多媒体信息安全专刊

基于曲面插值的加密图像可逆信息隐藏算法

展开
  • 1. 广西师范大学 网络信息中心, 广西 桂林 541004;
    2. 广西师范大学 广西多源信息挖掘与安全重点实验室, 广西 桂林 541004;
    3. 桂林电子科技大学 广西高校云计算与复杂系统重点实验室, 广西 桂林 541004;
    4. 桂林师范高等专科学校 网络与教育技术中心, 广西 桂林 541000

收稿日期: 2018-02-01

  网络出版日期: 2018-03-31

基金资助

国家自然科学基金(No.61762017,No.61363034,No.61562007,No.81701780);广西自然科学基金(No.2015GXNSFDA139040,No.2017GXNSFBA198221,No.2017GXNSFAA198222);教育部“春晖计划”合作科研项目基金(No.Z2015149);广西信息科学实验中心项目基金(No.20130204);广西教育厅高校科研项目基金(No.LX2014056,No.LX2014115,No.KY2015LX006);广西区域多源信息集成与智能处理协同创新中心项目基金;广西高校云计算与复杂系统重点实验室项目基金(No.15202);广西师范大学校级项目青年课题基金:基于预测技术的可逆信息隐藏研究;广西师范大学校级项目青年课题基金(No.2016QN007)资助

Reversible Information Hiding Method in Encrypted Image Based on Surface Interpolation

Expand
  • 1. Network Information Center, Guangxi Normal University, Guilin 541004, Guangxi Province, China;
    2. Guangxi Key Lab of Multi-source Information Mining of Security, Guangxi Normal University, Guilin 541004, Guangxi Province, China;
    3. Guangxi Colleges and Universities Key Laboratory of Cloud and Complex Systems, Guilin University of Electronic Technology, Guilin 541004, Guangxi Province, China;
    4. Network and Educational Technology Center, Guilin Normal College, Guilin 541004, Guangxi Province, China

Received date: 2018-02-01

  Online published: 2018-03-31

摘要

提出一种基于曲面插值的加密图像可逆信息隐藏算法.对原始图像进行加密,利用随机函数确定加密图像中的载体像素,根据载体像素取反位的不同采取不同的隐藏方法.对载密图像进行解密以确定载体像素,在载体像素5×5邻域中选取与载体像素距离最近的6个非载体像素,采用曲面插值的方法计算载体像素的预测值,应用该预测值提取秘密信息并恢复载体像素.实验结果表明,该算法提取秘密信息的错误率较低,恢复图像的视觉效果较好.

本文引用格式

陈艳, 俞春强, 侯晓杰, 张显全, 唐振军, 何南 . 基于曲面插值的加密图像可逆信息隐藏算法[J]. 应用科学学报, 2018 , 36(2) : 220 -236 . DOI: 10.3969/j.issn.0255-8297.2018.02.002

Abstract

This paper proposes a reversible information hiding method for encrypted images by means of surface interpolation. An original image is encrypted frstly, then a random function is used for obtaining the cover pixels in the encrypted image. Different hiding methods are adopted in accordance with the different inverted bits in the cover pixels. The stego-image is decrypted and the cover pixels are obtained. In the 5×5 neighborhood of a cover pixel, six non-cover pixels which are closet to the cover pixel are selected. Then surface interpolation is applied to calculate the predicted value of the cover pixel. The predicted value is used for extracting secret data and recovering the original pixel. The experimental results indicate that this method performs with a lower error rate in secret data extraction and a higher visual quality in image recovery.

参考文献

[1] Zhang X P, Wang S Z. Efcient steganographic embedding by exploiting modifcation direction[J]. IEEE Communications Letters, 2006, 10(11):781-783
[2] Zhang X Q, Sun Z R, Tang Z J, Yu C J, Wang X Y. High capacity data hiding based on interpolated image[J]. Multimedia Tools and Applications, 2017, 76(7):9195-9218
[3] Zhang X Q, Tang Z J, Liang T, Zhang S C, Zhu Y J, Sun Y H. Data hiding method based on local image features[J]. Lecture Notes in Computer Science, 2012, 7669:247-256
[4] Qin C, Ji P, Zhang X P, Dong J, Wang J W. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy[J]. Signal Processing, 2017, 138:280-293
[5] Fridrich J, Goljan M, Du R. Lossless data embedding:new paradigm in digital watermarking[J]. Eurasip Journal on Advances in Signal Processing, 2002(2):185-196.
[6] Celik M U, Sharma G, Tekalp A M, Saber E. Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2):253-266.
[7] Tian J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8):831-841.
[8] Alattar A M. Reversible watermark using the difference expansion of a generalized integer transform[J]. IEEE Transactions on Image Processing, 2004, 13(8):1147-1156.
[9] Ni Z C, Shi Y Q, Ansari N, Su W. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3):354-362.
[10] Weng S W, Pan J S, Li L D. Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding[J]. Information Sciences, 2016, 369(10):114-159
[11] Qin C, Chang C C, Liao L T. An adaptive prediction-error expansion oriented reversible information hiding scheme[J]. Pattern Recognition Letters, 2012, 33(16):2166-2172
[12] Zhang X Q, Yu C Q, Wang X Y, Ding F, Tang Z J. A reversible data hiding scheme for JPEG images[J]. ICIC Express Letters, 2013, 7(9):2575-2580.
[13] Zhang X P. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[14] Wien H, Chen T H, Wu H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202.
[15] Liao X, Shu C W. Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J]. Journal of Visual Communication and Image Representation, 2015, 28:21-27.
[16] Zhang X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832.
[17] Ma K D, Zhang W M, Zhao X F, Yu N H, Li F H. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562.
[18] Qian Z X, Zhang X P. Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4):636-646.
[19] Wu X T, Sun W. High-capacity reversible data hiding in encrypted images by prediction error[J]. Signal Processing, 2014, 104(4):387-400.
[20] Chen Y C, Shiu C W, Horng G. Encrypted signal-based reversible data hiding with public key cryptosystem[J]. Journal of Visual Communication and Image Representation, 2014, 25:1164-1170.
[21] 项世军,罗欣荣. 同态公钥加密系统的图像可逆信息隐藏算法[J]. 软件学报,2016, 27(6):1592-1601. Xiang S J, Luo X R. Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J]. Journal of Software, 2016, 27(6):1592-1601. (in Chinese)
[22] Nguyen T S, Chang C C, Chang W C. High capacity reversible data hiding scheme for encrypted images[J]. Signal Processing:Image Communication, 2016, 44(3):84-91.

文章导航

/