Method for reversible image data hiding
First Claim
1. A method for reversible image data hiding comprising:
- encrypting an original image by an encryption process to generate an encrypted image, wherein the encryption process including;
generating a key stream by using a secret encryption key; and
generating an encrypted image by XORing the original image with the key stream;
embedding a message into the encrypted image by an embedment process to generate an embedded image, wherein the embedment process including;
generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set; and
extracting the message and the original image from the embedded image by a decryption and extraction process.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for reversible image data hiding comprising: encrypting an original image by an encryption process to generate an encrypted image, embedding a message into the encrypted image by an embedment process to generate an embedded image, and extracting the message and the original image from the embedded image by a decryption and extraction process. The encryption process including: generating a key stream by using a secret encryption key, and generating an encrypted image by XORing the original image with the key stream. The embedment process including: generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set.
-
Citations
20 Claims
-
1. A method for reversible image data hiding comprising:
-
encrypting an original image by an encryption process to generate an encrypted image, wherein the encryption process including; generating a key stream by using a secret encryption key; and generating an encrypted image by XORing the original image with the key stream; embedding a message into the encrypted image by an embedment process to generate an embedded image, wherein the embedment process including; generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set; and extracting the message and the original image from the embedded image by a decryption and extraction process. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for reversible image data hiding comprising:
-
encrypting an original image by an encryption process to generate an encrypted image, wherein the encryption process including; generating a key stream by using a secret encryption key; and generating an encrypted image by XORing the original image with the key stream; embedding a message into the encrypted image by an embedment process to generate an embedded image, wherein the embedment process including; generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set; and extracting the message and the original image from the embedded image by a decryption and extraction process, wherein the decryption and extraction process including; generating a decrypted image by XORing the embedded image with the key stream; and generating the message and the original image by XORing the decrypted image with the public key set. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for reversible image data hiding comprising:
-
pre-negotiating a secret encryption key between a first electronic device and a third electronic device; encrypting an original image by an encryption process to generate an encrypted image by the first electronic device, wherein the encryption process including; generating a key stream by using the secret encryption key; and generating an encrypted image by XORing the original image with the key stream; sending the encrypted image to a second electronic device from the first electronic device; embedding a message into the encrypted image by an embedment process to generate an embedded image by the second electronic device which does not know the secret encryption key, wherein the embedment process including; generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set; sending the embedded image to the third electronic device from the second electronic device; and extracting the message and the original image from the embedded image by a decryption and extraction process by the third electronic device, wherein the decryption and extraction process including; generating a decrypted image by XORing the embedded image with the key stream; and generating the message and the original image by XORing the decrypted image with the public key set. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification