this embodiment, a 24-bit color image with an original image size of 640 × 640 is adopted, and the hidden information is a character string: ceshi0123456789abcdefghijklmnopqrstuvwxyz $% + -.
VS2010 and calling opencv2.4.9 library are taken as experimental tools. The image attack tool uses matlab2014a, with patch size of 8 x 8.
In the embodiment, a peak signal-to-noise ratio (PSNR) is used to measure the influence of subjective factors on the similarity between an image after information hiding and an original image, and usually, when the PSNR is greater than or equal to 30, the difference of the image after the information hiding cannot be visually perceived. PSNR is defined as follows:
calculating MSE value of each channel of RGB three channels, and calculating PSNR value after taking average value:
the quantization factor is tested as follows:
the size of the quantization factor alpha determines the transparency and robustness of the information hidden picture, and also affects the selection of the quantization matrix, and if the size of the quantization factor alpha is too large, the transparency of the carrier image is reduced, and if the size of the quantization factor alpha is too small, the robustness of the image is reduced. In a large number of experiments, the value of α is optimally: between 0.01 and 3, values below 1 being chosen in this experiment, the following results were achieved:
in the experimental process, when α is 0.01, correct hidden information cannot be extracted; when α is 0.5 or more, the image distortion is severe, so the value of the quantization factor α is selected here as: 0.05-0.15. Fig. 3 and 4 show the comparison results of two different images with quantization factors of 0.05 and 0.1.
The K-means cluster analysis adjusting factor selection experiment comprises the following steps:
when the image is hidden in the information, because the texture complexity or the brightness difference between the carrier images is too large, the selection is carried out according to the value empirical value of the adjusting factor, and the extraction accuracy of the hidden information is influenced. Therefore, the brightness of different levels of the picture is tested by adopting different adjustment factors. The results are shown in the following table:
from the two experimental results, the following test of this example selects α ═ 0.1 and β ∈ [0.4,1.0] to perform the cross-platform compression resistance test of the image.
Wherein, the compression resistance test result is as follows:
the cross-platform compression resistance test method comprises the following steps: testing mainstream interactive platforms such as WeChat point-to-point (mutual forwarding or downloading and forwarding of two parties), QQ point-to-point, QQ space, microblog sharing and the like, wherein the testing machine is selected from different types of mainstream mobile phones on the market, and the testing system is divided into android and IOS; testing the selected images: 640 x 640 of the 24-bit color images, wherein the quantization factor alpha is 0.1; the regulation factor is as follows: beta belongs to [0.4,1.0 ]. If all the test patterns can correctly extract information, the pressure resistance is stable. The tests in the following table are the robustness performance against JPEG/JPEG2000 attacks with quality factor (quality factor) of 20-100;
the tests in the table below are multiple cross-platform compression resistance tests.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.
Claims (7)
1. A cross-platform anti-compression color image information hiding algorithm based on RS and Hamming codes is characterized in that: the method comprises the following steps:
step S1: encrypting the hidden information into binary hidden data stream by using a specific coding mode, and obtaining check bits through double coding of RS codes and Hamming codes to form hidden data;
step S2: and (3) hiding information: extracting DCT coefficients of the JPEG carrier image, quantizing the coefficients, analyzing and counting a noise threshold value through K-means, and adjusting the size of two intermediate frequency coefficients in each 8 x 8 block;
step S3: and embedding the information after the coding processing into a JPEG image to obtain a JPEG cryptograph.
2. The RS and hamming code based cross-platform anti-compression color image information hiding algorithm of claim 1, wherein: in step S1, the specific encoding method is a digital-letter hybrid encoding method, the information to be hidden is divided into two character groups, the first character in each group is multiplied by 45 through the numerical value of the character index table, the second character index data is added and converted into 11-bit binary code, if the number of the characters is only one, the 6-bit binary code is used for representing the characters.
