[go: up one dir, main page]

CN108596820A - a kind of image processing system based on information security - Google Patents

a kind of image processing system based on information security Download PDF

Info

Publication number
CN108596820A
CN108596820A CN201810323138.3A CN201810323138A CN108596820A CN 108596820 A CN108596820 A CN 108596820A CN 201810323138 A CN201810323138 A CN 201810323138A CN 108596820 A CN108596820 A CN 108596820A
Authority
CN
China
Prior art keywords
module
image
information security
watermark
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810323138.3A
Other languages
Chinese (zh)
Other versions
CN108596820B (en
Inventor
韦鹏程
颜蓓
李莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Education
Original Assignee
Chongqing University of Education
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Education filed Critical Chongqing University of Education
Priority to CN201810323138.3A priority Critical patent/CN108596820B/en
Publication of CN108596820A publication Critical patent/CN108596820A/en
Application granted granted Critical
Publication of CN108596820B publication Critical patent/CN108596820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

本发明属于图像处理技术领域,公开了一种基于信息安全的图像处理系统,包括:图像采集模块、输入模块、主控模块、加密模块、成像模块、存储模块、判断模块、解码模块、水印模块。本发明提供水印模块按2×2像素大小进行不重叠分块,从待处理图像中提取灰度均值,将该灰度均值定义为水印信息,由于灰度均值由8位二进制位表示,其中高6位表示灰度均值的整数部分,嵌入从待处理图像提取的水印信息可以无误差的表示该图像块的灰度均值,无论是图像信息部分还是嵌入的水印信息部分只要有一个比特的数据改变,本算法将会检测出该图像被篡改。同时通过加密模块,将图像数据与密码组合,可以提高图像查看的安全性。

The invention belongs to the technical field of image processing, and discloses an image processing system based on information security, including: an image acquisition module, an input module, a main control module, an encryption module, an imaging module, a storage module, a judgment module, a decoding module, and a watermark module . The present invention provides a watermark module that performs non-overlapping blocks according to the size of 2×2 pixels, extracts the average gray value from the image to be processed, and defines the average gray value as watermark information. Since the average gray value is represented by 8 binary bits, the high 6 bits represent the integer part of the average gray value, embedding the watermark information extracted from the image to be processed can represent the average gray value of the image block without error, as long as there is one bit of data change in either the image information part or the embedded watermark information part , the algorithm will detect that the image has been tampered with. At the same time, through the encryption module, the image data is combined with the password, which can improve the security of image viewing.

Description

一种基于信息安全的图像处理系统An Image Processing System Based on Information Security

技术领域technical field

本发明属于图像处理技术领域,尤其涉及一种基于信息安全的图像处理系统。The invention belongs to the technical field of image processing, and in particular relates to an image processing system based on information security.

背景技术Background technique

信息安全主要包括以下五方面的内容,即需保证信息的保密性、真实性、完整性、未授权拷贝和所寄生系统的安全性。信息安全本身包括的范围很大,其中包括如何防范商业企业机密泄露、防范青少年对不良信息的浏览、个人信息的泄露等。网络环境下的信息安全体系是保证信息安全的关键,包括计算机安全操作系统、各种安全协议、安全机制(数字签名、消息认证、数据加密等),直至安全系统,如UniNAC、DLP等,只要存在安全漏洞便可以威胁全局安全。信息安全是指信息系统(包括硬件、软件、数据、人、物理环境及其基础设施)受到保护,不受偶然的或者恶意的原因而遭到破坏、更改、泄露,系统连续可靠正常地运行,信息服务不中断,最终实现业务连续性。然而,现有的图像如果被篡改不容易发现,导致图像传播的风险性;同时图像被转移出存储设备,则任何人都能够观看图像,用户的隐私没有得到完全保护。Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), and security systems, such as UniNAC, DLP, etc., as long as A security breach can threaten global security. Information security means that the information system (including hardware, software, data, people, physical environment and its infrastructure) is protected from being damaged, changed, or leaked due to accidental or malicious reasons, and the system operates continuously and reliably. Information services are not interrupted, ultimately achieving business continuity. However, if the existing image is tampered with, it is not easy to find out, which leads to the risk of image dissemination; at the same time, if the image is transferred out of the storage device, anyone can watch the image, and the user's privacy is not fully protected.

综上所述,现有技术存在的问题是:现有的图像如果被篡改不容易发现,导致图像传播的风险性;同时图像被转移出存储设备,则任何人都能够观看图像,用户的隐私没有得到完全保护。To sum up, the problems in the existing technology are: if the existing images are tampered with, it is not easy to find out, resulting in the risk of image dissemination; at the same time, if the images are transferred out of the storage device, anyone can watch the images, and the user's privacy is protected. Not fully protected.

发明内容Contents of the invention

针对现有技术存在的问题,本发明提供了一种基于信息安全的图像处理系统。Aiming at the problems existing in the prior art, the present invention provides an image processing system based on information security.

本发明是这样实现的,一种基于信息安全的图像处理系统包括:The present invention is achieved in that a kind of image processing system based on information security comprises:

图像采集模块、输入模块、主控模块、加密模块、成像模块、存储模块、判断模块、解码模块、水印模块;Image acquisition module, input module, main control module, encryption module, imaging module, storage module, judgment module, decoding module, watermark module;

图像采集模块,与主控模块连接,用于采集原始图片;An image acquisition module, connected with the main control module, for collecting original pictures;

所述图像采集模块提取信息安全图像训练样本的HoG特征和GMM特征,并将HoG特征和GMM特征相结合作为信息安全图像的特征;包括如下步骤:Said image acquisition module extracts the HoG feature and the GMM feature of the information security image training sample, and combines the HoG feature and the GMM feature as the feature of the information security image; comprises the following steps:

信息安全图像训练样本图像划分成若干个信息安全图像,将信息安全图像中的每个像素从RGB颜色空间转换到YCbCr颜色空间,并提取其Cb、Cr色度分量的值;其中,Y表示亮度分量,Cb表示蓝色色度分量,Cr表示红色色度分量;Divide the information security image training sample image into several information security images, convert each pixel in the information security image from the RGB color space to the YC b C r color space, and extract the values of its C b and C r chrominance components; Wherein, Y represents the luminance component, C b represents the blue chrominance component, and C r represents the red chrominance component;

将信息安全图像分成U个互不重叠的小图像块,分别求出每个小图像块在Cb、Cr色度分量上的均值向量:将这些均值向量分别代入步骤(2)训练出的GMM信息安全图像颜色模型,得到每个小图像块在GMM模型中每个高斯分量ωiGi(i∈{1,2,…,K})上的值,作为该小图像块的颜色特征,将U个小图像块的颜色特征联合起来记作 Divide the information security image into U small image blocks that do not overlap with each other, and calculate the mean value vector of each small image block on the C b , C r chrominance components: Substitute these mean vectors into the GMM information security image color model trained in step (2), and obtain each Gaussian component ω i G i (i∈{1,2,…,K} ), as the color feature of the small image block, the color features of U small image blocks are combined and recorded as

将信息安全图像训练样本图像转换成灰度图像,对输入图像进行Gamma校正;Convert the information security image training sample image into a grayscale image, and perform Gamma correction on the input image;

计算灰度图像中每个像素点(x,y)的水平方向和垂直方向梯度值gx(x,y)和gy(x,y);Calculate the horizontal and vertical gradient values g x (x, y) and g y (x, y) of each pixel (x, y) in the grayscale image;

gx(x,y)=I(x+1,y)-I(x-1,y)g x (x,y)=I(x+1,y)-I(x-1,y)

gy(x,y)=I(x,y+1)-I(x,y-1)g y (x,y)=I(x,y+1)-I(x,y-1)

式中,I(x,y)表示像素点(x,y)处的灰度值,根据下式计算像素点(x,y)处的梯度幅值g(x,y)和方向α(x,y);In the formula, I(x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g(x, y) and the direction α(x, y) at the pixel point (x, y) are calculated according to the following formula ,y);

将信息安全图像训练样本的灰度图像划分成信息安全图像,统计每个信息安全图像上的梯度直方图,用于描述目标的形状信息;Divide the grayscale image of the information security image training sample into information security images, and count the gradient histogram on each information security image, which is used to describe the shape information of the target;

对每个信息安全图像采用9个bin的直方图来统计信息安全图像内像素点的梯度信息,将各个bin中像素点的梯度大小进行累加组成该信息安全图像的梯度直方图,用9维特征向量来表示,记作h1=[f1,f2,…,f9],其中fi为第i个bin的梯度累加值;For each information security image, the histogram of 9 bins is used to count the gradient information of the pixels in the information security image, and the gradient size of the pixels in each bin is accumulated to form the gradient histogram of the information security image, and the 9-dimensional feature is used Vector, denoted as h 1 =[f 1 ,f 2 ,…,f 9 ], where f i is the cumulative gradient value of the ith bin;

联合得到的梯度特征向量h1和得到颜色特征向量h2,组成信息安全图像的特征向量[h1,h2];Combine the obtained gradient feature vector h 1 and the obtained color feature vector h 2 to form the feature vector [h 1 , h 2 ] of the information security image;

将信息安全图像组合成块,并在块内归一化;Combining infosec images into blocks and normalizing within blocks;

输入模块,与主控模块连接,用于输入用户操作图片信息;The input module is connected with the main control module and is used for inputting user operation picture information;

主控模块,与图像采集模块、输入模块、加密模块、存储模块、判断模块、水印模块连接,用于控制各个模块正常工作;The main control module is connected with the image acquisition module, input module, encryption module, storage module, judgment module and watermark module, and is used to control the normal operation of each module;

所述主控模块的信息安全图像缝合线采用消除跨重叠区域遮挡的方法,具体包括:The information security image stitching line of the main control module adopts a method of eliminating cross-overlapping area occlusion, specifically including:

1)采用阈值分割的方法将信息安全图像分为两部分,高量值区和低量值区,阈值代价准则定义如式(2)(3):1) Using the method of threshold segmentation to divide the information security image into two parts, the high value area and the low value area, the threshold cost criterion is defined as formula (2) (3):

其中为cost(公式(1)求得的误匹配度量矩阵,δ·T]是图像分割阈值,其中TI为重叠区域的最大误匹配量值,为固定常量,δ∈(0;的二值化矩阵;Among them, cost (the mismatch measurement matrix obtained by formula (1), δ T] is the image segmentation threshold, where TI is the maximum mismatch value in the overlapping area, which is a fixed constant, δ∈(0; for The binarization matrix;

2)判断缝合线的起点和终点是否均在低量值区(Tcost_b=0)且位于同一连通分量,即判断起点终点间是否存在一条路径;若不存在,表示图中存在一条或多条跨重叠区域的遮挡;查找跨重叠区域的遮挡,并逐步减小此遮挡区域的量值,直到不存在跨重叠区域的遮挡,使起点和终点位于同一连通分量内;此时起点终点所在的连通区域,即求解的缝合线最小连通域;2) Judging whether the starting point and the ending point of the suture line are both in the low-value area (Tcost_b=0) and located in the same connected component, that is, judging whether there is a path between the starting point and the ending point; if not, it means that there are one or more spanning The occlusion of the overlapping area; find the occlusion across the overlapping area, and gradually reduce the value of the occlusion area until there is no occlusion across the overlapping area, so that the starting point and the ending point are located in the same connected component; at this time, the connected area where the starting point and ending point are located , that is, the least connected domain of the suture line to be solved;

加密模块,与主控模块连接,用于对图片进行加密;An encryption module is connected with the main control module and is used to encrypt pictures;

成像模块,与加密模块连接,用于对图片加密后生成加密图片;The imaging module is connected with the encryption module, and is used to generate an encrypted picture after encrypting the picture;

存储模块,与主控模块连接,用于对加密图片进行存储;The storage module is connected with the main control module and is used to store the encrypted pictures;

判断模块,与主控模块连接,用于对用户输入的图片操作信息与加密模块加密信息进行匹配判断,如果一致则通过解码模块打开图片,否则无法打开;The judging module is connected with the main control module, and is used for matching and judging the picture operation information input by the user and the encrypted information of the encryption module. If they are consistent, the picture is opened through the decoding module, otherwise it cannot be opened;

解码模块,与判断模块连接,用于根据判断模块判断结果,如果一致,则解密图片;The decoding module is connected with the judging module, and is used for judging the result according to the judging module, and if it is consistent, the picture is decrypted;

水印模块,与主控模块连接,用于对图片进行嵌加水印。The watermark module is connected with the main control module and is used for embedding watermarks on pictures.

进一步,所述水印模块嵌入方法如下:Further, the embedding method of the watermark module is as follows:

首先,对待处理图像按2×2像素大小进行不重叠分块,得到若干个子块,计算子块中所有像素的灰度均值,将所述灰度均值定义为水印信息;根据第一密钥,利用logistic映射产生的第一伪随机二值序列对所述水印信息进行加密得到待嵌入水印信息;First, the image to be processed is divided into non-overlapping blocks according to the size of 2×2 pixels to obtain several sub-blocks, and the gray-scale mean value of all pixels in the sub-block is calculated, and the gray-scale mean value is defined as watermark information; according to the first key, Encrypting the watermark information using the first pseudo-random binary sequence generated by logistic mapping to obtain the watermark information to be embedded;

其次,根据第二密钥,利用logistic映射产生的第二伪随机二值序列对所述水印信息在所述待处理图像上的嵌入的位平面进行加密得到加密嵌入位平面;Secondly, according to the second key, the second pseudo-random binary sequence generated by logistic mapping is used to encrypt the embedded bit-plane of the watermark information on the image to be processed to obtain an encrypted embedded bit-plane;

接着,根据所述加密嵌入位平面将所述待嵌入水印信息嵌入到所述待处理图像中得到嵌入水印;Next, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;

然后,根据第三密钥,进行混沌迭代运算产生混沌实值序列,将所述混沌实值序列划分为多个大小相同的不重叠分区,对每个分区的混沌实值序列进行排序得到有序序列,根据每个分区的混沌实值序列中的每个值在所述有序序列中的位置编号获得置换嵌入地址;根据置换嵌入地址将所述嵌入水印进行置换得到置换水印;Then, according to the third key, a chaotic iterative operation is performed to generate a chaotic real-valued sequence, and the chaotic real-valued sequence is divided into a plurality of non-overlapping partitions of the same size, and the chaotic real-valued sequence of each partition is sorted to obtain an ordered sequence, obtaining a permutation embedding address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; permuting the embedding watermark according to the permutation embedding address to obtain a permutation watermark;

最后,以分区为单位,将含有置换水印的一个分区与另一个分区进行调换;将调换的置换水印嵌入到待处理图像中。Finally, in the unit of partition, one partition containing the permuted watermark is swapped with another partition; the transposed permuted watermark is embedded into the image to be processed.

本发明的优点及积极效果为:本发明提供水印模块按2×2像素大小进行不重叠分块,从待处理图像中提取灰度均值,将该灰度均值定义为水印信息,由于灰度均值由8位二进制位表示,其中高6位表示灰度均值的整数部分,最后2位表示灰度值的小数部分。哪怕只有1bit信息被篡改,都可以检测出来且做到篡改区域的精确定位。嵌入从待处理图像提取的水印信息可以无误差的表示该图像块的灰度均值,无论是图像信息部分还是嵌入的水印信息部分只要有一个比特的数据改变,本算法将会检测出该图像被篡改。同时通过加密模块,将图像数据与密码组合,可以提高图像查看的安全性。The advantages and positive effects of the present invention are as follows: the present invention provides the watermark module to perform non-overlapping blocks according to the size of 2×2 pixels, extract the average gray value from the image to be processed, and define the average gray value as watermark information, because the average gray value Represented by 8 binary bits, the upper 6 bits represent the integer part of the gray mean value, and the last 2 bits represent the fractional part of the gray value. Even if only 1 bit of information has been tampered with, it can be detected and the tampered area can be accurately located. Embedding the watermark information extracted from the image to be processed can represent the average gray value of the image block without error. As long as there is a bit of data change in either the image information part or the embedded watermark information part, the algorithm will detect that the image has been tamper. At the same time, through the encryption module, the image data is combined with the password, which can improve the security of image viewing.

附图说明Description of drawings

图1是本发明实施例提供的基于信息安全的图像处理系统结构框图。FIG. 1 is a structural block diagram of an image processing system based on information security provided by an embodiment of the present invention.

图中:1、图像采集模块;2、输入模块;3、主控模块;4、加密模块;5、成像模块;6、存储模块;7、判断模块;8、解码模块;9、水印模块。In the figure: 1. Image acquisition module; 2. Input module; 3. Main control module; 4. Encryption module; 5. Imaging module; 6. Storage module; 7. Judgment module; 8. Decoding module; 9. Watermark module.

具体实施方式Detailed ways

为能进一步了解本发明的发明内容、特点及功效,兹例举以下实施例,并配合附图详细说明如下。In order to further understand the content, features and effects of the present invention, the following examples are given, and detailed descriptions are given below with reference to the accompanying drawings.

下面结合附图对本发明的结构作详细的描述。The structure of the present invention will be described in detail below in conjunction with the accompanying drawings.

如图1所示,本发明提供的基于信息安全的图像处理系统包括:图像采集模块1、输入模块2、主控模块3、加密模块4、成像模块5、存储模块6、判断模块7、解码模块8、水印模块9。As shown in Figure 1, the image processing system based on information security provided by the present invention includes: image acquisition module 1, input module 2, main control module 3, encryption module 4, imaging module 5, storage module 6, judgment module 7, decoding Module 8, watermark module 9.

图像采集模块1,与主控模块3连接,用于采集原始图片;The image acquisition module 1 is connected with the main control module 3 for collecting original pictures;

输入模块2,与主控模块3连接,用于输入用户操作图片信息;The input module 2 is connected with the main control module 3, and is used to input user operation picture information;

主控模块3,与图像采集模块1、输入模块2、加密模块4、存储模块6、判断模块7、水印模块9连接,用于控制各个模块正常工作;The main control module 3 is connected with the image acquisition module 1, the input module 2, the encryption module 4, the storage module 6, the judgment module 7, and the watermark module 9, and is used to control the normal operation of each module;

加密模块4,与主控模块3连接,用于对图片进行加密;Encryption module 4, is connected with main control module 3, is used for encrypting picture;

成像模块5,与加密模块4连接,用于对图片加密后生成加密图片;The imaging module 5 is connected with the encryption module 4, and is used to generate an encrypted picture after encrypting the picture;

存储模块6,与主控模块3连接,用于对加密图片进行存储;Storage module 6, is connected with main control module 3, is used for storing encrypted picture;

判断模块7,与主控模块3连接,用于对用户输入的图片操作信息与加密模块4加密信息进行匹配判断,如果一致则通过解码模块8打开图片,否则无法打开;Judgment module 7 is connected with main control module 3, and is used for matching and judging the picture operation information input by the user and the encrypted information of encryption module 4. If consistent, the picture is opened by decoding module 8, otherwise it cannot be opened;

解码模块8,与判断模块7连接,用于根据判断模块7判断结果,如果一致,则解密图片;The decoding module 8 is connected with the judging module 7, and is used to judge the result according to the judging module 7, if consistent, then decrypt the picture;

水印模块9,与主控模块3连接,用于对图片进行嵌加水印。The watermark module 9 is connected with the main control module 3, and is used for embedding a watermark on the picture.

所述图像采集模块提取信息安全图像训练样本的HoG特征和GMM特征,并将HoG特征和GMM特征相结合作为信息安全图像的特征;包括如下步骤:Said image acquisition module extracts the HoG feature and the GMM feature of the information security image training sample, and combines the HoG feature and the GMM feature as the feature of the information security image; comprises the following steps:

信息安全图像训练样本图像划分成若干个信息安全图像,将信息安全图像中的每个像素从RGB颜色空间转换到YCbCr颜色空间,并提取其Cb、Cr色度分量的值;其中,Y表示亮度分量,Cb表示蓝色色度分量,Cr表示红色色度分量;Divide the information security image training sample image into several information security images, convert each pixel in the information security image from the RGB color space to the YC b C r color space, and extract the values of its C b and C r chrominance components; Wherein, Y represents the luminance component, C b represents the blue chrominance component, and C r represents the red chrominance component;

将信息安全图像分成U个互不重叠的小图像块,分别求出每个小图像块在Cb、Cr色度分量上的均值向量:将这些均值向量分别代入步骤(2)训练出的GMM信息安全图像颜色模型,得到每个小图像块在GMM模型中每个高斯分量ωiGi(i∈{1,2,…,K})上的值,作为该小图像块的颜色特征,将U个小图像块的颜色特征联合起来记作 Divide the information security image into U small image blocks that do not overlap with each other, and calculate the mean value vector of each small image block on the C b , C r chrominance components: Substitute these mean vectors into the GMM information security image color model trained in step (2), and obtain each Gaussian component ω i G i (i∈{1,2,…,K} ), as the color feature of the small image block, the color features of U small image blocks are combined and recorded as

将信息安全图像训练样本图像转换成灰度图像,对输入图像进行Gamma校正;Convert the information security image training sample image into a grayscale image, and perform Gamma correction on the input image;

计算灰度图像中每个像素点(x,y)的水平方向和垂直方向梯度值gx(x,y)和gy(x,y);Calculate the horizontal and vertical gradient values g x (x, y) and g y (x, y) of each pixel (x, y) in the grayscale image;

gx(x,y)=I(x+1,y)-I(x-1,y)g x (x,y)=I(x+1,y)-I(x-1,y)

gy(x,y)=I(x,y+1)-I(x,y-1)g y (x,y)=I(x,y+1)-I(x,y-1)

式中,I(x,y)表示像素点(x,y)处的灰度值,根据下式计算像素点(x,y)处的梯度幅值g(x,y)和方向α(x,y);In the formula, I(x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g(x, y) and the direction α(x, y) at the pixel point (x, y) are calculated according to the following formula ,y);

将信息安全图像训练样本的灰度图像划分成信息安全图像,统计每个信息安全图像上的梯度直方图,用于描述目标的形状信息;Divide the grayscale image of the information security image training sample into information security images, and count the gradient histogram on each information security image, which is used to describe the shape information of the target;

对每个信息安全图像采用9个bin的直方图来统计信息安全图像内像素点的梯度信息,将各个bin中像素点的梯度大小进行累加组成该信息安全图像的梯度直方图,用9维特征向量来表示,记作h1=[f1,f2,…,f9],其中fi为第i个bin的梯度累加值;For each information security image, the histogram of 9 bins is used to count the gradient information of the pixels in the information security image, and the gradient size of the pixels in each bin is accumulated to form the gradient histogram of the information security image, and the 9-dimensional feature is used Vector, denoted as h 1 =[f 1 ,f 2 ,…,f 9 ], where f i is the cumulative gradient value of the ith bin;

联合得到的梯度特征向量h1和得到颜色特征向量h2,组成信息安全图像的特征向量[h1,h2];Combine the obtained gradient feature vector h 1 and the obtained color feature vector h 2 to form the feature vector [h 1 , h 2 ] of the information security image;

将信息安全图像组合成块,并在块内归一化;Combining infosec images into blocks and normalizing within blocks;

所述主控模块的信息安全图像缝合线采用消除跨重叠区域遮挡的方法,具体包括:The information security image stitching line of the main control module adopts a method of eliminating cross-overlapping area occlusion, specifically including:

1)采用阈值分割的方法将信息安全图像分为两部分,高量值区和低量值区,阈值代价准则定义如式(2)(3):1) Using the method of threshold segmentation to divide the information security image into two parts, the high value area and the low value area, the threshold cost criterion is defined as formula (2) (3):

其中为cost(公式(1)求得的误匹配度量矩阵,δ·T]是图像分割阈值,其中T]为重叠区域的最大误匹配量值,为固定常量,δ∈(0;的二值化矩阵;where is cost (the mismatch measurement matrix obtained by formula (1), δ T] is the image segmentation threshold, where T] is the maximum mismatch value in the overlapping area, which is a fixed constant, δ∈(0; for The binarization matrix;

2)判断缝合线的起点和终点是否均在低量值区(Tcost_b=0)且位于同一连通分量,即判断起点终点间是否存在一条路径;若不存在,表示图中存在一条或多条跨重叠区域的遮挡;查找跨重叠区域的遮挡,并逐步减小此遮挡区域的量值,直到不存在跨重叠区域的遮挡,使起点和终点位于同一连通分量内;此时起点终点所在的连通区域,即求解的缝合线最小连通域。2) Judging whether the starting point and the ending point of the suture line are both in the low-value area (Tcost_b=0) and located in the same connected component, that is, judging whether there is a path between the starting point and the ending point; if not, it means that there are one or more spanning The occlusion of the overlapping area; find the occlusion across the overlapping area, and gradually reduce the value of the occlusion area until there is no occlusion across the overlapping area, so that the starting point and the ending point are located in the same connected component; at this time, the connected area where the starting point and ending point are located , that is, the least connected domain of the suture line to be solved.

本发明提供的水印模块9嵌入方法如下:The embedding method of watermark module 9 provided by the present invention is as follows:

首先,对待处理图像按2×2像素大小进行不重叠分块,得到若干个子块,计算子块中所有像素的灰度均值,将所述灰度均值定义为水印信息;根据第一密钥,利用logistic映射产生的第一伪随机二值序列对所述水印信息进行加密得到待嵌入水印信息;First, the image to be processed is divided into non-overlapping blocks according to the size of 2×2 pixels to obtain several sub-blocks, and the gray-scale mean value of all pixels in the sub-block is calculated, and the gray-scale mean value is defined as watermark information; according to the first key, Encrypting the watermark information using the first pseudo-random binary sequence generated by logistic mapping to obtain the watermark information to be embedded;

其次,根据第二密钥,利用logistic映射产生的第二伪随机二值序列对所述水印信息在所述待处理图像上的嵌入的位平面进行加密得到加密嵌入位平面;Secondly, according to the second key, the second pseudo-random binary sequence generated by logistic mapping is used to encrypt the embedded bit-plane of the watermark information on the image to be processed to obtain an encrypted embedded bit-plane;

接着,根据所述加密嵌入位平面将所述待嵌入水印信息嵌入到所述待处理图像中得到嵌入水印;Next, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark;

然后,根据第三密钥,进行混沌迭代运算产生混沌实值序列,将所述混沌实值序列划分为多个大小相同的不重叠分区,对每个分区的混沌实值序列进行排序得到有序序列,根据每个分区的混沌实值序列中的每个值在所述有序序列中的位置编号获得置换嵌入地址;根据置换嵌入地址将所述嵌入水印进行置换得到置换水印;Then, according to the third key, a chaotic iterative operation is performed to generate a chaotic real-valued sequence, and the chaotic real-valued sequence is divided into a plurality of non-overlapping partitions of the same size, and the chaotic real-valued sequence of each partition is sorted to obtain an ordered sequence, obtaining a permutation embedding address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; permuting the embedding watermark according to the permutation embedding address to obtain a permutation watermark;

最后,以分区为单位,将含有置换水印的一个分区与另一个分区进行调换;将调换的置换水印嵌入到待处理图像中。Finally, in the unit of partition, one partition containing the permuted watermark is swapped with another partition; the transposed permuted watermark is embedded into the image to be processed.

本发明处理时,通过图像采集模块1采集原始图片;主控模块3调取加密模块4对图片进行加密;接着,通过成像模块5对图片加密后生成加密图片;通过存储模块6对加密图片进行存储;用户通过输入模块2输入用户操作图片信息;主控模块3调取判断模块7对用户输入的图片操作信息与加密模块4加密信息进行匹配判断,如果一致则通过解码模块8打开图片,否则无法打开;通过水印模块9对图片进行嵌加水印。During the processing of the present invention, the original picture is collected by the image acquisition module 1; the main control module 3 transfers the encryption module 4 to encrypt the picture; then, the encrypted picture is generated after the image is encrypted by the imaging module 5; the encrypted picture is encrypted by the storage module 6 Storage; the user inputs the user operation picture information through the input module 2; the main control module 3 transfers the judgment module 7 to match and judge the picture operation information input by the user and the encrypted information of the encryption module 4, if they are consistent, the picture is opened by the decoding module 8, otherwise Unable to open; Embedding watermark to the picture through watermark module 9.

以上所述仅是对本发明的较佳实施例而已,并非对本发明作任何形式上的限制,凡是依据本发明的技术实质对以上实施例所做的任何简单修改,等同变化与修饰,均属于本发明技术方案的范围内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention in any form. Any simple modifications made to the above embodiments according to the technical essence of the present invention, equivalent changes and modifications, all belong to this invention. within the scope of the technical solution of the invention.

Claims (2)

1.一种基于信息安全的图像处理系统,其特征在于,所述基于信息安全的图像处理系统包括:1. An image processing system based on information security, characterized in that, the image processing system based on information security comprises: 图像采集模块、输入模块、主控模块、加密模块、成像模块、存储模块、判断模块、解码模块、水印模块;Image acquisition module, input module, main control module, encryption module, imaging module, storage module, judgment module, decoding module, watermark module; 图像采集模块,与主控模块连接,用于采集原始图片;An image acquisition module, connected with the main control module, for collecting original pictures; 所述图像采集模块提取信息安全图像训练样本的HoG特征和GMM特征,并将HoG特征和GMM特征相结合作为信息安全图像的特征;包括如下步骤:Said image acquisition module extracts the HoG feature and the GMM feature of the information security image training sample, and combines the HoG feature and the GMM feature as the feature of the information security image; comprises the following steps: 信息安全图像训练样本图像划分成若干个信息安全图像,将信息安全图像中的每个像素从RGB颜色空间转换到YCbCr颜色空间,并提取其Cb、Cr色度分量的值;其中,Y表示亮度分量,Cb表示蓝色色度分量,Cr表示红色色度分量;Divide the information security image training sample image into several information security images, convert each pixel in the information security image from the RGB color space to the YC b C r color space, and extract the values of its C b and C r chrominance components; Wherein, Y represents the luminance component, C b represents the blue chrominance component, and C r represents the red chrominance component; 将信息安全图像分成U个互不重叠的小图像块,分别求出每个小图像块在Cb、Cr色度分量上的均值向量:将这些均值向量分别代入步骤(2)训练出的GMM信息安全图像颜色模型,得到每个小图像块在GMM模型中每个高斯分量ωiGi(i∈{1,2,…,K})上的值,作为该小图像块的颜色特征,将U个小图像块的颜色特征联合起来记作 Divide the information security image into U small image blocks that do not overlap with each other, and calculate the mean value vector of each small image block on the C b , C r chrominance components: Substitute these mean vectors into the GMM information security image color model trained in step (2), and obtain each Gaussian component ω i G i (i∈{1,2,…,K} ), as the color feature of the small image block, the color features of U small image blocks are combined and recorded as 将信息安全图像训练样本图像转换成灰度图像,对输入图像进行Gamma校正;Convert the information security image training sample image into a grayscale image, and perform Gamma correction on the input image; 计算灰度图像中每个像素点(x,y)的水平方向和垂直方向梯度值gx(x,y)和gy(x,y);Calculate the horizontal and vertical gradient values g x (x, y) and g y (x, y) of each pixel (x, y) in the grayscale image; gx(x,y)=I(x+1,y)-I(x-1,y)g x (x,y)=I(x+1,y)-I(x-1,y) gy(x,y)=I(x,y+1)-I(x,y-1)g y (x,y)=I(x,y+1)-I(x,y-1) 式中,I(x,y)表示像素点(x,y)处的灰度值,根据下式计算像素点(x,y)处的梯度幅值g(x,y)和方向α(x,y);In the formula, I(x, y) represents the gray value at the pixel point (x, y), and the gradient amplitude g(x, y) and the direction α(x, y) at the pixel point (x, y) are calculated according to the following formula ,y); 将信息安全图像训练样本的灰度图像划分成信息安全图像,统计每个信息安全图像上的梯度直方图,用于描述目标的形状信息;Divide the grayscale image of the information security image training sample into information security images, and count the gradient histogram on each information security image, which is used to describe the shape information of the target; 对每个信息安全图像采用9个bin的直方图来统计信息安全图像内像素点的梯度信息,将各个bin中像素点的梯度大小进行累加组成该信息安全图像的梯度直方图,用9维特征向量来表示,记作h1=[f1,f2,…,f9],其中fi为第i个bin的梯度累加值;For each information security image, the histogram of 9 bins is used to count the gradient information of the pixels in the information security image, and the gradient size of the pixels in each bin is accumulated to form the gradient histogram of the information security image, and the 9-dimensional feature is used Vector, denoted as h 1 =[f 1 ,f 2 ,…,f 9 ], where f i is the cumulative gradient value of the ith bin; 联合得到的梯度特征向量h1和得到颜色特征向量h2,组成信息安全图像的特征向量[h1,h2];Combine the obtained gradient feature vector h 1 and the obtained color feature vector h 2 to form the feature vector [h 1 , h 2 ] of the information security image; 将信息安全图像组合成块,并在块内归一化;Combining infosec images into blocks and normalizing within blocks; 输入模块,与主控模块连接,用于输入用户操作图片信息;The input module is connected with the main control module and is used for inputting user operation picture information; 主控模块,与图像采集模块、输入模块、加密模块、存储模块、判断模块、水印模块连接,用于控制各个模块正常工作;The main control module is connected with the image acquisition module, input module, encryption module, storage module, judgment module and watermark module, and is used to control the normal operation of each module; 所述主控模块的信息安全图像缝合线采用消除跨重叠区域遮挡的方法,具体包括:The information security image stitching line of the main control module adopts a method of eliminating cross-overlapping area occlusion, specifically including: 1)采用阈值分割的方法将信息安全图像分为两部分,高量值区和低量值区,阈值代价准则定义如式(2)(3):1) Using the method of threshold segmentation to divide the information security image into two parts, the high value area and the low value area, the threshold cost criterion is defined as formula (2) (3): 其中为cost(公式(1)求得的误匹配度量矩阵,δ·T]是图像分割阈值,其中T1为重叠区域的最大误匹配量值,为固定常量,δ∈(0;的二值化矩阵;Among them, cost (the mismatch measurement matrix obtained by formula (1), δ T] is the image segmentation threshold, where T1 is the maximum mismatch value in the overlapping area, which is a fixed constant, δ∈(0; for The binarization matrix; 2)判断缝合线的起点和终点是否均在低量值区(Tcost_b=0)且位于同一连通分量,即判断起点终点间是否存在一条路径;若不存在,表示图中存在一条或多条跨重叠区域的遮挡;查找跨重叠区域的遮挡,并逐步减小此遮挡区域的量值,直到不存在跨重叠区域的遮挡,使起点和终点位于同一连通分量内;此时起点终点所在的连通区域,即求解的缝合线最小连通域;2) Judging whether the starting point and the ending point of the suture line are both in the low-value area (Tcost_b=0) and located in the same connected component, that is, judging whether there is a path between the starting point and the ending point; if not, it means that there are one or more spanning The occlusion of the overlapping area; find the occlusion across the overlapping area, and gradually reduce the value of the occlusion area until there is no occlusion across the overlapping area, so that the starting point and the ending point are located in the same connected component; at this time, the connected area where the starting point and ending point are located , that is, the least connected domain of the suture line to be solved; 加密模块,与主控模块连接,用于对图片进行加密;An encryption module is connected with the main control module and is used to encrypt pictures; 成像模块,与加密模块连接,用于对图片加密后生成加密图片;The imaging module is connected with the encryption module, and is used to generate an encrypted picture after encrypting the picture; 存储模块,与主控模块连接,用于对加密图片进行存储;The storage module is connected with the main control module and is used to store the encrypted pictures; 判断模块,与主控模块连接,用于对用户输入的图片操作信息与加密模块加密信息进行匹配判断,如果一致则通过解码模块打开图片,否则无法打开;The judging module is connected with the main control module, and is used for matching and judging the picture operation information input by the user and the encrypted information of the encryption module. If they are consistent, the picture is opened through the decoding module, otherwise it cannot be opened; 解码模块,与判断模块连接,用于根据判断模块判断结果,如果一致,则解密图片;The decoding module is connected with the judging module, and is used for judging the result according to the judging module, and if it is consistent, the picture is decrypted; 水印模块,与主控模块连接,用于对图片进行嵌加水印。The watermark module is connected with the main control module and is used for embedding watermarks on pictures. 2.如权利要求1所述基于信息安全的图像处理系统,其特征在于,所述水印模块嵌入方法如下:2. the image processing system based on information security as claimed in claim 1, is characterized in that, described watermark module embedding method is as follows: 首先,对待处理图像按2×2像素大小进行不重叠分块,得到若干个子块,计算子块中所有像素的灰度均值,将所述灰度均值定义为水印信息;根据第一密钥,利用logistic映射产生的第一伪随机二值序列对所述水印信息进行加密得到待嵌入水印信息;First, the image to be processed is divided into non-overlapping blocks according to the size of 2×2 pixels to obtain several sub-blocks, and the gray-scale mean value of all pixels in the sub-block is calculated, and the gray-scale mean value is defined as watermark information; according to the first key, Encrypting the watermark information using the first pseudo-random binary sequence generated by logistic mapping to obtain the watermark information to be embedded; 其次,根据第二密钥,利用logistic映射产生的第二伪随机二值序列对所述水印信息在所述待处理图像上的嵌入的位平面进行加密得到加密嵌入位平面;Secondly, according to the second key, the second pseudo-random binary sequence generated by logistic mapping is used to encrypt the embedded bit-plane of the watermark information on the image to be processed to obtain an encrypted embedded bit-plane; 接着,根据所述加密嵌入位平面将所述待嵌入水印信息嵌入到所述待处理图像中得到嵌入水印;Next, embedding the watermark information to be embedded into the image to be processed according to the encrypted embedding bit plane to obtain an embedded watermark; 然后,根据第三密钥,进行混沌迭代运算产生混沌实值序列,将所述混沌实值序列划分为多个大小相同的不重叠分区,对每个分区的混沌实值序列进行排序得到有序序列,根据每个分区的混沌实值序列中的每个值在所述有序序列中的位置编号获得置换嵌入地址;根据置换嵌入地址将所述嵌入水印进行置换得到置换水印;Then, according to the third key, a chaotic iterative operation is performed to generate a chaotic real-valued sequence, and the chaotic real-valued sequence is divided into a plurality of non-overlapping partitions of the same size, and the chaotic real-valued sequence of each partition is sorted to obtain an ordered sequence, obtaining a permutation embedding address according to the position number of each value in the chaotic real value sequence of each partition in the ordered sequence; permuting the embedding watermark according to the permutation embedding address to obtain a permutation watermark; 最后,以分区为单位,将含有置换水印的一个分区与另一个分区进行调换;将调换的置换水印嵌入到待处理图像中。Finally, in the unit of partition, one partition containing the permuted watermark is swapped with another partition; the transposed permuted watermark is embedded into the image to be processed.
CN201810323138.3A 2018-04-11 2018-04-11 Image processing system based on information security Active CN108596820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810323138.3A CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810323138.3A CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Publications (2)

Publication Number Publication Date
CN108596820A true CN108596820A (en) 2018-09-28
CN108596820B CN108596820B (en) 2022-04-05

Family

ID=63621991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810323138.3A Active CN108596820B (en) 2018-04-11 2018-04-11 Image processing system based on information security

Country Status (1)

Country Link
CN (1) CN108596820B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767375A (en) * 2018-12-06 2019-05-17 北京北信源信息安全技术有限公司 Method and system for image watermark embedding and tracing
CN110232651A (en) * 2019-06-12 2019-09-13 山东科技大学 A kind of reversible information hidden method based on block prediction and difference histogram shifting
CN110286813A (en) * 2019-05-22 2019-09-27 北京达佳互联信息技术有限公司 Picture mark position determines method and apparatus
CN111784708A (en) * 2020-07-03 2020-10-16 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device
CN112529586A (en) * 2020-12-15 2021-03-19 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112804502A (en) * 2021-03-10 2021-05-14 重庆第二师范学院 Video monitoring system, method, storage medium and device based on artificial intelligence
CN115080931A (en) * 2022-07-21 2022-09-20 南通东德纺织科技有限公司 Textile image copyright protection method based on digital watermark
CN115861034A (en) * 2023-02-20 2023-03-28 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN117768748A (en) * 2024-01-03 2024-03-26 北京睿航至臻科技有限公司 Watermark processing method based on database

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103247017A (en) * 2013-05-08 2013-08-14 江苏大学 Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model
KR20150002040A (en) * 2013-06-28 2015-01-07 (주) 세인 The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG
CN104537600A (en) * 2014-12-16 2015-04-22 陕西科技大学 Secondary image encrypting and decrypting methods and watermark information tamper area positioning method
US20160335503A1 (en) * 2013-11-07 2016-11-17 Nuctech Company Limited Inspection methods and devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103247017A (en) * 2013-05-08 2013-08-14 江苏大学 Mesh segmentation-based non-blind watermark realization method for three-dimensional mesh model
KR20150002040A (en) * 2013-06-28 2015-01-07 (주) 세인 The way of Real-time Pedestrian Recognition and Tracking using Kalman Filter and Clustering Algorithm based on Cascade Method by HOG
US20160335503A1 (en) * 2013-11-07 2016-11-17 Nuctech Company Limited Inspection methods and devices
CN104537600A (en) * 2014-12-16 2015-04-22 陕西科技大学 Secondary image encrypting and decrypting methods and watermark information tamper area positioning method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767375A (en) * 2018-12-06 2019-05-17 北京北信源信息安全技术有限公司 Method and system for image watermark embedding and tracing
CN109767375B (en) * 2018-12-06 2022-12-13 北京北信源信息安全技术有限公司 Image watermark embedding and tracing method and system
CN110286813A (en) * 2019-05-22 2019-09-27 北京达佳互联信息技术有限公司 Picture mark position determines method and apparatus
US11574415B2 (en) 2019-05-22 2023-02-07 Beijing Dajia Internet Information Technology Co., Ltd. Method and apparatus for determining an icon position
CN110232651A (en) * 2019-06-12 2019-09-13 山东科技大学 A kind of reversible information hidden method based on block prediction and difference histogram shifting
CN111784708A (en) * 2020-07-03 2020-10-16 上海骏聿数码科技有限公司 Image tamper-proof inspection method and device
CN112529586B (en) * 2020-12-15 2023-07-28 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112529586A (en) * 2020-12-15 2021-03-19 深圳市快付通金融网络科技服务有限公司 Transaction information management method, device, equipment and storage medium
CN112804502A (en) * 2021-03-10 2021-05-14 重庆第二师范学院 Video monitoring system, method, storage medium and device based on artificial intelligence
CN115080931A (en) * 2022-07-21 2022-09-20 南通东德纺织科技有限公司 Textile image copyright protection method based on digital watermark
CN115861034A (en) * 2023-02-20 2023-03-28 深圳市欣博跃电子有限公司 Wireless routing data intelligent management system
CN117768748A (en) * 2024-01-03 2024-03-26 北京睿航至臻科技有限公司 Watermark processing method based on database
CN117768748B (en) * 2024-01-03 2024-06-11 北京睿航至臻科技有限公司 Watermark processing method based on database

Also Published As

Publication number Publication date
CN108596820B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN108596820A (en) a kind of image processing system based on information security
Yi et al. Binary-block embedding for reversible data hiding in encrypted images
Yin et al. Separable and Error‐Free Reversible Data Hiding in Encrypted Image with High Payload
Ahmed et al. A secure and robust hash-based scheme for image authentication
Yahya Steganography techniques for digital images
Li et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction
US7454797B2 (en) Secure image authentication with discrete level tamper localization
Li et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection
Kumar et al. High capacity reversible data hiding based on histogram shifting for medical images
Ahmed et al. Hash-based authentication of digital images in noisy channels
Chhajed et al. Applying Decision Tree for Hiding Data in Binary Images for Secure and Secret Information Flow
Hameed et al. A high quality secure medical image steganography method
Chhajed et al. Data hiding in binary images for secret and secure communication using decision tree
Thanekar et al. OCTA (STAR) PVD: A different approach of image steganopgraphy
Sethi et al. Video security against deepfakes and other forgeries
WO2021175714A1 (en) Scrambling of regions of interest in an image to preserve privacy
Riaz et al. A robust multimedia authentication and restoration scheme in digital photography
Powell Securing LSB embedding against structural steganalysis
Kar et al. Chaos-based video steganography
Nyeem et al. Modelling attacks on self-authentication watermarking
Wang et al. A Black-box Tripartite Verifiable and Buyer-traceable DNN IP Protection Scheme
Priya et al. Reversible information hiding in videos
Kanwal et al. Chain-of-evidence in secured surveillance videos using steganography and hashing
Korivi et al. A New Reversible Data hiding Scheme in Encrypted Images using Predefined Pixel Mapping
Moganti Securing secret data using an enhanced Camellia encryption with steganography using pixel indicator technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant