Journal of Applied Sciences ›› 2019, Vol. 37 ›› Issue (5): 673-690.doi: 10.3969/j.issn.0255-8297.2019.05.009

• Special Issue: Information Security of Multimedia • Previous Articles     Next Articles

Improved Generation Camouflage Method Combined with Block Rotation and Photo Mosaic

ZHAO Yunying, SHAO Liping, WANG Yang, LU Hai   

  1. School of Computer Science, Shaanxi Normal University, Xi'an 710119, China
  • Received:2019-07-26 Revised:2019-07-30 Online:2019-09-30 Published:2019-10-18

Abstract: The conventional generation camouflage method combined with block rotation and photo mosaic expresses secret information by placing the circular images related to secret information in the embedding position, thus leading to a poor visual quality of resulted mosaic image and the leakage of hidden secret information. To address this, an improved generation camouflage method combined with block rotation and photo mosaic is proposed in this paper. In the method, firstly several grayscale images are converted into circular images and arranged as encoded images according to the ascending order of pixel mean value, and the cover image is directly transformed into the multiple halftone image by error diffusion. Secondly, the hidden positions of secret information are determined by random coordinate sequences, and the secret information was encrypted and mapped by generating random encryption mapping matrix. Finally, the coded images with the corresponding pixel values are selected by traversing the cover image. For the hidden and unhidden positions, the encoded images are rotated by a determined angle relative to secret information and a random angle respectively to generate a photo mosaic image. In order to improve the accuracy of secret information authentication, secret information is authenticated by the user key combined with centroid rotation matching strategy and interval authentication strategy. Experiments show that the proposed method directly uses the rotation angle of the encoded circular image to express secret information and it always selects the encoded circular image corresponding to the pixel value in the cover image to express secret information, so it neither brings any deviation nor causes any visual quality degradation. The proposed method performs strong anti-attack robustness and high security due to the entire key-dependency in extraction process.

Key words: photo mosaic, error diffusion, encryption mapping, interval extension, generating information hiding

CLC Number: