多媒体信息安全

改进块旋转和马赛克拼图的生成式伪装方法

展开
  • 陕西师范大学 计算机科学学院, 西安 710119

收稿日期: 2019-07-26

  修回日期: 2019-07-30

  网络出版日期: 2019-10-18

基金资助

国家自然科学基金(No.61100239);陕西省自然科学基金(No.2011JQ8009,No.2016JM6065);中央高校基本科研业务费基金(No.GK201402036,No.201703057)资助

Improved Generation Camouflage Method Combined with Block Rotation and Photo Mosaic

Expand
  • School of Computer Science, Shaanxi Normal University, Xi'an 710119, China

Received date: 2019-07-26

  Revised date: 2019-07-30

  Online published: 2019-10-18

摘要

结合块旋转和马赛克拼图的生成式伪装方法通过在嵌密位置放置与待隐藏秘密信息相关的圆形图像对秘密信息进行表达,会导致生成的马赛克图像的视觉质量较差,而较差的视觉质量也容易导致隐藏的秘密信息发生泄漏.为避免该问题,提出一种改进块旋转和马赛克拼图的生成式伪装方法.在该方法中,首先将多个灰度图像转换为圆形图像并按像素均值增序排列作为编码图像,将掩体图像直接通过误差扩散预处理转化为多级半色调图像;其次,通过随机坐标序列来决定秘密信息的隐藏位置,通过生成随机加密映射矩阵对秘密信息进行加密映射处理;最后,遍历掩体图像选取像素值对应的编码图像,对于隐藏和非隐藏位置,分别将编码图像旋转与秘密信息相关角度和随机角度,进而生成马赛克图像.在提取时,根据密钥结合质心旋转匹配策略以及区间认证策略对秘密信息进行认证以提高秘密信息认证的精度.实验表明,所提方法直接用编码圆形图像的旋转角度来表达秘密信息,在放置过程中始终选取以掩体像素值相对应的编码圆形图像来表达秘密信息,因而不会产生任何偏差,也不会导致任何视觉质量下降,具有良好的视觉质量.该方法引入了区间认证策略,具有较高的认证精度,所提方法具有较强的抗攻击鲁棒性且提取过程完全依赖于密钥,具有较高的安全性.

本文引用格式

赵运营, 邵利平, 王洋, 陆海 . 改进块旋转和马赛克拼图的生成式伪装方法[J]. 应用科学学报, 2019 , 37(5) : 673 -690 . DOI: 10.3969/j.issn.0255-8297.2019.05.009

Abstract

The conventional generation camouflage method combined with block rotation and photo mosaic expresses secret information by placing the circular images related to secret information in the embedding position, thus leading to a poor visual quality of resulted mosaic image and the leakage of hidden secret information. To address this, an improved generation camouflage method combined with block rotation and photo mosaic is proposed in this paper. In the method, firstly several grayscale images are converted into circular images and arranged as encoded images according to the ascending order of pixel mean value, and the cover image is directly transformed into the multiple halftone image by error diffusion. Secondly, the hidden positions of secret information are determined by random coordinate sequences, and the secret information was encrypted and mapped by generating random encryption mapping matrix. Finally, the coded images with the corresponding pixel values are selected by traversing the cover image. For the hidden and unhidden positions, the encoded images are rotated by a determined angle relative to secret information and a random angle respectively to generate a photo mosaic image. In order to improve the accuracy of secret information authentication, secret information is authenticated by the user key combined with centroid rotation matching strategy and interval authentication strategy. Experiments show that the proposed method directly uses the rotation angle of the encoded circular image to express secret information and it always selects the encoded circular image corresponding to the pixel value in the cover image to express secret information, so it neither brings any deviation nor causes any visual quality degradation. The proposed method performs strong anti-attack robustness and high security due to the entire key-dependency in extraction process.

参考文献

[1] Zhou Z L, Sun H Y, Harit R, et al. Coverless image steganography without embedding[C]//International Conference on Cloud Computing and Security. Springer, 2015:123-132.
[2] Yuan C S, Xia Z H, Sun X M. Coverless image steganography based on SIFT and BOF[J]. Journal of Internet Technology, 2017, 18(2):435-442.
[3] Zhou Z L, Wu J Q. M, Yang C N, et al. Coverless image steganography using histograms of oriented gradients-based hashing algorithm[J]. Journal of Internet Technology, 2017, 18(5):1177-1184.
[4] Xu J, Mao X, Jin X, et al. Hidden message in a deformation-based texture[J]. Visual Computer International Journal of Computer Graphics, 2015, 31(12):1653-1669.
[5] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2015, 24(1):130-139.
[6] Qin Z C, Li M, Wu B. Robust steganography via patch-based texture synthesis[C]//International Conference on Internet Multimedia Computing and Service. Springer, 2017:429-439.
[7] Lin W L, Tsai W H. Data hiding in image mosaics by visible boundary regions and its copyright protection application against print-and-scan attacks[C]//International Computer symposium, 2004:449-454.
[8] Lee Y L, Tsai W H. A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(4):695-703.
[9] Hou D, Zhang W, Yu N. Image camouflage by reversible image transformation[J]. Journal of Visual Communication and Image Representation, 2016, 40:225-236.
[10] 刘小凯,姚恒,秦川. 基于图像块分类阈值优化的改进可逆图像伪装[J]. 应用科学学报, 2018, 36(2):237-246. Liu X K, Yao H, Qin C. Improved reversible image camouflage method based on image block classification threshold optimization[J]. Journal of Applied Sciences, 2018, 36(2):237-246. (in Chinese)
[11] 陕西师范大学. 基于Tangram算法和2维双尺度矩形映射的图像伪装及重构方法:中国,201410404838.7[P/OL].2014-11-12.
[12] 谢贤文,邵利平. 结合字典序和排序线性拟合的音频隐藏方法[J]. 小型微型计算机系统,2017, 38(12):2658-2667. Xie X W, Shao L P. Audio information hiding method combined with dictionary order and order linear fitting[J]. Journal of Chinese Computer Systems, 2017, 38(12):2658-2667. (in Chinese)
[13] Dinu C, Jean-Marc C. Very fast watermarking by reversible contrast mapping[J]. IEEE Signal Processing Letters, 2007, 14(4):255-258.
[14] 陕西师范大学. 一种结合块旋转和马赛克的无嵌入伪装方法:中国,201810449626.9[P/OL]. 2018-10-12.
文章导航

/