3. The RS and hamming code based cross-platform anti-compression color image information hiding algorithm of claim 1, wherein: the encoding process of the RS code comprises the following specific steps:
step S101: according to the primitive polynomial g (x) of GF field8+x4+x3+x2+1, solving all elements in the domain;
step S102: the check code generating polynomial is:xn-1 ═ g (x) h (x), the check polynomial h (x) is determined from the operating rules in the galois field; where k is the total check code number, k0Values of 0 or 1, α being the root of primitive polynomial g (x);
step S103: sequentially solving check elements: cn-k-1,Cn-k-2,...,C1,C0(ii) a Wherein, the check element is the error correction data;
the decoding process of the RS code comprises the following specific steps:
step S111: receiving data code r (x) to obtain adjoint polynomial Sj;
Step S112: examination SjIf all the received code words are 0, the received code words are valid code words, and go to step S118;
step S113: initialization:ω0=1+S(x),t-1=0,t0=1;
wherein d isminRepresents the lowest power of the information polynomial, and S (x) represents the value of the adjoint polynomial x;
step S114: iteration:
ωk=αk-1ωk-2+αk-2xmωk-1,
tk=αk-1tk-2+αk-2xmtk-1;
therein, αk-1And αk-2Are each omegak-1And ωk-2M is ωk-1And ωk-2Until deg (ω) is reached, the iterative process of step S114 is performedk)≤t;
Step 115: from SjObtaining an error position polynomial A (x); solving the root of A (x) to obtain the number of error positions and determining the error positions; if the number of roots is less than the degree of A (x), which indicates that there is a heavy root or a root on the extension field, the decoding fails, and go to step S119; wherein,
A(x)=en-1xn-1+en-2xn-2+...+e0;
wherein e represents an error location;
step 116: solving an error value by a Forney algorithm, if the denominator is 0, failing to decode, and turning to the step S119;
step 117: subtracting the error value from the corresponding position of the received code word, and correcting errors;
step 118: outputting information bits of the correct code word;
step 119, outputting the information bits in the received code word to the decoding failure flag.
4. The RS and hamming code based cross-platform anti-compression color image information hiding algorithm of claim 1, wherein: the encoding rule of the Hamming code comprises the following steps:
step S121: calculating a check bit: n represents the data length of the added check code, K represents the effective information digit, r represents the added check code digit, and the relation is satisfied: k + r is less than or equal to 2r-1;
Step S122: all the check code positions are 2nThe power position, the available check bits are respectively: 1. positions 2, 4, 8 and 16, wherein the number of the leftmost bits is counted;
step S123: dividing each bit in the K + r bit Hamming code into r parity groups, and according to the grouping result, each group calculates the check bit according to odd or even check to form the Hamming check code.
5. The RS and hamming code based cross-platform anti-compression color image information hiding algorithm of claim 1, wherein: the step S2 specifically includes: dividing data into preset class numbers K on the basis of a minimum error function by adopting a K-means clustering algorithm, dividing an image into a plurality of layers due to different texture complexity and color brightness of a carrier image, and introducing reasonable adjustment factors to hide information so as to balance the transparency and the robustness of the image; and calculating the noise sensitivity of the image block by adopting a human eye vision masking model to hide information.
6. The RS and hamming code based cross-platform anti-compression color image information hiding algorithm of claim 1, wherein: the step S3 specifically includes the following steps:
step S31: the secret information M generates binary data M1 in an encoding mode;
step S32: the M1 data are sequentially encoded by RS and Hamming to obtain data M2 containing error correction bits and check bits, namely the final content to be hidden;
step S33: extracting green channels G from the carrier image S, dividing the green channels G into 8-8 non-overlapped blocks, respectively performing DCT (discrete cosine transform) transformation on each block and quantizing DCT coefficients;
step S34: calculating a threshold jnd for each block of visual noise;
step S35: two coefficients are selected from the intermediate frequency coefficients, and are set as a and b, and the embedding process is described as follows:
when 0 is to be embedded, judging the relationship between a and b, when a-b < jnd, a-a + jnd, b-jnd; otherwise, the values of a and b are not changed;
when 1 is to be embedded, judging the relationship between a and b, when b-a < jnd, a-jnd and b-b + jnd; otherwise, the values of a and b are not changed;
step S36: DCT blocks are inversely transformed and inversely quantized, and stored as RGB color space.
7. The RS and hamming code based cross-platform anti-compression color image information hiding algorithm of claim 1, wherein: further comprising step S4: the method for extracting the hidden information specifically comprises the following steps:
step S41: extracting a color RGB image G channel containing hidden information, dividing the color RGB image G channel into 8-8 non-overlapped blocks, respectively carrying out DCT (discrete cosine transform) transformation on each block and quantizing DCT coefficients;
step S42: selecting from each block a corresponding intermediate frequency coefficient pair Fij(r1,r2) And Fij(l1,l2) The extraction formula is as follows:
wherein V represents the extracted information data;
step S43: v, obtaining a binary character string through Hamming decoding and RS decoding;
step S44: and performing a reverse coding mode on the binary character string to obtain final hidden information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710199960.9A CN106961602B (en) | 2017-03-30 | 2017-03-30 | A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710199960.9A CN106961602B (en) | 2017-03-30 | 2017-03-30 | A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106961602A true CN106961602A (en) | 2017-07-18 |
CN106961602B CN106961602B (en) | 2019-10-18 |
Family
ID=59471563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710199960.9A Active CN106961602B (en) | 2017-03-30 | 2017-03-30 | A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106961602B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636707A (en) * | 2018-12-05 | 2019-04-16 | 厦门北卡信息科技有限公司 | A kind of blind Detecting Information hiding and extracting method based on image texture characteristic |
CN111654353A (en) * | 2019-03-04 | 2020-09-11 | 南京大学 | FEC scheme facing next generation Ethernet and decoder hardware architecture thereof |
CN113344763A (en) * | 2021-08-09 | 2021-09-03 | 江苏羽驰区块链科技研究院有限公司 | Robust watermarking algorithm based on JND and oriented to screen shooting |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6604218B1 (en) * | 1999-01-12 | 2003-08-05 | Matsushita Electric Industrial Co., Ltd. | Data encoding apparatus and data decoding apparatus |
CN101004830A (en) * | 2006-12-20 | 2007-07-25 | 北京理工大学 | Robust watermark technique of digital image selected from space domain of images |
CN101064162A (en) * | 2006-04-28 | 2007-10-31 | 富士通株式会社 | Error correction device, encoder, decoder, method ,and information storage device |
US8683274B1 (en) * | 2006-05-08 | 2014-03-25 | Marvell International Ltd. | Error correction coding for varying signal-to-noise ratio channels |
CN103700061A (en) * | 2013-12-30 | 2014-04-02 | 东北大学 | Compressive-sensing-based digital image watermark embedding and extraction method |
CN105303512A (en) * | 2015-09-18 | 2016-02-03 | 安徽大学 | Video dual watermark method based on SVD and QR codes |
-
2017
- 2017-03-30 CN CN201710199960.9A patent/CN106961602B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6604218B1 (en) * | 1999-01-12 | 2003-08-05 | Matsushita Electric Industrial Co., Ltd. | Data encoding apparatus and data decoding apparatus |
CN101064162A (en) * | 2006-04-28 | 2007-10-31 | 富士通株式会社 | Error correction device, encoder, decoder, method ,and information storage device |
US8683274B1 (en) * | 2006-05-08 | 2014-03-25 | Marvell International Ltd. | Error correction coding for varying signal-to-noise ratio channels |
CN101004830A (en) * | 2006-12-20 | 2007-07-25 | 北京理工大学 | Robust watermark technique of digital image selected from space domain of images |
CN103700061A (en) * | 2013-12-30 | 2014-04-02 | 东北大学 | Compressive-sensing-based digital image watermark embedding and extraction method |
CN105303512A (en) * | 2015-09-18 | 2016-02-03 | 安徽大学 | Video dual watermark method based on SVD and QR codes |
Non-Patent Citations (1)
Title |
---|
