期刊文献+

基于自适应哈夫曼编码的密文可逆信息隐藏算法 被引量:19

Reversible Data Hiding in Encrypted Images Using Adaptive Huffman Encoding Strategy
下载PDF
导出
摘要 随着云存储和隐私保护的发展,密文域可逆信息隐藏作为一种可以在密文中嵌入秘密信息,保证嵌入后的信息可以无错误提取,并能无损恢复原始明文图像的技术,越来越受到人们的关注.本文提出了一种基于自适应哈夫曼编码的密文域可逆信息隐藏算法,对不同的图像采用不同的哈夫曼码字编码腾出空间来嵌入秘密信息.首先利用自然图像相邻像素间的相关性对原始明文图像进行像素值预测,从最高有效位到最低有效位,对原始像素值和预测像素值的相同比特位进行自适应的哈夫曼编码标记.然后,利用流密码对原始明文图像进行加密.最后在腾出的空间,通过位替换来自适应的嵌入秘密信息.由于哈夫曼编码和解码的可逆性,合法接收者可以对原始明文图像和秘密信息实现分离的无损恢复和提取.实验结果表明,与现有的几种方法相比,本文提出的方法具有更好的安全性和更高的嵌入率,在BOSSBase、BOWS-2和UCID三个数据集上的平均嵌入率比MPHC算法分别提高了0.09bpp、0.062 bpp和0.06bpp,在最佳情况下比MPHC算法能分别高出0.958 bpp、0.797 bpp和0.320 bpp,最差情况下的嵌入率比MPHC算法也分别高出了 0.01 bpp、0.039 bpp和0.061 bpp. With the growing demand of cloud storage for user privacy protection,RDHEI(Reversible Data Hiding in Encrypted Images),as a technology that can embed secret information in encrypted domain,has attracted more and more attention.A good RDHEI method expects to find the best balance between the number of erroneous extracted bits of the secret information,the embedding rate and the quality of the reconstructed image after data-extraction.General RDHEI methods ensure that the embedded secret information can be extracted without error and the original plaintext image can be restored losslessly,thus the embedding rate is the key index to evaluate the performance of an RDHEI method.This paper proposes an effective reversible data hiding method in encrypted images via an adaptive Huffman Encoding strategy,which utilizes diverse Huffman codewords for various images to free up space to accommodate secret information.The proposed method follows EPE-HCRDH(High-Capacity Reversible Data Hiding with Embedded Prediction Errors) method and is an improved method based on MPHC(multi-MSB Prediction and Huffman Coding) method,which provides a high-security level to protect the original image content.Firstly,by exploiting the correlation between the pixels of a natural image,each pixel can be predicted by its neighbors,so as to obtain the entire prediction image.Next,from MSB(Most Significant Bit) to LSB(Least Significant Bit),the same number of bits between each pair of original and predicted pixels is identified and stored in a label map.Then,the label map is compressed by adaptive Huffman encoding with diverse codewords for various images.Using an encryption key,the original plaintext image is encrypted with stream cipher,and the compressed label map is embedded into encrypted image.Finally,according to the extracted label map,after using a data-hiding key,multi-bit secret information can be embedded adaptively in each encrypted pixel through multi-MSB substitution.Due to the reversibility of Huffman encoding and decoding,the secret information can be extracted error-free and the original plaintext image can be restored losslessly by MSB prediction.For different keys,image-recovery and data-extraction can be performed separately.Compared with the experimental results of several state-of-the-art methods,the proposed method has better security performance and achieves higher embedding rate.The average embedding rate of the proposed method outperforms MPHC method 0.09 bpp,0.062 bpp and 0.06 bpp on three datasets BOSSBase,BOWS-2 and UCID,respectively.In addition,the texture complexity of the original plaintext image has a significant effect on the embedding rate.Generally speaking,smooth images have a satisfactory embedding rate,while texture images have a less ideal embedding rate.For both smooth images and texture images,the proposed method achieves higher embedding rate and outperforms the competitors.On the three datasets,the embedding rate of the proposed method is 0.958 bpp,0.797 bpp,0.320 bpp higher than MPHC method in the best case,and 0.01 bpp,0.039 bpp,0.061 bpp higher than MPHC method in the worst case,respectively.It is shown that the proposed method of adaptive Huffman codewords encoding has better performance than the MPHC method of predefined Huffman codewords encoding.
作者 吴友情 郭玉堂 汤进 罗斌 殷赵霞 WU You-Qing;GUO Yu-Tang;TANG Jin;LUO Bin;YIN Zhao-Xia(Anui Provincial Key Laboralory of Mullimodal Cognilire Com pulalion,School of Compuler Science and Technology,Anhui Unitversily,Tlefei 230601;School of Compuler Science and Technology,Ilefei Normal Universily,Ilefei 230601)
出处 《计算机学报》 EI CAS CSCD 北大核心 2021年第4期846-858,共13页 Chinese Journal of Computers
基金 国家重点研发计划项目(2018AAA0100400) 国家自然科学基金项目(61872003,61860206004)资助。
关键词 密文域 可逆信息隐藏 哈夫曼编码 自适应 分离 encrypted domain reversible data hiding Huffman encoding adaptively separately
  • 相关文献

参考文献3

二级参考文献34

  • 1Kamstra L, Heijmans H. Reversible data embedding into images using wavelet techniques and sorting. IEEE Transac- tions on Image Processing, 2005, 14(12): 2082-2090.
  • 2van Leest A, van Der Veen M, Bruekers F. Reversible image watermarking//Proceedings of the IEEE International Conference on Image Processing. San Francisco, USA, 2003, 3:731-734.
  • 3Feng Jen-Bang, Lin Luon-Chang, Tsai Chwei-Shyong, et al. Reversible watermarking: Current status and key issues. International Journal of Network Security, 2006, 2(3): 161-171.
  • 4Tian J. Reversible data embedding using a difference expansion. IEEE Transaction on Circuits System for Video Technology, 2003, 13(8).. 890-896.
  • 5Ni Zhi-Cheng, Shi Yun-Qing, Ansari N, Su Wei. Reversible data biding. IEEE Transactions on Circuits and Systems forVideo Technology, 2006, 16(3): 354-362.
  • 6Celik M U, Sharma G, Tekalp A M, et al. Lossless generalize& LSB data embedding. IEEE Transactions on Image Processing, 2005, 14(2): 253-266.
  • 7Wang Xiang, Li Xiao-Long, Yang Bin, Guo Zong-Ming. Efficient generalized integer transform for reversible water- marking. IEEE Signal Processing Letters, 2010, 17(6): 567-570.
  • 8Gibson J, Eveleigh D, Rondeau R, Tan Qing. Benefits and challenges of three cloud computing service models//Proceedings of the 4th International Conference on Computational Aspects of Social Networks. Sco Carlos, Brazil, 2012:198-205.
  • 9Behl A, Behl K. An analysis of cloud computing security issues//Proeeedings of the 2012 World Congress on Information and Communication Technologies. Trivandrum, India, 2012: 109-114.
  • 10Shaikh F B, Haider S. Security threats in cloud computing// Proceedings of the 6th International Conference on Internet Technology and Secured Transactions. Abu Dhabi, United Arab Emirates, 2011:214-219.

共引文献38

同被引文献91

引证文献19

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部