首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 281 毫秒
1.
Digital watermarking can be used as data hiding technique to interleave medical images with patient information before transmitting and storing applications. While digital image watermarking and lossy compression methods have been widely studied, much less attention has been paid to their application in medical imaging situations, due partially to speculations on loss in viewer performance caused by degradation of image information. This article describes an hybrid data hiding/compression system, adapted to medical imaging. The central contribution is to integrate blind watermarking, based on turbo trellis-coded quantization, to JP3D encoder. The latter meets conformity condition, with respect to its antecedents JPEG2000 coders. Thus, the watermark embedding can be applied on two-dimensional as well as volumetric images. Results of our method applied to magnetic resonance and computed tomography medical images have shown that our watermarking scheme is robust to JP3D compression attacks and can provide relative high data embedding rate whereas keep a relative lower distortion.  相似文献   

2.
Digital data hiding applications have been developed mainly with a view for sending secret information safely through the Internet or other computer networks. Most of the existing vector quantisation (VQ)-based data hiding methods, however, are capable of embedding only a limited quantity of secret data into the medium, usually a secret bit in every block at most. To improve the embedding capacity without seriously sacrificing qualities of carrier media, an adaptive VQ-based data hiding scheme based on a codeword clustering technique is presented. After the adaptive clustering process, the proposed scheme embeds secret data into the VQ-index table by performing codeword-order-cycle permutation. With the help of the cycle technique, more options can be offered for proper codeword substitution, which adds more flexibility to the whole data hiding scheme and therefore improves the quality of the embedded image. As the experimental results demonstrate, the proposed scheme is capable of providing better image quality and embedding capacity than the currently existing VQ-based hiding schemes. In fact, the stego-image quality is so good that it is visually indistinguishable from the VQ-compressed image  相似文献   

3.
陈立全  卢苗  胡爱群  孙晓燕 《通信学报》2013,34(12):120-130
分析了以编码信道为载体的信息隐藏算法及容量,指出现有算法存在的问题,提出了一种结合容量上限判断的基于二级定位的信息隐藏算法。所提算法在秘密信息嵌入前首先计算系统隐藏容量上限,并判断是否超出;接着在嵌入位置选择过程中引入二级定位以及循环移位机制。仿真结果表明,相比已有算法,所提算法能较好地避免因隐藏容量过大而导致秘密通道暴露的风险;同时通过二级定位及循环移位机制提高嵌入位置的随机性,避免秘密信息相互覆盖,提升信息隐藏性能。  相似文献   

4.
数字图像信息隐藏技术研究   总被引:2,自引:0,他引:2  
阐述了信息隐藏的基本概念及其与信息加密的区别,给出了用数字图像作为掩护媒体的信息隐藏算法,为了提高信息隐藏的安全性,引入了混沌序列对秘密信息进行加密的方法,实验结果表明,算法很好的实现了信息隐藏功能。  相似文献   

5.
针对密文域可逆信息隐藏在多用户场景下算法嵌入率低、载体图像容灾性能较弱等问题,该文提出一种基于多项式秘密共享的图像密文域可逆信息隐藏方案。通过将图像分割成多幅影子图像并存储在不同的用户端,可以增强图像的容灾性,为了实现额外信息在图像重构前后提取的可分离性,该方案包括两种嵌入算法:算法1在图像分割的过程中,将额外信息嵌入多项式的冗余系数中得到含有额外信息的影子图像,该算法支持在图像重构之后提取额外信息;算法2针对图像分割后的任一影子图像,利用秘密共享的加法同态特性实施嵌入,该算法支持直接从影子图像中提取额外信息。实验在不同门限方案和影子图像压缩率的条件下进行测试,当压缩率为50%时,(3, 4)门限方案的嵌入率达4.18 bpp(bit per pixel),(3, 5)门限方案的嵌入率达3.78 bpp。结果表明,两种嵌入算法分别支持从影子图像与重构图像中提取额外信息,实现了方案的可分离性;与现有方案相比,所提算法嵌入率较高、计算复杂度较低,具有较强的实用性。  相似文献   

6.
针对可逆数据隐藏中图像质量和嵌入容量之间相互矛盾的问题,提出一种中心折叠技术与最低有效位替换相结合的可逆数据隐藏方法。该方法首先对原始图像中的像素进行位平面划分,以得到2个位平面;然后利用中心折叠技术将秘密数据折叠,并将折叠后的秘密数据嵌入到原始像素的最高有效位中,以生成2个隐秘像素;最后利用最低有效位替换将秘密数据嵌入到隐秘像素的最低有效位中,以进一步提高嵌入容量。实验结果表明,利用中心折叠技术与最低有效位替换来嵌入秘密数据,嵌入容量达到了1 572 778位,有效地提高了嵌入容量;当嵌入容量相同时,与嵌入秘密数据后的相关算法相比,图像的PSNR提高了约2dB,降低了图像失真,具有更好的不可感知性。  相似文献   

7.
基于嵌入矩阵的二值图像隐藏方法   总被引:1,自引:0,他引:1  
描述了一种基于嵌入矩阵的二值图像信息隐藏方法,该方法将图像交叉分块后,计算各子块的可修改分值,根据可修改分值的大小选取子块的中心像素作为数据嵌入的位置;数据嵌入时,使用基于嵌入矩阵的信息隐藏方法,在嵌入同等数据量的同时,可有效地减少对原图像数据的修改.  相似文献   

8.
Reversible data hiding (RDH) algorithms allow data protection and exact recovery of the original cover image upon data extraction. Most of RDH algorithms attempt to embed data while maintaining high peak signal-to-noise ratio. However, it has been deemed recently that some applications may demand improving the image contrast while embedding data. Additionally, stego images with better contrast could be less attractive to attacker, given the fact they have no idea about the original cover image. In this paper, we propose a sharpening-aware RDH (SARDH) algorithm that is capable of embedding significant amount of data in addition to sharpening the image. Experimental results proved the ability of SARDH algorithm in embedding large payloads and providing sharper stego images.  相似文献   

9.
邱应强  余轮 《电子与信息学报》2015,37(12):2830-2837
为使用于无损信息隐藏的广义整数变换更具普遍意义并提高数据嵌入容量,该文在对广义整数变换进行拓展的基础上提出一种图像无损信息隐藏新方法。该方法通过对广义整数变换引入可变参数m进行拓展,可在n个像素点组成的图像块中嵌入m(n-1) bit数据,m>1时提高了数据嵌入容量,方法还采用一种新的数据嵌入策略提高了隐藏图像质量。与现有整数变换算法相比,该文算法在数据嵌入容量和隐藏图像质量上有一定的提升。该方法可用于对图像质量要求较高的军事通信、医学保健和法律论证等领域,在提取嵌入的机密信息后,原宿主图像可无失真恢复。  相似文献   

10.
In recent years, the increasing requirements in cloud storage and cloud computing have made it necessary to encrypt digital images for privacy protection. Meanwhile, many reversible data hiding (RDH) algorithms in the encrypted domain have been proposed. However, most of these algorithms are for gray-level images, and the intrinsic cross-channel correlations of color images cannot be utilized to improve the embedding capacity. In this paper, we propose a novel data hiding method for encrypted color images. In the encryption stage, the homomorphic property of encryption is achieved by basic modular addition. During the data hiding process, the cross-channel correlations between R, G and B channels are generated in encrypted domain, and data hiding is performed by the difference histogram shifting. Analysis and experiments demonstrate that the proposed method is secure and the RDH performance is superior.  相似文献   

11.
Adaptive reversible data hiding scheme based on integer transform   总被引:3,自引:0,他引:3  
In this paper, we present a new reversible data hiding algorithm based on integer transform and adaptive embedding. According to the image block type determined by the pre-estimated distortion, the parameter in integer transform is adaptively selected in different blocks. This allows embedding more data bits into smooth blocks while avoiding large distortion generated by noisy ones, and thus enables very high capacity with good image quality. For instance, by the proposed method, we can embed as high as 2.17 bits per pixel into Lena image with a reasonable PSNR of 20.71 dB. Experimental results demonstrate that the proposed method outperforms some state-of-the-art algorithms, especially for high capacity case.  相似文献   

12.
密文图像的可逆数据隐藏技术既能保证载体内容不被泄露,又能传递附加信息。本文提出了一种基于块容量标签(block capacity label, BCL)的高容量密文图像可逆数据隐藏算法。该方案在图像加密之前进行预处理,首先将图像分为两个区域:参考像素区域和预测像素区域。然后将预测像素区域分为不重叠的块,根据所提出的算法确定分块的BCL,在对图像进行加密之后嵌入BCL,生成加密图像;在秘密数据嵌入阶段,根据BCL和数据隐藏密钥嵌入秘密数据。实验测试了BOWS-2数据集,平均嵌入容量为3.806 8 bpp,与现有方法相比,该方法可以获得更高的秘密数据嵌入容量,并可以实现原始图像的完美重建。  相似文献   

13.
Reversible data hiding in encrypted images is an effective technique to embed information in encrypted domain, without knowing the original content of the image or the encryption key. In this paper, a high-capacity reversible data hiding scheme for encrypted images based on MSB (most significant bit) prediction is proposed. Since the prediction is not always accurate, it is necessary to identify the prediction error and store this information in the location map. The stream cipher is then used to encrypt the original image directly. During the data hiding phase, up to three MSBs of each available pixel in the encrypted image are substituted by the bits of the secret message. At the receiving end, the embedded data can be extracted without any errors and the original image can be perfectly reconstructed by utilizing MSB prediction. Experimental results show that the scheme can achieve higher embedding capacity than most related methods.  相似文献   

14.
A novel data hiding technique based on modified histogram shifting that incorporates multi-bit secret data hiding is proposed. The proposed technique divides the image pixel values into embeddable and nonembeddable pixel values. Embeddable pixel values are those that are within a specified limit interval surrounding the peak value of an image. The limit interval is calculated from the number of secret bits to be embedded into each embeddable pixel value. The embedded secret bits can be perfectly extracted from the stego image at the receiver side without any overhead bits. From the simulation, it is found that the proposed technique produces a better quality stego image compared to other data hiding techniques, for the same embedding rate. Since the proposed technique only embeds the secret bits in a limited number of pixel values, the change in the visual quality of the stego image is negligible when compared to other data hiding techniques.  相似文献   

15.
分区域的医学图像高容量无损信息隐藏方法   总被引:1,自引:0,他引:1  
针对医学图像的分区域典型特征,提出一种基于区域和直方图平移的高容量无损信息隐藏方法。本方法用最大类间距分割法求得原始图像的前景区域,再用聚合多边形逼近和图像拟合法得到其数据嵌入区域。在数据嵌入过程中,提出利用差值直方图循环平移和基于编码的直方图平移方法分别在前景和背景区域嵌入数据,提高了原始直方图平移方法容量和解决了溢出问题。实验结果表明该方法总的嵌入容量可达1 bit/packet以上,并且隐秘图像质量在40dB左右,适用于具有区域特征的质量敏感图像的大容量信息隐藏。  相似文献   

16.
Recently, data hiding by modifying network parameters like packet header, payload, and packet length has become popular among researchers. Different algorithms have been proposed during the last few years which have altered the network packets in different ways to embed the data bits. Some of these algorithms modify the network packet length for embedding. Although most of the packet length based embedding schemes try to imitate the normal network traffic distribution, they have altered the statistical distribution of network packet lengths during embedding. These statistical anomalies can be exploited to detect such schemes. In this paper, a second order detection scheme for packet length based steganography has been proposed. A comprehensive set of experiments have been carried out to show that the proposed detection scheme can detect network packet length based steganography with a considerably high accuracy.  相似文献   

17.
Applications on the cloud server have matured, and protecting the privacy of the content owner has attracted more attention. Privacy-Preserving Reversible data hiding (PP-RDH) is an efficient technique for embedding additional data into an encrypted image. In this paper, we propose a privacy-preserving reversible data hiding scheme using the quad-tree partition and Integer Wavelet Transform (IWT) techniques. Our scheme focuses on improving the embedding rate and quality of the recovered image when a 2 × 2-sized, block-based image encryption method is applied to ensure relative higher security. On this basis, the IWT technique transforms the encrypted image, and coefficients in three high frequency subbands are converted into 8-bit binary system. Then, the quad-tree partition technique encodes each 8 × 8-sized coefficient block, since there are many zeroes in the front bit planes. The experimental results indicated that our proposed scheme significantly improved the embedding rate, and guaranteed lossless image recovery and data extraction.  相似文献   

18.
Secret image sharing (SIS) can divide a secret image into several shadow images for protection. Information hiding in the sharing domain (IHSD) fuses SIS and information hiding (IH) to simultaneously share any secret image and hide any information, and this technique can be applied in cloud computing, law enforcement and medical diagnoses. IHSD not only marks shadow images with information to prevent malicious tampering and for convenient management, search and identification but also enhances the robustness of IH. In this paper, we first introduce a formal definition of IHSD. Then, we describe a general IHSD model and algorithms with a concrete example in detail. In IHSD, we design the random element utilization model to control the random pixels generated from SIS. Then, we obtain shadow images with hidden information to realize SIS and IH simultaneously. The inputs of SIS with secret images, steganography and extra information in algorithms are without any limitations. Theoretical analyses, experiments and comparisons are presented to prove the effectiveness and feasibility of IHSD.  相似文献   

19.
密文域可逆信息隐藏技术在医学、云服务、军事、商业等众多领域有着广泛应用,针对现有密文域信息隐藏算法的可逆性不能完全保证、嵌入率低、不能完全分离等不足,提出一种完全可逆可分离密文域信息隐藏算法,首先,给出了适合图像加密遍历矩阵所需满足的条件和构造方法,载体图像拥有者设置密钥1构造遍历矩阵,并对明文图像进行加密,然后将加密图像传送给信息嵌入者,信息嵌入者设置密钥2,以期望插值为目标,根据插值区间大小确定嵌入位数,再由差值修正因子和秘密信息共同确定最终插值,使最终插值最大限度接近期望插值,确保载密图像高质量,整个过程无附加信息、无数据溢出、且均可保证可逆性,密钥1拥有者和密钥2拥有者两种权限互不干涉,是完全可逆可分离算法,平均嵌入率可达到3 bit/pixel,通过与8种优秀算法的实验比较,表明算法在嵌入容量、可逆性、可分离性率等方面相比于对比算法均有一定优势.  相似文献   

20.
Due to privacy and security concerns, the researches of reversible data hiding in encrypted images (RDHEI) have become increasingly important. Conventional schemes vacate the spare room after image encryption (VRAE) suffer from the low embedding rate, high error rate of data extraction, and imperfect image recovery. To address these issues, we propose a separable reversible data hiding scheme for encrypted images that utilizes a novel pixel rotation technique to embed data into fully encrypted images. The block complexities of four decrypted rotation states are considered when recovering image. To realize perfect image recovery, we further devise a lossless version (LPR-RDHEI). Experimental results demonstrate that the proposed PR-RDHEI scheme achieves an embedding rate of 0.4994 bpp on average and ensures lossless data extraction. Meanwhile, the proposed LPR-RDHEI scheme still has a 0.4494 bpp embedding rate on average. The embedding rates of our two schemes are significantly improved compared with state-of-the-arts.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号