期刊文献+

基于图像块相关性分类的加密域可逆数据隐藏 被引量:3

Reversible Data Hiding in Encrypted Domain Based on Correlation Classification of Image Blocks
原文传递
导出
摘要 考虑到不同图像块中像素的重要位(高位)具有不同的相关性,本文提出了一种基于图像块高位相关性分类的加密域可逆数据隐藏算法.在数据嵌入前,对各图像块的高位进行相关性划分,然后根据相关性强弱对加密图像的相应像素执行不同程度的低位(不重要位)取反,以达到减小嵌入失真和提高数据提取正确率的目的.同现有的两个主要方法相比,大量的实验结果表明该算法在保证解密后图像具有相同峰值信噪比的情况下,能有效减小数据提取和图像恢复的错误率. This paper proposes a new reversible data hiding in encrypted domain by considering the correlation of MSBs(most significant bits)of image blocks.For an information bit embedding in a block,its MSBs' correlation is computed for deciding the number of LSBs(Least Significant Bits)to be flipped.In such a way,data recovery rate can be improved for the same embedding distortion by comparing the two existing states of the art works.Experiment results have proven the validity of the proposed method.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2013年第5期486-490,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(61272414 61272415)资助项目 广州市科技计划应用基础研究专项(2012J4100108) 暨南大学优秀硕士研究生科研创新计划 暨南大学优秀本科推免生科研创新培育计划资助项目
关键词 加密域 可逆数据隐藏 重要位 相关性 encrypted domain reversible data hiding most significant bits correlation
  • 相关文献

参考文献11

  • 1Tian J. Reversible data embedding using a difference expansion[J]. IEEE Trans Circuits Syst Video Tech- nol, 2003, 13(8) :890-896.
  • 2Celik M U, Sharma G, Tekalp A M, et al . Lossless generalized-LSB data embedding[J]. IEEE Trans Im- age Process, 2005, 14(2) :253-266.
  • 3Ni Z, Shi Y Q, Ansari N, et al. Reversible data hid- ding[J]. IEEE Trans Circuits Syst Video Technol, 2006, 16(8) :354-362.
  • 4Luo L, Chen Z, Chen M, et al. Reversible image wa- termarking using interpolation technique [J]. IEEE Trans Inf Forensics Secur, 2010, 5(1) :187-193.
  • 5Hong W, Chen T S, Chang Y P, etal. A high capaci- ty reversible data hiding scheme using orthogonal pro- jection and prediction error modification EJ]. Signal Process, 2010, 90:2911-2922.
  • 6Chang C C, Lin C C, Chen Y H. Reversible data em- bedding schemeusing differences between originaland- predicted pixelvalues[J]. Inform Secur, 2008, 2 (2): 35-46.
  • 7Kundur D, Karthik K. Video fingerprinting and en- cryption principles for digital rights management[J]. Proc IEEE, 2004, 92:918-932.
  • 8Lian S, Liu Z, Ren Z, et al. Commutative encryption and watermarking invideo compression [ J ]. IEEE Trans Circuits Syst Video Technol , 2007, 17(6) : 774- 778.
  • 9Cancellaro M, Battisti F, Carli M, et al. A commuta- tive digital image watermarking and encryption method in the tree structured haar transform domain[J]. Sig- nal Process : Image Commun, 2011, 26(1) :1-12.
  • 10Zhang X. Reversible data hiding in encrypted image [J]. IEEE Signal Process Lett, 2011, 18(4):255- 258.

同被引文献7

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部