[go: up one dir, main page]

CN115131253B - A Secret Image Sharing Method and System Against JPEG Heavy Compression - Google Patents

A Secret Image Sharing Method and System Against JPEG Heavy Compression Download PDF

Info

Publication number
CN115131253B
CN115131253B CN202210581724.4A CN202210581724A CN115131253B CN 115131253 B CN115131253 B CN 115131253B CN 202210581724 A CN202210581724 A CN 202210581724A CN 115131253 B CN115131253 B CN 115131253B
Authority
CN
China
Prior art keywords
dct
shadow
shared
image
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210581724.4A
Other languages
Chinese (zh)
Other versions
CN115131253A (en
Inventor
姜越
杨国正
刘京菊
于龙
刘林涛
李龙龙
陈佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202210581724.4A priority Critical patent/CN115131253B/en
Publication of CN115131253A publication Critical patent/CN115131253A/en
Application granted granted Critical
Publication of CN115131253B publication Critical patent/CN115131253B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/10Image enhancement or restoration using non-spatial domain filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/11Complex mathematical operations for solving equations, e.g. nonlinear equations, general mathematical optimization problems
    • G06F17/12Simultaneous equations, e.g. systems of linear equations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20056Discrete and fast Fourier transform, [DFT, FFT]

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Computational Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Operations Research (AREA)
  • Algebra (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)

Abstract

本发明提出一种用于对抗JPEG重压缩的秘密图像分享方法和系统,属于图像处理技术领域。待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述方法在分享所述JPEG图像的同时对抗所述压缩处理。

Figure 202210581724

The invention proposes a secret image sharing method and system for resisting JPEG heavy compression, belonging to the technical field of image processing. The secret image to be shared is a JPEG image, and the secret information contained in the JPEG image is a quantized DCT coefficient. The JPEG re-compression refers to the compression processing performed after the JPEG image is shared. against the compression process while maintaining the JPEG image.

Figure 202210581724

Description

一种用于对抗JPEG重压缩的秘密图像分享方法和系统A secret image sharing method and system for counteracting JPEG heavy compression

技术领域Technical Field

本发明属于图像处理技术领域,尤其涉及一种用于对抗JPEG重压缩的秘密图像分享方法和系统。The present invention belongs to the technical field of image processing, and in particular to a secret image sharing method and system for resisting JPEG heavy compression.

背景技术Background Art

秘密分享技术把秘密信息加密成为多个影子图像(shadow,shadowimage或share)并分发给多个参与方,只有授权参与方的子集合可以一起解密,而非授权子集合无法解密。一个秘密分享算法一般包括秘密分享(share或generate)和恢复(recover)两个阶段,有时也称作加密(encrypt)和解密(decrypt)或者编码(encode)和解码(decode)。在(k,n)门限秘密分享方案(scheme)当中,其中k≤n,将秘密信息加密成n个影子图像。只有获得等于或者大于k个影子图像时,才能解密原秘密;而少于k个影子图像时无法获得任何秘密。Secret sharing technology encrypts secret information into multiple shadow images (shadow, shadowimage or share) and distributes them to multiple participants. Only a subset of authorized participants can decrypt together, while unauthorized subsets cannot decrypt. A secret sharing algorithm generally includes two stages: secret sharing (share or generate) and recovery (recover), sometimes also called encryption (encrypt) and decryption (decrypt) or encoding (encode) and decoding (decode). In the (k,n) threshold secret sharing scheme, where k≤n, the secret information is encrypted into n shadow images. Only when equal to or greater than k shadow images are obtained can the original secret be decrypted; when there are less than k shadow images, no secret can be obtained.

数字图像是最重要的媒体类型之一,研究者们广泛研究将秘密分享技术应用于数字图像对象,秘密图像分享(SIS)技术蓬勃发展。相对于数据,在秘密图像分享领域数字图像的特殊性在于:(1)数字图像的特殊文件存储结构。以灰度BMP格式数字图像为例,其像素值取值空间为[0,255],所以在秘密图像分享方案中应充分考虑秘密值、分享值及相关参数的取值范围,避免分享或恢复过程出现信息丢失,导致无法恢复秘密图像的情况。(2)数字图像由大量像素点组成,秘密分享每次仅针对一个或几个像素值进行分享操作,因此,方案设计过程中应当重视分享和恢复算法的高效性。(3)相邻像素值之间有关联性。图像相邻像素点之间存在连贯性和关联性,这可能造成图像秘密信息的泄露。因此秘密图像分享方案要同时考虑单次分享安全性和视觉安全性。(4)图像传递最终靠人眼视觉系统识别,由于人眼的低通滤波特性,不要求无损恢复图像(5)图像是特殊的数据,秘密图像分享方案可经简单改变应用于一般数据的秘密分享场合。秘密图像分享方案进行性能评估指标包括:秘密图像的恢复质量,有无像素扩张,(k,n)门限,秘密图像恢复复杂度,影子图像可理解,渐进性,秘密图像类型等。Digital images are one of the most important media types. Researchers have extensively studied the application of secret sharing technology to digital image objects, and secret image sharing (SIS) technology has flourished. Compared with data, the special features of digital images in the field of secret image sharing are: (1) The special file storage structure of digital images. Taking grayscale BMP format digital images as an example, the pixel value space is [0, 255]. Therefore, in the secret image sharing scheme, the value range of secret values, sharing values and related parameters should be fully considered to avoid information loss during the sharing or recovery process, resulting in the inability to recover the secret image. (2) Digital images are composed of a large number of pixels. Secret sharing only performs sharing operations on one or several pixel values at a time. Therefore, the efficiency of sharing and recovery algorithms should be emphasized during the scheme design process. (3) There is correlation between adjacent pixel values. There is coherence and correlation between adjacent pixel points in the image, which may cause the leakage of image secret information. Therefore, the secret image sharing scheme should consider both single-time sharing security and visual security. (4) Image transmission ultimately relies on human visual system recognition. Due to the low-pass filtering characteristics of the human eye, lossless image restoration is not required. (5) Images are special data, and the secret image sharing scheme can be applied to general data secret sharing scenarios with simple changes. The performance evaluation indicators of the secret image sharing scheme include: secret image restoration quality, pixel expansion, (k,n) threshold, secret image restoration complexity, shadow image understandability, gradualness, secret image type, etc.

秘密分享的主流原理包括:基于多项式的(k,n)门限秘密分享方案,基于中国剩余定理的秘密分享方案,可视加密方案。本技术方案是基于多项式的秘密分享方案。下面介绍基于多项式的(k,n)门限秘密分享方案。The mainstream principles of secret sharing include: (k,n) threshold secret sharing scheme based on polynomials, secret sharing scheme based on the Chinese remainder theorem, and visual encryption scheme. This technical scheme is a secret sharing scheme based on polynomials. The following introduces a (k,n) threshold secret sharing scheme based on polynomials.

现有技术中的多项式秘密分享方案将秘密嵌入一个随机的k-1次多项式,在解密时这个多项式可以由拉格朗日插值法重构,从而获取嵌入多项式的秘密信息。已知秘密信息s,将其分享为n个影子份额sc1,sc2,…,scn,具体的方案如下:The polynomial secret sharing scheme in the prior art embeds the secret into a random k-1 degree polynomial. During decryption, the polynomial can be reconstructed by Lagrange interpolation to obtain the secret information embedded in the polynomial. Given the secret information s, share it as n shadow shares sc 1 ,sc 2 ,…,sc n . The specific scheme is as follows:

(1)在初始化阶段,确定门限(k,n)的值,其中,k≤n。选择一个大素数p,满足p>n且p>s,令GF(p)是一个有限域,所有的元素都是GF(p)的元素,且所有的运算在有限域GF(p)中进行。(1) In the initialization phase, determine the value of the threshold (k,n), where k≤n. Select a large prime number p such that p>n and p>s, and let GF(p) be a finite field, all elements of which are elements of GF(p), and all operations are performed in the finite field GF(p).

(2)在分享阶段,为了将s加密成为影子值sci,在有限域GF(p)内随机生成一个k-1次的多项式:(2) In the sharing phase, in order to encrypt s into the shadow value sc i , a k-1 degree polynomial is randomly generated in the finite field GF(p):

f(x)=a0+a1x+…+ak-1xk-1 f(x)=a 0 +a 1 x+…+a k-1 x k-1

其中,将秘密s嵌入到多项式第一个系数中,即a0=s,其余的系数a1,…,ak-1在有限域GF(p)中随机选取。然后计算The secret s is embedded into the first coefficient of the polynomial, that is, a 0 = s, and the remaining coefficients a 1 ,…, a k-1 are randomly selected from the finite field GF(p). Then calculate

sc1=f(1),…,sck=f(k),…,scn=f(n)sc 1 =f(1),…,sc k =f(k),…,sc n =f(n)

取(i,sci)作为一个影子对,其中i作为一个信息标签或者序号标签,sci作为一个影子像素值。将n个影子份额分别分发给n个参与者即完成秘密分享。Take (i, sc i ) as a shadow pair, where i is an information tag or sequence number tag, and sc i is a shadow pixel value. Distribute n shadow shares to n participants to complete secret sharing.

(3)在恢复阶段,在获取n个参与者中持有的任意k个秘密对

Figure GDA0004211234770000021
其中,
Figure GDA0004211234770000022
可以构建如下的线性方程组:(3) In the recovery phase, obtain any k secret pairs held by n participants.
Figure GDA0004211234770000021
in,
Figure GDA0004211234770000022
The following linear equations can be constructed:

Figure GDA0004211234770000023
Figure GDA0004211234770000023

因为il(1≤l≤k)均不相同,所以可由拉格朗日插值公式构造如下的多项式:Because i l (1≤l≤k) are all different, the following polynomial can be constructed using the Lagrange interpolation formula:

Figure GDA0004211234770000031
Figure GDA0004211234770000031

从而可得秘密s=f(0)。如果k-1个参与者想要获得秘密,可构造出k-1个方程并组成线性方程组,其中分享多项式的k个系数是未知数。由于标签il不同,每一个影子份额都对应一个唯一的多项式满足公式线性方程组,所以已知k-1个影子无法求解含有k个未知数的线性方程组,从而得不到关于秘密的任何信息,因此这个方案是完善的。Thus, the secret s = f(0) can be obtained. If k-1 participants want to obtain the secret, they can construct k-1 equations and form a linear system of equations, where the k coefficients of the shared polynomial are unknowns. Since the labels i l are different, each shadow share corresponds to a unique polynomial that satisfies the linear system of equations. Therefore, it is known that k-1 shadows cannot solve the linear system of equations containing k unknowns, and thus cannot obtain any information about the secret. Therefore, this solution is perfect.

随着社交网络影响力的不断提高,Facebook、Twitter、Instagram、Wechat和新浪微博等在人们日常生活中的深入渗透,照片分享已经成为用户与朋友交流的一种流行活动。截止2022年2月已有350亿张照片被上传到Facebook上。利用社交网络上的图像传递或储存信息,可以实现秘密信息的隐蔽传输和存储,满足国家和社会便捷安全通信的需求,对保障信息安全具有重要价值。目前秘密图像分享(Secret Image Sharing,SIS)可以解决以图像为媒介的隐蔽通信和隐蔽存储的问题。秘密图像分享技术利用秘密共享的思想,将秘密拆分存储以阻止秘密图像分享技术利用秘密共享的思想,将秘密拆分存储以阻止秘密过于集中,而达到分散风险和容忍入侵(丢失)的目的,该技术把秘密信息加密成为多个影子图像(shadow,shadow image或share)并分发给多个参与方,只有授权参与方的子集合可以一起解密,而非授权子集合无法解密。一般基于秘密图像分享的隐蔽通信是多通道的,能够解决单一图像隐写面临的不能实现多通道隐蔽通信、权限控制以及丢失容忍等的问题。With the increasing influence of social networks, Facebook, Twitter, Instagram, WeChat and Sina Weibo have penetrated deeply into people's daily lives, and photo sharing has become a popular activity for users to communicate with friends. As of February 2022, 35 billion photos have been uploaded to Facebook. Using images on social networks to transmit or store information can achieve the covert transmission and storage of secret information, meet the needs of the country and society for convenient and secure communication, and have important value in ensuring information security. At present, Secret Image Sharing (SIS) can solve the problem of covert communication and covert storage using images as the medium. Secret image sharing technology uses the idea of secret sharing to split the storage of secrets to prevent secrets from being too concentrated, and achieves the purpose of dispersing risks and tolerating intrusion (loss). This technology encrypts secret information into multiple shadow images (shadow, shadow image or share) and distributes them to multiple participants. Only a subset of authorized participants can decrypt together, while unauthorized subsets cannot be decrypted. Generally, covert communication based on secret image sharing is multi-channel, which can solve the problems faced by single image steganography, such as the inability to achieve multi-channel covert communication, authority control, and loss tolerance.

然而,在大规模社交网络环境下,受社交网络性能和后台服务器的限制,经过社交网络有损信道的图像会被执行重压缩等有损操作,造成影子图像质量降低和信息损失。而传统的秘密图像分享技术是针对无损信道设计的,导致传统的技术在社交网络环境下不再适用。将已有的秘密图像分享技术应用与公共互联网上的社交网络时,分发者将秘密图像分享为若干个影子图像交由若干个参与者;参与者将持有的影子图像上传至其社交网络账号如Facebook、Twitter、微信等社交平台,影子图像会经过公共互联网的信道的传输;上传的影子图像会被进行重压缩等有损操作,造成影子图像质量降低和信息损失;恢复者收到有损的影子图像后若想成功恢复,就需要设计鲁棒的秘密图像分享方案生成对JPEG重压缩鲁棒的影子图像。However, in a large-scale social network environment, due to the limitations of social network performance and backend servers, images passing through lossy channels of social networks will be subjected to lossy operations such as recompression, resulting in reduced shadow image quality and information loss. Traditional secret image sharing technology is designed for lossless channels, which makes traditional technology no longer applicable in social network environments. When the existing secret image sharing technology is applied to social networks on the public Internet, the distributor shares the secret image as several shadow images and hands them over to several participants; the participants upload the shadow images they hold to their social network accounts such as Facebook, Twitter, WeChat and other social platforms, and the shadow images will be transmitted through the channels of the public Internet; the uploaded shadow images will be subjected to lossy operations such as recompression, resulting in reduced shadow image quality and information loss; if the restorer wants to successfully restore the lossy shadow images after receiving them, it is necessary to design a robust secret image sharing scheme to generate shadow images that are robust to JPEG recompression.

对抗JPEG重压缩的鲁棒秘密分享方案是将秘密图像分享应用于社交网络的必经之路和基础。另外,应追求更好的秘密图像分享属性,如影子图像可理解、恢复的秘密图像的高图像质量等。A robust secret sharing scheme against JPEG heavy compression is the only way and foundation for applying secret image sharing to social networks. In addition, better secret image sharing properties should be pursued, such as understandable shadow images and high image quality of recovered secret images.

传统的秘密图像分享技术是针对无损信道设计的,将图像上传到社交网络时图像会被执行重压缩有损操作,导致传统的秘密图像分享技术在社交网络环境下不再适用。目前并没有针对JPEG重压缩有效的鲁棒秘密图像分享方案。对抗JPEG重压缩的鲁棒秘密分享方案是将秘密图像分享应用于社交网络的必经之路和基础。为了对抗JPEG重压缩对影子图像造成的损失,本专利寻找到了JPEG重压缩前后的稳定量,并利用基于多项式的秘密图像分享方案的筛选机制和稳定块条件构造出能够对抗JPEG重压缩的鲁棒影子图像。Traditional secret image sharing technology is designed for lossless channels. When uploading images to social networks, the images will be subjected to lossy recompression operations, resulting in traditional secret image sharing technology no longer being applicable in social network environments. Currently, there is no robust secret image sharing solution that is effective against JPEG recompression. A robust secret sharing solution that resists JPEG recompression is the only way and basis for applying secret image sharing to social networks. In order to combat the loss of shadow images caused by JPEG recompression, this patent finds the stable amount before and after JPEG recompression, and uses the screening mechanism and stable block conditions of the polynomial-based secret image sharing solution to construct a robust shadow image that can resist JPEG recompression.

发明内容Summary of the invention

针对上述技术问题,本发明提出一种用于对抗JPEG重压缩的秘密图像分享方案。In view of the above technical problems, the present invention proposes a secret image sharing solution for resisting JPEG heavy compression.

本发明第一方面公开了一种用于对抗JPEG重压缩的秘密图像分享方法。待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT(Discrete CosineTransform,离散余弦变换)系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述方法在分享所述JPEG图像的同时对抗所述压缩处理;所述方法包括:The first aspect of the present invention discloses a secret image sharing method for resisting JPEG recompression. The secret image to be shared is a JPEG image, the secret information contained in the JPEG image is a quantized DCT (Discrete Cosine Transform) coefficient, the JPEG recompression refers to the compression process performed on the JPEG image after the sharing process, and the method resists the compression process while sharing the JPEG image; the method comprises:

步骤S1、提取获取到的n+1张图像进行预处理,以提取所述n+1张图像中的每一张图像的完整DCT系数列表,所述n+1张图像包括1张所述待分享的秘密图像和n张载体图像;Step S1, extracting and preprocessing the acquired n+1 images to extract a complete DCT coefficient list of each image in the n+1 images, wherein the n+1 images include one secret image to be shared and n carrier images;

步骤S2、基于n+1张所述完整DCT系数列表,确定所述待分享的秘密图像的待分享DCT系数列表、所述n张载体图像对应的n张待使用DCT系数列表,并根据所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值确定素数p;Step S2, based on the n+1 complete DCT coefficient lists, determining the DCT coefficient list to be shared of the secret image to be shared and the n DCT coefficient lists to be used corresponding to the n carrier images, and determining the prime number p according to the maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used;

步骤S3、利用所述待分享DCT系数列表、所述n张待使用DCT系数列表、所述素数p和门限值k,通过计算获取与所述n张待使用DCT系数列表对应的且包含所述待分享的秘密图像的秘密信息的n张分享值列表;Step S3, using the DCT coefficient list to be shared, the n DCT coefficient lists to be used, the prime number p and the threshold value k, obtaining by calculation n sharing value lists corresponding to the n DCT coefficient lists to be used and containing the secret information of the secret image to be shared;

步骤S4、对于所述n张分享值列表中每张分享值列表,均执行:依据其各个分享值形成B×B个影子DCT块,并对所述B×B个影子DCT块进行解压缩处理以获取B×B个影子图像空域块;Step S4, for each of the n sharing value lists, executing: forming B×B shadow DCT blocks according to each sharing value thereof, and decompressing the B×B shadow DCT blocks to obtain B×B shadow image spatial domain blocks;

步骤S5、判断基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值是否都在指定范围内,若是,对于所述每张分享值列表对应的B×B个影子图像空域块,将其作为对抗所述JPEG重压缩的B×B个影子DCT块;Step S5, determining whether the element value in each image spatial domain block of a total of n×B×B shadow image spatial domain blocks obtained based on the n sharing value lists is within a specified range, and if so, using the B×B shadow image spatial domain blocks corresponding to each sharing value list as B×B shadow DCT blocks to resist the JPEG recompression;

步骤S6、对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,确定对抗所述JPEG重压缩的1张影子图像,共得到对抗所述JPEG重压缩的n张影子图像,发送方通过向接收方发送对抗所述JPEG重压缩的n张影子图像实现分享所述秘密图像的同时对抗所述JPEG重压缩;Step S6: for each of the B×B shadow DCT blocks corresponding to the shared value list that resist the JPEG recompression, determine one shadow image that resists the JPEG recompression, and obtain a total of n shadow images that resist the JPEG recompression. The sender sends the n shadow images that resist the JPEG recompression to the receiver to share the secret image while resisting the JPEG recompression.

其中,n、p、k、B均为正整数,k≤n,且门限值k表征恢复所述秘密图像所需的最少影子图像的数量。Wherein, n, p, k, and B are all positive integers, k≤n, and the threshold value k represents the minimum number of shadow images required to restore the secret image.

根据本发明第一方面的方法,在所述步骤S1中,所述预处理具体包括,对所述n+1张图像中的每一张图像均执行:According to the method of the first aspect of the present invention, in step S1, the preprocessing specifically includes performing the following steps on each of the n+1 images:

通过熵解码提取当前图像经量化后的DCT系数矩阵,所述DCT系数矩阵包含M×M个DCT系数,对所述DCT系数矩阵进行分块处理,分为B×B个DCT块,每个所述DCT块包含A×A个DCT系数,其中M=B×A;Extracting a quantized DCT coefficient matrix of the current image by entropy decoding, the DCT coefficient matrix comprising M×M DCT coefficients, performing block processing on the DCT coefficient matrix into B×B DCT blocks, each of which comprises A×A DCT coefficients, wherein M=B×A;

对每个包含A×A个DCT系数的DCT块,以之字顺序提取前C个DCT系数,以获取每个所述DCT块的DCT系数列表,从而构建所述当前图像的完整DCT系数列表,每个所述DCT块的DCT系数列表长度为C,所述当前图像的完整DCT系数列表的长度为C×B×B;For each DCT block containing A×A DCT coefficients, extract the first C DCT coefficients in a zigzag order to obtain a DCT coefficient list of each DCT block, thereby constructing a complete DCT coefficient list of the current image, the length of the DCT coefficient list of each DCT block is C, and the length of the complete DCT coefficient list of the current image is C×B×B;

其中,M、A、C均为正整数。Among them, M, A, and C are all positive integers.

根据本发明第一方面的方法,所述步骤S2具体包括:According to the method of the first aspect of the present invention, step S2 specifically comprises:

判断所述n+1张完整DCT系数列表中的最小DCT系数是否大于0;Determine whether the minimum DCT coefficient in the n+1 complete DCT coefficient lists is greater than 0;

若是,则将所述n+1张完整DCT系数列表中的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将所述n+1张完整DCT系数列表中的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If yes, one of the n+1 complete DCT coefficient lists of the secret image to be shared is used as the DCT coefficient list to be shared, and n of the n+1 complete DCT coefficient lists of the carrier image are used as the n DCT coefficient lists to be used;

若否,则对所述n+1张完整DCT系数列表中的全部DCT系数进行值平移,所述值平移的平移量为所述最小DCT系数的绝对值,将经所述值平移后的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将经所述值平移后的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If not, perform value shift on all DCT coefficients in the n+1 complete DCT coefficient lists, the shift amount of the value shift is the absolute value of the minimum DCT coefficient, and use the complete DCT coefficient list of the secret image to be shared after the value shift as the DCT coefficient list to be shared, and use the complete DCT coefficient lists of the n carrier images after the value shift as the n DCT coefficient lists to be used;

获取所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值,取大于所述最大DCT系数的最小素数作为所述素数p。The maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used is obtained, and the minimum prime number greater than the maximum DCT coefficient is taken as the prime number p.

根据本发明第一方面的方法,所述待分享DCT系数列表的长度、所述n张待使用DCT系数列表中的每一张列表的长度、所述n张分享值列表中的每一张列表的长度均为C×B×B;所述步骤S3具体包括:According to the method of the first aspect of the present invention, the length of the DCT coefficient list to be shared, the length of each of the n DCT coefficient lists to be used, and the length of each of the n shared value lists are all C×B×B; the step S3 specifically includes:

对于所述n张分享值列表中每一张列表中的每个位置,利用公式f(x)=s+a1x+a2x2+…+ak-1xk-1(mod p)计算其DCT影子值;For each position in each of the n shared value lists, calculate its DCT shadow value using the formula f(x)=s+a 1 x+a 2 x 2 +…+ak -1 x k-1 (mod p);

其中,f(x)为所述n张分享值列表中当前列表中的当前位置上的DCT影子值,s为所述待分享DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数,a1、a2、...、ak-1为任意选取的随机数,x为选定值,(mod p)表示模p运算;Wherein, f(x) is the DCT shadow value at the current position in the current list in the n shared value lists, s is the DCT coefficient at the position in the DCT coefficient list to be shared corresponding to the current position in the current list, a 1 , a 2 , ..., a k-1 are arbitrarily selected random numbers, x is a selected value, and (mod p) represents a modulo p operation;

判断f(x)的高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位是否相等,其中

Figure GDA0004211234770000061
Determine whether the high δ bits of f(x) are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, wherein
Figure GDA0004211234770000061

若是,则将所述DCT影子值f(x)作为所述当前位置的n张分享值列表中当前列表中的当前位置上的分享值;If so, the DCT shadow value f(x) is used as the shared value at the current position in the current list of the n shared value lists at the current position;

若否,则调节a1、a2、...、ak-1并重新计算f(x),直到其高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位相等,并获取当前位置上的分享值。If not, adjust a1 , a2 , ..., ak-1 and recalculate f(x) until its high δ bits are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, and obtain the sharing value at the current position.

根据本发明第一方面的方法,在所述步骤S3中,对于所述当前列表中的各个位置,在计算其DCT影子值时,x保持不变,且n张所述分享值列表的选定值x各不相同,f(x)、x、以及a1、a2、...、ak-1的取值范围为[0,p-1]上的整数。According to the method of the first aspect of the present invention, in step S3, for each position in the current list, when calculating its DCT shadow value, x remains unchanged, and the selected values x of the n shared value lists are different, and the value ranges of f(x), x, and a1 , a2 , ..., ak-1 are integers on [0, p-1].

根据本发明第一方面的方法,所述步骤S4具体包括:According to the method of the first aspect of the present invention, step S4 specifically comprises:

对所述n张分享值列表中每张分享值列表:每提取C个分享值,将其与所述n张载体图像中对应的载体图像的对应DCT块中第C+1至第A×A个DCT系数进行拼接,以形成1张完整的影子DCT列表;重复以上操作得到n张完整的影子DCT列表;For each of the n shared value lists: extract C shared values each time, and concatenate them with the C+1th to A×Ath DCT coefficients in the corresponding DCT block of the corresponding carrier image in the n carrier images to form a complete shadow DCT list; repeat the above operation to obtain n complete shadow DCT lists;

对所述n张影子DCT列表中的每张DCT列表:通过逆之字排列得到B×B个大小为A×A的影子DCT块,对所述B×B个影子DCT块分别进行解压缩处理,所述解压缩处理包括逆DCT变换和四舍五入处理,从而获取B×B个影子图像空域块;重复以上操作得到共n×B×B个影子图像空域块;For each of the n shadow DCT lists: obtain B×B shadow DCT blocks of size A×A by inverse zigzag arrangement, decompress the B×B shadow DCT blocks respectively, wherein the decompression process includes inverse DCT transformation and rounding process, thereby obtaining B×B shadow image spatial domain blocks; repeat the above operation to obtain a total of n×B×B shadow image spatial domain blocks;

其中,在执行所述逆之字排列之前,判断在步骤S2中是否对所述n+1张完整DCT系数列表中的全部DCT系数进行了值平移,若是,则将所述n张影子DCT列表中的全部分享值和全部DCT值执行逆值平移,所述逆值平移的平移量为所述最小DCT系数的绝对值。Before executing the inverse zigzag arrangement, it is determined whether all DCT coefficients in the n+1 complete DCT coefficient lists have been value shifted in step S2. If so, all shared values and all DCT values in the n shadow DCT lists are inversely value shifted, and the shift amount of the inverse value shift is the absolute value of the minimum DCT coefficient.

根据本发明第一方面的方法,在所述步骤S5中:According to the method of the first aspect of the present invention, in step S5:

所述指定范围为[-128,127);The specified range is [-128, 127);

若基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值不都在指定范围内,则调节a1、a2、...、ak-1并重新执行步骤S3-S5,直到所述每个图像空域块中的元素值都在所述指定范围内。If the element value in each image spatial domain block of the n×B×B shadow image spatial domain blocks obtained based on the n sharing value lists is not within the specified range, a 1 , a 2 , ..., a k-1 are adjusted and steps S3 to S5 are re-executed until the element value in each image spatial domain block is within the specified range.

在所述步骤S6中:In step S6:

对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,通过拼接形成所述1个影子DCT矩阵,对所述1个影子DCT矩阵进行熵编码,从而得到对抗所述JPEG重压缩的1个影子图像;重复上述操作,共得到对抗所述JPEG重压缩的n张影子图像;For the B×B shadow DCT blocks corresponding to each of the sharing value lists that resist the JPEG recompression, the shadow DCT matrix is formed by splicing, and the shadow DCT matrix is entropy encoded to obtain a shadow image that resists the JPEG recompression; repeat the above operation to obtain a total of n shadow images that resist the JPEG recompression;

获取n张所述分享值列表的选定值x1、x2、...、xn,所述发送方将所述选定值x1、x2、...、xn与所述n张影子图像一同发送至所述接收方,所述接收方基于接收到的l张所述影子图像和所述选定值x1、x2、...、xn,恢复出所述秘密图像,其中,k≤l≤n。Selected values x 1 , x 2 , ..., x n of n shared value lists are obtained. The sender sends the selected values x 1 , x 2 , ..., x n together with the n shadow images to the receiver. The receiver restores the secret image based on the received l shadow images and the selected values x 1 , x 2 , ..., x n , where k≤l≤n.

本发明第二方面公开了一种用于对抗JPEG重压缩的秘密图像分享系统。待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT(Discrete CosineTransform,离散余弦变换)系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述系统在分享所述JPEG图像的同时对抗所述压缩处理;所述系统包括:The second aspect of the present invention discloses a secret image sharing system for resisting JPEG recompression. The secret image to be shared is a JPEG image, the secret information contained in the JPEG image is a quantized DCT (Discrete Cosine Transform) coefficient, the JPEG recompression refers to the compression process performed on the JPEG image after the sharing process, and the system resists the compression process while sharing the JPEG image; the system comprises:

第一处理单元,被配置为:提取获取到的n+1张图像进行预处理,以提取所述n+1张图像中的每一张图像的完整DCT系数列表,所述n+1张图像包括1张所述待分享的秘密图像和n张载体图像;A first processing unit is configured to: extract the acquired n+1 images for preprocessing to extract a complete DCT coefficient list of each image in the n+1 images, wherein the n+1 images include one secret image to be shared and n carrier images;

第二处理单元,被配置为:基于n+1张所述完整DCT系数列表,确定所述待分享的秘密图像的待分享DCT系数列表、所述n张载体图像对应的n张待使用DCT系数列表,并根据所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值确定素数p;The second processing unit is configured to: determine the DCT coefficient list to be shared of the secret image to be shared and the n DCT coefficient lists to be used corresponding to the n carrier images based on the n+1 complete DCT coefficient lists, and determine the prime number p according to the maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used;

第三处理单元,被配置为:利用所述待分享DCT系数列表、所述n张待使用DCT系数列表、所述素数p和门限值k,通过计算获取与所述n张待使用DCT系数列表对应的且包含所述待分享的秘密图像的秘密信息的n张分享值列表;The third processing unit is configured to: use the DCT coefficient list to be shared, the n DCT coefficient lists to be used, the prime number p and the threshold value k to obtain, by calculation, n sharing value lists corresponding to the n DCT coefficient lists to be used and containing the secret information of the secret image to be shared;

第四处理单元,被配置为:对于所述n张分享值列表中每张分享值列表,均执行:依据其各个分享值形成B×B个影子DCT块,并对所述B×B个影子DCT块进行解压缩处理以获取B×B个影子图像空域块;The fourth processing unit is configured to: for each of the n sharing value lists, perform: forming B×B shadow DCT blocks according to each sharing value thereof, and decompressing the B×B shadow DCT blocks to obtain B×B shadow image spatial domain blocks;

第五处理单元,被配置为:判断基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值是否都在指定范围内,若是,对于所述每张分享值列表对应的B×B个影子图像空域块,将其作为对抗所述JPEG重压缩的B×B个影子DCT块;A fifth processing unit is configured to: determine whether an element value in each image spatial domain block of a total of n×B×B shadow image spatial domain blocks obtained based on the n sharing value lists is within a specified range, and if so, use the B×B shadow image spatial domain blocks corresponding to each sharing value list as B×B shadow DCT blocks to resist the JPEG recompression;

第六处理单元,被配置为:对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,确定对抗所述JPEG重压缩的1张影子图像,共得到对抗所述JPEG重压缩的n张影子图像;The sixth processing unit is configured to: determine, for each of the B×B shadow DCT blocks corresponding to the sharing value list and resistant to the JPEG recompression, one shadow image resistant to the JPEG recompression, and obtain a total of n shadow images resistant to the JPEG recompression;

其中,发送方通过向接收方发送对抗所述JPEG重压缩的n张影子图像实现分享所述秘密图像的同时对抗所述JPEG重压缩;The sender shares the secret image while resisting the JPEG recompression by sending n shadow images resisting the JPEG recompression to the receiver;

其中,n、p、k、B均为正整数,k≤n,且门限值k表征恢复所述秘密图像所需的最少影子图像的数量。Wherein, n, p, k, and B are all positive integers, k≤n, and the threshold value k represents the minimum number of shadow images required to restore the secret image.

根据本发明第二方面的系统,所述预处理具体包括,对所述n+1张图像中的每一张图像均执行:According to the system of the second aspect of the present invention, the preprocessing specifically includes performing the following steps on each of the n+1 images:

通过熵解码提取当前图像经量化后的DCT系数矩阵,所述DCT系数矩阵包含M×M个DCT系数,对所述DCT系数矩阵进行分块处理,分为B×B个DCT块,每个所述DCT块包含A×A个DCT系数,其中M=B×A;Extracting a quantized DCT coefficient matrix of the current image by entropy decoding, the DCT coefficient matrix comprising M×M DCT coefficients, performing block processing on the DCT coefficient matrix into B×B DCT blocks, each of which comprises A×A DCT coefficients, wherein M=B×A;

对每个包含A×A个DCT系数的DCT块,以之字顺序提取前C个DCT系数,以获取每个所述DCT块的DCT系数列表,从而构建所述当前图像的完整DCT系数列表,每个所述DCT块的DCT系数列表长度为C,所述当前图像的完整DCT系数列表的长度为C×B×B;For each DCT block containing A×A DCT coefficients, extract the first C DCT coefficients in a zigzag order to obtain a DCT coefficient list of each DCT block, thereby constructing a complete DCT coefficient list of the current image, the length of the DCT coefficient list of each DCT block is C, and the length of the complete DCT coefficient list of the current image is C×B×B;

其中,M、A、C均为正整数。Among them, M, A, and C are all positive integers.

根据本发明第二方面的系统,所述第二处理单元具体被配置为:According to the system of the second aspect of the present invention, the second processing unit is specifically configured as follows:

判断所述n+1张完整DCT系数列表中的最小DCT系数是否大于0;Determine whether the minimum DCT coefficient in the n+1 complete DCT coefficient lists is greater than 0;

若是,则将所述n+1张完整DCT系数列表中的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将所述n+1张完整DCT系数列表中的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If yes, one of the n+1 complete DCT coefficient lists of the secret image to be shared is used as the DCT coefficient list to be shared, and n of the n+1 complete DCT coefficient lists of the carrier image are used as the n DCT coefficient lists to be used;

若否,则对所述n+1张完整DCT系数列表中的全部DCT系数进行值平移,所述值平移的平移量为所述最小DCT系数的绝对值,将经所述值平移后的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将经所述值平移后的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If not, perform value shift on all DCT coefficients in the n+1 complete DCT coefficient lists, the shift amount of the value shift is the absolute value of the minimum DCT coefficient, and use the complete DCT coefficient list of the secret image to be shared after the value shift as the DCT coefficient list to be shared, and use the complete DCT coefficient lists of the n carrier images after the value shift as the n DCT coefficient lists to be used;

获取所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值,取大于所述最大DCT系数的最小素数作为所述素数p。The maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used is obtained, and the minimum prime number greater than the maximum DCT coefficient is taken as the prime number p.

根据本发明第二方面的系统,所述待分享DCT系数列表的长度、所述n张待使用DCT系数列表中的每一张列表的长度、所述n张分享值列表中的每一张列表的长度均为C×B×B;所述第二处理单元具体被配置为:According to the system of the second aspect of the present invention, the length of the DCT coefficient list to be shared, the length of each of the n DCT coefficient lists to be used, and the length of each of the n shared value lists are all C×B×B; the second processing unit is specifically configured as follows:

对于所述n张分享值列表中每一张列表中的每个位置,利用公式f(x)=s+a1x+a2x2+…+ak-1xk-1(mod p)计算其DCT影子值;For each position in each of the n shared value lists, calculate its DCT shadow value using the formula f(x)=s+a 1 x+a 2 x 2 +…+ak -1 x k-1 (mod p);

其中,f(x)为所述n张分享值列表中当前列表中的当前位置上的DCT影子值,s为所述待分享DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数,a1、a2、...、ak-1为任意选取的随机数,x为选定值,(mod p)表示模p运算;Wherein, f(x) is the DCT shadow value at the current position in the current list in the n shared value lists, s is the DCT coefficient at the position in the DCT coefficient list to be shared corresponding to the current position in the current list, a 1 , a 2 , ..., a k-1 are arbitrarily selected random numbers, x is a selected value, and (mod p) represents a modulo p operation;

判断f(x)的高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位是否相等,其中

Figure GDA0004211234770000091
Determine whether the high δ bits of f(x) are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, wherein
Figure GDA0004211234770000091

若是,则将所述DCT影子值f(x)作为所述当前位置的n张分享值列表中当前列表中的当前位置上的分享值;If so, the DCT shadow value f(x) is used as the shared value at the current position in the current list of the n shared value lists at the current position;

若否,则调节a1、a2、...、ak-1并重新计算f(x),直到其高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位相等,并获取当前位置上的分享值。If not, adjust a1 , a2 , ..., ak-1 and recalculate f(x) until its high δ bits are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, and obtain the sharing value at the current position.

根据本发明第二方面的系统,对于所述当前列表中的各个位置,在计算其DCT影子值时,x保持不变,且n张所述分享值列表的选定值x各不相同,f(x)、x、以及a1、a2、...、ak-1的取值范围为[0,p-1]上的整数。According to the system of the second aspect of the present invention, for each position in the current list, when calculating its DCT shadow value, x remains unchanged, and the selected values x of the n shared value lists are different, and the value ranges of f(x), x, and a1 , a2 , ..., ak-1 are integers on [0, p-1].

根据本发明第二方面的系统,所述第四处理单元具体被配置为:According to the system of the second aspect of the present invention, the fourth processing unit is specifically configured as follows:

对所述n张分享值列表中每张分享值列表:每提取C个分享值,将其与所述n张载体图像中对应的载体图像的对应DCT块中第C+1至第A×A个DCT系数进行拼接,以形成1张完整的影子DCT列表;重复以上操作得到n张完整的影子DCT列表;For each of the n shared value lists: extract C shared values each time, and concatenate them with the C+1th to A×Ath DCT coefficients in the corresponding DCT block of the corresponding carrier image in the n carrier images to form a complete shadow DCT list; repeat the above operation to obtain n complete shadow DCT lists;

对所述n张影子DCT列表中的每张DCT列表:通过逆之字排列得到B×B个大小为A×A的影子DCT块,对所述B×B个影子DCT块分别进行解压缩处理,所述解压缩处理包括逆DCT变换和四舍五入处理,从而获取B×B个影子图像空域块;重复以上操作得到共n×B×B个影子图像空域块;For each of the n shadow DCT lists: obtain B×B shadow DCT blocks of size A×A by inverse zigzag arrangement, decompress the B×B shadow DCT blocks respectively, wherein the decompression process includes inverse DCT transformation and rounding process, thereby obtaining B×B shadow image spatial domain blocks; repeat the above operation to obtain a total of n×B×B shadow image spatial domain blocks;

其中,在执行所述逆之字排列之前,判断在步骤S2中是否对所述n+1张完整DCT系数列表中的全部DCT系数进行了值平移,若是,则将所述n张影子DCT列表中的全部分享值和全部DCT值执行逆值平移,所述逆值平移的平移量为所述最小DCT系数的绝对值。Before executing the inverse zigzag arrangement, it is determined whether all DCT coefficients in the n+1 complete DCT coefficient lists have been value shifted in step S2. If so, all shared values and all DCT values in the n shadow DCT lists are inversely value shifted, and the shift amount of the inverse value shift is the absolute value of the minimum DCT coefficient.

根据本发明第二方面的系统,所述指定范围为[-128,127);所述第五处理单元具体被配置为:若基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值不都在指定范围内,则调节a1、a2、...、ak-1并重新执行步骤S3-S5,直到所述每个图像空域块中的元素值都在所述指定范围内。According to the system of the second aspect of the present invention, the specified range is [-128, 127); the fifth processing unit is specifically configured to: if the element value in each image spatial domain block of a total of n×B×B shadow image spatial domain blocks obtained based on n sharing value lists is not within the specified range, adjust a 1 , a 2 , ..., a k-1 and re-execute steps S3-S5 until the element value in each image spatial domain block is within the specified range.

根据本发明第二方面的系统,所述第六处理单元具体被配置为:According to the system of the second aspect of the present invention, the sixth processing unit is specifically configured as follows:

对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,通过拼接形成所述1个影子DCT矩阵,对所述1个影子DCT矩阵进行熵编码,从而得到对抗所述JPEG重压缩的1个影子图像;重复上述操作,共得到对抗所述JPEG重压缩的n张影子图像;For the B×B shadow DCT blocks corresponding to each of the sharing value lists that resist the JPEG recompression, the shadow DCT matrix is formed by splicing, and the shadow DCT matrix is entropy encoded to obtain a shadow image that resists the JPEG recompression; repeat the above operation to obtain a total of n shadow images that resist the JPEG recompression;

获取n张所述分享值列表的选定值x1、x2、...、xn,所述发送方将所述选定值x1、x2、...、xn与所述n张影子图像一同发送至所述接收方;Obtaining selected values x 1 , x 2 , ..., x n of n shared value lists, the sender sending the selected values x 1 , x 2 , ..., x n together with the n shadow images to the receiver;

其中,所述接收方基于接收到的l张所述影子图像和所述选定值x1、x2、...、xn,恢复出所述秘密图像,其中,k≤l≤n。The receiver recovers the secret image based on the received l shadow images and the selected values x 1 , x 2 , . . . , x n , where k≤l≤n.

本发明第三方面公开了一种电子设备。所述电子设备包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时,实现本公开第一方面中任一项所述的一种用于对抗JPEG重压缩的秘密图像分享方法中的步骤。The third aspect of the present invention discloses an electronic device. The electronic device includes a memory and a processor, the memory stores a computer program, and when the processor executes the computer program, the steps of any one of the secret image sharing methods for resisting JPEG recompression described in the first aspect of the present disclosure are implemented.

本发明第四方面公开了一种计算机可读存储介质。所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,实现本公开第一方面中任一项所述的一种用于对抗JPEG重压缩的秘密图像分享方法中的步骤。The fourth aspect of the present invention discloses a computer-readable storage medium having a computer program stored thereon, and when the computer program is executed by a processor, the steps of any one of the secret image sharing methods for resisting JPEG recompression described in the first aspect of the present disclosure are implemented.

综上,本发明提供的技术方案将秘图像分享技术应用于社交网络可以实现秘密信息的隐蔽传输和存储,满足国家和社会便捷安全通信的需求,对保障信息安全具有重要价值。本发明提出的方案实现了针对JPEG重压缩的白盒鲁棒方案,实现了(k,n)门限、影子图像可理解。该方案可以应用于面向社交网络的隐蔽通信领域中。In summary, the technical solution provided by the present invention applies secret image sharing technology to social networks to achieve covert transmission and storage of secret information, meet the needs of the state and society for convenient and secure communication, and have important value in ensuring information security. The solution proposed by the present invention implements a white-box robust solution for JPEG recompression, and realizes (k,n) threshold and understandable shadow images. The solution can be applied to the field of covert communication for social networks.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本发明具体实施方式或现有技术中的技术方案下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the specific implementation methods of the present invention or the technical solutions in the prior art, the drawings required for use in the specific implementation methods or the description of the prior art will be briefly introduced below. Obviously, the drawings in the following description are some implementation methods of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.

图1为根据本发明实施例的一种用于对抗JPEG重压缩的秘密图像分享方法的流程示意图;FIG1 is a schematic flow chart of a secret image sharing method for resisting JPEG recompression according to an embodiment of the present invention;

图2(a-k)为根据本发明实施例的(3,3)门限,δ=4,num(即,C)=9,id=[11,13,19],QF=75的结果示意图;FIG2 (a-k) is a schematic diagram of the results of (3,3) threshold, δ=4, num (i.e., C)=9, id=[11,13,19], and QF=75 according to an embodiment of the present invention;

图3(a-h)为根据本发明实施例的(2,2)门限,δ=3,num(即,C)=9,id=[11,13],QF=75的结果示意图;FIG3 (a-h) is a schematic diagram of the results of (2,2) threshold, δ=3, num (i.e., C)=9, id=[11,13], and QF=75 according to an embodiment of the present invention;

图4为根据本发明实施例的电子设备的结构图。FIG. 4 is a structural diagram of an electronic device according to an embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例只是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solution and advantages of the embodiments of the present invention clearer, the technical solution in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

秘密分享:秘密分享(Secret Sharing,SS)技术把秘密信息加密成为多个影子图像(shadow,shadow image或share)且分发给多个参与方,而且只有授权参与方的子集合可以一起解密,而非授权子集合无法解密。Secret Sharing: Secret Sharing (SS) technology encrypts secret information into multiple shadow images (shadow, shadow image or share) and distributes them to multiple participants. Only a subset of authorized participants can decrypt together, while unauthorized subsets cannot decrypt.

秘密图像分享:秘密图像分享(Secret Image Sharing,SIS)把秘密图像加密成为多个影子图像(shadow,shadow image或share)且分发给多个参与方,而且只有授权参与方的子集合可以一起解密,而非授权子集合无法解密。Secret Image Sharing: Secret Image Sharing (SIS) encrypts a secret image into multiple shadow images (shadow, shadow image or share) and distributes them to multiple parties. Only a subset of authorized parties can decrypt them together, while unauthorized subsets cannot decrypt them.

影子图像可理解:影子图像是可理解的,而不是无意义图像,可以降低对于加密的怀疑以及增加影子图像的管理效率。影子图像可理解的定量指标由视觉质量(本申请采用PSNR)评价。Shadow images are understandable: Shadow images are understandable, rather than meaningless images, which can reduce suspicion of encryption and increase the efficiency of shadow image management. The quantitative indicator of shadow image understandability is evaluated by visual quality (PSNR is used in this application).

峰值信噪比(Signaltonoiseratio,PSNR):本申请采用PSNR的指标来评价影子图像和恢复的秘密图像的图像质量。Peak signal-to-noise ratio (PSNR): This application uses the PSNR indicator to evaluate the image quality of the shadow image and the restored secret image.

Figure GDA0004211234770000121
Figure GDA0004211234770000121

Figure GDA0004211234770000122
Figure GDA0004211234770000122

(k,n)门限:在n个影子图像中,需要k个及以上影子图像才能恢复秘密。当门限为k时,具有一定的容错能力,最多可允许n-k个影子丢失。(k, n) threshold: Among n shadow images, k or more shadow images are required to recover the secret. When the threshold is k, it has a certain fault tolerance and can allow up to n-k shadows to be lost.

均值滤波:是图像处理中最常用的手段,从频率域观点来看均值滤波是一种低通滤波器,高频信号将会去掉,因此可以帮助消除图像尖锐噪声,实现图像平滑,模糊等功能。理想的均值滤波是用每个像素和它周围像素计算出来的平均值替换图像中每个像素。采样Kernel数据通常是3×3的矩阵,但可以是任何形状。Mean filtering: It is the most commonly used method in image processing. From the frequency domain point of view, mean filtering is a low-pass filter. High-frequency signals will be removed, so it can help eliminate sharp noise in the image and achieve image smoothing, blurring and other functions. The ideal mean filter replaces each pixel in the image with the average value calculated from each pixel and its surrounding pixels. The sampling kernel data is usually a 3×3 matrix, but it can be of any shape.

JPEG图像:JPEG(Joint Photographic Experts Group)即联合图像专家组,是用于连续色调静态图像压缩的一种标准,文件后缀名为.jpg或.jpeg,是最常用的图像文件格式。JPEG image: JPEG (Joint Photographic Experts Group) is a standard for continuous-tone static image compression. The file extension is .jpg or .jpeg, and it is the most commonly used image file format.

压缩质量因子(Qulity Factor,QF),通过计算得到的(计算方法如下面的公式所示)。表1表示了压缩质量因子QF=75的量化表,量化表中的元素控制压缩比,较大的值产生较大的压缩。The compression quality factor (QF) is obtained by calculation (the calculation method is shown in the following formula). Table 1 shows a quantization table for compression quality factor QF=75. The elements in the quantization table control the compression ratio, and a larger value produces a greater compression.

Figure GDA0004211234770000123
Figure GDA0004211234770000123

其中Q0(u,v)表示标准量化表中(u,v)位置上处的量化步长。Where Q0(u, v) represents the quantization step size at the position (u, v) in the standard quantization table.

88 66 55 88 1212 2020 2626 3131 66 66 77 1010 1313 2929 3030 2828 77 77 88 1212 2020 2929 3535 2828 77 99 1111 1515 2626 4444 4040 3131 99 1111 1919 2828 3434 5555 5252 3939 1212 1818 2828 3232 4141 5252 5757 4646 2525 3232 3939 4444 5252 6161 6060 5151 3636 4646 4848 4949 5656 5050 5252 5050

表1 QF=75的量化表Table 1 Quantization table for QF=75

白盒鲁棒:本申请中,白盒鲁棒指已知重压缩信道的压缩质量因子QF或者按照自己的意志使用重压缩信道,在已知重压缩信道的压缩质量因子QF情况下对JPEG重压缩的鲁棒是一种白盒鲁棒。White-box robustness: In this application, white-box robustness refers to the known compression quality factor QF of the recompression channel or the use of the recompression channel at one's own will. The robustness to JPEG recompression under the condition of known compression quality factor QF of the recompression channel is a kind of white-box robustness.

本发明第一方面公开了一种用于对抗JPEG重压缩的秘密图像分享方法。待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT(Discrete CosineTransform,离散余弦变换)系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述方法在分享所述JPEG图像的同时对抗所述压缩处理。The first aspect of the present invention discloses a secret image sharing method for resisting JPEG recompression. The secret image to be shared is a JPEG image, the secret information contained in the JPEG image is a quantized DCT (Discrete Cosine Transform) coefficient, the JPEG recompression refers to the compression process performed on the JPEG image after the sharing process, and the method resists the compression process while sharing the JPEG image.

具体地,本申请发现了重压缩前后稳定不变的稳定量,即当QM1=QM2(QM1表示秘密jpeg图像的量化表矩阵,而QM2表示重压缩时使用的量化表矩阵),且重压缩信道QF≤92时,只要满足:-128≤[IDCT(D)]<127,重压缩前后的DCT系数不会发生变化,本申请将这个条件称之为稳定块条件,也就是对原图像熵解码后的DCT系数矩阵(下面称之为原始DCT系数矩阵)的每一个8×8进行IDCT变换后得到的空域像素值如果在[-128,127),则称这个块是稳定块。本申请给出基于稳定块条件构造鲁棒影子图像的方法,使构造的影子图像在经过重压缩信道时其DCT数不发生变化,即构造出的影子图像对重压缩信道鲁棒。Specifically, the present application has discovered a stable quantity that remains unchanged before and after recompression, that is, when QM1=QM2 (QM1 represents the quantization table matrix of the secret jpeg image, and QM2 represents the quantization table matrix used in recompression), and the recompression channel QF≤92, as long as: -128≤[IDCT(D)]<127 is satisfied, the DCT coefficients before and after recompression will not change. The present application refers to this condition as a stable block condition, that is, if the spatial domain pixel value obtained after IDCT transformation of each 8×8 of the DCT coefficient matrix after entropy decoding of the original image (hereinafter referred to as the original DCT coefficient matrix) is in [-128,127), then this block is called a stable block. The present application provides a method for constructing a robust shadow image based on the stable block condition, so that the DCT number of the constructed shadow image does not change when passing through the recompression channel, that is, the constructed shadow image is robust to the recompression channel.

所述方法包括:The method comprises:

步骤S1、提取获取到的n+1张图像进行预处理,以提取所述n+1张图像中的每一张图像的完整DCT系数列表,所述n+1张图像包括1张所述待分享的秘密图像和n张载体图像;Step S1, extracting and preprocessing the acquired n+1 images to extract a complete DCT coefficient list of each image in the n+1 images, wherein the n+1 images include one secret image to be shared and n carrier images;

步骤S2、基于n+1张所述完整DCT系数列表,确定所述待分享的秘密图像的待分享DCT系数列表、所述n张载体图像对应的n张待使用DCT系数列表,并根据所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值确定素数p;Step S2, based on the n+1 complete DCT coefficient lists, determining the DCT coefficient list to be shared of the secret image to be shared and the n DCT coefficient lists to be used corresponding to the n carrier images, and determining the prime number p according to the maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used;

步骤S3、利用所述待分享DCT系数列表、所述n张待使用DCT系数列表、所述素数p和门限值k,通过计算获取与所述n张待使用DCT系数列表对应的且包含所述待分享的秘密图像的秘密信息的n张分享值列表;Step S3, using the DCT coefficient list to be shared, the n DCT coefficient lists to be used, the prime number p and the threshold value k, obtaining by calculation n sharing value lists corresponding to the n DCT coefficient lists to be used and containing the secret information of the secret image to be shared;

步骤S4、对于所述n张分享值列表中每张分享值列表,均执行:依据其各个分享值形成B×B个影子DCT块,并对所述B×B个影子DCT块进行解压缩处理以获取B×B个影子图像空域块;Step S4, for each of the n sharing value lists, executing: forming B×B shadow DCT blocks according to each sharing value thereof, and decompressing the B×B shadow DCT blocks to obtain B×B shadow image spatial domain blocks;

步骤S5、判断基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值是否都在指定范围内,若是,对于所述每张分享值列表对应的B×B个影子图像空域块,将其作为对抗所述JPEG重压缩的B×B个影子DCT块;Step S5, determining whether the element value in each image spatial domain block of a total of n×B×B shadow image spatial domain blocks obtained based on the n sharing value lists is within a specified range, and if so, using the B×B shadow image spatial domain blocks corresponding to each sharing value list as B×B shadow DCT blocks to resist the JPEG recompression;

步骤S6、对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,确定对抗所述JPEG重压缩的1张影子图像,共得到对抗所述JPEG重压缩的n张影子图像,发送方通过向接收方发送对抗所述JPEG重压缩的n张影子图像实现分享所述秘密图像的同时对抗所述JPEG重压缩;Step S6: for each of the B×B shadow DCT blocks corresponding to the shared value list that resist the JPEG recompression, determine one shadow image that resists the JPEG recompression, and obtain a total of n shadow images that resist the JPEG recompression. The sender sends the n shadow images that resist the JPEG recompression to the receiver to share the secret image while resisting the JPEG recompression.

其中,n、p、k、B均为正整数,k≤n,且门限值k表征恢复所述秘密图像所需的最少影子图像的数量。Wherein, n, p, k, and B are all positive integers, k≤n, and the threshold value k represents the minimum number of shadow images required to restore the secret image.

在一些实施例中,在所述步骤S1中,所述预处理具体包括,对所述n+1张图像中的每一张图像均执行:In some embodiments, in step S1, the preprocessing specifically includes performing the following steps on each of the n+1 images:

通过熵解码提取当前图像经量化后的DCT系数矩阵,所述DCT系数矩阵包含M×M个DCT系数,对所述DCT系数矩阵进行分块处理,分为B×B个DCT块,每个所述DCT块包含A×A个DCT系数,其中M=B×A;Extracting a quantized DCT coefficient matrix of the current image by entropy decoding, the DCT coefficient matrix comprising M×M DCT coefficients, performing block processing on the DCT coefficient matrix into B×B DCT blocks, each of which comprises A×A DCT coefficients, wherein M=B×A;

对每个包含A×A个DCT系数的DCT块,以之字顺序提取前C个DCT系数,以获取每个所述DCT块的DCT系数列表,从而构建所述当前图像的完整DCT系数列表,每个所述DCT块的DCT系数列表长度为C,所述当前图像的完整DCT系数列表的长度为C×B×B;For each DCT block containing A×A DCT coefficients, extract the first C DCT coefficients in a zigzag order to obtain a DCT coefficient list of each DCT block, thereby constructing a complete DCT coefficient list of the current image, the length of the DCT coefficient list of each DCT block is C, and the length of the complete DCT coefficient list of the current image is C×B×B;

其中,M、A、C均为正整数。Among them, M, A, and C are all positive integers.

在一些实施例中,所述步骤S2具体包括:In some embodiments, step S2 specifically includes:

判断所述n+1张完整DCT系数列表中的最小DCT系数是否大于0;Determine whether the minimum DCT coefficient in the n+1 complete DCT coefficient lists is greater than 0;

若是,则将所述n+1张完整DCT系数列表中的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将所述n+1张完整DCT系数列表中的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If yes, one of the n+1 complete DCT coefficient lists of the secret image to be shared is used as the DCT coefficient list to be shared, and n of the n+1 complete DCT coefficient lists of the carrier image are used as the n DCT coefficient lists to be used;

若否,则对所述n+1张完整DCT系数列表中的全部DCT系数进行值平移,所述值平移的平移量为所述最小DCT系数的绝对值,将经所述值平移后的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将经所述值平移后的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If not, perform value shift on all DCT coefficients in the n+1 complete DCT coefficient lists, the shift amount of the value shift is the absolute value of the minimum DCT coefficient, and use the complete DCT coefficient list of the secret image to be shared after the value shift as the DCT coefficient list to be shared, and use the complete DCT coefficient lists of the n carrier images after the value shift as the n DCT coefficient lists to be used;

获取所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值,取大于所述最大DCT系数的最小素数作为所述素数p。The maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used is obtained, and the minimum prime number greater than the maximum DCT coefficient is taken as the prime number p.

在一些实施例中,所述待分享DCT系数列表的长度、所述n张待使用DCT系数列表中的每一张列表的长度、所述n张分享值列表中的每一张列表的长度均为C×B×B;所述步骤S3具体包括:In some embodiments, the length of the DCT coefficient list to be shared, the length of each of the n DCT coefficient lists to be used, and the length of each of the n shared value lists are all C×B×B; the step S3 specifically includes:

对于所述n张分享值列表中每一张列表中的每个位置,利用公式f(x)=s+a1x+a2x2+…+ak-1xk-1(mod p)计算其DCT影子值;For each position in each of the n shared value lists, calculate its DCT shadow value using the formula f(x)=s+a 1 x+a 2 x 2 +…+ak -1 x k-1 (mod p);

其中,f(x)为所述n张分享值列表中当前列表中的当前位置上的DCT影子值,s为所述待分享DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数,a1、a2、...、ak-1为任意选取的随机数,x为选定值,(mod p)表示模p运算;Wherein, f(x) is the DCT shadow value at the current position in the current list in the n shared value lists, s is the DCT coefficient at the position in the DCT coefficient list to be shared corresponding to the current position in the current list, a 1 , a 2 , ..., a k-1 are arbitrarily selected random numbers, x is a selected value, and (mod p) represents a modulo p operation;

判断f(x)的高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位是否相等,其中

Figure GDA0004211234770000151
Determine whether the high δ bits of f(x) are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, wherein
Figure GDA0004211234770000151

若是,则将所述DCT影子值f(x)作为所述当前位置的n张分享值列表中当前列表中的当前位置上的分享值;If so, the DCT shadow value f(x) is used as the shared value at the current position in the current list of the n shared value lists at the current position;

若否,则调节a1、a2、...、ak-1并重新计算f(x),直到其高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位相等,并获取当前位置上的分享值。If not, adjust a1 , a2 , ..., ak-1 and recalculate f(x) until its high δ bits are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, and obtain the sharing value at the current position.

在一些实施例中,在所述步骤S3中,对于所述当前列表中的各个位置,在计算其DCT影子值时,x保持不变,且n张所述分享值列表的选定值x各不相同,f(x)、x、以及a1、a2、...、ak-1的取值范围为[0,p-1]上的整数。In some embodiments, in step S3, for each position in the current list, when calculating its DCT shadow value, x remains unchanged, and the selected values x of the n shared value lists are different, and the value ranges of f(x), x, and a1 , a2 , ..., ak-1 are integers on [0, p-1].

在一些实施例中,所述步骤S4具体包括:In some embodiments, step S4 specifically includes:

对所述n张分享值列表中每张分享值列表:每提取C个分享值,将其与所述n张载体图像中对应的载体图像的对应DCT块中第C+1至第A×A个DCT系数进行拼接,以形成1张完整的影子DCT列表;重复以上操作得到n张完整的影子DCT列表;For each of the n shared value lists: extract C shared values each time, and concatenate them with the C+1th to A×Ath DCT coefficients in the corresponding DCT block of the corresponding carrier image in the n carrier images to form a complete shadow DCT list; repeat the above operation to obtain n complete shadow DCT lists;

对所述n张影子DCT列表中的每张DCT列表:通过逆之字排列得到B×B个大小为A×A的影子DCT块,对所述B×B个影子DCT块分别进行解压缩处理,所述解压缩处理包括逆DCT变换和四舍五入处理,从而获取B×B个影子图像空域块;重复以上操作得到共n×B×B个影子图像空域块;For each of the n shadow DCT lists: obtain B×B shadow DCT blocks of size A×A by inverse zigzag arrangement, decompress the B×B shadow DCT blocks respectively, wherein the decompression process includes inverse DCT transformation and rounding process, thereby obtaining B×B shadow image spatial domain blocks; repeat the above operation to obtain a total of n×B×B shadow image spatial domain blocks;

其中,在执行所述逆之字排列之前,判断在步骤S2中是否对所述n+1张完整DCT系数列表中的全部DCT系数进行了值平移,若是,则将所述n张影子DCT列表中的全部分享值和全部DCT值执行逆值平移,所述逆值平移的平移量为所述最小DCT系数的绝对值。Before executing the inverse zigzag arrangement, it is determined whether all DCT coefficients in the n+1 complete DCT coefficient lists have been value shifted in step S2. If so, all shared values and all DCT values in the n shadow DCT lists are inversely shifted, and the shift amount of the inverse value shift is the absolute value of the minimum DCT coefficient.

在一些实施例中,在所述步骤S5中:In some embodiments, in step S5:

所述指定范围为[-128,127);The specified range is [-128, 127);

若基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值不都在指定范围内,则调节a1、a2、...、ak-1并重新执行步骤S3-S5,直到所述每个图像空域块中的元素值都在所述指定范围内。If the element value in each image spatial domain block of the n×B×B shadow image spatial domain blocks obtained based on the n sharing value lists is not within the specified range, a 1 , a 2 , ..., a k-1 are adjusted and steps S3 to S5 are re-executed until the element value in each image spatial domain block is within the specified range.

在一些实施例中,在所述步骤S6中:In some embodiments, in step S6:

对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,通过拼接形成所述1个影子DCT矩阵,对所述1个影子DCT矩阵进行熵编码,从而得到对抗所述JPEG重压缩的1个影子图像;重复上述操作,共得到对抗所述JPEG重压缩的n张影子图像;For the B×B shadow DCT blocks corresponding to each of the sharing value lists that resist the JPEG recompression, the shadow DCT matrix is formed by splicing, and the shadow DCT matrix is entropy encoded to obtain a shadow image that resists the JPEG recompression; repeat the above operation to obtain a total of n shadow images that resist the JPEG recompression;

获取n张所述分享值列表的选定值x1、x2、...、xn,所述发送方将所述选定值x1、x2、...、xn与所述n张影子图像一同发送至所述接收方,所述接收方基于接收到的l张所述影子图像和所述选定值x1、x2、...、xn,恢复出所述秘密图像,其中,k≤l≤n。Selected values x 1 , x 2 , ..., x n of n shared value lists are obtained. The sender sends the selected values x 1 , x 2 , ..., x n together with the n shadow images to the receiver. The receiver restores the secret image based on the received l shadow images and the selected values x 1 , x 2 , ..., x n , where k≤l≤n.

具体实施方式的算法如下(结合图1):The algorithm of the specific implementation is as follows (combined with Figure 1):

Figure GDA0004211234770000161
Figure GDA0004211234770000161

Figure GDA0004211234770000171
Figure GDA0004211234770000171

对于秘密jpeg图像S和n个载体jpeg图像的第i个原始DCT系数矩阵块S_DCTblocki,cover1_DCTblocki,…,cover_DCTblocki,首先提取这些块之字排列的前num位并输入到基于多项式的影子可理解的秘密分享算法中,得到n个影子DCT列表,将其与对应的影子图像的后64-num进行拼接,并逆之字排列后得到n个影子DCT块SC1_DCTblock'i,SC2_DCTblock'i,…,SCn_DCTblock'iFor the i-th original DCT coefficient matrix block S_DCTblock i ,cover 1 _DCTblock i ,…,cover_DCTblock i of the secret jpeg image S and n carrier jpeg images, first extract the first num bits of these blocks in zigzag order and input them into the polynomial-based shadow-comprehensible secret sharing algorithm to obtain n shadow DCT lists, which are concatenated with the last 64-num bits of the corresponding shadow image and inversely zigzag-ordered to obtain n shadow DCT blocks SC 1 _DCTblock' i ,SC 2 _DCTblock' i ,…,SC n _DCTblock' i .

然后对其进行解压缩操作,解压缩操作具体包括IDC变换、四舍五入,解压为影子图像空域块SC1_Spatialblocki,SC2_Spatialblocki,…,SCn_SpatialblockiThen, a decompression operation is performed on it, and the decompression operation specifically includes IDC transformation and rounding, and decompression is performed into the shadow image spatial domain blocks SC 1 _Spatialblock i , SC 2 _Spatialblock i , …, SC n _Spatialblock i .

接下来是至关重要的一步,即判断这n个空域像素块的所有元素是否都在[-128,127)范围内,如果都在该范围内,那么说明这一轮生成的影子DCT块为稳定块,直接保存;若有任何元素超出[-128,127)范围,则说明生成的影子DCT块为不稳定块,返回基于多项式的影子可理解的秘密分享算法中,继续筛选随机数直到生成稳定的影子DCT块。值得注意的是可能不会存在使所有影子DCT块都稳定的一组随机数(具体的分析将在下面给出),所以在这里设置最大筛选次数MAX。The next crucial step is to determine whether all elements of the n spatial pixel blocks are within the range of [-128, 127). If they are within the range, it means that the shadow DCT block generated in this round is a stable block and is saved directly; if any element exceeds the range of [-128, 127), it means that the generated shadow DCT block is an unstable block, and it returns to the polynomial-based shadow understandable secret sharing algorithm, and continues to screen random numbers until a stable shadow DCT block is generated. It is worth noting that there may not be a set of random numbers that make all shadow DCT blocks stable (the specific analysis will be given below), so the maximum number of screening times MAX is set here.

在恢复阶段,将获得的大于等于k个的影子图像熵解码得到其量化后的DCT系数;将量化后的DCT系数分割成8×8的块;然后将每一个块进行之字形排列,并提取之字排列后数据的前num位作为待恢复的对象;根据分享过程中确定的最小平移值,将所有DCT系数平移至正数范围,用拉格朗日插值法恢复,然后反平移,接着用64-num个零补齐64位,之后熵编码,最后保存为秘密图像。In the recovery stage, the obtained shadow images greater than or equal to k are entropy decoded to obtain their quantized DCT coefficients; the quantized DCT coefficients are divided into 8×8 blocks; each block is then arranged in a zigzag pattern, and the first num bits of the zigzag arranged data are extracted as the object to be recovered; according to the minimum shift value determined during the sharing process, all DCT coefficients are shifted to the positive range, restored using the Lagrange interpolation method, and then inversely shifted, and then 64 bits are padded with 64-num zeros, followed by entropy encoding, and finally saved as a secret image.

实验验证过程:Experimental verification process:

为了验证基于稳定块条件的鲁棒影子图像构造的鲁棒秘密图像分享方案的有效性,本申请对上面提出的分享算法和恢复方法实施了本地仿真实验。本申请实验图片来源于BOSSbase1.0,随机选择4张大小为256×256灰度图像,并将其转换成质量因子为75的JPEG图像。用JPEGIO包的的read()函数来模拟熵解码,用JPEGIO包的的write()函数来模拟熵编码。In order to verify the effectiveness of the robust secret image sharing scheme based on the robust shadow image construction under stable block conditions, this application implements a local simulation experiment on the sharing algorithm and recovery method proposed above. The experimental images of this application are from BOSSbase1.0. Four grayscale images of size 256×256 are randomly selected and converted into JPEG images with a quality factor of 75. The read() function of the JPEGIO package is used to simulate entropy decoding, and the write() function of the JPEGIO package is used to simulate entropy encoding.

这里共展示了2组实验。图2展示了(3,3)门限,δ=4,num=9,id=[11,13,19],QF=75的基于稳定块条件的鲁棒载体图像构造的鲁棒秘密图像分享的实验结果。图2(a)展示了输入的灰度秘密JPEG图像S,大小为256×256,QF=75。图2(b-d)为输入的3个大小为256×256的灰度载体JPEG图像cover1、cover2和cover3,QF=75。应用申请提出的算法后的得到的鲁棒载体JPEG图像stable_SC1、stable_SC2和stable_SC3在图2(e-g)展示,其大小也256×256。图2(h-j)展示了经过压缩质量因子为75的压缩信道后3个大小为256×256的重压缩后的灰度载体JPEG图像recom_SC1、recom_SC2和recom_SC3。图2(k)为恢复的秘密JPEG图像S*。从恢复的秘密图像可以看出有若干个块的恢复是不正常的,这是由于当筛选次数达到最大条件时并没有筛选出稳定的载体图像。实验表明(3,3)门限的本申请方案可行,生成的影子图像质量和恢复的秘密图像的图像质量都比较高。Two sets of experiments are shown here. Figure 2 shows the experimental results of robust secret image sharing based on robust carrier image construction based on stable block conditions with (3,3) threshold, δ=4, num=9, id=[11,13,19], QF=75. Figure 2(a) shows the input grayscale secret JPEG image S, size 256×256, QF=75. Figure 2(bd) shows the input three grayscale carrier JPEG images cover1, cover2 and cover3 of size 256×256, QF=75. The robust carrier JPEG images stable_SC1, stable_SC2 and stable_SC3 obtained by applying the proposed algorithm are shown in Figure 2(eg), and their size is also 256×256. Figure 2(hj) shows the three grayscale carrier JPEG images recom_SC1, recom_SC2 and recom_SC3 of size 256×256 after compression channel with compression quality factor 75. Figure 2(k) is the recovered secret JPEG image S * . It can be seen from the recovered secret image that the recovery of several blocks is abnormal. This is because when the screening times reach the maximum condition, no stable carrier image is screened out. Experiments show that the (3,3) threshold scheme of the present application is feasible, and the quality of the generated shadow image and the image quality of the recovered secret image are both relatively high.

图3展示了(2,2)门限,δ=3,num=9,id=[11,13],QF=75的基于稳定块条件的鲁棒载体图像构造鲁棒秘密图像分享的实验结果。图3(a)展示了输入的灰度秘密JPEG图像S,大小为256×256,QF=75。图3(b-c)为输入的2个大小为256×256的灰度载体JPEG图像cover1和cover2,QF=75。应用本申请提出的算法后的得到的鲁棒载体JPEG图像stable_SC1、stable_SC2和stable_SC3在图3(d-e)展示,其大小也是256×256。图3(f-g)展示了经过压缩质量因子为75的压缩信道后2个大小为256×256的重压缩后的灰度载体JPEG图像recom_SC1和recom_SC2。图3(h)为恢复的秘密JPEG图像S*。与上一个实验相似从恢复的秘密图像可以看出有若干个块的恢复是不正常的,这是由于当筛选次数达到最大条件时并没有筛选出稳定的载体图像。实验表明(2,2)门限的本申请方案可行,生成的影子图像质量和恢复的秘密图像的图像质量都比较高。Figure 3 shows the experimental results of constructing robust secret image sharing based on robust carrier images with stable block conditions with (2,2) threshold, δ=3, num=9, id=[11,13], QF=75. Figure 3(a) shows the input grayscale secret JPEG image S, with a size of 256×256 and QF=75. Figure 3(bc) shows the input two grayscale carrier JPEG images cover1 and cover2 with a size of 256×256 and QF=75. The robust carrier JPEG images stable_SC1, stable_SC2 and stable_SC3 obtained by applying the algorithm proposed in this application are shown in Figure 3(de), and their size is also 256×256. Figure 3(fg) shows two recompressed grayscale carrier JPEG images recom_SC1 and recom_SC2 with a size of 256×256 after compression channel with compression quality factor of 75. Figure 3(h) shows the recovered secret JPEG image S * . Similar to the previous experiment, it can be seen from the recovered secret image that the recovery of several blocks is abnormal. This is because when the screening times reach the maximum condition, no stable carrier image is screened out. The experiment shows that the (2,2) threshold scheme of the present application is feasible, and the quality of the generated shadow image and the image quality of the recovered secret image are both relatively high.

本发明第二方面公开了一种用于对抗JPEG重压缩的秘密图像分享系统。待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT(Discrete CosineTransform,离散余弦变换)系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述系统在分享所述JPEG图像的同时对抗所述压缩处理;所述系统包括:The second aspect of the present invention discloses a secret image sharing system for resisting JPEG recompression. The secret image to be shared is a JPEG image, the secret information contained in the JPEG image is a quantized DCT (Discrete Cosine Transform) coefficient, the JPEG recompression refers to the compression process performed on the JPEG image after the sharing process, and the system resists the compression process while sharing the JPEG image; the system comprises:

第一处理单元,被配置为:提取获取到的n+1张图像进行预处理,以提取所述n+1张图像中的每一张图像的完整DCT系数列表,所述n+1张图像包括1张所述待分享的秘密图像和n张载体图像;A first processing unit is configured to: extract the acquired n+1 images for preprocessing to extract a complete DCT coefficient list of each image in the n+1 images, wherein the n+1 images include one secret image to be shared and n carrier images;

第二处理单元,被配置为:基于n+1张所述完整DCT系数列表,确定所述待分享的秘密图像的待分享DCT系数列表、所述n张载体图像对应的n张待使用DCT系数列表,并根据所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值确定素数p;The second processing unit is configured to: determine the DCT coefficient list to be shared of the secret image to be shared and the n DCT coefficient lists to be used corresponding to the n carrier images based on the n+1 complete DCT coefficient lists, and determine the prime number p according to the maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used;

第三处理单元,被配置为:利用所述待分享DCT系数列表、所述n张待使用DCT系数列表、所述素数p和门限值k,通过计算获取与所述n张待使用DCT系数列表对应的且包含所述待分享的秘密图像的秘密信息的n张分享值列表;The third processing unit is configured to: use the DCT coefficient list to be shared, the n DCT coefficient lists to be used, the prime number p and the threshold value k to obtain, by calculation, n sharing value lists corresponding to the n DCT coefficient lists to be used and containing the secret information of the secret image to be shared;

第四处理单元,被配置为:对于所述n张分享值列表中每张分享值列表,均执行:依据其各个分享值形成B×B个影子DCT块,并对所述B×B个影子DCT块进行解压缩处理以获取B×B个影子图像空域块;The fourth processing unit is configured to: for each of the n sharing value lists, perform: forming B×B shadow DCT blocks according to each sharing value thereof, and decompressing the B×B shadow DCT blocks to obtain B×B shadow image spatial domain blocks;

第五处理单元,被配置为:判断基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值是否都在指定范围内,若是,对于所述每张分享值列表对应的B×B个影子图像空域块,将其作为对抗所述JPEG重压缩的B×B个影子DCT块;A fifth processing unit is configured to: determine whether an element value in each image spatial domain block of a total of n×B×B shadow image spatial domain blocks obtained based on the n sharing value lists is within a specified range, and if so, use the B×B shadow image spatial domain blocks corresponding to each sharing value list as B×B shadow DCT blocks to resist the JPEG recompression;

第六处理单元,被配置为:对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,确定对抗所述JPEG重压缩的1张影子图像,共得到对抗所述JPEG重压缩的n张影子图像;The sixth processing unit is configured to: determine, for each of the B×B shadow DCT blocks corresponding to the sharing value list and resistant to the JPEG recompression, one shadow image resistant to the JPEG recompression, and obtain a total of n shadow images resistant to the JPEG recompression;

其中,发送方通过向接收方发送对抗所述JPEG重压缩的n张影子图像实现分享所述秘密图像的同时对抗所述JPEG重压缩;The sender shares the secret image while resisting the JPEG recompression by sending n shadow images resisting the JPEG recompression to the receiver;

其中,n、p、k、B均为正整数,k≤n,且门限值k表征恢复所述秘密图像所需的最少影子图像的数量。Wherein, n, p, k, and B are all positive integers, k≤n, and the threshold value k represents the minimum number of shadow images required to restore the secret image.

根据本发明第二方面的系统,所述预处理具体包括,对所述n+1张图像中的每一张图像均执行:According to the system of the second aspect of the present invention, the preprocessing specifically includes performing the following steps on each of the n+1 images:

通过熵解码提取当前图像经量化后的DCT系数矩阵,所述DCT系数矩阵包含M×M个DCT系数,对所述DCT系数矩阵进行分块处理,分为B×B个DCT块,每个所述DCT块包含A×A个DCT系数,其中M=B×A;Extracting a quantized DCT coefficient matrix of the current image by entropy decoding, the DCT coefficient matrix comprising M×M DCT coefficients, performing block processing on the DCT coefficient matrix into B×B DCT blocks, each of which comprises A×A DCT coefficients, wherein M=B×A;

对每个包含A×A个DCT系数的DCT块,以之字顺序提取前C个DCT系数,以获取每个所述DCT块的DCT系数列表,从而构建所述当前图像的完整DCT系数列表,每个所述DCT块的DCT系数列表长度为C,所述当前图像的完整DCT系数列表的长度为C×B×B;For each DCT block containing A×A DCT coefficients, extract the first C DCT coefficients in a zigzag order to obtain a DCT coefficient list of each DCT block, thereby constructing a complete DCT coefficient list of the current image, the length of the DCT coefficient list of each DCT block is C, and the length of the complete DCT coefficient list of the current image is C×B×B;

其中,M、A、C均为正整数。Among them, M, A, and C are all positive integers.

根据本发明第二方面的系统,所述第二处理单元具体被配置为:According to the system of the second aspect of the present invention, the second processing unit is specifically configured as follows:

判断所述n+1张完整DCT系数列表中的最小DCT系数是否大于0;Determine whether the minimum DCT coefficient in the n+1 complete DCT coefficient lists is greater than 0;

若是,则将所述n+1张完整DCT系数列表中的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将所述n+1张完整DCT系数列表中的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If yes, one of the n+1 complete DCT coefficient lists of the secret image to be shared is used as the DCT coefficient list to be shared, and n of the n+1 complete DCT coefficient lists of the carrier image are used as the n DCT coefficient lists to be used;

若否,则对所述n+1张完整DCT系数列表中的全部DCT系数进行值平移,所述值平移的平移量为所述最小DCT系数的绝对值,将经所述值平移后的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将经所述值平移后的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If not, perform value shift on all DCT coefficients in the n+1 complete DCT coefficient lists, the shift amount of the value shift is the absolute value of the minimum DCT coefficient, and use the complete DCT coefficient list of the secret image to be shared after the value shift as the DCT coefficient list to be shared, and use the complete DCT coefficient lists of the n carrier images after the value shift as the n DCT coefficient lists to be used;

获取所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值,取大于所述最大DCT系数的最小素数作为所述素数p。The maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used is obtained, and the minimum prime number greater than the maximum DCT coefficient is taken as the prime number p.

根据本发明第二方面的系统,所述待分享DCT系数列表的长度、所述n张待使用DCT系数列表中的每一张列表的长度、所述n张分享值列表中的每一张列表的长度均为C×B×B;所述第二处理单元具体被配置为:According to the system of the second aspect of the present invention, the length of the DCT coefficient list to be shared, the length of each of the n DCT coefficient lists to be used, and the length of each of the n shared value lists are all C×B×B; the second processing unit is specifically configured as follows:

对于所述n张分享值列表中每一张列表中的每个位置,利用公式f(x)=s+a1x+a2x2+…+ak-1xk-1(mod p)计算其DCT影子值;For each position in each of the n shared value lists, calculate its DCT shadow value using the formula f(x)=s+a 1 x+a 2 x 2 +…+ak -1 x k-1 (mod p);

其中,f(x)为所述n张分享值列表中当前列表中的当前位置上的DCT影子值,s为所述待分享DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数,a1、a2、...、ak-1为任意选取的随机数,x为选定值,(mod p)表示模p运算;Wherein, f(x) is the DCT shadow value at the current position in the current list in the n shared value lists, s is the DCT coefficient at the position in the DCT coefficient list to be shared corresponding to the current position in the current list, a 1 , a 2 , ..., a k-1 are arbitrarily selected random numbers, x is a selected value, and (mod p) represents a modulo p operation;

判断f(x)的高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位是否相等,其中

Figure GDA0004211234770000201
Determine whether the high δ bits of f(x) are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, wherein
Figure GDA0004211234770000201

若是,则将所述DCT影子值f(x)作为所述当前位置的n张分享值列表中当前列表中的当前位置上的分享值;If so, the DCT shadow value f(x) is used as the shared value at the current position in the current list of the n shared value lists at the current position;

若否,则调节a1、a2、...、ak-1并重新计算f(x),直到其高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位相等,并获取当前位置上的分享值。If not, adjust a1 , a2 , ..., ak-1 and recalculate f(x) until its high δ bits are equal to the high δ bits of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, and obtain the sharing value at the current position.

根据本发明第二方面的系统,对于所述当前列表中的各个位置,在计算其DCT影子值时,x保持不变,且n张所述分享值列表的选定值x各不相同,f(x)、x、以及a1、a2、...、ak-1的取值范围为[0,p-1]上的整数。According to the system of the second aspect of the present invention, for each position in the current list, when calculating its DCT shadow value, x remains unchanged, and the selected values x of the n shared value lists are different, and the value ranges of f(x), x, and a1 , a2 , ..., ak-1 are integers on [0, p-1].

根据本发明第二方面的系统,所述第四处理单元具体被配置为:According to the system of the second aspect of the present invention, the fourth processing unit is specifically configured as follows:

对所述n张分享值列表中每张分享值列表:每提取C个分享值,将其与所述n张载体图像中对应的载体图像的对应DCT块中第C+1至第A×A个DCT系数进行拼接,以形成1张完整的影子DCT列表;重复以上操作得到n张完整的影子DCT列表;For each of the n shared value lists: extract C shared values each time, and concatenate them with the C+1th to A×Ath DCT coefficients in the corresponding DCT block of the corresponding carrier image in the n carrier images to form a complete shadow DCT list; repeat the above operation to obtain n complete shadow DCT lists;

对所述n张影子DCT列表中的每张DCT列表:通过逆之字排列得到B×B个大小为A×A的影子DCT块,对所述B×B个影子DCT块分别进行解压缩处理,所述解压缩处理包括逆DCT变换和四舍五入处理,从而获取B×B个影子图像空域块;重复以上操作得到共n×B×B个影子图像空域块;For each of the n shadow DCT lists: obtain B×B shadow DCT blocks of size A×A by inverse zigzag arrangement, decompress the B×B shadow DCT blocks respectively, wherein the decompression process includes inverse DCT transformation and rounding process, thereby obtaining B×B shadow image spatial domain blocks; repeat the above operation to obtain a total of n×B×B shadow image spatial domain blocks;

其中,在执行所述逆之字排列之前,判断在步骤S2中是否对所述n+1张完整DCT系数列表中的全部DCT系数进行了值平移,若是,则将所述n张影子DCT列表中的全部分享值和全部DCT值执行逆值平移,所述逆值平移的平移量为所述最小DCT系数的绝对值。Before executing the inverse zigzag arrangement, it is determined whether all DCT coefficients in the n+1 complete DCT coefficient lists have been value shifted in step S2. If so, all shared values and all DCT values in the n shadow DCT lists are inversely value shifted, and the shift amount of the inverse value shift is the absolute value of the minimum DCT coefficient.

根据本发明第二方面的系统,所述指定范围为[-128,127);所述第五处理单元具体被配置为:若基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值不都在指定范围内,则调节a1、a2、...、ak-1并重新执行步骤S3-S5,直到所述每个图像空域块中的元素值都在所述指定范围内。According to the system of the second aspect of the present invention, the specified range is [-128, 127); the fifth processing unit is specifically configured to: if the element value in each image spatial domain block of a total of n×B×B shadow image spatial domain blocks obtained based on n sharing value lists is not within the specified range, adjust a 1 , a 2 , ..., a k-1 and re-execute steps S3-S5 until the element value in each image spatial domain block is within the specified range.

根据本发明第二方面的系统,所述第六处理单元具体被配置为:According to the system of the second aspect of the present invention, the sixth processing unit is specifically configured as follows:

对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,通过拼接形成所述1个影子DCT矩阵,对所述1个影子DCT矩阵进行熵编码,从而得到对抗所述JPEG重压缩的1个影子图像;重复上述操作,共得到对抗所述JPEG重压缩的n张影子图像;For the B×B shadow DCT blocks corresponding to each of the sharing value lists that resist the JPEG recompression, the shadow DCT matrix is formed by splicing, and the shadow DCT matrix is entropy encoded to obtain a shadow image that resists the JPEG recompression; repeat the above operation to obtain a total of n shadow images that resist the JPEG recompression;

获取n张所述分享值列表的选定值x1、x2、...、xn,所述发送方将所述选定值x1、x2、...、xn与所述n张影子图像一同发送至所述接收方;Obtaining selected values x 1 , x 2 , ..., x n of n shared value lists, the sender sending the selected values x 1 , x 2 , ..., x n together with the n shadow images to the receiver;

其中,所述接收方基于接收到的l张所述影子图像和所述选定值x1、x2、...、xn,恢复出所述秘密图像,其中,k≤l≤n。The receiver recovers the secret image based on the received l shadow images and the selected values x 1 , x 2 , . . . , x n , where k≤l≤n.

本发明第三方面公开了一种电子设备。所述电子设备包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时,实现本公开第一方面中任一项所述的一种用于对抗JPEG重压缩的秘密图像分享方法中的步骤。The third aspect of the present invention discloses an electronic device. The electronic device includes a memory and a processor, the memory stores a computer program, and when the processor executes the computer program, the steps of any one of the secret image sharing methods for resisting JPEG recompression described in the first aspect of the present disclosure are implemented.

图4为根据本发明实施例的一种电子设备的结构图,如图4所示,电子设备包括通过系统总线连接的处理器、存储器、通信接口、显示屏和输入装置。其中,该电子设备的处理器用于提供计算和控制能力。该电子设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该电子设备的通信接口用于与外部的终端进行有线或无线方式的通信,无线方式可通过WIFI、运营商网络、近场通信(NFC)或其他技术实现。该电子设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该电子设备的输入装置可以是显示屏上覆盖的触摸层,也可以是电子设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。FIG4 is a block diagram of an electronic device according to an embodiment of the present invention. As shown in FIG4 , the electronic device includes a processor, a memory, a communication interface, a display screen, and an input device connected via a system bus. Among them, the processor of the electronic device is used to provide computing and control capabilities. The memory of the electronic device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The communication interface of the electronic device is used to communicate with an external terminal in a wired or wireless manner, and the wireless manner can be implemented through WIFI, an operator network, near field communication (NFC) or other technologies. The display screen of the electronic device can be a liquid crystal display screen or an electronic ink display screen, and the input device of the electronic device can be a touch layer covered on the display screen, or a key, trackball or touchpad provided on the housing of the electronic device, or an external keyboard, touchpad or mouse, etc.

本领域技术人员可以理解,图4中示出的结构,仅仅是与本公开的技术方案相关的部分的结构图,并不构成对本申请方案所应用于其上的电子设备的限定,具体的电子设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art will understand that the structure shown in FIG. 4 is merely a structural diagram of the portion related to the technical solution of the present disclosure, and does not constitute a limitation on the electronic device to which the technical solution of the present application is applied. The specific electronic device may include more or fewer components than shown in the figure, or combine certain components, or have a different arrangement of components.

本发明第四方面公开了一种计算机可读存储介质。所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,实现本公开第一方面中任一项所述的一种用于对抗JPEG重压缩的秘密图像分享方法中的步骤。The fourth aspect of the present invention discloses a computer-readable storage medium having a computer program stored thereon, and when the computer program is executed by a processor, the steps of any one of the secret image sharing methods for resisting JPEG recompression described in the first aspect of the present disclosure are implemented.

综上,本发明提供的技术方案将秘图像分享技术应用于社交网络可以实现秘密信息的隐蔽传输和存储,满足国家和社会便捷安全通信的需求,对保障信息安全具有重要价值。本发明提出的方案实现了针对JPEG重压缩的白盒鲁棒方案,实现了(k,n)门限、影子图像可理解。该方案可以应用于面向社交网络的隐蔽通信领域中。In summary, the technical solution provided by the present invention applies secret image sharing technology to social networks to achieve covert transmission and storage of secret information, meet the needs of the state and society for convenient and secure communication, and have important value in ensuring information security. The solution proposed by the present invention implements a white-box robust solution for JPEG recompression, and realizes (k,n) threshold and understandable shadow images. The solution can be applied to the field of covert communication for social networks.

请注意,以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。Please note that the technical features of the above embodiments can be combined arbitrarily. In order to make the description concise, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction in the combination of these technical features, they should be considered to be within the scope of this specification. The above-mentioned embodiments only express several implementation methods of the present application, and their descriptions are relatively specific and detailed, but they cannot be understood as limiting the scope of the invention patent. It should be pointed out that for ordinary technicians in this field, without departing from the concept of the present application, several variations and improvements can be made, which all belong to the scope of protection of the present application. Therefore, the scope of protection of the patent in this application shall be based on the attached claims.

Claims (10)

1.一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于,待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT(Discrete Cosine Transform,离散余弦变换)系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述方法在分享所述JPEG图像的同时对抗所述压缩处理;所述方法包括:1. A secret image sharing method for resisting JPEG heavy compression, it is characterized in that, the secret image to be shared is a JPEG image, and the secret information contained in the JPEG image is a quantized DCT (Discrete Cosine Transform, discrete cosine transform ) coefficient, the JPEG heavy compression refers to the compression processing performed after the JPEG image is shared and processed, and the method resists the compression processing while sharing the JPEG image; the method includes: 步骤S1、提取获取到的n+1张图像进行预处理,以提取所述n+1张图像中的每一张图像的完整DCT系数列表,所述n+1张图像包括1张所述待分享的秘密图像和n张载体图像;Step S1, extracting the acquired n+1 images for preprocessing, so as to extract a complete list of DCT coefficients for each of the n+1 images, the n+1 images including one of the pending Shared secret image and n carrier images; 步骤S2、基于n+1张所述完整DCT系数列表,确定所述待分享的秘密图像的待分享DCT系数列表、所述n张载体图像对应的n张待使用DCT系数列表,并根据所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值确定素数p;Step S2, based on the n+1 complete DCT coefficient lists, determine the DCT coefficient lists to be shared of the secret image to be shared, and the n DCT coefficient lists to be used corresponding to the n carrier images, and according to the The maximum DCT coefficient value in the list of DCT coefficients to be shared and the n pieces of DCT coefficient lists to be used determines the prime number p; 步骤S3、利用所述待分享DCT系数列表、所述n张待使用DCT系数列表、所述素数p和门限值k,通过计算获取与所述n张待使用DCT系数列表对应的且包含所述待分享的秘密图像的秘密信息的n张分享值列表;Step S3, using the list of DCT coefficients to be shared, the list of n DCT coefficients to be used, the prime number p and the threshold value k, obtain by calculation corresponding to the n lists of DCT coefficients to be used and including all A list of n sharing values describing the secret information of the secret image to be shared; 步骤S4、对于所述n张分享值列表中每张分享值列表,均执行:依据其各个分享值形成B×B个影子DCT块,并对所述B×B个影子DCT块进行解压缩处理以获取B×B个影子图像空域块;Step S4, for each shared value list in the n shared value lists, execute: form B×B shadow DCT blocks according to their respective shared values, and decompress the B×B shadow DCT blocks to obtain B×B shadow image spatial blocks; 步骤S5、判断基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值是否都在指定范围内,若是,对于所述每张分享值列表对应的B×B个影子图像空域块,将其作为对抗所述JPEG重压缩的B×B个影子DCT块;Step S5. Determine whether the element values in each of the n×B×B shadow image spatial blocks obtained based on n shared value lists are all within the specified range, and if so, for each shared value The B×B shadow image spatial domain blocks corresponding to the list are used as B×B shadow DCT blocks against the JPEG re-compression; 步骤S6、对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,确定对抗所述JPEG重压缩的1张影子图像,共得到对抗所述JPEG重压缩的n张影子图像,发送方通过向接收方发送对抗所述JPEG重压缩的n张影子图像实现分享所述秘密图像的同时对抗所述JPEG重压缩;Step S6, for the B×B shadow DCT blocks against the JPEG re-compression corresponding to each shared value list, determine one shadow image against the JPEG re-compression, and obtain a total of resistance against the JPEG re-compression n shadow images, the sender sends n shadow images against the JPEG re-compression to the receiver to share the secret image while resisting the JPEG re-compression; 其中,n、p、k、B均为正整数,k≤n,且门限值k表征恢复所述秘密图像所需的最少影子图像的数量。Wherein, n, p, k, and B are all positive integers, k≤n, and the threshold k represents the minimum number of shadow images required to restore the secret image. 2.根据权利要求1所述的一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于,在所述步骤S1中,所述预处理具体包括,对所述n+1张图像中的每一张图像均执行:2. A secret image sharing method for resisting JPEG re-compression according to claim 1, characterized in that, in the step S1, the preprocessing specifically includes, among the n+1 images For each image of the execute: 通过熵解码提取当前图像经量化后的DCT系数矩阵,所述DCT系数矩阵包含M×M个DCT系数,对所述DCT系数矩阵进行分块处理,分为B×B个DCT块,每个所述DCT块包含A×A个DCT系数,其中M=B×A;The quantized DCT coefficient matrix of the current image is extracted by entropy decoding, the DCT coefficient matrix includes M×M DCT coefficients, and the DCT coefficient matrix is divided into B×B DCT blocks, each of which The DCT block includes A×A DCT coefficients, where M=B×A; 对每个包含A×A个DCT系数的DCT块,以之字顺序提取前C个DCT系数,以获取每个所述DCT块的DCT系数列表,从而构建所述当前图像的完整DCT系数列表,每个所述DCT块的DCT系数列表长度为C,所述当前图像的完整DCT系数列表的长度为C×B×B;For each DCT block containing A×A DCT coefficients, extract the first C DCT coefficients in zigzag order to obtain a DCT coefficient list of each DCT block, thereby constructing a complete DCT coefficient list of the current image, The length of the DCT coefficient list of each DCT block is C, and the length of the complete DCT coefficient list of the current image is C×B×B; 其中,M、A、C均为正整数。Wherein, M, A, and C are all positive integers. 3.根据权利要求2所述的一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于,所述步骤S2具体包括:3. A kind of secret image sharing method for resisting JPEG heavy compression according to claim 2, it is characterized in that, described step S2 specifically comprises: 判断所述n+1张完整DCT系数列表中的最小DCT系数是否大于0;Judging whether the minimum DCT coefficient in the n+1 complete DCT coefficient list is greater than 0; 若是,则将所述n+1张完整DCT系数列表中的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将所述n+1张完整DCT系数列表中的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If so, use one of the complete DCT coefficient lists of the secret image to be shared in the n+1 complete DCT coefficient lists as the to-be-shared DCT coefficient list, and use the n+1 complete DCT coefficient lists The complete DCT coefficient lists of the n pieces of the carrier image in the n pieces are used as the n pieces of DCT coefficient lists to be used; 若否,则对所述n+1张完整DCT系数列表中的全部DCT系数进行值平移,所述值平移的平移量为所述最小DCT系数的绝对值,将经所述值平移后的1张所述待分享的秘密图像的完整DCT系数列表作为所述待分享DCT系数列表,将经所述值平移后的n张所述载体图像的完整DCT系数列表作为所述n张待使用DCT系数列表;If not, then perform value translation on all the DCT coefficients in the n+1 complete DCT coefficient list, the translation amount of the value translation is the absolute value of the minimum DCT coefficient, and the 1 after the value translation The complete DCT coefficient lists of the secret images to be shared are used as the DCT coefficient lists to be shared, and the complete DCT coefficient lists of the n carrier images after the value translation are used as the n DCT coefficients to be used. list; 获取所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值,取大于所述最大DCT系数的最小素数作为所述素数p。Obtain the maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used, and take the smallest prime number greater than the maximum DCT coefficient as the prime number p. 4.根据权利要求3所述的一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于,所述待分享DCT系数列表的长度、所述n张待使用DCT系数列表中的每一张列表的长度、所述n张分享值列表中的每一张列表的长度均为C×B×B;所述步骤S3具体包括:4. A kind of secret image sharing method for resisting JPEG heavy compression according to claim 3, it is characterized in that, the length of the DCT coefficient list to be shared, each of the n DCT coefficient lists to be used The length of the list and the length of each list in the n shared value lists are C×B×B; the step S3 specifically includes: 对于所述n张分享值列表中每一张列表中的每个位置,利用公式f(x)=s+a1x+a2x2+…+ak-1xk-1(mod p)计算其DCT影子值;For each position in each of the n shared value lists, use the formula f(x)=s+a 1 x+a 2 x 2 +...+a k-1 x k-1 (mod p ) to calculate its DCT shadow value; 其中,f(x)为所述n张分享值列表中当前列表中的当前位置上的DCT影子值,s为所述待分享DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数,a1、a2、...、ak-1为任意选取的随机数,x为选定值,(mod p)表示模p运算;Wherein, f(x) is the DCT shadow value at the current position in the current list in the n shared value lists, and s is at the position corresponding to the current position in the current list in the DCT coefficient list to be shared The DCT coefficients of , a 1 , a 2 ,..., a k-1 are randomly selected random numbers, x is a selected value, and (mod p) represents a modulo p operation; 判断f(x)的高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位是否相等,其中
Figure FDA0004211234760000031
Judging whether the high δ bit of f(x) is equal to the high δ bit of the DCT coefficient at the position corresponding to the current position in the current list in the n DCT coefficient lists to be used, wherein
Figure FDA0004211234760000031
若是,则将所述DCT影子值f(x)作为所述当前位置的n张分享值列表中当前列表中的当前位置上的分享值;If so, then use the DCT shadow value f(x) as the shared value at the current position in the current list in the n shared value lists of the current position; 若否,则调节a1、a2、...、ak-1并重新计算f(x),直到其高δ位与所述n张待使用DCT系数列表中与所述当前列表中的当前位置对应的位置上的DCT系数的高δ位相等,并获取当前位置上的分享值。If not, adjust a 1 , a 2 , ..., a k-1 and recalculate f(x), until its high δ bit is the same as that in the n DCT coefficient lists to be used and in the current list The high δ bits of the DCT coefficients at the position corresponding to the current position are equal, and the shared value at the current position is obtained.
5.根据权利要求4所述的一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于,在所述步骤S3中,对于所述当前列表中的各个位置,在计算其DCT影子值时,x保持不变,且n张所述分享值列表的选定值x各不相同,f(x)、x、以及a1、a2、...、ak-1的取值范围为[0,p-1]上的整数。5. A kind of secret image sharing method for resisting JPEG heavy compression according to claim 4, it is characterized in that, in described step S3, for each position in the described current list, calculate its DCT shadow value , x remains unchanged, and the selected value x of the n shared value lists is different, and the value ranges of f(x), x, and a 1 , a 2 ,..., a k-1 is an integer on [0,p-1]. 6.根据权利要求5所述的一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于,所述步骤S4具体包括:6. A kind of secret image sharing method for resisting JPEG heavy compression according to claim 5, is characterized in that, described step S4 specifically comprises: 对所述n张分享值列表中每张分享值列表:每提取C个分享值,将其与所述n张载体图像中对应的载体图像的对应DCT块中第C+1至第A×A个DCT系数进行拼接,以形成1张完整的影子DCT列表;重复以上操作得到n张完整的影子DCT列表;For each shared value list in the n shared value lists: every time C shared values are extracted, compare them with the C+1th to A×Ath DCT blocks of the corresponding carrier images in the n carrier images The DCT coefficients are spliced to form a complete shadow DCT list; repeat the above operations to obtain n complete shadow DCT lists; 对所述n张影子DCT列表中的每张DCT列表:通过逆之字排列得到B×B个大小为A×A的影子DCT块,对所述B×B个影子DCT块分别进行解压缩处理,所述解压缩处理包括逆DCT变换和四舍五入处理,从而获取B×B个影子图像空域块;重复以上操作得到共n×B×B个影子图像空域块;For each DCT list in the n shadow DCT lists: obtain B×B shadow DCT blocks with a size of A×A by reverse zigzag arrangement, and decompress the B×B shadow DCT blocks respectively , the decompression processing includes inverse DCT transform and rounding processing, thereby obtaining B×B shadow image spatial blocks; repeating the above operations to obtain a total of n×B×B shadow image spatial blocks; 其中,在执行所述逆之字排列之前,判断在步骤S2中是否对所述n+1张完整DCT系数列表中的全部DCT系数进行了值平移,若是,则将所述n张影子DCT列表中的全部分享值和全部DCT值执行逆值平移,所述逆值平移的平移量为所述最小DCT系数的绝对值。Wherein, before performing the inverse zigzag arrangement, it is judged in step S2 whether all DCT coefficients in the n+1 complete DCT coefficient lists have been shifted in value, and if so, the n shadow DCT lists All the shared values and all DCT values in are subjected to inverse value translation, and the translation amount of the inverse value translation is the absolute value of the minimum DCT coefficient. 7.根据权利要求6所述的一种用于对抗JPEG重压缩的秘密图像分享方法,其特征在于:7. A kind of secret image sharing method for resisting JPEG heavy compression according to claim 6, is characterized in that: 在所述步骤S5中:In said step S5: 所述指定范围为[-128,127);The specified range is [-128,127); 若基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值不都在指定范围内,则调节a1、a2、...、ak-1并重新执行步骤S3-S5,直到所述每个图像空域块中的元素值都在所述指定范围内;If the element values in each of the n×B×B shadow image spatial blocks obtained based on n shared value lists are not all within the specified range, then adjust a 1 , a 2 , ..., a k-1 and re-execute steps S3-S5, until the element values in each image spatial domain block are within the specified range; 在所述步骤S6中:In said step S6: 对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,通过拼接形成1个影子DCT矩阵,对所述1个影子DCT矩阵进行熵编码,从而得到对抗所述JPEG重压缩的1个影子图像;重复上述操作,共得到对抗所述JPEG重压缩的n张影子图像;For the B×B shadow DCT blocks against the JPEG recompression corresponding to each shared value list, a shadow DCT matrix is formed by splicing, and entropy coding is performed on the 1 shadow DCT matrix, so as to obtain Described 1 shadow image of JPEG heavy compression; Repeat above-mentioned operation, obtain altogether the n shadow images of resisting described JPEG heavy compression; 获取n张所述分享值列表的选定值x1、x2、...、xn,所述发送方将所述选定值x1、x2、...、xn与所述n张影子图像一同发送至所述接收方,所述接收方基于接收到的l张所述影子图像和所述选定值x1、x2、...、xn,恢复出所述秘密图像,其中,k≤l≤n。Obtain n selected values x 1 , x 2 , ..., x n of the shared value list, and the sender combines the selected values x 1 , x 2 , ..., x n with the The n shadow images are sent to the receiver together, and the receiver recovers the secret based on the received l shadow images and the selected values x 1 , x 2 , ..., x n image, where k≤l≤n. 8.一种用于对抗JPEG重压缩的秘密图像分享系统,其特征在于,待分享的秘密图像为JPEG图像,所述JPEG图像包含的秘密信息为经量化的DCT(Discrete Cosine Transform,离散余弦变换)系数,所述JPEG重压缩指对所述JPEG图像进行分享处理后执行的压缩处理,所述系统在分享所述JPEG图像的同时对抗所述压缩处理;所述系统包括:8. A secret image sharing system for resisting JPEG heavy compression, characterized in that, the secret image to be shared is a JPEG image, and the secret information contained in the JPEG image is a quantized DCT (Discrete Cosine Transform, discrete cosine transform ) coefficient, the JPEG heavy compression refers to the compression processing performed after the JPEG image is shared and processed, and the system resists the compression processing while sharing the JPEG image; the system includes: 第一处理单元,被配置为:提取获取到的n+1张图像进行预处理,以提取所述n+1张图像中的每一张图像的完整DCT系数列表,所述n+1张图像包括1张所述待分享的秘密图像和n张载体图像;The first processing unit is configured to: extract the acquired n+1 images for preprocessing, so as to extract a complete list of DCT coefficients for each of the n+1 images, the n+1 images Including 1 secret image to be shared and n carrier images; 第二处理单元,被配置为:基于n+1张所述完整DCT系数列表,确定所述待分享的秘密图像的待分享DCT系数列表、所述n张载体图像对应的n张待使用DCT系数列表,并根据所述待分享DCT系数列表和所述n张待使用DCT系数列表中的最大DCT系数值确定素数p;The second processing unit is configured to: based on the n+1 complete DCT coefficient lists, determine the DCT coefficient list to be shared of the secret image to be shared, and the n DCT coefficients to be used corresponding to the n carrier images List, and determine the prime number p according to the maximum DCT coefficient value in the DCT coefficient list to be shared and the n DCT coefficient lists to be used; 第三处理单元,被配置为:利用所述待分享DCT系数列表、所述n张待使用DCT系数列表、所述素数p和门限值k,通过计算获取与所述n张待使用DCT系数列表对应的且包含所述待分享的秘密图像的秘密信息的n张分享值列表;The third processing unit is configured to: use the list of DCT coefficients to be shared, the list of n DCT coefficients to be used, the prime number p, and the threshold value k to acquire and obtain the n DCT coefficients to be used by calculation n shared value lists corresponding to the list and containing the secret information of the secret image to be shared; 第四处理单元,被配置为:对于所述n张分享值列表中每张分享值列表,均执行:依据其各个分享值形成B×B个影子DCT块,并对所述B×B个影子DCT块进行解压缩处理以获取B×B个影子图像空域块;The fourth processing unit is configured to: for each shared value list in the n shared value lists, perform: form B×B shadow DCT blocks according to their respective shared values, and perform the following operations on the B×B shadow DCT blocks The DCT block is decompressed to obtain B×B shadow image spatial blocks; 第五处理单元,被配置为:判断基于n张分享值列表得到的共n×B×B个影子图像空域块中的每个图像空域块中的元素值是否都在指定范围内,若是,对于所述每张分享值列表对应的B×B个影子图像空域块,将其作为对抗所述JPEG重压缩的B×B个影子DCT块;The fifth processing unit is configured to: determine whether the element values in each of the n×B×B shadow image spatial blocks obtained based on n shared value lists are all within the specified range, and if so, for The B×B shadow image space blocks corresponding to each shared value list are used as B×B shadow DCT blocks against the JPEG re-compression; 第六处理单元,被配置为:对于所述每张分享值列表对应的对抗所述JPEG重压缩的B×B个影子DCT块,确定对抗所述JPEG重压缩的1张影子图像,共得到对抗所述JPEG重压缩的n张影子图像;The sixth processing unit is configured to: for the B×B shadow DCT blocks against the JPEG recompression corresponding to each shared value list, determine a shadow image against the JPEG recompression, and obtain a total of The n shadow images of the JPEG re-compression; 其中,发送方通过向接收方发送对抗所述JPEG重压缩的n张影子图像实现分享所述秘密图像的同时对抗所述JPEG重压缩;Wherein, the sender realizes sharing the secret image by sending n shadow images against the JPEG recompression to the receiver while resisting the JPEG recompression; 其中,n、p、k、B均为正整数,k≤n,且门限值k表征恢复所述秘密图像所需的最少影子图像的数量。Wherein, n, p, k, and B are all positive integers, k≤n, and the threshold k represents the minimum number of shadow images required to recover the secret image. 9.一种电子设备,其特征在于,所述电子设备包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时,实现权利要求1-7中任一项所述的一种用于对抗JPEG重压缩的秘密图像分享方法中的步骤。9. An electronic device, characterized in that the electronic device comprises a memory and a processor, the memory stores a computer program, and when the processor executes the computer program, any one of claims 1-7 is realized The steps in the described secret image sharing method for resisting JPEG heavy compression. 10.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,实现权利要求1-7中任一项所述的一种用于对抗JPEG重压缩的秘密图像分享方法中的步骤。10. A computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method described in any one of claims 1-7 is realized. Steps in a method for secret image sharing against JPEG recompression.
CN202210581724.4A 2022-05-26 2022-05-26 A Secret Image Sharing Method and System Against JPEG Heavy Compression Active CN115131253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210581724.4A CN115131253B (en) 2022-05-26 2022-05-26 A Secret Image Sharing Method and System Against JPEG Heavy Compression

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210581724.4A CN115131253B (en) 2022-05-26 2022-05-26 A Secret Image Sharing Method and System Against JPEG Heavy Compression

Publications (2)

Publication Number Publication Date
CN115131253A CN115131253A (en) 2022-09-30
CN115131253B true CN115131253B (en) 2023-06-09

Family

ID=83376903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210581724.4A Active CN115131253B (en) 2022-05-26 2022-05-26 A Secret Image Sharing Method and System Against JPEG Heavy Compression

Country Status (1)

Country Link
CN (1) CN115131253B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115955534B (en) * 2023-03-12 2023-05-16 江西财经大学 Secret embedding sharing method, system, terminal and medium based on compressed sensing

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7430330B2 (en) * 2001-01-16 2008-09-30 Hamilton Chris H Method and apparatus for optimizing a JPEG image using regionally variable compression levels
US20020131645A1 (en) * 2001-01-16 2002-09-19 Packeteer Incorporated Method and apparatus for optimizing a JPEG image using regionally variable compression levels
US8442221B2 (en) * 2005-09-30 2013-05-14 Konica Minolta Laboratory U.S.A., Inc. Method and apparatus for image encryption and embedding and related applications
US8379911B2 (en) * 2010-12-10 2013-02-19 Infosys Technologies Limited Method and system for efficient watermarking of video content
CN105426709B (en) * 2015-11-12 2016-10-12 福建北卡科技有限公司 Private information communication means based on jpeg image Information hiding and system
CN105389517B (en) * 2015-12-21 2018-04-17 西安电子科技大学 The method hidden using image progress secret information
CN106683053B (en) * 2016-10-28 2019-10-08 陕西师范大学 A kind of GF (26) the progressive secret image sharing of finite field multi-threshold and reconstructing method
CN106530368B (en) * 2016-10-28 2019-06-11 陕西师范大学 A Multi-threshold Progressive Secret Image Sharing and Reconstruction Method in Prime Domain
CN108600574A (en) * 2018-04-20 2018-09-28 大连理工大学 Secret sharing method based on Faster R-CNN ' s
CN113612898B (en) * 2021-05-08 2022-11-08 上海大学 Robust covert communication device for resisting JPEG image downsampling

Also Published As

Publication number Publication date
CN115131253A (en) 2022-09-30

Similar Documents

Publication Publication Date Title
He et al. A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams
Fridrich et al. Perturbed quantization steganography with wet paper codes
Ping et al. Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation
Li et al. Distortion less secret image sharing scheme for Internet of Things system
Li et al. Survey on JPEG compatible joint image compression and encryption algorithms
CN108810555B (en) Thumbnail image privacy protection method based on image compression and elastic resolution
Zhang et al. Harnessing the hybrid cloud for secure big image data service
Yang et al. A visually meaningful image encryption algorithm based on adaptive 2D compressive sensing and chaotic system
Zhang et al. A Novel 1D Hybrid Chaotic Map‐Based Image Compression and Encryption Using Compressed Sensing and Fibonacci‐Lucas Transform
CN113034334B (en) Method and device for hiding reversible information of encrypted image by combining JPEG (joint photographic experts group) and Huffman (human field) codes
Kumar et al. An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes
Yang et al. Efficient color image encryption by color-grayscale conversion based on steganography
Chuman et al. Image manipulation specifications on social networking services for encryption-then-compression systems
Meng et al. Reversible data hiding in encrypted images based on IWT and chaotic system
Jose et al. Comparative analysis of reversible data hiding schemes
CN115131253B (en) A Secret Image Sharing Method and System Against JPEG Heavy Compression
CN114782563B (en) A secret image sharing method and system for JPEG images
Bharathkumar et al. An enhanced triple prime encryption approach for image encryption in LSB steganography
Singh et al. An improved encryption–Compression-based algorithm for securing digital images
CN115330890B (en) Secret image sharing method and system based on global adjustment and stable block conditions
Tchakounté et al. An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images.
Chang et al. Distortion‐free secret image sharing method with two meaningful shadows
CN107845055B (en) Image encryption method for resisting Facebook compression
Wang et al. Secure and efficient image transmission scheme for smart cities using sparse signal transformation and parallel compressive sensing
Abed A proposed encoding and hiding text in an image by using fractal image compression

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant