期刊文献+

基于无损压缩的加密图像可逆信息隐藏 被引量:5

Reversible data hiding in encrypted images based on lossless compression
下载PDF
导出
摘要 针对现有方法存在的隐藏容量低、操作不灵活的缺陷,文章提出了一种基于无损压缩的加密图像可逆信息隐藏算法。图像拥有者对原始图像进行替换加密;秘密信息隐藏者将加密图像随机划分为若干个大小相等且互不重叠的块,并且在每个加密块中采用无损压缩技术获得空余空间来隐藏秘密信息;接收者采用提取密钥进行秘密信息提取后,再结合解密密钥能够正确恢复出原始图像。实验仿真结果表明,与现有方法相比,所提出的算法在峰值信噪比和信息隐藏率上都具有很好的效能。 Aiming at the defects of existing algorithms in the embedding capacity and the operation of receiver, an algorithm of reversible data hiding in encrypted images based on lossless compression is proposed. Firstly, the substitution encryption technology is used to encrypt the original image. Secondly, the data hider randomly divides the encrypted image into several equal and non-overlapping blocks, then the ones are compressed with a lossless manner to create a sparse space to embed secret data. Finally, the receiver can obtain secret data and original image by using the data-hiding key and decryption key. The experimental results show that compared with the previous methods, the proposed method achieves excellent efficiency in peak signal-to-noise ratio(PSNR) and embedding rate.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第1期50-55,共6页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(61272540) 安徽省自然科学基金资助项目(1508085MF115)
关键词 加密图像 可逆信息隐藏 替换加密 无损压缩 峰值信噪比 隐藏率 encrypted image reversible data hiding substitution encryption lossless compression peak signal-to-noise ratio(PSNR) embedding rate
  • 相关文献

参考文献11

  • 1张小华 刘芳 焦李成.一种基于混沌序列的图象加密技术.中国图象图形学报,2003,8(4):374-378.
  • 2Thodi D M,Rodriguez J J.Expansion embedding techniques for reversible watermarking[J].IEEE Trans on Image Pro- cessing,2007,16(3):721-730.
  • 3Kim H J,Sachnev V,Shi Y Q,et al.A novel difference ex- pansion transform for reversible data embedding[J].IEEE Transactions on Information Forensics and Security,2008,3(3):456-465.
  • 4郑淑丽,王美玲,邢慧芬,胡东辉.一种基于位平面的差值扩展可逆水印算法[J].合肥工业大学学报(自然科学版),2012,35(10):1345-1348. 被引量:4
  • 5邓小鸿,陈志刚,毛伊敏.基于无损水印的医学图像篡改检测和高质量恢复[J].中国图象图形学报,2014,19(4):583-591. 被引量:17
  • 6Puech W,Chaumont M,Strauss 0.A reversible data hiding method for encrypted images[C]//Proc SPIE 6819,Securi- ty,Forensics,Steganography,and Watermarking of Multi- media Contents X,2008:68191E.doi:10.1117/12.766754.
  • 7Zhang X P.Reversible data hiding in encrypted images[J].IEEE Signal Processing Letters,2011,18(4):255-258.
  • 8Hong W,Chen T S,Wu H.An improved reversible data hiding in encrypted images using side match[J].IEEE Sig- nal Processing Letters,2012,19(4):199-202.
  • 9Zhang X P.Separable reversible data hiding in encrypted image[J].IEEE Transactions on Information Forensics and Security,2012,7(2):826-832.
  • 10Ma K D,Zhang W M,Zhao X F.Reversible data hiding in encrypted images by reserving room before encryption[J].IEEE Transactions on Information Forensics Security,2013,8(3):553-562.

二级参考文献20

  • 1Barton J M. Method and apparatus for embedding authenti- cation information within digital data: US, 5646997 [P]. 1997-07-08.
  • 2Tian J. Reversible watermarking by difference expansion [C]//Proe Workshop on Multimediaand Security, 2002: 19-22.
  • 3Alattar A M. Reversible watermark using the difference ex- pansion of a generalized integer transform[J]. IEEE Trans- actions on Image Processing,2004,13(8):1147-1156.
  • 4Kamstra L, Henk J A, Heijmans M. Reversible data em- bedding into images using wavelet techniques and sorting [J]. IEEE Transactions on Image Processing, 2005,14(12) : 2082- 2090.
  • 5Thodi D M, Rodriguez J J. Expansion embedding tech- niques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007,16(3):721-730.
  • 6Deng X H, Chen Z G, Deng X H, et al. A novel dual-layer re- versible watermarking for medical image authentication and EPR hiding [ J ]. Advanced Science Letters, 2011,4 ( 11 ): 3678- 3684.
  • 7Li C T, Li Y. Medical images authentication through repetitive in- dex modulation based watermarking [ J 1. International Journal of Digital Crime and Forensics,2009,1 (4) :32-39.
  • 8Peng F,Lei Y Z,Long M,et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion [ J ]. Computer-Aided Design ,2011,43 (8): 1018-1024.
  • 9Tian L H, Zheng N N, Xue J R, et al. An inte~'ated visual sali- ency-based watermarking approach for synchronous image authen- tication and copyright protection [ J ]. Signal Processing: Image Communication ,2011,26 ( 8 ) :427-437.
  • 10Chiang K H,Chien K C C, Chang R F, et al. Tamper detection and restoring system for medical images using wavelet-based re- versible data embedding [ J ]. Journal of Digital Imaging, 2008, 21 ( 1 ) : 77-90.

共引文献34

同被引文献54

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部