信号与信息处理

参数化二叉树编码实现加密图像可逆数据隐藏

展开
  • 1. 华侨大学 信息科学与工程学院, 福建 厦门 361021;
    2. 复旦大学 计算机科学技术学院, 上海 200433

收稿日期: 2020-12-17

  网络出版日期: 2022-05-25

基金资助

国家自然科学基金(No.61871434,No.61972168)资助

Reversible Data Hiding in Encrypted Image Using Parametric Binary Tree Labeling

Expand
  • 1. College of Information Science and Engineering, Huaqiao University, Xiamen 361021, Fujian, China;
    2. School of Computer Science, Fudan University, Shanghai 200433, China

Received date: 2020-12-17

  Online published: 2022-05-25

摘要

为了提高数据嵌入容量,提出了一种基于参数化二叉树编码的加密图像可逆数据隐藏新方法。该方法的系统由图像所有者、数据嵌入者和授权接收者三方组成,其中,图像所有者采用特殊的图像块随机调制和置乱对原始图像加密并上传;由于加密操作很好地保留了图像块的像素相关性,数据嵌入者可在加密域充分利用图像块相关性,通过自适应选择参考像素来预测同一图像块的其余像素得到预测差值,再使用参数化二叉树编码进行无损压缩生成嵌入空间,实现大容量数据嵌入;授权接收者可正确提取嵌入数据或无失真恢复原图像。仿真实验结果表明:所提方法提高了嵌入容量,且可用于医学、云服务、军事等众多领域。

本文引用格式

邱应强, 陈馨, 杨玉燕, 曾焕强, 钱振兴 . 参数化二叉树编码实现加密图像可逆数据隐藏[J]. 应用科学学报, 2022 , 40(3) : 457 -469 . DOI: 10.3969/j.issn.0255-8297.2022.03.009

Abstract

To achieve high embedding capacity, an improved reversible data hiding method based on parametric binary tree labeling is proposed for encrypted images. The proposed method includes the following three independent stages:image owner, data hider and authorized receivers. In the first stage, image owner encrypts the original image in a special way of modulating randomly and scrambling image blocks but reserving the pixels' correlation within image blocks. After the encrypted image is uploaded onto cloud servers, data hider first chooses a reference pixel of each image block by adoptive way, and predicts the rest pixels according to the correlation information. Then the data hider can embed large amounts of additional data into the encrypted image by using parametric binary tree labeling in the second stage. In the last stage, authorized receivers can extract the embedded data, or recover the original image losslessly. Experimental results show that the improved method can not only achieve high embedding capacity, but also be applicable in medical, cloud services, military and other fields.

参考文献

[1] Khan A, Siddiqa A, Munib S, et al. A recent survey of reversible watermarking techniques[J]. Information Sciences, 2014, 279:251-272.
[2] Shi Y Q, Li X L, Zhang X P, et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016, 4:3210-3237.
[3] Tian J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits Systems and Video Technology, 2003, 13(8):890-896.
[4] Qiu Y Q, Qian Z X, Yu L. Adaptive reversible data hiding by extending the generalized integer transformation[J]. IEEE Signal Processing Letters, 2016, 23(1):130-134.
[5] Ni Z C, Shi Y Q, Ansari N, et al. Reversible data hiding[J]. IEEE Transactions on Circuits Systems and Video Technology, 2006, 16(3):354-362.
[6] Qin J Q, Huang F J. Reversible data hiding based on multiple two-dimensional histograms modification[J]. IEEE Signal Processing Letters, 2019, 26(6):843-847.
[7] Zhang W M, Hu X C, Li X L, et al. Optimal transition probability of reversible data hiding for general distortion metrics and its applications[J]. IEEE Transactions on Image Processing, 2015, 24(1):294-304.
[8] Ma K D, Zhang W M, Zhao X F, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562.
[9] Cao X C, Du L, Wei X X, et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation[J]. IEEE Transactions on Cybernetics, 2016, 46(5):1132-1143.
[10] Qiu Y Q, Qian Z X, Zeng H Q, et al. Reversible data hiding in encrypted images using adaptive reversible integer transformation[J]. Signal Processing, 2020, 167:1-10.
[11] Puteaux P, Puech W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7):1670-1681.
[12] Yin Z X, Xiang Y Z, Zhang X P. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Transactions on Multimedia, 2020, 22(4):874-884.
[13] Zhang X P, Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[14] Zhang X P, Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):526-532.
[15] Zhou J T, Sun W W, Dong L, et al. Secure reversible image data hiding over encrypted domain via key modulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(3):441-452.
[16] Yi S, Zhou Y C. Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019, 21(1):51-64.
[17] Wu Y Q, Xiang Y Z, Guo Y T, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020, 22(8):1929-1938.
文章导航

/