首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
《成像科学杂志》2013,61(2):109-117
Abstract

Image hiding involves the concealment of an embedded secret image within a cover image to form a stego-image. The secret image can be used for transmission across the public networks without its presence being detected. Image hiding thus serves as a way of secure message communication; therefore, except for the platitudinous issues of image quality and hiding capacity, it is necessary to pay more attention to the means to assure the origin and integrity of the delivered content. In this paper, a digital signature scheme is skillfully applied so as to guarantee the integrity and the origin of the transmitted message and a behind-the-scenes guide to recover the hidden secret. Our idea launches realistic feints and ambushes to enhance the effect of camouflage.  相似文献   

2.
Abstract

An image watermarking model based on visual secret sharing (VSS) is proposed for protection of ownership. In the embedding phase, the watermark is first divided by VSS into two parts: a hiding watermark and a secret watermark. Then only the hiding watermark is embedded into the original image and the secret watermark is reserved for watermark extracting by the owner. In the extracting phase, the hiding watermark is extracted from the watermarked image first and then directly superimposed on the secret watermark to recover the watermark information.  相似文献   

3.
《成像科学杂志》2013,61(7):398-407
Abstract

Dual image based reversible data hidings are recently proposed where dual copies of a cover image are used to embed the secret data. In this paper, a novel reversible data hiding method based on neighbouring pixel value differencing is proposed to increase embedding capacity with a good image quality. The mean value of neighbouring pixels and the difference values are used to decide the size of embedding bits per the sub-block. The receiver can extract the secret data and recover the cover image from dual stegoimages. The experimental results show that the proposed method has a higher capacity and still a good image quality where it could embed 767,922 bits and maintain 45.58 and 45.33?dB for dual images.  相似文献   

4.
《成像科学杂志》2013,61(2):195-203
Abstract

In this paper, we propose two reversible information hiding schemes based on side-match vector quantisation (SMVQ). In 2006, Chang et al. proposed a data-hiding scheme based on SMVQ coding. In order to increase both the image quality and the embedding capacity, we improve their method by embedding multiple secret bits into a block and finding out the second selected codeword from the full codebook. In addition, we propose another reversible information hiding scheme whose output is a pure VQ index table. The weighted bipartite graph is used to model our scheme and the matching approach is used to find out the best solution. Compared with Chang et al.’s scheme, we have higher visual quality in the experimental results.  相似文献   

5.
In this paper, we propose a robust information hiding scheme such that the secret information is restorable upon cover image tampering. The secret information is first translated into a binary image, and then the binary image is encoded into an ‘index table’ via Vector Quantisation (VQ). Without noticeable damage to image quality, the secret information codes (VQ index table of secret information) are hidden repeatedly into the cover image. Using our proposed scheme, the extracted secret codes can be almost completely restored to their original state even when the cover image has been tampered with. Experimental results show that our proposed scheme restores the secret information perfectly under many types of tampering attacks.  相似文献   

6.
A new secret image transmission scheme suitable for narrow communication channel is proposed in this article. A set of secret images can be simultaneously and efficiently delivered to the receiver via a small and meaningless data stream by the proposed scheme. To reduce the volume of secret images, a codebook is first generated and these secret images are encoded into binary indexes based on the vector quantization (VQ) technique. The compressed message is then embedded into the VQ codebook utilized in the encoding procedure by an adaptive least‐significant‐bits (LSB) modification technique. For the purpose of security, the slightly modified codebook is further encrypted into a meaningless data stream by the AES cryptosystem. Simulation results show that the proposed scheme provides an impressive improvement both in the visual quality of the extracted secret images at the receiver and in the hiding capacity of the cover medium. Experimental data also reveal the feasibility of the proposed secret image transmission scheme for limited‐bandwidth environment. © 2007 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 17, 1–9, 2007  相似文献   

7.
In this paper, we have presented a high-payload, reversible data hiding scheme that is focused on embedding secret data into joint photographic experts group (JPEG) bitstream by using histogram modification. In JPEG, for AC coefficients, 162 different variable length codes (VLCs) are defined and assigned by Huffman coding for all 162 run/size possibilities. After parsing VLC usage in the bitstream, we generated a histogram of run/size. According to a peak point and the nearest zero point of the histogram, the secret data were embedded by modifying the corresponding VLC values slightly. The experimental results and comparing the performance of our scheme with those of other existing schemes demonstrated that the proposed scheme preserved the quality of the image with no distortion and achieved the goal of high embedding capacity.  相似文献   

8.
《成像科学杂志》2013,61(7):378-388
Abstract

A low bit rate information hiding scheme is important for efficient communication. According to our observation, in a search order coding based (SOC based) hiding method, the case distribution generated from different images and from different secret strings is different. Based on this characteristic, we designed a dynamic selective, SOC based, information hiding scheme to achieve a desirable compression effect. That is, depending on different case distributions, we used different coding modes to reduce the bit rate more effectively. The main concept of our design is to let the two cases that occur most frequently use one-bit indicators and to let the remaining two cases use four-bit indicators to indicate the following coding types. The experimental results showed that the proposed scheme has a lower bit rate than other SOC based information hiding schemes. As a result, the proposed information hiding scheme is more practical for real world applications.  相似文献   

9.
Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits (MSB) of the encrypted pixels in smooth blocks and the final marked image can be obtained. At the receiver side, secret data will be extracted correctly with data-hiding key. When receiver only has encryption key, after stream cipher decryption, block scrambling decryption and MSB error prediction with threshold, decrypted image will be achieved. When data hiding key and encryption key are both obtained, receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly, hence, receiver can recover marked image losslessly. Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.  相似文献   

10.
《成像科学杂志》2013,61(6):475-483
Abstract

Data hiding in two-colour images is difficult since 1 pixel requires only 1 bit representation and it is easy to detect for pixel distortion. In this paper, we describe a new data hiding method for two-colour images by two-stage referencing. The cover image is partitioned into n×n non-overlapping sub-blocks, and we calculate difference values by two stages for all pixels to find the suitable replacement pixel. The two-stage referencing is to obtain difference values that are different with the current pixel value for neighbouring pixels with n×n and (n+2)×(n+2). These two difference values are used to embed a secret bit on the sub-block. The experimental results show that the proposed method achieves a good visual quality for the stego-image.  相似文献   

11.
This paper presents the security analysis of a recently proposed data hiding scheme by Kanan and Nazeri [A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014;41(14):6123–6130]. Security of the scheme depends upon a secret key\chromosome constructed using a genetic algorithm. The key specifies offsets and patterns for data embedding. By performing the key-sensitivity analysis and exploiting image pixel correlation, it is shown in the present paper that the secret data can be easily revealed. Simulation results demonstrate that just 11 bits out of the 27-bit secret key are sufficient to reveal the data. To overcome the problem, an improvement is suggested in the data embedding pattern that demonstrates high data security. Bitwise analysis of the secret key used in the modified approach exhibits high sensitivity to change in the key.  相似文献   

12.
ABSTRACT

In idealized secret image sharing (SIS), all of the shared images (shadows) play the same role, but in real life, the shared images are often hierarchical. This paper proposes a hierarchical secret image sharing (HSIS) method by means of optical imaging. To implement the scheme, a generalized single-phase modulation algorithm is proposed in Fresnel transform domain. Its features that multiple secret images can be recovered through combination of some shared images though each participant only holds one share of images. Theoretically, the secret images are divided into multiple phase encodings (shared images) by phase modulation, each secret image can be directly captured by the intensity detector when illuminating some of the shared images orderly displayed with parallel light. Experimental simulation shows that the shared images and the restored secret images do not have any size distortion, and further verifies the feasibility of the proposed scheme.  相似文献   

13.
Abstract

A multiple-image encryption (MIE) scheme with a single-pixel detector has been proposed according to the principle of ghost imaging. In this scheme, each of the spatially coherent laser beams is modified by a set of phase-mask keys and illuminates on a secret image. All of the transmitted lights are recorded together by a single-pixel (bucket) detector to obtain a ciphertext, but anyone of the secret images can be decrypted from the ciphertext independently without any mutually overlapped despite some noise in them. The MIE scheme will bring convenience for data storage and transmission, especially in the case that different secret images need to be distributed to different authorized users, because the ciphertext is a real-valued function and this scheme can effectively avoid the secret images being extracted mutually. The basic principle of the MIE scheme is described theoretically and verified by computer simulations. Finally, the feasibility, robustness and encryption capacity are also tested numerically.  相似文献   

14.
《成像科学杂志》2013,61(4):229-240
Abstract

Visual cryptography is different from traditional cryptography. That is, neither time-consuming computation nor complex cryptographic knowledge is needed. Stacking is the only operation required to recover a secret image, and the individual image does not give the hackers any information about the secret image. None of researches tried to deal with meaningful colour share transparencies. Hence, two methods are proposed for hiding a colour image in two meaningful colour share transparencies in this paper. To achieve this goal, the colour decomposition approach and halftone technology are first applied to cope with secret colour images. Then the concept of the human visual system is utilized to generate two colour meaningful sharing transparencies. To support various applications, two variants are presented. The first proposed method, method-1, is suitable for simple colour images, and the second, method-2, provides better visibility of complex colour images.  相似文献   

15.
《成像科学杂志》2013,61(6):509-517
Abstract

In this paper, a secure image delivery scheme that can protect the privacy of secret region in the transmitted image is proposed. The secret region that requires protection is firstly analogised as the repairing and cloning region in the problems of image inpainting and editing. By inpainting and modified Poisson editing, the original protection region can effectively be concealed or disguised with other meaningful content. In the modified Poisson editing process, the twice Laplacian operator is used to improve the seamless transition on the boundary of protection region. The bits generated by the original content of the region are then reversibly embedded into the inpainted or disguised image to form the final protected image. The protected image can be delivered in channels securely, and the attacker cannot obtain the real content of the image without the keys. Experiments were conducted to show the effectiveness and security of the scheme.  相似文献   

16.
17.
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels, creating the stego image. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. A coverless data hiding concept is proposed to solve this issue. Coverless does not mean that cover is not required, or the payload can be transmitted without a cover. Instead, the payload is embedded by cover generation or a secret message mapping between the cover file and the payload. In this paper, a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message. Firstly, the image is divided into equal rows then further divided into equal columns, creating blocks (i.e., sub-images). Then, according to secret message bits and a proposed mapping function, each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image. After that, the generated jigsaw puzzle image is sent to the receiver. Experimental results and analysis show a good performance in the hiding capacity, security, and robustness compared with existing coverless image steganography methods.  相似文献   

18.
《成像科学杂志》2013,61(3):334-340
Abstract

In a (k, n) visual cryptographic scheme (VCS), a secret image is encrypted into n shadow images in such way that any k or more shadows can be superimposed to visually decode the secret, and less than k shadows cannot obtain any information on the secret image. Most VCSs only share one secret image. A (k, n, s) multi-secret VCS (MVCS) is a (k, n)-VCS, which can share s secret images. Recently, Chen et al. introduced a novel (2, 2, 4)-MVCS. However, their scheme is insecure. The threshold property of Chen et al.’s (2, 2, 4)-MVCS is compromised. In this paper, we show how an attacker retrieves the secret information of Chen et al.’s (2, 2, 4)-MVCS from one shadow image.  相似文献   

19.
《成像科学杂志》2013,61(5):403-407
Abstract

In recent years, many visual secret sharing technologies have been proposed to protect the security of secret images (black and white, grey scale or colour images). In 2005, Lukac and Plataniotis used the concept of the Naor–Shamir method to propose a visual secret sharing technology for sharing secret grey-scale images based on bit-plane decomposition. Although their method can avoid pixel-value cutting problem, it still suffers from the pixel expansion problem. In this paper, we propose a new secret grey-scale image sharing method to improve this situation. In the proposed sharing image creation phase, two sharing images (one is grey-scale and the other is binary) are created and later shared by two protectors. The original secret image can be easily reconstructed if both sharing images are obtained. However, one cannot obtain the original secret image from each of the sharing images. Experimental results also show that the proposed method can effectively solve the pixel expansion problem.  相似文献   

20.
Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images. The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image. In this paper, a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed. The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns. The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image. The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board. Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography. Finally, the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号