Special Issue: Information Security of Multimedia

Improved Generation Camouflage Method Combined with Block Rotation and Photo Mosaic

Expand
  • School of Computer Science, Shaanxi Normal University, Xi'an 710119, China

Received date: 2019-07-26

  Revised date: 2019-07-30

  Online published: 2019-10-18

Abstract

The conventional generation camouflage method combined with block rotation and photo mosaic expresses secret information by placing the circular images related to secret information in the embedding position, thus leading to a poor visual quality of resulted mosaic image and the leakage of hidden secret information. To address this, an improved generation camouflage method combined with block rotation and photo mosaic is proposed in this paper. In the method, firstly several grayscale images are converted into circular images and arranged as encoded images according to the ascending order of pixel mean value, and the cover image is directly transformed into the multiple halftone image by error diffusion. Secondly, the hidden positions of secret information are determined by random coordinate sequences, and the secret information was encrypted and mapped by generating random encryption mapping matrix. Finally, the coded images with the corresponding pixel values are selected by traversing the cover image. For the hidden and unhidden positions, the encoded images are rotated by a determined angle relative to secret information and a random angle respectively to generate a photo mosaic image. In order to improve the accuracy of secret information authentication, secret information is authenticated by the user key combined with centroid rotation matching strategy and interval authentication strategy. Experiments show that the proposed method directly uses the rotation angle of the encoded circular image to express secret information and it always selects the encoded circular image corresponding to the pixel value in the cover image to express secret information, so it neither brings any deviation nor causes any visual quality degradation. The proposed method performs strong anti-attack robustness and high security due to the entire key-dependency in extraction process.

Cite this article

ZHAO Yunying, SHAO Liping, WANG Yang, LU Hai . Improved Generation Camouflage Method Combined with Block Rotation and Photo Mosaic[J]. Journal of Applied Sciences, 2019 , 37(5) : 673 -690 . DOI: 10.3969/j.issn.0255-8297.2019.05.009

References

[1] Zhou Z L, Sun H Y, Harit R, et al. Coverless image steganography without embedding[C]//International Conference on Cloud Computing and Security. Springer, 2015:123-132.
[2] Yuan C S, Xia Z H, Sun X M. Coverless image steganography based on SIFT and BOF[J]. Journal of Internet Technology, 2017, 18(2):435-442.
[3] Zhou Z L, Wu J Q. M, Yang C N, et al. Coverless image steganography using histograms of oriented gradients-based hashing algorithm[J]. Journal of Internet Technology, 2017, 18(5):1177-1184.
[4] Xu J, Mao X, Jin X, et al. Hidden message in a deformation-based texture[J]. Visual Computer International Journal of Computer Graphics, 2015, 31(12):1653-1669.
[5] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2015, 24(1):130-139.
[6] Qin Z C, Li M, Wu B. Robust steganography via patch-based texture synthesis[C]//International Conference on Internet Multimedia Computing and Service. Springer, 2017:429-439.
[7] Lin W L, Tsai W H. Data hiding in image mosaics by visible boundary regions and its copyright protection application against print-and-scan attacks[C]//International Computer symposium, 2004:449-454.
[8] Lee Y L, Tsai W H. A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(4):695-703.
[9] Hou D, Zhang W, Yu N. Image camouflage by reversible image transformation[J]. Journal of Visual Communication and Image Representation, 2016, 40:225-236.
[10] 刘小凯,姚恒,秦川. 基于图像块分类阈值优化的改进可逆图像伪装[J]. 应用科学学报, 2018, 36(2):237-246. Liu X K, Yao H, Qin C. Improved reversible image camouflage method based on image block classification threshold optimization[J]. Journal of Applied Sciences, 2018, 36(2):237-246. (in Chinese)
[11] 陕西师范大学. 基于Tangram算法和2维双尺度矩形映射的图像伪装及重构方法:中国,201410404838.7[P/OL].2014-11-12.
[12] 谢贤文,邵利平. 结合字典序和排序线性拟合的音频隐藏方法[J]. 小型微型计算机系统,2017, 38(12):2658-2667. Xie X W, Shao L P. Audio information hiding method combined with dictionary order and order linear fitting[J]. Journal of Chinese Computer Systems, 2017, 38(12):2658-2667. (in Chinese)
[13] Dinu C, Jean-Marc C. Very fast watermarking by reversible contrast mapping[J]. IEEE Signal Processing Letters, 2007, 14(4):255-258.
[14] 陕西师范大学. 一种结合块旋转和马赛克的无嵌入伪装方法:中国,201810449626.9[P/OL]. 2018-10-12.
Outlines

/