信号与信息处理

按需发送的加密图像中的可逆信息隐藏

展开
  • 上海大学通信与信息工程学院,上海200444

收稿日期: 2014-10-17

  修回日期: 2014-12-02

  网络出版日期: 2014-12-04

基金资助

国家自然科学基金(No.61103181, No.61472235, No.61202367);上海自然科学基金(No.14ZR1415100,No.12ZR1443700);上海市青年科技启明星人才计划基金(No.14QA1401900);上海市教委创新基金(No.14YZ020)

Reversible Data Hiding in Encrypted Images Transmitted on Demand

Expand
  • School of Communication and Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2014-10-17

  Revised date: 2014-12-02

  Online published: 2014-12-04

摘要

提出了一种新的加密图像中的可逆信息隐藏算法. 发送方对图像进行下采样并计算残差,得到子图像和残差两部分数据,再使用加密密钥对两部分数据分别进行加密后发送给服务器端. 服务器端对残差部分的加密数据进行算术编码,产生冗余空间并使用嵌入密钥隐藏额外数据. 接收端根据持有密钥的情况,从服务器端获取不同的数据版本. 与以往方法相比,所提出的按需传输数据的新机制可有效减少服务器传送的数据量,且在图像可无损恢复的前提下大大提高了数据嵌入率.

本文引用格式

韩喜玉,钱振兴,张新鹏,姜飞 . 按需发送的加密图像中的可逆信息隐藏[J]. 应用科学学报, 2015 , 33(1) : 50 -58 . DOI: 10.3969/j.issn.0255-8297.2015.01.006

Abstract

This paper proposes a new method of reversible data hiding in encrypted images. The sender down-samples the original image and calculates the residuals to generate two sets of objects: sub-images and residuals. These are encrypted with an encryption keyand sent to the server. The server applies arithmetic coding on the encrypted residuals to generate spatial redundancy, and then hides extra data using the embedding key. With the key, the receiver obtains different versions of the data transmitted by the server. Unlike the conventional methods, a transmission-on-demand mechanism is used, which can effectively reduce the amount of transmitted data on the server. With the image perfectly recovered, the data embedding rate is greatly improved.

参考文献

[1]      FRIDRICH J, GOLJAN M, DU R. Lossless data embedding for all images formats[C]//Electronic Imaging 2002. International Society for Optics and Photonics, 2002: 572-583.
[2]      KUNDUR D, KARTHIK K. Video fingerprinting and encryption principles for digital rights management [J]. Proceedings of the IEEE, 2004, 92(6): 918-932.
[3]       CELIK M U, SHARMA G, TEKALP A M. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.
[4]       THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Processing, 2007, 16(3): 721-730.
[5]       NI Z, SHI Y Q, ANSARI N. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362.
[6]       TAI W L, YEH C M, CHANG C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6):  906-910.
[7]       LUO L, CHEN Z, CHEN M, ZHENG X, XIONG Z. Reversible image watermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 187-193.
[8]       LI X, YANG B, ZENG T. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J]. IEEE Transactions on Image Processing, 2011, 20(12): 3524-3533.
[9]      HWANG K, LI D. Trusted cloud computing with secure resources and data coloring[J]. IEEE  on Internet Computing, 2010, 14(5): 14-22.
[10]  ZHANG X. Reversible data hiding in encrypted image [J]. IEEE on Signal Processing Letters, 2011, 18(4): 255-258.
[11]  HONG W, CHEN T S, WU H Y. An improved reversible data hiding in encrypted images using side match [J]. IEEE on Signal Processing Letters, 2012, 19(4): 199-202.
[12]  ZHANG X. Separable reversible data hiding in encrypted image[J]. Information Forensics and Security, IEEE Transactions on, 2012, 7(2): 826-832.
[13]  ZHANG X, QIAN Z, FENG G, REN Y. Efficient reversible data hiding in encrypted images[J]. Journal of Visual Communication and Image Representation, 2014, 25(2): 322-328.
[14]  QIAN Z, ZHANG X H X. Separable reversible data hiding in encrypted images by n-nary histogram modification [C]//The Third International Conference on Multimedia Technology, Atlantis Press, Paris. 2013: 869-876.
 
[15]  MA K, ZHANG W, ZHAO X, YU N. Reversible data hiding in encrypted images by reserving room before encryption [J]. Information Forensics and Security, IEEE Transactions on, 2013, 8(3): 553-562.
[16]  ZHANG W, MA K, YU N. Reversibility improved data hiding in encrypted images[J]. Signal Processing, 2014, 94: 118-127.
[17]  ABDUL Karim M S, WONG K S. Universal data embedding in encrypted domain[J]. Signal Processing, 2014, 94: 174-182.
[18]  WITTEN I H, NEAL R M, CLEARY J G. Arithmetic coding for data compression[J]. Communications of the ACM, 1987, 30(6): 520-540.
[19]  ZHANG D, WU X. An edge-guided image interpolation algorithm via directional filtering and data fusion[J]. IEEE Transactions on Image Processing, 2006, 15(8): 2226-2238.
 
 
(编辑:管玉娟)
 
文章导航

/