[go: up one dir, main page]

CN113704710B - Information hiding method and device and computer storage medium - Google Patents

Information hiding method and device and computer storage medium Download PDF

Info

Publication number
CN113704710B
CN113704710B CN202110996843.1A CN202110996843A CN113704710B CN 113704710 B CN113704710 B CN 113704710B CN 202110996843 A CN202110996843 A CN 202110996843A CN 113704710 B CN113704710 B CN 113704710B
Authority
CN
China
Prior art keywords
image
information
gray level
processing
information hiding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110996843.1A
Other languages
Chinese (zh)
Other versions
CN113704710A (en
Inventor
杨磊
张何钫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Junzheng Network Technology Co Ltd
Original Assignee
Shanghai Junzheng Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Junzheng Network Technology Co Ltd filed Critical Shanghai Junzheng Network Technology Co Ltd
Priority to CN202110996843.1A priority Critical patent/CN113704710B/en
Publication of CN113704710A publication Critical patent/CN113704710A/en
Application granted granted Critical
Publication of CN113704710B publication Critical patent/CN113704710B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an information hiding method, an information hiding device and a computer storage medium, relates to the technical field of information processing, and solves the technical problem of low confidentiality of hidden information. The information hiding method comprises the following steps: acquiring a first image and a second image; processing the first image through a frequency domain algorithm to obtain a gray level image; carrying out gray level processing on the second image according to the gray level image, and carrying out affine transformation scrambling on the image subjected to the gray level processing to obtain a third image; and embedding the third image into the gray level image, and obtaining a fourth image hiding the second image through a frequency domain restoration algorithm.

Description

Information hiding method and device and computer storage medium
Technical Field
The present invention relates to the field of image processing technologies, and in particular, to an information hiding method, an information hiding device, and a computer storage medium.
Background
Information hiding means embedding secret information into a carrier by utilizing human perception and redundancy of digital media so as to track the use of the carrier, thereby achieving the purposes of copyright protection, integrity authentication and the like.
In the information hiding algorithm in the prior art, the frequency domain algorithm has more robustness, the watermark failure problem caused by the fact that the picture is damaged can be prevented, the information hidden by the frequency domain algorithm is easy to display, and the confidentiality of the hidden content is low.
Accordingly, those skilled in the art have focused on developing an information hiding method, apparatus, and computer storage medium that can improve the confidentiality of hidden information.
Disclosure of Invention
In view of the above-mentioned drawbacks of the prior art, the technical problems to be solved by the present invention are: the confidentiality of the hidden information is low.
In order to achieve the above purpose, the invention adopts the following technical scheme:
In a first aspect, the present invention provides an information hiding method, including: acquiring a first image and a second image; processing the first image through a frequency domain algorithm to obtain a gray level image; carrying out gray level processing on the second image according to the gray level image, and carrying out affine transformation scrambling on the image subjected to the gray level processing to obtain a third image; and embedding the third image into the gray level image, and obtaining a fourth image hiding the second image through a frequency domain restoration algorithm.
In the embodiment of the invention, since the second image can be subjected to gray processing according to the gray map, the gray distribution of the image after sub-affine transformation can be more similar to the target image channel of the first image, and when the third image is embedded into the gray map, the gray distribution of the gray map cannot be greatly changed, so that the characteristic of sub-affine transformation is combined with the frequency domain algorithm, the protection capability of hidden information can be improved, and the information in the second image can be better hidden.
In a preferred embodiment of the present invention, the second image includes a blank area, and the performing gray scale processing on the second image according to the gray scale map includes: determining a first pixel value distribution proportion of the gray scale map; and adding pixels in the blank area according to the first pixel value distribution proportion until the pixel value distribution proportion of the second image is the first pixel value distribution proportion.
In the embodiment of the invention, the pixel value distribution proportion of the second image can reach the first pixel value distribution proportion by adding the pixels, so that the image gray distribution after sub-affine transformation can be more similar to the target image channel of the first image, the difficulty in analyzing and identifying the image gray distribution is increased, and the confidentiality of hidden information is further improved.
In a preferred embodiment of the present invention, the second image includes an information area, and after the fourth image hiding the second image is obtained, the method further includes: acquiring the fourth image; converting the fourth image through the frequency domain algorithm, and extracting the third image; and carrying out sub-affine period reduction on the third image to obtain an image after the gray level processing of the second image, wherein the image after the gray level processing comprises text information in the information area.
In the embodiment of the invention, the hidden text information can be restored from the fourth image, so that the information hidden in the image can be restored, thereby achieving the secret protection of the hidden information.
In a preferred embodiment of the present invention, the frequency domain algorithm is a fast fourier transform algorithm, and the frequency domain restoration algorithm is a fast fourier transform restoration algorithm.
In a preferred embodiment of the present invention, the processing the first image by the frequency domain algorithm includes: and processing pixels of a target image channel of the first image through the frequency domain algorithm, wherein the target image channel is any one of the image channels of the first image.
In the embodiment of the invention, because the target image channel can be any one of the image channels of the first image, a user can select any one of the four image channels for information hiding, so that the randomness of information hiding is increased, and the confidentiality of hidden information is improved.
In a second aspect, the present invention provides an information hiding apparatus, comprising: an acquisition unit and a processing unit; the acquisition unit is used for acquiring a first image and a second image; the processing unit is used for processing the first image through a frequency domain algorithm to obtain a gray level image; carrying out gray level processing on the second image according to the gray level image, and carrying out affine transformation scrambling on the image subjected to the gray level processing to obtain a third image; and embedding the third image into the gray level image, and obtaining a fourth image hiding the second image through a frequency domain restoration algorithm.
In a preferred embodiment of the present invention, the processing unit is specifically configured to: determining a first pixel value distribution proportion of the gray scale map; and adding pixels in the blank area according to the first pixel value distribution proportion until the pixel value distribution proportion of the second image is the first pixel value distribution proportion.
In a preferred embodiment of the present invention, the acquiring unit is further configured to acquire the fourth image; the processing unit is further configured to convert the fourth image through the frequency domain algorithm, and extract the third image; and carrying out sub-affine period reduction on the third image to obtain an image after the gray level processing of the second image, wherein the image after the gray level processing comprises text information in the information area.
In a preferred embodiment of the present invention, the frequency domain algorithm is a fast fourier transform algorithm, and the frequency domain restoration algorithm is a fast fourier transform restoration algorithm.
In a preferred embodiment of the present invention, the processing unit is specifically configured to: and processing pixels of a target image channel of the first image through the frequency domain algorithm, wherein the target image channel is any one of the image channels of the first image.
In a third aspect, the present invention provides an information hiding apparatus comprising a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the information hiding device is running, the processor executes computer-executable instructions stored in the memory to cause the information hiding device to perform the information hiding method provided in the above first aspect and its various possible embodiments.
In a fourth aspect, a computer readable storage medium is provided, the computer readable storage medium comprising computer executable instructions which, when run on a computer, cause an information hiding device to perform the information hiding method provided by the above first aspect and its various possible embodiments.
In a fifth aspect, a computer program product is provided, comprising computer instructions which, when run on a computer, cause an information hiding apparatus to perform the information hiding method provided by the above first aspect and its various possible embodiments.
It should be noted that the above-mentioned computer instructions may be stored in whole or in part on a computer-readable storage medium. The computer readable storage medium may be packaged together with the processor executing the information hiding apparatus or may be packaged separately from the processor executing the information hiding apparatus, which is not limited by the embodiment of the present invention.
The description of the second, third, fourth and fifth aspects of the present invention may refer to the detailed description of the first aspect; moreover, the advantages described in the second aspect, the third aspect, the fourth aspect and the fifth aspect may refer to the analysis of the advantages of the first aspect, and are not described herein.
The conception, specific structure, and technical effects of the present invention will be further described with reference to the accompanying drawings to fully understand the objects, features, and effects of the present invention.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of an information hiding method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of image processing provided by an embodiment of the present invention;
FIG. 3 is a schematic diagram of an information hiding apparatus according to an embodiment of the present invention;
fig. 4 is a second schematic structural diagram of an information hiding device according to an embodiment of the present invention.
Detailed Description
Other advantages and effects of the present invention will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present invention with reference to specific examples. The invention may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present invention. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present invention is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
In order to clearly describe the technical solution of the embodiment of the present invention, in the embodiment of the present invention, the words "first", "second", etc. are used to distinguish identical items or similar items having substantially the same function and effect, and those skilled in the art will understand that the words "first", "second", etc. are not limited in number and execution order.
Some exemplary embodiments of the invention have been described for illustrative purposes, it being understood that the invention may be practiced otherwise than as specifically shown in the accompanying drawings.
The foregoing implementations are described in detail below with reference to specific embodiments and accompanying drawings.
As shown in fig. 1, an embodiment of the present invention provides an information hiding method that can be applied to an information hiding apparatus. The information hiding device may be a component, an integrated circuit, or a chip in the terminal, may be a mobile electronic device such as a notebook computer, or may be a non-mobile electronic device such as a server. The information hiding method may include: S101-S104:
S101, the information hiding device acquires a first image and a second image.
The first image may be a color image, and the second image may be a black-and-white image or a gray-scale image containing watermark information. The first image includes 4 image channels, an A (alph) image channel, an R (red) image channel, a G (green) image channel, and a B (blue) image channel, respectively. The second image includes one image channel, the a image channel. Each image channel may include 8 bit planes.
The bit plane is a plane formed by taking an image as a bottom surface and taking 8-bit binary numbers representing the brightness of pixels as heights, and the positions of pixels in the formed stereo histogram are the same.
Alternatively, the information hiding device may acquire the first image first and then acquire the second image; the first image and the second image may be acquired simultaneously, and may be specifically determined according to actual use conditions, which is not limited in the embodiment of the present application.
S102, the information hiding device processes the first image through a frequency domain algorithm to obtain a gray level image.
Alternatively, the information hiding means may process pixels of a target image channel of the first image, which may be any one of the image channels of the first image, by a frequency domain algorithm, thereby obtaining a gray scale map.
Optionally, after the first image is acquired, the information hiding device may determine the target image channel from the 4 image channels in a random determination manner or in a manner of selecting and determining by user input, and then convert each pixel in the target image channel through a frequency domain algorithm, so as to obtain a gray scale map corresponding to the target image channel. Since the number of bits per pixel value is 8, the pixel values in the gray scale map may be distributed in the gray scale interval range of 0-255.
Alternatively, the frequency domain algorithm may be a fast fourier transform (Fast Fourier Transform, FFT) algorithm.
And S103, the information hiding device carries out gray scale processing on the second image according to the gray scale image, and carries out affine transformation scrambling on the image subjected to the gray scale processing to obtain a third image.
Alternatively, after the above-mentioned gray-scale image is obtained, the information hiding means may perform gray-scale processing on the second image according to the gray-scale image. Specifically, the second image may include a blank area, and the information hiding device may determine a first pixel value distribution ratio of the gray scale image; and adding pixels in the blank area of the second image according to the first pixel value distribution ratio until the pixel value distribution ratio of the second image is the first pixel value distribution ratio.
Illustratively, the gray scale map includes 10000 pixels and the second image includes 5000 pixels. If the number of pixels with a pixel value of a is 2000, the number of pixels with a pixel value of b is 3000, the number of pixels with a pixel value of c is 5000, and the number of pixels with a pixel value of a in the second image is 1000, the number of pixels with a pixel value of b is 0, and the number of pixels with a pixel value of c is 4000 in the gray image, the information hiding apparatus may determine that the first pixel value distribution ratio of the gray image includes: the pixel distribution ratio of the pixel value a is 20%, the pixel distribution ratio of the pixel value b is 30%, and the pixel distribution ratio of the pixel value c is 50%. Then, the number of pixels with the pixel value of a in the second image is 1000, and the pixels account for 20% of the second image, so that the pixels with the pixel value of a do not need to be increased; since the number of pixels with the pixel value b is 0 and the number of pixels with the pixel value c is 4000, the information hiding device may increase 1500 pixels with the pixel value b on the pixels with the pixel value c, so that the proportion of the pixels with the pixel value b in the second image is 30 percent and the proportion of the pixels with the pixel value c in the second image is 50 percent.
Optionally, after the gray processing is performed on the second image, since pixels are added in a blank area of the second image, the pixel distribution of the same pixel value is relatively concentrated, and in order to improve the concealment of the hidden information in the second image, the image after the gray processing may be subjected to sub-affine transformation scrambling, so as to obtain a third image with uniformly distributed pixel values. As shown in fig. 2 (a), is a second image; as shown in fig. 2 (b), the second image is subjected to gradation processing; as shown in fig. 2 (c), a third image is obtained.
Optionally, the information hiding device may scramble the image after the gray processing by sub-affine transformation for a preset number of times, to obtain a third image. The preset number of times may be greater than or equal to 20.
It should be noted that, the sub-affine transformation scrambling refers to the following formula one: or formula 2: /(I) And transforming the coordinates of the pixel points of the image. And the sub-affine transformation scrambling satisfies: the condition 1, the change is the single mapping of the discrete point domain { (x, y): 1.ltoreq.x.ltoreq.N, 1.ltoreq.y.ltoreq.N } to itself; the condition 2, the variation is the full mapping of the discrete point domain { (x, y): 1. Ltoreq.x. Ltoreq.N, 1. Ltoreq.y. Ltoreq.N } to itself. Wherein x, y represent coordinate values before transformation, x ', y' represent coordinate values after transformation, N represent steps a, b, c, d, e, f of the digital image, and are integers. The method is characterized in that a given N-order digital image is subjected to the transformation for a plurality of times, each pixel point is scrambled and uniformly distributed in the image, and the original image can be restored after the times reach a certain period. In the embodiment of the present application, the solution of the affine transformation scrambling may be determined as a=0, b= -1, c=1, d= -1, e=n+1, f=1.
And S104, the information hiding device embeds the third image into the gray level image, and obtains a fourth image hiding the second image through a frequency domain restoration algorithm.
Alternatively, the information hiding device may embed the third image into the gray scale image, and then obtain a fourth image hiding the second image through a frequency domain restoration algorithm.
Alternatively, since the pixels are typically represented in binary, the information hiding means may embed the third image in the gray map by and, or. Taking as an example that the pixel 1 in the third image is embedded in the pixel 2 at the position corresponding to the gray-scale image. The pixel value of the pixel 1 is 1010, the pixel value of the pixel 2 is 0110, if the embedding rule is that the values on the same pixel bit are the same, 1 is the same, and if the embedding rule is different, 0 is the different, then the pixel value of the pixel 2 after the pixel 1 is embedded is 0011.
In the case that the frequency domain algorithm is an FFT algorithm, the frequency domain restoration algorithm may be a fast fourier transform restoration algorithm, that is, an FFT restoration algorithm.
Alternatively, after obtaining the fourth image in which the second image is hidden, the information hiding means may also obtain hidden information from the fourth image. Specifically, the second image may include an information area, and for example, as shown in fig. 2 (a), the information area may include watermark information of "secinfo". The information hiding device may first acquire a fourth image; the fourth image is converted by the frequency domain algorithm, and then, the converted image and the gray level image without hidden information can be subjected to pixel comparison based on the embedding rule, so that a third image, namely the image shown in (c) in fig. 2, is extracted from the converted image, and then, the third image is subjected to sub-affine period reduction, so that an image after gray level processing of the second image, namely the image shown in (b) in fig. 2, is obtained, wherein the image after gray level processing comprises text information in an information area. Thus, watermark information of "secinfo" may be determined directly from the image.
In the embodiment of the invention, since the second image can be subjected to gray processing according to the gray map, the gray distribution of the image after sub-affine transformation can be more similar to the target image channel of the first image, and when the third image is embedded into the gray map, the gray distribution of the gray map cannot be greatly changed, so that the characteristic of sub-affine transformation is combined with the frequency domain algorithm, the protection capability of hidden information can be improved, and the information in the second image can be better hidden.
The foregoing description of the solution provided by the embodiments of the present application has been mainly presented in terms of a method. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
According to the information hiding method provided by the embodiment of the application, the execution main body can be an information hiding device or a control module for information hiding in the information hiding device. In the embodiment of the present application, an information hiding method performed by an information hiding device is taken as an example, and the information hiding device provided by the embodiment of the present application is described.
It should be noted that, in the embodiment of the present application, the information hiding device may be divided into functional modules according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. Optionally, the division of the modules in the embodiment of the present application is schematic, which is merely a logic function division, and other division manners may be implemented in practice.
As shown in fig. 3, an embodiment of the present application provides an information hiding apparatus 300. The information hiding apparatus 300 includes: an acquisition unit 301 and a processing unit 302. The acquiring unit 301 may be configured to acquire a first image and a second image; the processing unit 302 may be configured to process the first image by using a frequency domain algorithm to obtain a gray scale map; carrying out gray level processing on the second image according to the gray level image, and carrying out affine transformation scrambling on the image subjected to the gray level processing to obtain a third image; and embedding the third image into the gray level image, and obtaining a fourth image hiding the second image through a frequency domain restoration algorithm.
Optionally, the processing unit 302 may be specifically configured to: determining a first pixel value distribution proportion of the gray scale map; and adding pixels in the blank area according to the first pixel value distribution proportion until the pixel value distribution proportion of the second image is the first pixel value distribution proportion.
Optionally, the acquiring unit 301 may be further configured to acquire the fourth image; a processing unit 302, further configured to convert the fourth image by using the frequency domain algorithm, and extract the third image; and carrying out sub-affine period reduction on the third image to obtain an image after the gray level processing of the second image, wherein the image after the gray level processing comprises text information in the information area.
Optionally, the frequency domain algorithm is a fast fourier transform algorithm, and the frequency domain restoration algorithm is a fast fourier transform restoration algorithm.
Optionally, the processing unit 302 may be specifically configured to: and processing pixels of a target image channel of the first image through the frequency domain algorithm, wherein the target image channel is any one of the image channels of the first image.
Of course, the information hiding apparatus 300 provided by the embodiment of the present application includes, but is not limited to, the above-described units.
According to the information hiding device provided by the embodiment of the invention, since the second image can be subjected to gray processing according to the gray map, the gray distribution of the image after sub-affine transformation can be more similar to the target image channel of the first image, and when the third image is embedded into the gray map, the gray distribution of the gray map cannot be greatly changed, so that the characteristic of sub-affine transformation is combined with the frequency domain algorithm, the protection capability of hidden information can be improved, and the information in the second image can be better hidden.
The embodiment of the application also provides an information hiding device as shown in fig. 4, which comprises a processor 11, a memory 12, a communication interface 13 and a bus 14. The processor 11, the memory 12 and the communication interface 13 may be connected by a bus 14.
The processor 11 is a control center of the information hiding apparatus, and may be one processor or a collective name of a plurality of processing elements. For example, the processor 11 may be a general-purpose central processing unit (central processing unit, CPU), or may be another general-purpose processor. Wherein the general purpose processor may be a microprocessor or any conventional processor or the like.
As an example, processor 11 may include one or more CPUs, such as CPU 0 and CPU 1 shown in fig. 4.
Memory 12 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that can store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or electrically erasable programmable read-only memory (EEPROM), magnetic disk storage or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In a possible implementation, the memory 12 may exist separately from the processor 11, and the memory 12 may be connected to the processor 11 through the bus 14 for storing instructions or program code. When the processor 11 invokes and executes the instructions or the program codes stored in the memory 12, the deployment method of the service function chain provided by the embodiment of the application can be realized.
In another possible implementation, the memory 12 may also be integrated with the processor 11.
A communication interface 13 for connecting with other devices via a communication network. The communication network may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN), etc. The communication interface 13 may include a receiving unit for receiving data, and a transmitting unit for transmitting data.
Bus 14 may be an industry standard architecture (Industry Standard Architecture, ISA) bus, an external device interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
It should be noted that the structure shown in fig. 4 does not constitute a limitation of the information hiding means. The information hiding means may include more or less components than those shown in fig. 4, or some components may be combined, or different component arrangements.
The embodiments of the present invention also provide a computer-readable storage medium including computer-executable instructions. When the computer-executable instructions are executed on a computer, the computer is caused to perform the steps performed by the information hiding apparatus in the information hiding method provided in the above-described embodiment.
The embodiment of the invention also provides a computer program product which can be directly loaded into a memory and contains software codes, and the computer program product can realize the steps executed by the information hiding device in the information hiding method provided by the embodiment after being loaded and executed by a computer.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal to perform the method according to the embodiments of the present invention.
The above embodiments are merely illustrative of the principles and functions of the present invention, and are not intended to limit the invention. Modifications and variations may be made to the above-described embodiments by those skilled in the art without departing from the spirit and scope of the invention. Accordingly, it is intended that all equivalent modifications and variations of the invention be covered by the claims of this invention, which are within the skill of those skilled in the art, can be made without departing from the spirit and scope of the invention disclosed herein.

Claims (10)

1. An information hiding method, comprising:
Acquiring a first image and a second image;
processing the first image through a frequency domain algorithm to obtain a gray level image;
carrying out gray level processing on the second image according to the gray level image, and carrying out affine transformation scrambling on the image subjected to the gray level processing to obtain a third image;
embedding the third image into the gray level image, and obtaining a fourth image hiding the second image through a frequency domain restoration algorithm;
The gray scale processing of the second image according to the gray scale map includes:
And adding pixels in the second image until the pixel value distribution proportion of the second image is the same as that of the gray scale.
2. The information hiding method according to claim 1, wherein the second image includes a blank area, and the performing gray processing on the second image according to the gray map includes:
determining a first pixel value distribution proportion of the gray scale map;
And adding pixels in the blank area according to the first pixel value distribution proportion until the pixel value distribution proportion of the second image is the first pixel value distribution proportion.
3. An information hiding method according to claim 1 or2, wherein said second image includes an information area, said obtaining a fourth image hiding said second image further comprising:
acquiring the fourth image;
Converting the fourth image through the frequency domain algorithm, and extracting the third image;
And carrying out sub-affine period reduction on the third image to obtain an image after the gray level processing of the second image, wherein the image after the gray level processing comprises text information in the information area.
4. The information hiding method according to claim 1, wherein the frequency domain algorithm is a fast fourier transform algorithm, and the frequency domain restoration algorithm is a fast fourier transform restoration algorithm.
5. The information hiding method according to claim 1, wherein the processing the first image by a frequency domain algorithm includes: and processing pixels of a target image channel of the first image through the frequency domain algorithm, wherein the target image channel is any one of the image channels of the first image.
6. An information hiding apparatus, characterized by comprising: an acquisition unit and a processing unit;
The acquisition unit is used for acquiring a first image and a second image;
the processing unit is used for processing the first image through a frequency domain algorithm to obtain a gray level image; carrying out gray level processing on the second image according to the gray level image, and carrying out affine transformation scrambling on the image subjected to the gray level processing to obtain a third image; embedding the third image into the gray level image, and obtaining a fourth image hiding the second image through a frequency domain restoration algorithm;
the processing unit is specifically configured to: and adding pixels in the second image until the pixel value distribution proportion of the second image is the same as that of the gray scale.
7. The information hiding apparatus according to claim 6, wherein the second image comprises a blank area, the processing unit being specifically configured to: determining a first pixel value distribution proportion of the gray scale map; and adding pixels in the blank area according to the first pixel value distribution proportion until the pixel value distribution proportion of the second image is the first pixel value distribution proportion.
8. The information hiding apparatus as claimed in claim 6 or 7, wherein the second image comprises an information area,
The acquisition unit is further used for acquiring the fourth image;
The processing unit is further configured to convert the fourth image through the frequency domain algorithm, and extract the third image; and carrying out sub-affine period reduction on the third image to obtain an image after the gray level processing of the second image, wherein the image after the gray level processing comprises text information in the information area.
9. An information hiding device, comprising a memory and a processor; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus;
When the information hiding apparatus is running, the processor executes the computer-executable instructions stored in the memory to cause the information hiding apparatus to perform the information hiding method as claimed in any one of claims 1 to 5.
10. A computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the information hiding method according to any one of claims 1-5.
CN202110996843.1A 2021-08-27 2021-08-27 Information hiding method and device and computer storage medium Active CN113704710B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110996843.1A CN113704710B (en) 2021-08-27 2021-08-27 Information hiding method and device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110996843.1A CN113704710B (en) 2021-08-27 2021-08-27 Information hiding method and device and computer storage medium

Publications (2)

Publication Number Publication Date
CN113704710A CN113704710A (en) 2021-11-26
CN113704710B true CN113704710B (en) 2024-06-07

Family

ID=78656110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110996843.1A Active CN113704710B (en) 2021-08-27 2021-08-27 Information hiding method and device and computer storage medium

Country Status (1)

Country Link
CN (1) CN113704710B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6188776B1 (en) * 1996-05-21 2001-02-13 Interval Research Corporation Principle component analysis of images for the automatic location of control points
JP2002232693A (en) * 2001-02-02 2002-08-16 Ntt Electornics Corp A digital watermark management system, a digital watermark management method, a digital watermark embedding processing device, a digital watermark detection processing device, a recording medium on which a digital watermark management program is recorded, a recording medium on which content including a digital watermark is recorded, an electronic data distribution management device, And electronic data transmission characteristic adjustment device.
CN101615286A (en) * 2008-06-25 2009-12-30 中国科学院自动化研究所 A Blind Information Hiding Detection Method Based on Image Gray Level Run Histogram Analysis
CA2841146A1 (en) * 2011-06-27 2013-01-03 Canadian Bank Note Company, Limited Encoding hidden information in spatial line frequencies
CN102915519A (en) * 2012-09-12 2013-02-06 东北林业大学 Algorithm for encrypting image on basis of chaotic mapping and series changing
CN103632335A (en) * 2013-12-23 2014-03-12 桂林理工大学 Lossless image information hiding method for chain type vector space hiding model
CN109379507A (en) * 2018-09-18 2019-02-22 湖北工程学院 Image protection method and storage medium
CN209776664U (en) * 2019-03-08 2019-12-13 上海钧正网络科技有限公司 Hidden handlebar wiring structure and moped
CN113012014A (en) * 2021-02-19 2021-06-22 上海益高信息技术有限公司 Electronic decoding method for optical watermark anti-counterfeiting seal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644281B2 (en) * 2004-09-27 2010-01-05 Universite De Geneve Character and vector graphics watermark for structured electronic documents security
US20060120558A1 (en) * 2004-10-20 2006-06-08 Yun-Qing Shi System and method for lossless data hiding using the integer wavelet transform
CN109859092B (en) * 2019-01-21 2023-05-12 深圳前海微众银行股份有限公司 Information hiding method, device, equipment and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6188776B1 (en) * 1996-05-21 2001-02-13 Interval Research Corporation Principle component analysis of images for the automatic location of control points
JP2002232693A (en) * 2001-02-02 2002-08-16 Ntt Electornics Corp A digital watermark management system, a digital watermark management method, a digital watermark embedding processing device, a digital watermark detection processing device, a recording medium on which a digital watermark management program is recorded, a recording medium on which content including a digital watermark is recorded, an electronic data distribution management device, And electronic data transmission characteristic adjustment device.
CN101615286A (en) * 2008-06-25 2009-12-30 中国科学院自动化研究所 A Blind Information Hiding Detection Method Based on Image Gray Level Run Histogram Analysis
CA2841146A1 (en) * 2011-06-27 2013-01-03 Canadian Bank Note Company, Limited Encoding hidden information in spatial line frequencies
CN102915519A (en) * 2012-09-12 2013-02-06 东北林业大学 Algorithm for encrypting image on basis of chaotic mapping and series changing
CN103632335A (en) * 2013-12-23 2014-03-12 桂林理工大学 Lossless image information hiding method for chain type vector space hiding model
CN109379507A (en) * 2018-09-18 2019-02-22 湖北工程学院 Image protection method and storage medium
CN209776664U (en) * 2019-03-08 2019-12-13 上海钧正网络科技有限公司 Hidden handlebar wiring structure and moped
CN113012014A (en) * 2021-02-19 2021-06-22 上海益高信息技术有限公司 Electronic decoding method for optical watermark anti-counterfeiting seal

Non-Patent Citations (10)

* Cited by examiner, † Cited by third party
Title
一种改进的LSB数字图像隐藏算法;袁占亭;张秋余;刘洪国;彭铎;;计算机应用研究;20090115(第01期);372-374+377 *
亚仿射变换的性质及其应用;柏森, 曹长修;计算机辅助设计与图形学学报;20030220(第02期);205-208+214 *
卢斌 ; 王冰 ; .基于改进亚仿射变换的图像信息隐藏算法.计算机工程.2011,(第11期),164-166+169. *
基于图像二级置乱的信息隐藏技术;李扬;樊养余;郝重阳;;中国图象图形学报;20060930(第08期);1088-1091 *
基于改进亚仿射变换的图像信息隐藏算法;卢斌;王冰;;计算机工程;20110605(第11期);164-166+169 *
基于直方图技术的无损数据隐藏;陶奉芝;杨厚俊;范延滨;;计算机工程;20080820(16);235-237 *
李扬 ; 樊养余 ; 郝重阳 ; .基于图像二级置乱的信息隐藏技术.中国图象图形学报.2006,(第08期),1088-1091. *
柏森,曹长修.亚仿射变换的性质及其应用.计算机辅助设计与图形学学报.2003,(第02期),205-208+214. *
袁占亭 ; 张秋余 ; 刘洪国 ; 彭铎 ; .一种改进的LSB数字图像隐藏算法.计算机应用研究.2009,(第01期),372-374+377. *
陶奉芝 ; 杨厚俊 ; 范延滨 ; .基于直方图技术的无损数据隐藏.计算机工程.2008,(16),235-237. *

Also Published As

Publication number Publication date
CN113704710A (en) 2021-11-26

Similar Documents

Publication Publication Date Title
JP3937841B2 (en) Information processing apparatus and control method thereof
Thien et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
JP5701182B2 (en) Image processing apparatus, image processing method, and computer program
CN110766594B (en) Information hiding method and device, detection method and device and anti-counterfeiting tracing method
EP3410685B1 (en) Image processing device, image processing method, and program
US9159112B2 (en) Digital watermarking using saturation patterns
US20090080688A1 (en) Digital watermarking for few-color images
CN102956025B (en) Image watermark detection method and system
CN111414779A (en) Anti-counterfeit label identification method and device
Alwan et al. Color image steganography in YCbCr space
CN116579908A (en) Method and device for implanting encrypted hidden information into image
CN113704710B (en) Information hiding method and device and computer storage medium
CN113240569A (en) Fingerprint image encryption method, device and system
CN109859092B (en) Information hiding method, device, equipment and computer readable storage medium
KR102180924B1 (en) System and Method for Embedding and Extracting Digital Watermark Using QR Code
CN113704703B (en) Information hiding method and device and computer storage medium
Sondas et al. H NMH: A new hybrid approach based on near maximum histogram and LSB technique for image steganography
Bailey et al. Evaluation of pixel-based steganography and stegodetection methods
Halboos et al. Improve steganography system using agents software based on statistical and classification technique
Lysenko et al. Applying of Kutter-Jordan-Bossen steganographic algorithm in video sequences
Farhan et al. Improved method using a two Exclusive-OR to binary image in RGB color image steganography
Bucerzan et al. Contributions to steganographic techniques on mobile devices
CN113434828A (en) Intelligent terminal image divulgence tracking and copyright authentication method based on digital watermarking
WO2020014898A1 (en) Image information hiding method and device, and decryption method and device
Watni et al. Comparison of image formats to apply image steganography in smartphones: a preliminary study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant