多媒体信息安全专刊

JPEG图像同步嵌入与加扰方案

展开
  • 1. 安徽大学 电子信息工程学院, 合肥 230601;
    2. 安徽大学 计算机科学与技术学院, 合肥 230601

收稿日期: 2018-01-31

  网络出版日期: 2018-03-31

基金资助

国家自然科学基金(No.61502009);安徽大学科研训练计划基金资助

Synchronized Data Embedding and Scrambling Scheme in JPEG Images

Expand
  • 1. School of Electronics and Information Engineering, Anhui University, Hefei 230601, China;
    2. School of Computer Science and Technology, Anhui University, Hefei 230601, China

Received date: 2018-01-31

  Online published: 2018-03-31

摘要

提出了一种JPEG图像的同步嵌入与加扰方案.首先对DC系数使用棋盘预测法进行预测,根据预测误差值将DC系数分为没有进行预测(NP)、进行预测但没有嵌入数据(PN)、进行预测且嵌入数据(PE)3类,再利用秘密数据替代PE部分系数值完成DC系数的嵌入加扰,最后对符合条件的AC系数的游程编码(run length coding,RLC)序列进行旋转,完成RLC序列的嵌入加扰.实验结果证实,该方案能保证高嵌入容量和低文件膨胀度,而且重构图像的SSIM值均大于0.996,PSNR值均大于50,在一定条件下能完全重构原始图像.

关键词: 加扰; 可逆; JPEG; 数据嵌入; 预测

本文引用格式

戴禹, 殷赵霞 . JPEG图像同步嵌入与加扰方案[J]. 应用科学学报, 2018 , 36(2) : 255 -266 . DOI: 10.3969/j.issn.0255-8297.2018.02.005

Abstract

A synchronized data embedding-scrambling scheme in JPEG images is proposed in this paper. First, Checkerboard prediction method is used to predict the DC coefcient. According to the prediction error, the DC coefcient values are classifed into three categories:not-predicted (NP), predicted but not embedded (PN), and predictedand-embedded (PE). Then, the PE is vacated to embed information while scrambling the DC coefcients. Finally, the eligible RLC (run length coding) pairs of AC coefcients are rotated to embed information. Experimental results confrmed that the method ensures the high payload and the low fle expansion. The SSIM value of the reconstructed image is more than 0.996. The PSNR value of the reconstructed image is more than 50. And the original image can be reconstructed completely under certain conditions.

参考文献

[1] 张新鹏,殷赵霞. 多媒体信息隐藏技术[J]. 自然杂志,2017,39(2):87-95. Zhang X P, Yin Z X, Data hiding in multimedia[J]. Chinese Journal of Nature, 2017, 39(2):87-95. (in Chinese)
[2] Zhang X P. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(2):826-832.
[3] Qian Z X, Zhang X P, Wang S Z. Reversible data hiding in encrypted JPEG bitstream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491.
[4] Luo B, Li X L, Zhang W M. PVO-based reversible data hiding for encrypted images[C]//IEEE China Summit and International Conference on Signal and Information Processing. IEEE,2015:831-835.
[5] Zhang X P, Long J, Wang Z C, Cheng H. Lossless and reversible data hiding in encrypted images with public-key cryptography[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2016, 26(9):1622-1631.
[6] Qian Z X, Zhang X P. Reversible data hiding in encrypted images with distributed source encoding[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2016, 26(4):636-646.
[7] Qian Z X, Zhou H, Zhang X P, Zhang W M. Separable reversible data hiding in encrypted JPEG bitstreams[J]. IEEE Transactions on Dependable & Secure Computing, 2016(99):1-13.
[8] Yin Z X, Abel A, Tang J, Zhang X P, Luo B. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modifcation[J]. Multimedia Tools & Applications, 2017, 76(3):1-22.
[9] Yin Z X, Chang C C, Xu Q, Luo B. Second-order steganographic method based on adaptive reference matrix[J]. Image Processing Iet, 2014, 9(4):300-305.
[10] Long J, Yin Z X, Lv J P, Zhang X P. Rotation based reversible data hiding for JPEG images[J]. Iete Technical Review, 2016, 33(6):1-8.
[11] Ong S Y, Wong K S, Tanaka K. A scalable reversible data embedding method with progressive quality degradation functionality[J]. Signal Processing Image Communication, 2014, 29(1):135-149
[12] Karim M S A, Wong K. Universal data embedding in encrypted domain[M]. Elsevier NorthHolland, Inc. 2014, 94(1):174-182
[13] Rad R M, Wong K, Guo J M. A unifed data embedding and scrambling method[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2014, 23(4):1463-1475.
[14] Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 2004, 13(4):600-612.
[15] Ma K D, Zhang W M, Zhao X F, Yu N H, Li F H. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(3):553-562.
[16] Kundur D, Karthik K. Video fngerprinting and encryption principles for digital rights management[J]. Proceedings of the IEEE, 2004, 92(6):918-932.
[17] Ong S Y, Wong K S, Tanaka K. Scrambling-embedding for JPEG compressed image[J]. Signal Processing, 2015, 109:38-53.

文章导航

/