TAESOO KIM等: "Efficient Transmission of Reversible Data Hiding in Encryption Images by Using Reed-Solomon Codes", 《2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636707A (en) * | 2018-12-05 | 2019-04-16 | 厦门北卡信息科技有限公司 | A kind of blind Detecting Information hiding and extracting method based on image texture characteristic |
CN109636707B (en) * | 2018-12-05 | 2023-03-21 | 北卡科技有限公司 | Blind detection information hiding and extracting method based on image texture features |
CN111654353A (en) * | 2019-03-04 | 2020-09-11 | 南京大学 | FEC scheme facing next generation Ethernet and decoder hardware architecture thereof |
CN113344763A (en) * | 2021-08-09 | 2021-09-03 | 江苏羽驰区块链科技研究院有限公司 | Robust watermarking algorithm based on JND and oriented to screen shooting |
Also Published As
Publication number | Publication date |
---|---|
CN106961602B (en) | 2019-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Janakiraman et al. | Pixel forefinger for gray in color: A layer by layer stego | |
Zhang et al. | A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients | |
Zhang et al. | A framework of adaptive steganography resisting JPEG compression and detection | |
Lefèvre et al. | Efficient image tampering localization using semi-fragile watermarking and error control codes | |
JP2003244419A (en) | Electronic watermark embedding method, encoder and decoder capable of utilizing such method | |
Zhang et al. | Novel video steganography algorithm based on secret sharing and error-correcting code for H. 264/AVC | |
CN106961602B (en) | A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code | |
CN112202984A (en) | Ciphertext domain reversible information hiding method based on error correction redundancy | |
Artiles et al. | Robust image watermarking algorithm using chaotic sequences | |
Yin et al. | Robust adaptive steganography based on dither modulation and modification with re-compression | |
CN111179144B (en) | Efficient information hiding method for multi-embedding of multi-system secret information | |
CN112132738B (en) | Image robust steganography method with reference generation | |
JP2004221715A (en) | Electronic watermark embedding method, and encoder and decoder capable of utilizing the method | |
Almayyahi et al. | High-security image steganography technique using XNOR operation and fibonacci algorithm | |
CN103581677B (en) | Image encrypted compression and decompression decryption method and device | |
Amsden et al. | Transmitting hidden information using steganography via Facebook | |
CN117041442A (en) | Image robust steganography method based on adaptive STC-ECC strategy | |
Abdelsatir et al. | A novel (k, n) secret sharing scheme from quadratic residues for grayscale Images | |
Pandian et al. | A hybrid embedded steganography technique: optimum pixel method and matrix embedding | |
Moloi et al. | Performance Analysis for Reed Solomon Codes and Bose Chaudhuri-Hocquenghem Codes in Digital Image Watermarking | |
Jiang et al. | Meaningful secret image sharing for JPEG images with arbitrary quality factors | |
CN106998471B (en) | Video hiding method and video extracting method for modifying prediction mode | |
Kumar et al. | Secret data hiding in image using AMBTC technique | |
Daneshmandpour et al. | Multi-rate reference embedding for highly-scalable self-recovery using fuzzy mamdani | |
Bezzateev et al. | Image encryption in code based compression algorithms based on multilevel image structure model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 350108 Room 132, Room 1, Building 10, Innovation Park, Haixi High-tech Industrial Park, East Science and Technology Road, Minhou County, Fuzhou City, Fujian Province Applicant after: North Carolina Technology Co., Ltd. Address before: 350108 Room 132, Room 1, Building 10, Innovation Park, Haixi High-tech Industrial Park, East Science and Technology Road, Minhou County, Fuzhou City, Fujian Province Applicant before: FUJIAN NORCA TECH CO., LTD. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |