[go: up one dir, main page]

CN117041442A - Image robust steganography method based on adaptive STC-ECC strategy - Google Patents

Image robust steganography method based on adaptive STC-ECC strategy Download PDF

Info

Publication number
CN117041442A
CN117041442A CN202310964979.3A CN202310964979A CN117041442A CN 117041442 A CN117041442 A CN 117041442A CN 202310964979 A CN202310964979 A CN 202310964979A CN 117041442 A CN117041442 A CN 117041442A
Authority
CN
China
Prior art keywords
sequence
stc
image
carrier
steganography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310964979.3A
Other languages
Chinese (zh)
Inventor
肖凤军
黄林超
常琪
任一支
姚晔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN202310964979.3A priority Critical patent/CN117041442A/en
Publication of CN117041442A publication Critical patent/CN117041442A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/32165Transform domain methods using cosine transforms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The application discloses an image robust steganography method based on a self-adaptive STC-ECC strategy, which comprises the steps of firstly decoding a JPEG file, decoding a carrier image which needs to be embedded with secret information in a JPEG domain, and obtaining a DCT coefficient matrix X. Next, the modification loss ρ of each coefficient is calculated. Then extracting candidate carrier element sequence C c The secret message is embedded in the carrier image by screening of the payload and embedding density to generate a steganographic sequence. And finally, modifying coefficients in the carrier image through a dithering modulation algorithm according to the generated steganography sequence S to realize hiding of secret information and output steganography images. The application effectively reduces error diffusion phenomenon, ensures reliable extraction of secret information, increases flexibility, adaptability and robustness, and makes the steganographic image difficult to be detected under conventional observation and analysis.

Description

Image robust steganography method based on adaptive STC-ECC strategy
Technical Field
The application belongs to the technical field of steganography and concealment, and particularly relates to an image robust steganography method based on a self-adaptive STC-ECC strategy.
Background
The purpose of the image steganography technique is to achieve covert communication through digital images. However, in the image transmitted by the social network, since the operator needs to consider the limitation of bandwidth and storage, the transmitted image is subjected to secondary compression processing. To improve communication security, adaptive steganography employs Syndrome Trellis Coding (STC) to achieve minimal image distortion. The robust steganography can still correctly extract hidden information after the image is compressed for the second time.
In the last decade, the academia has proposed the "build anti-compression domain & ECC-STC" framework to achieve robust adaptive embedding. The framework uses a coefficient with high compression resistance as a carrier coefficient, processes the encoded secret message by an Error Correction Code (ECC), and embeds the encoded data into an image by STC encoding. However, to ensure robustness, a large number of additional check codes need to be embedded, which results in a significant decrease in security as the message load increases. In addition, since STC is a matrix code, error diffusion phenomenon easily occurs in the decoding process, and even if a large number of check codes are added, good robustness cannot be obtained.
To solve this problem, the academia proposes to build an anti-compression domain & STC-ECC framework. During the embedding process, the framework divides the vector sequence into two parts: the former part is used to embed the secret message, then the part of the concealment sequence is encoded with ECC and a check code is embedded in the second part. By the method, error diffusion is effectively reduced, and expenditure of check codes is reduced, so that robustness and safety are improved. However, this framework also presents a problem in that there is a fixed check code overhead no matter how much information payload is embedded, so that even when less message payload is transmitted, it is easily distinguished by the steganographic analyzer.
The above-mentioned technical drawbacks are a major problem in this field.
Disclosure of Invention
Aiming at the problems, the application provides an image robust steganography method based on a self-adaptive STC-ECC strategy, which solves the problems of redundancy of check codes, error diffusion, fixed check codes and the like in the existing framework through a new robust steganography framework, improves the robustness and the safety of the robust self-adaptive steganography in a social network, and does not need to share other information. The application provides an image robust steganography method based on a self-adaptive STC-ECC strategy, which comprises the following specific steps:
step S1, decoding the JPEG file. The carrier image for embedding the secret message is decoded in the JPEG domain and a matrix X of discrete cosine transform DCT coefficients is obtained for use in subsequent steps.
Step S2, calculating the modification loss rho of each coefficient in X, and quantifying the modification distortion of each coefficient in X. The calculation may be performed using existing already existing distortion functions UERD and J-uniwasd.
Step S3, extracting candidate carrier element sequence C c . The carrier selection frequency band can be adjusted according to different image transmission channels or social platforms, and candidate carrier sequences C are extracted through a jitter modulation algorithm c
Step S4, the secret information is embedded by the self-adaptive STC-ECC strategy. According to candidate vector sequence C c The secret message is embedded in the carrier image by screening of the payload and the embedding density, generating a steganographic sequence S.
Step S41, for the extracted candidate vector sequence C c Random scrambling is performed so that coefficients of various distortion sizes are uniformly distributed.
Step S42, because the selected Reed-Solomon (RS) error correction code is block coded, the candidate carrier sequence C is required c Cut into n b Equal length l b To facilitate generation of a check code for a fixed parameter.
Step S43, based on the payload, i.e. the length l of the embedded secret message m Determining the number of required carrier element blocks n e And select n e The candidate carrier element blocks are combined into a carrier sequence C * ;,n e The following formula is shown:
where w is the embedding density parameter.
The vector sequence C * Cutting into a front carrier sequence according to the ratio of 3:1And the posterior segment vector sequence->
Step S44, according to the modification loss ρ, the secret message m is embedded into the preceding carrier sequence by STC encodingObtaining the anterior steganography sequence->
Step S45, steganographic sequence for the front segment using RS (n, k, t) error correction codeAnd coding to obtain a check code part.
Step S46, embedding the check code into the rear carrier sequence through STC codingIn obtaining the posterior segment steganographic sequence +.>
Step S47, steganography sequenceAnd->Combining and filling the unselected carrier element blocks (if there are unselected carrier element blocks) to obtain the preliminary steganography case S *
Step S48, the steganographic sequence S is processed by the same random number seed * Reverse scrambling to obtain steganographic sequencesS。
Step S5, modifying the carrier element. And modifying coefficients in the carrier image through a dithering modulation algorithm according to the steganography sequence S generated in the last step, so as to realize hiding of secret information.
Step S6, outputting the steganographic image. And (5) carrying out JPEG encoding on the modified coefficient in the step (S5) to generate a JPEG image file, namely a steganographic image.
The beneficial effects of the application are as follows:
1. the improved embedding algorithm effectively reduces error diffusion phenomenon by ECC coding the steganography sequence after STC embedding, and ensures reliable extraction of secret information.
2. And a dynamic carrier sequence selection and optimized check code generation mechanism is introduced, and the check code overhead is adjusted according to the change of the message load, so that the flexibility and the adaptability of the method are improved.
3. While maintaining the visual quality of the steganographic image, robustness is enhanced, making the steganographic image difficult to detect under conventional observation and analysis.
The application has the advantage of high robust performance, and can be widely applied to transmission environments such as social networks and the like. The robust steganography method is suitable for personal users and enterprise users, and provides a reliable and safe solution for hidden communication. Through the method and the device, the user can carry out hidden communication in the social network without sharing other information, and meanwhile, excellent robustness and confidentiality are obtained.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the present application;
FIG. 2 is a flow chart of adaptive STC-ECC embedding provided by an embodiment of the present application;
FIG. 3 is a schematic diagram of embedding bands in a DCT coefficient block of 8×8 in the JPEG domain;
FIG. 4 is a schematic diagram of a dithering modulation algorithm;
FIG. 5 is a schematic diagram of the detection error rate in an example.
Detailed Description
The application provides an image robust steganography method for embedding secret information based on a self-adaptive STC-ECC strategy, which is characterized in that the security and the robustness of steganography are realized. The method is suitable for various hidden communication services and provides highly reliable hidden communication services for users.
For a better understanding of the technical solution of the present application, embodiments of the present application are described in detail below with reference to the accompanying drawings. It should be clear that the described embodiments, all other embodiments, which a person of ordinary skill in the art would obtain without making any inventive effort, fall within the scope of protection of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a robust steganography method based on adaptive STC-ECC according to an embodiment of the present application.
The specific implementation mode is as follows:
step S1, decoding the JPEG file, decoding a carrier image which needs to be embedded with the secret message in a JPEG domain, and obtaining a discrete cosine transform DCT coefficient matrix X for use in the subsequent step.
Step S2, calculating the modification loss rho of the coefficients, and quantifying the modification distortion of each coefficient in X. The calculation may be performed using existing already existing distortion functions UERD and J-uniwasd.
Step S3, extracting candidate carrier element sequence C c . The carrier selection frequency band can be adjusted according to different image transmission channels or social platforms, and candidate carrier sequences C are extracted through a jitter modulation algorithm c
For example, when the channel compression quality is known, coefficients of a lower frequency band can be selected for embedding to ensure steganography security. And when the channel is unknown, the coefficients with medium and low frequencies can be selected for embedding so as to ensure the robustness. Referring to fig. 3, fig. 3 shows 8 x 8 DCT blocks, in which domain E is embedded k Ranging from k=1 to k=15, each frequency representing a different level of security and robustness.
For example E k =4, 5 represents the lower frequency band, fit into the known channel, and E k =7, 8,9 represents the mid-low frequency band, suitable for unknown channels.
In the dithering modulation algorithm, as shown in fig. 4, the DCT coefficients are divided into a set a and a set B according to the quantization value Δ, which represent 0 or 1, respectively. The selected coefficient values are mapped into a binary sequence S.
Step S4, the secret information is embedded by the self-adaptive STC-ECC strategy. Selection of candidate vector sequence C c Then, the secret message is embedded into the carrier image through screening of the payload and the embedding density, and a steganography sequence is generated.
Step S41, for the extracted candidate vector sequence C c Random scrambling is carried out, so that coefficients with different distortion sizes are uniformly distributed;
step S42, because the selected Reed-Solomon (RS) error correction code is block coded, the candidate carrier sequence is cut into n b Equal length l b To facilitate generation of a check code for a fixed parameter.
Step S43, based on the payload, i.e. the length l of the embedded secret message m Determining the number of required carrier element blocks n e And select n e The candidate carrier element blocks are combined into a carrier sequence C * ;n e The following formula is shown:
where w is the embedding density parameter.
At the same time, the vector sequence C * Cutting into a front carrier sequence according to the ratio of 3:1And the posterior segment vector sequence->
Step S44, according to the modification loss ρ, the secret message m is embedded into the preceding carrier sequence by STC encodingObtaining the anterior steganography sequence->
The STC code comprises an STC original matrix, an STC code matrix, a carrier matrix, a hidden matrix and secret information, and specific examples are as follows:
m=[0 1 1 1] T
wherein H is 2×2 The matrix is the original matrix, H 4×8 An STC coding matrix formed by expanding an original matrix base,Is a carrier matrix>Is a steganographic matrix.
Step S45, steganographic sequence for the front segment using RS (n, k, t) error correction codeAnd coding to obtain a check code part.
The RS (n, k, t) error correction code outputs n integer codes for k integers by considering t bits as an integer, wherein the codes comprise (n-k) check codes and have the capability of correcting (n-k)/2 integer errors.
Step S46, embedding the check code into the rear carrier sequence through STC codingIn obtaining the posterior segment steganographic sequence +.>As shown in fig. 2.
Step S47, steganography sequenceAnd->Combining and filling the unselected carrier element blocks (if there are unselected carrier element blocks) to obtain the preliminary steganography case S *
Step S48, the steganographic sequence S is processed by the same random number seed * And (5) carrying out reverse scrambling to obtain a steganographic sequence S.
Step S5, modifying the carrier element. And modifying coefficients in the carrier image through a dithering modulation algorithm according to the steganography sequence S generated in the last step, so as to realize hiding of secret information.
In the dithering modulation algorithm, as shown in fig. 4, the DCT coefficients are divided into a set a and a set B according to the quantization value Δ, which represent 0 or 1, respectively. If the elements in the steganographic sequence are different from the values mapped by the actual coefficient values, modifying the coefficient values to match the steganographic elements.
Step S6, outputting the steganographic image. And (5) carrying out JPEG encoding on the modified coefficient in the step (S5) to generate a JPEG image file.
Using a BOSSBase1.01 image library, firstly, performing JPEG compression with a quality factor of 75 on 10000 images in the library to serve as a frequency domain candidate carrier image set. Then, using TCM, DMMR, ESS, SSR and Adaptive-GMAS and other representative steganography algorithm, and using RS (200,192,8) error correction coding, embedding random secret information under embedded load of 0.01-0.1 bpnzAC and the like to generate corresponding secret-carrying image. The specific experimental setup is shown in table 1.
TABLE 1
And testing the synchronism of the channel matching network at the embedding and receiving ends. First, for a candidate carrier image set, the secret images generated by different algorithms under different embedding ratios are attacked. Then, the secret message in the corresponding secret image under each embedded load is extracted for each steganography algorithm, and the number of perfect extracted pictures is calculated as shown in table 2.
TABLE 2
The experimental results in table 2 show that the robust steganography algorithm embedded by the adaptive STC-ECC strategy of the application achieves stronger robustness for JPEG recompression. The main reason is that the error diffusion phenomenon of STC decoding in the prior algorithm is avoided by encoding the sequence after the STC embedding by ECC. The complete correct extraction of the secret information at the receiving end is ensured.
In order to test the anti-detection performance of the steganography algorithm for the statistical characteristics of the algorithm generated secret image, the CCPEV, DCTR and other frequency domain steganography detection characteristics are utilized, and the integrated classifier is combined to test the secret image under different embedded loads generated by the robust steganography algorithms such as TCM, DMMR, ESS, SSR, adaptive-GMAS and the like and the algorithm provided in the scheme. For each group of carrier images generated by different algorithms under different embedding ratios, 1/2 of the carrier images are randomly used for training in experiments, and the other 1/2 of the carrier images are used for testing to obtain the detection error rate P of the carrier images corresponding to different methods E As shown in fig. 5, the left graph is a schematic diagram of the detection error rate of ccev, and the right graph is a schematic diagram of the detection error rate of DCTR.
As shown by the experimental results, compared with the robust steganography algorithms such as TCM, DMMR, ESS, SSR and Adaptive-GMAS proposed previously, the secret image generated by the algorithm provided by the application can obtain excellent detection resistance.
Through the implementation mode, the image robust steganography safety and reliability can be effectively improved, and the method and the device are suitable for various hidden communication services. The method maintains a high degree of concealment in image transmission, providing a reliable and secure solution for covert communication.
While certain specific embodiments of the application have been described in detail by way of example, it will be appreciated by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the application. It will be appreciated by those skilled in the art that modifications could be made to the above embodiments without departing from the scope and spirit of the application. The scope of the application is defined by the appended claims.
In summary, the image robust steganography method provided by the application can improve the security and reliability of steganography, is widely applicable to various hidden communication services, and provides highly reliable hidden communication services for users.

Claims (8)

1. An image robust steganography method based on an adaptive STC-ECC strategy is characterized by comprising the following steps:
step S1, decoding a carrier image for embedding a secret message in a JPEG domain, and obtaining a discrete cosine transform DCT coefficient matrix X;
step S2, calculating the modification distortion of each coefficient in X to obtain modification loss rho;
step S3, extracting a candidate carrier sequence C through a jitter modulation algorithm c
Step S4, according to candidate vector sequence C c Embedding the secret message into the carrier image through screening of the payload and the embedding density to generate a steganography sequence S;
s5, modifying coefficients in the carrier image according to the steganography sequence S through a dithering modulation algorithm to realize hiding of secret information;
and S6, carrying out JPEG encoding on the modified coefficient in the step S5 to generate a JPEG image file, namely a steganographic image.
2. The image robust steganography method based on the adaptive STC-ECC policy according to claim 1, wherein in step S2, the modified distortion of each coefficient in the computation X is computed using distortion functions UERD and J-uniwasd.
3. The image robust steganography method based on the adaptive STC-ECC policy according to claim 1, characterized in that in step S3, the candidate carrier sequence C is extracted by a jitter modulation algorithm c In the process of (1), aiming at different image transmission channels or social platforms, the carrier selection frequency band is adjusted.
4. A method of image robust steganography based on adaptive STC-ECC policy according to any of claims 1 to 3, characterized in that step 4 comprises the following specific procedures:
step S41, for the extracted candidate vector sequence C c Randomly scrambling;
step S42, candidate vector sequence C c Cut into n b Equal length l b Is a carrier element block of (a);
step S43, based on the payload, i.e. the length l of the embedded secret message m Determining the number of required carrier element blocks n e And select n e The candidate carrier element blocks are combined into a carrier sequence C *
The vector sequence C * Cutting into a front carrier sequence according to the ratio of 3:1And the posterior segment vector sequence->
Step S44, according to the modification loss ρ, utilizing verificationSub-lattice encoded STC embeds secret message m into a preceding carrier sequenceObtaining the anterior steganography sequence->
Step S45, steganographic sequence for the front segment using RS (n, k, t) error correction codeCoding to obtain a check code;
step S46, embedding the check code into the rear carrier sequence through STC codingIn obtaining the posterior segment steganographic sequence +.>
Step S47, steganography sequenceAnd->Combining to obtain a preliminary steganography sequence S *
Step S48, the steganographic sequence S is processed by the same random number seed * And (5) carrying out reverse scrambling to obtain a steganographic sequence S.
5. The image robust steganography method based on the adaptive STC-ECC policy according to claim 4, wherein in step S43, the carrier element block number n e Is calculated as follows:
where w is the embedding density parameter.
6. The image robust steganography method based on the adaptive STC-ECC policy of claim 4, wherein in step S44, the syndrome-encoded STC includes an STC original matrix, an STC encoding matrix, a carrier matrix, a steganographically-encoded matrix, and secret information, specifically as follows:
m=[0 1 1 1] T
wherein H is 2×2 The matrix is the original matrix, H 4×8 An STC coding matrix formed by expanding an original matrix base,Is a carrier matrix>Is a steganographic matrix.
7. The image robust steganography method based on the adaptive STC-ECC scheme according to claim 4, wherein in step S45, the RS (n, k, t) error correction code corrects (n-k)/2 integer errors by regarding t bits as an integer, and outputting n integer codes for k integers, including (n-k) check codes.
8. The image robust steganography method based on the adaptive STC-ECC policy according to claim 4, wherein in step S47, the steganography sequence isAnd->In combination, if there are unselected carrier element blocks, then +.>Andfilling unselected carrier element blocks during combination to obtain steganography case S *
CN202310964979.3A 2023-08-02 2023-08-02 Image robust steganography method based on adaptive STC-ECC strategy Pending CN117041442A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310964979.3A CN117041442A (en) 2023-08-02 2023-08-02 Image robust steganography method based on adaptive STC-ECC strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310964979.3A CN117041442A (en) 2023-08-02 2023-08-02 Image robust steganography method based on adaptive STC-ECC strategy

Publications (1)

Publication Number Publication Date
CN117041442A true CN117041442A (en) 2023-11-10

Family

ID=88601562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310964979.3A Pending CN117041442A (en) 2023-08-02 2023-08-02 Image robust steganography method based on adaptive STC-ECC strategy

Country Status (1)

Country Link
CN (1) CN117041442A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117745507A (en) * 2023-12-06 2024-03-22 无锡学院 A generative steganography method and system based on chess record construction

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117745507A (en) * 2023-12-06 2024-03-22 无锡学院 A generative steganography method and system based on chess record construction
CN117745507B (en) * 2023-12-06 2024-05-24 无锡学院 A generative steganography method and system based on chess record construction

Similar Documents

Publication Publication Date Title
Zhang et al. Multiple robustness enhancements for image adaptive steganography in lossy channels
Tao et al. Towards robust image steganography
Yang et al. A contrast-sensitive reversible visible image watermarking technique
JP4250187B2 (en) System and method for robust and reversible data hiding and data restoration in spatial domain
US6704431B1 (en) Method and apparatus for digital watermarking
US20030152225A1 (en) Digital watermarking system using scrambling method
Zhang et al. A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients
Yan et al. Robust secret image sharing resistant to noise in shares
Su et al. A high capacity reversible data hiding in encrypted AMBTC-compressed images
Kumar et al. A reversible high capacity data hiding scheme using combinatorial strategy
Huang et al. Robust image steganography against JPEG compression based on DCT residual modulation
CN117041442A (en) Image robust steganography method based on adaptive STC-ECC strategy
CN106961602B (en) A kind of cross-platform incompressible color image information hidden algorithm based on RS and Hamming code
Lai et al. High embedding capacity data hiding technique based on hybrid AMBTC and LSB substitutions
Lin et al. A high-quality image authentication scheme for AMBTC-compressed images
Shapiro et al. Improved ECC-based phase watermarking method for video copyright protection
CN108171665B (en) A Multi-version Backup and Restricted Two-Factor Authentication Master Key (t,s,k,n) Image Sharing Method
Lin et al. Novel image authentication scheme for AMBTC-compressed images
Ur-Rehman et al. Soft authentication and correction of images
Sarkar et al. Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS-a randomized block based hiding scheme
RU2785832C1 (en) Method for ensuring the robustness of a digital watermark embedded in a static image trasmitted over a noisy communication chanel
Yu et al. A JPEG compression-resistant data watermark embedding and detection algorithm
JP2006516848A (en) Lossless data embedding
Bahrushin et al. Robust to JPEG Compression Image Watermarking Scheme Based on Even-Odd Modulation and Error-Correcting Codes
Zhang et al. Improving Robustness of TCM-based Robust Steganography with Variable Robustness

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination