期刊文献+

基于完整上下文预测的可逆数据隐藏 被引量:2

Reversible Data Hiding Based on Full Context Prediction
下载PDF
导出
摘要 提出一种非线性、自适应、基于完整上下文的梯度调整预测算子FCGAP。FCGAP适用于图像可逆数据隐藏算法。在FCGAP中,目标像素的预测值等于4邻域像素值的加权平均,加权系数由与目标像素最近距离的12近邻确定。采用FCGAP,提出一种高容量低失真的可逆数据隐藏算法。实验结果表明,FCGAP能充分利用上下文信息,提高像素预测精度,基于FCGAP提出的可逆数据隐藏算法相比已有可逆数据隐藏算法具有更好的容量-失真性能。 We propose a nonlinear, adaptive, gradient-adjusted predictor based on full context (FCOAP). FCGAP is suitable for reversible image data hiding. In FCA3AP, the predicted value of target pixel is equal to the weighted average of 4 neighborhood pixels, and the weighted coefficients are computed by 12 nearest neighbor pixels. Based on FCGAP, a reversible data hiding is proposed, which can provide high data embedding capacity and low distortion. Experimental resuits demonstrate that FCGAP can more fully utilize context information, and has better prediction accuracy of pixels than other predictors;the reversible data hiding based on FCGAP has better capacity-distortion performance compared with other state-of-the-art algoritlmas.
出处 《计算机科学》 CSCD 北大核心 2013年第11A期219-223,共5页 Computer Science
基金 国家自然科学基金项目(61070090 61003270) 国家自然科学基金广东省联合基金项目(U1035004) 广东省重大科技专项基金(2010A080402005)资助
关键词 可逆数据隐藏 无损数据隐藏 可逆图像水印 预测误差扩展 完整上下文预测 Reversible data hiding, Lossless data hiding, Reversible image watermarking, Prediction error expansion, Full context prediction
  • 相关文献

参考文献16

  • 1Cox I J, Miller M L, Bloom J A, et al. Digital watermarking and steganography ( 2nd ed) I- M]. Burlington: Morgan Kauffman, 2008 : 385-395.
  • 2罗剑高,韩国强,沃焱,梁鹏.篡改定位精度可动态调整的无损图像认证算法[J].华南理工大学学报(自然科学版),2011,39(7):121-126. 被引量:7
  • 3罗剑高,韩国强,沃焱,李向阳.基于自适应图像块组合的无损图像认证算法[J].通信学报,2012,33(6):64-72. 被引量:7
  • 4Yu Y H, Chang C C. A high capacity reversible data hiding scheme for annotation [A]//Second International Symposium on Intelligent Information Technology Application [C]. Shang- hai, China, 2008 .. 940-944.
  • 5Celik M U, Sharma G, Tekalp A M, et al. Lossless generalized- ISB data embedding [J]. IEEE Transactions on Image Process- ing, 2005,14(2) .. 253-266.
  • 6Tian J. Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8) 890-896.
  • 7Alattar A M. Reversible watermark using the difference expan- sion of a generalized integer transform [J]. IEEE Transactions on Image Processing,2004,13(8) :1147-1156.
  • 8曾宪庭,李卓,平玲娣.基于块参照像素的无损信息隐藏算法[J].计算机科学,2012,39(2):47-51. 被引量:8
  • 9Thodi D M,Rodriguez J J. Expansion embedding techniques for reversible watermarking [J]. IEEE Transactions on Image Pro- cessing, 2007,16 (3) : 721-730.
  • 10Li X L, Yang B, Zeng T Y. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J]. IEEE Transaetions on Image Proeessing, 2011,20 (12): 3524-3533.

二级参考文献46

  • 1张鸿宾,杨成.基于公钥和脆弱水印的图像认证算法[J].计算机科学,2004,31(11):218-221. 被引量:8
  • 2尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 3Cox I J, Miller M L, Bloom J A, et al. Digital watermarking and steganography [ M ]. 2nd ed. Burlington: Morgan Kauff- man, 2008 : 375- 422.
  • 4Wong P W, Memon N. Secret and public key image water-marking schemes for image authentication and ownership verification [ J]. IEEE Transactions on Image Processing, 2001,10 ( 10 ) : 1593-1601.
  • 5Celik M U, Sharma G, Saber E, et al. Hierarchical water- marking for secure image authentication with localization [ J ]. IEEE Transactions on Image Processing, 2002, 11 (6) :585-595.
  • 6Fridrich J,Goljan M,Du R. Invertible authentication [ C ]// Proceedings of Security and Watermarking of Multimedia Contents Ⅲ. San Jose: SPIE ,2001 : 197-208.
  • 7Tian J. Wavelet-based reversible watermarking for authen- tication [ C ]// Proceedings of Security and Watermarking of Multimedia Contents Ⅳ. San Jose: SPIE, 2002: 679- 690.
  • 8Lee Sang-kwang, Suh Young-ho, Ho Yo-suug. Reversible image authentication based on watermarking [ C ]//Pro- ceedings of IEEE International Conference on Multimedia and Expo. Toronto : IEEE,2006 : 1521-1324.
  • 9Celik M U, Sharma G, Tekalp A M. Lossless watermarking for image authentication:a new framework and an imple- mentation [ J ]. IEEE Transactions on Image Processing, 2006,15 (4) : 1042 -1049.
  • 10Weng S W, Zhao Y, Pan J S. Reversible watermarking re- sistant to cropping attack [ J ]. IET Information Security, 2007,1(2) :91-95.

共引文献16

同被引文献28

  • 1宣国荣,姚秋明,柴佩琪,季洪飞,施云庆.基于整数小波阈值嵌入的无损数据隐藏[J].计算机应用,2006,26(12):2890-2893. 被引量:8
  • 2ASIFULLAH K, AYESHA S, SUMMUYYA M, et al. A recent survey of reversible watermarking techniques[J]. Information Sciences 2014,279: 251-272.
  • 3TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology. 2003,13(8):890-896.
  • 4THODI D M, RODRIGUEZ J J. Expansion embedding techniques for reversible watermarking[J].IEEE Transactions on Image Process- ing,2007,16(3):721-730.
  • 5VASILIY S, HYOUNG J K, JEHO N, et al. Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Cir- cuits and Systems for Video Technology, 2009,19(7):989-999.
  • 6CHEN M, CHEN ZY, ZENG X, et al. Model order selection in re- versible image watermarking[J]. IEEE Journal of Selected Topics in Signal Processing, 2010, 4(3):592-604.
  • 7LEE C F, CHEN H L, TSO H K. Embedding capacity raising in re- versible data hiding based on prediction of difference expansion[J]. Journal of Systems and Software, 2010,83(10):1864-1872.
  • 8PENG F, LI X L, YANG B. Adaptive reversible data hiding scheme based on integer transform[J]. Signal Processing, 2012, 92(1):54-62.
  • 9WANG J X, NI J Q, PAN J W. A high capacity reversible data hidingscherae based on generalized prediction-error expansion and adaptive embedding[J]. Signal Processing, 2014, 98(5): 370-380.
  • 10Miecu R&D center, ACD Demo sol, ware [EB/OL].[20158-1-11] http:// www.miecu.net/research/rdh/.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部