多媒体信息安全专刊

基于图像块分类阈值优化的改进可逆图像伪装

展开
  • 1. 上海理工大学 光电信息与计算机工程学院, 上海 200093;
    2. 广西师范大学 广西多源信息挖掘与安全重点实验室, 广西 桂林 541004

收稿日期: 2018-02-01

  网络出版日期: 2018-03-31

基金资助

国家自然科学基金(No.61702332,No.61672354);广西多源信息挖掘与安全重点实验室开放基金(No.MIMS16-03)资助

Improved Reversible Image Camouflage Method Based on Image Block Classifcation Threshold Optimization

Expand
  • 1. School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China;
    2. Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, Guilin 541004, Guangxi Province, China

Received date: 2018-02-01

  Online published: 2018-03-31

摘要

为了提高数字图像伪装中生成的伪装图像的视觉质量,提出一种基于图像块分类阈值优化的可逆图像伪装方案.根据统计特征对原始图像子块和目标图像子块进行分类,通过优化分类阈值使得生成伪装图像和目标图像的均方差最小,然后进行相应类内图像块匹配、块线性变换、块旋转和翻转校正,最终使原始图像伪装成目标图像.采用可逆信息隐藏的算法将恢复原图所需的变换参数信息嵌入伪装图像,接收方提取辅助信息,从而实现原始图像的无损恢复.实验结果表明,该算法生成的伪装图像的视觉效果比未经阈值优化的伪装图像的效果更好.

本文引用格式

刘小凯, 姚恒, 秦川 . 基于图像块分类阈值优化的改进可逆图像伪装[J]. 应用科学学报, 2018 , 36(2) : 237 -246 . DOI: 10.3969/j.issn.0255-8297.2018.02.003

Abstract

In order to improve the visual quality of stego images in digital image camouflage, a method of reversible image camouflage based on the threshold optimization of image sub-block classifcation is proposed. First, the sub-blocks of the original image and the cover image are classifed, respectively, according to their statistical characteristics. The threshold for classifcation is optimized through minimizing the mean square error of the camouflage image and cover image. Then, after the processes of the image sub-block matching, image sub-block linear transformation, sub-block rotation and horizontal flipping, a stego image which is visually similar to the cover image is generated. The transformation parameter information used for restoring the original image is eventually embedded into the stego image in a reversible manner to generate the fnal camouflage image. Therefore, the receiver side can extract the auxiliary information to realize the lossless recovery of the original image. The experimental results show that the visual quality of the camouflage image generated by the proposed method is better than that of the image without classifcation threshold optimization.

参考文献

[1] Rivest R. The RC4 encryption algorithm[J]. RSA Data Security Inc, 1992, 20(1):86-96.
[2] Paillier P. Public-key cryptosystems based on composite degree residuosity classes[C]//International Conference on Theory and Application of Cryptographic Techniques. Springer-Verlag, 1999:223-238.
[3] 丁玮,闫伟齐,齐东旭. 基于Arnold变换的数字图像置乱技术[J]. 计算机辅助设计与图形学学报,2001, 13(4):338-341. Ding W, Yan W Q, Qi D X. Digital image scrambling technology based on Arnold transformation[J]. Journal of Computer Aided Design & Computer Graphics, 2001, 13(4):338-341. (in Chinese)
[4] 向德生,熊岳山. 基于约瑟夫遍历的数字图像置乱算法[J]. 计算机工程与应用,2005, 41(10):44-46. Xiang D S, Xiong Y S. Digital image scrambling based on Josephus traversing[J]. Computer Engineering and Applications, 2005, 41(10):44-46. (in Chinese)
[5] 张贵仓,王让定,章毓晋. 基于迭代混合的数字图像隐藏技术[J]. 计算机学报,2003, 26(5):569-574. Zhang G C, Wang R D, Zhang Y J. Digital image information hiding technology based on iterative blending[J]. Chinese Journal of Computers, 2003, 26(5):569-574. (in Chinese)
[6] 丁玮. 数字图像信息安全的算法研究[D]. 北京:中国科学院计算技术研究所,2000.
[7] 吴军,吴秋新. 一种基于七巧板游戏的数字图像信息伪装方法[J]. 计算机应用,2004, 24(6):125-128. Wu J, Wu Q X. A steganography method of digital image information based on tangram[J]. Computer Applications, 2004, 24(6):125-128. (in Chinese)
[8] Lai I J, Tsai W H. Secret-fragment-visible mosaic image-a new computer art and its application to information hiding[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(3):936-945.
[9] Lee Y L, Tsai W H. A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2014, 24(4):695-703.
[10] Reinhard E, Ashikhmin M, Gooch B, Shirley P. Color transfer between images[J]. IEEE Computer Graphics & Applications, 2001, 21(5):34-41.
[11] Zhang W M, Wang H, Hou D D, Yu N H. Reversible data hiding in encrypted images by reversible image transformation[J]. IEEE Transactions on Multimedia, 2016, 18(8):1469-1479.
[12] Hou D D, Zhang W M, Yu N H. Image camouflage by reversible image transformation[J]. Journal of Visual Communication and Image Representation, 2016, 40:225-236.
[13] Sachnev V, Kim H J, Nam J, Suresh S, Shi Y Q. Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2009, 19(7):989-999.
[14] BossBase image database,[DB]. http://agents.fel.cvut.cz/stegodata/RAWs/

文章导航

/