首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
密文图像的可逆数据隐藏技术既能保证载体内容不被泄露,又能传递附加信息。本文提出了一种基于块容量标签(block capacity label, BCL)的高容量密文图像可逆数据隐藏算法。该方案在图像加密之前进行预处理,首先将图像分为两个区域:参考像素区域和预测像素区域。然后将预测像素区域分为不重叠的块,根据所提出的算法确定分块的BCL,在对图像进行加密之后嵌入BCL,生成加密图像;在秘密数据嵌入阶段,根据BCL和数据隐藏密钥嵌入秘密数据。实验测试了BOWS-2数据集,平均嵌入容量为3.806 8 bpp,与现有方法相比,该方法可以获得更高的秘密数据嵌入容量,并可以实现原始图像的完美重建。  相似文献   

2.
针对图像在网络传输中的隐私信息泄露问题,提出了高安全可分离全位平面密文域可逆数据隐藏方案.重点研究如何保障原始图像和待隐藏数据安全,提出了分块分类置乱算法及遍历矩阵加密算法以实现原始图像加密,采用Hilbert曲线加密实现待嵌入数据加密,采用基于全位平面置乱技术,并分析讨论位平面特点,将其分为连续块和非连续块,进而使用像素预测方法,以实现秘钥可分离的可逆数据隐藏.实验结果表明,与现有同类算法相比,该方案具有较强的综合性能,首先,安全性高,本文分别从秘钥空间、秘钥敏感性、相关性、NPCR、UACI和信息熵等指标分析其安全性;其次,具有可逆性,提取数据与原始数据的NCC为1,恢复后图像与原始图像的PSNR为无穷大,能够完全无损的恢复图像、提取数据;且含密图像质量高,平均PSNR高达64.64 dB,远远高于其他文献;再次,容量高,理论最高容量为6 bpp,实际平均容量也达到2.5 bpp;此外,本方案具有鲁棒性,能够有效抵抗椒盐噪声、剪切和高斯白噪声攻击,且实现了秘钥可分离.  相似文献   

3.
文章提出一种基于DCT系数值排序预测的加密域JPEG图像可逆信息隐藏方案,该方案能够抵抗针对JPEG图像加密的轮廓攻击方法。区别于现有加密域JPEG图像信息隐藏方法,文章利用混沌加密方法置乱JPEG图像标识符,掩盖了加密域JPEG图像中的分块信息,利用基于DCT系数值排序预测的方法将秘密信息可逆嵌入加密JPEG图像中。在进行信息嵌入和提取的过程中,基于DCT系数值排序预测的可逆信息隐藏方法无需利用JPEG图像的分块信息,且信息嵌入的效率高,提取准确。实验结果显示,文章方案的安全性和嵌入容量都得到很大程度的提升,含密图像的图像质量也有一定程度的提高。  相似文献   

4.
该文提出了一种基于LWE(Learning With Errors)算法的密文域可逆隐写方案,利用LWE公钥密码算法对数据加密,用户在密文中嵌入隐藏信息,对于嵌入信息后的密文,用户使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前数据实现了提取过程与解密过程的可分离。通过推导方案在解密与提取信息过程中出错的概率,得到直接影响方案正确性的参数为所选噪声的标准差,实验获得并验证了标准差的合理取值区间;通过推导嵌入后密文的分布函数,分析密文统计特征的变化情况,论证了嵌入密文的隐藏信息的不可感知性。该方案是在密文域进行的可逆隐写,与原始载体无关,适用于文本、图片、音频等各类载体。实验仿真结果表明该方案不仅能够保证可逆隐写的可靠性与安全性,而且1 bit明文在密文域最大可负载1 bit隐藏信息。  相似文献   

5.
徐新星 《信息技术》2023,(2):134-139
针对当前算法对彩色图像进行可逆隐藏时无法获取最优嵌入数据,存在综合性能差以及加密性能差的问题,提出基于Tabu搜索的彩色图像可逆数据隐藏算法,首先对彩色图像进行加密,确定嵌入的位置,利用Tabu搜索算法提取出最优嵌入秘密数据,在加密图像时进行秘密数据的嵌入,对秘密信息以及图像进行预处理;其次接收者利用自带的密钥对已经嵌入数据的加密图像进行解密,同时对图像进行翻转恢复以及信息提取,实现彩色图像可逆数据隐藏。实验结果表明,所提算法的综合性能高以及加密性较好。  相似文献   

6.
密文域可逆信息隐藏技术在医学、云服务、军事、商业等众多领域有着广泛应用,针对现有密文域信息隐藏算法的可逆性不能完全保证、嵌入率低、不能完全分离等不足,提出一种完全可逆可分离密文域信息隐藏算法,首先,给出了适合图像加密遍历矩阵所需满足的条件和构造方法,载体图像拥有者设置密钥1构造遍历矩阵,并对明文图像进行加密,然后将加密图像传送给信息嵌入者,信息嵌入者设置密钥2,以期望插值为目标,根据插值区间大小确定嵌入位数,再由差值修正因子和秘密信息共同确定最终插值,使最终插值最大限度接近期望插值,确保载密图像高质量,整个过程无附加信息、无数据溢出、且均可保证可逆性,密钥1拥有者和密钥2拥有者两种权限互不干涉,是完全可逆可分离算法,平均嵌入率可达到3 bit/pixel,通过与8种优秀算法的实验比较,表明算法在嵌入容量、可逆性、可分离性率等方面相比于对比算法均有一定优势.  相似文献   

7.
双图像可逆信息隐藏由于其具有更好的安全性、嵌入率和图像视觉质量,成为信息安全领域重要的研究方向.Bhardwaj等人提出了密文域上的双图像可逆信息隐藏算法,进一步提升了安全性,但是该算法嵌入秘密信息的数量有限.本文提出了一种新的嵌入策略,先将图像的每个像素分解成3个单元,并使用Paillier算法对其加密.根据改进的最...  相似文献   

8.
为提高XU算法的隐藏容量和加密图像的安全性, 提出了一种基于预测误差分类置乱的加密域可逆 信息隐藏算法。首先根据XU的预测方法得到非采到样像素的预测误差,根据预测误差的取值范 围将所有非 采样像素分为可变像素和不变像素两类。对采样像素、可变像素和不变像素分类置乱后再异 或加密生成加 密图像,以提高加密图像的安全性。可变像素的低2位用于保存图像信息,剩余的6个高有效 位均可用于 隐藏信息,实现了一个可变像素嵌入多比特附加信息,提高了嵌入容量。实验结果表明,本 算法的加密方 法能有效抵抗COA唯密文攻击,且平滑图像的隐藏容量可以超过2比特每像素。  相似文献   

9.
针对可逆数据隐藏中图像质量和嵌入容量之间相互矛盾的问题,提出一种中心折叠技术与最低有效位替换相结合的可逆数据隐藏方法。该方法首先对原始图像中的像素进行位平面划分,以得到2个位平面;然后利用中心折叠技术将秘密数据折叠,并将折叠后的秘密数据嵌入到原始像素的最高有效位中,以生成2个隐秘像素;最后利用最低有效位替换将秘密数据嵌入到隐秘像素的最低有效位中,以进一步提高嵌入容量。实验结果表明,利用中心折叠技术与最低有效位替换来嵌入秘密数据,嵌入容量达到了1 572 778位,有效地提高了嵌入容量;当嵌入容量相同时,与嵌入秘密数据后的相关算法相比,图像的PSNR提高了约2dB,降低了图像失真,具有更好的不可感知性。  相似文献   

10.
提出一种编码压缩和加密的图像可逆信息隐藏算 法。计算载体像素预测值与其像素值的差值, 对差值进行哈夫曼编码压缩,通过压缩数据和随机数据加密重构图像,得到载体数据。将哈 夫曼编码的码 表和秘密信息隐藏在载体数据中,实现信息隐藏。在载密数据中提取码表数据和秘密信息, 对加密压缩数 据进行解密,结合码表和预测方法恢复原始图像。实验结果表明,本文算法具有较大的隐藏 容量,不仅能 正确提取秘密信息,还能无损恢复原始图像。  相似文献   

11.
Due to privacy and security concerns, the researches of reversible data hiding in encrypted images (RDHEI) have become increasingly important. Conventional schemes vacate the spare room after image encryption (VRAE) suffer from the low embedding rate, high error rate of data extraction, and imperfect image recovery. To address these issues, we propose a separable reversible data hiding scheme for encrypted images that utilizes a novel pixel rotation technique to embed data into fully encrypted images. The block complexities of four decrypted rotation states are considered when recovering image. To realize perfect image recovery, we further devise a lossless version (LPR-RDHEI). Experimental results demonstrate that the proposed PR-RDHEI scheme achieves an embedding rate of 0.4994 bpp on average and ensures lossless data extraction. Meanwhile, the proposed LPR-RDHEI scheme still has a 0.4494 bpp embedding rate on average. The embedding rates of our two schemes are significantly improved compared with state-of-the-arts.  相似文献   

12.
In recent years, the increasing requirements in cloud storage and cloud computing have made it necessary to encrypt digital images for privacy protection. Meanwhile, many reversible data hiding (RDH) algorithms in the encrypted domain have been proposed. However, most of these algorithms are for gray-level images, and the intrinsic cross-channel correlations of color images cannot be utilized to improve the embedding capacity. In this paper, we propose a novel data hiding method for encrypted color images. In the encryption stage, the homomorphic property of encryption is achieved by basic modular addition. During the data hiding process, the cross-channel correlations between R, G and B channels are generated in encrypted domain, and data hiding is performed by the difference histogram shifting. Analysis and experiments demonstrate that the proposed method is secure and the RDH performance is superior.  相似文献   

13.
This paper proposes a novel reversible data hiding method in encrypted images based on specific encryption process. In the proposed specific encryption algorithm, the stream cipher and prediction error are combined to vacate room for data embedding. After that, a permutation operation is performed on the encrypted image to improve the security. In the embedding process, we can embed a large amount of secret data in the encrypted image by pixel value expansion because most of the pixel values are less than 128 by the specific encryption process. At the receiver end, the encrypted image can be recovered from the marked encrypted image without knowing the secret data. Therefore, even if the recipient only has the encryption key, the original image will be perfectly recovered. If the recipient only has the data-hiding key, the secret data will be extracted. And if the recipient has both keys, the original image and the secret data are both available. The proposed method achieves a higher embedding capacity than that of methods based on vacating room after encryption. It does not require the image owner to perform reversible data hiding techniques on the original image, which is more convenient than methods based on reserving room before encryption. Experimental results demonstrate that the proposed method outperforms other state-of-the-art methods.  相似文献   

14.
基于压缩感知的鲁棒可分离的密文域水印算法   总被引:2,自引:0,他引:2  
为了满足密文域水印嵌入的需要,该文基于压缩感知技术,提出一种鲁棒可分离的密文域水印算法。首先,内容拥有者将图像进行不重叠分块,利用边缘检测手段划分重要块和非重要块。重要块用传统加密方式进行加密,非重要块用压缩感知技术进行加密,同时为水印嵌入留出一定空间,然后根据嵌入密钥,实现二值水印的密文嵌入。在接收端获取图像内容和水印的方式是可分离的,同时根据含水印的密文图像块的像素分布特性可重新判断块的属性,避免了传输块属性信息。此外,水印信息重复4次嵌入在密文图像的不同区域,保证了水印的鲁棒性。实验结果显示所提方案在抵抗适度攻击时具有鲁棒性和安全性。  相似文献   

15.
Ming Li  Di Xiao  Yushu Zhang 《ETRI Journal》2016,38(1):159-163
Block compressed sensing (BCS) is widely used in image sampling and is an efficient, effective technique. Through the use of BCS, an image can be simultaneously compressed and encrypted. In this paper, a novel reversible data hiding (RDH) method is proposed to embed additional data into BCS images. The proposed method is the first RDH method of its kind for BCS images. Results demonstrate that our approach performs better compared with other state‐of‐the‐art RDH methods on encrypted images.  相似文献   

16.
With the popularity of cloud servers, an increasing number of people are willing to store their images in the cloud due to many conveniences such as online browsing and managing images. On the other hand, this inevitably causes users’ concerns about image privacy leakage. Many image encryption schemes are proposed to prevent privacy leakage, while most of them focus only on privacy protection and ignore the usability of encrypted images. For this purpose, Marohn et al. (2017) designed two approximate thumbnail-preserving encryption (TPE) schemes to balance image privacy and usability. However, the decrypted image in these two schemes are only perceptually close to the original one and the original image cannot be perfectly recovered. To this end, we design a perfectly recoverable approximate TPE scheme in this paper, which combines reversibledata hiding (RDH) with encryption schemes. The thumbnails of the original and processed images are similar to balance image privacy and usability well. Meanwhile, the reversibility of RDH and encryption schemes is utilized to ensure the perfect recoverability in the proposed scheme. Experiments show that the proposed approximate TPE scheme is no longer limited to balancing usability and privacy but attains perfect recovery.  相似文献   

17.
Reversible data hiding (RDH) algorithms allow data protection and exact recovery of the original cover image upon data extraction. Most of RDH algorithms attempt to embed data while maintaining high peak signal-to-noise ratio. However, it has been deemed recently that some applications may demand improving the image contrast while embedding data. Additionally, stego images with better contrast could be less attractive to attacker, given the fact they have no idea about the original cover image. In this paper, we propose a sharpening-aware RDH (SARDH) algorithm that is capable of embedding significant amount of data in addition to sharpening the image. Experimental results proved the ability of SARDH algorithm in embedding large payloads and providing sharper stego images.  相似文献   

18.
An optical image encryption system with adaptive steganography using red, green, and blue (RGB) channel integration is proposed. The optical image encryption system employs a double random phase encoding algorithm to encrypt and decrypt color images. The RGB channel in a color image is first integrated into a large grayscale image. Then the integrated image is encrypted by two random phase masks. The secret data is then embedded into the encrypted image with a specific hiding sequence generated by the zero-LSB (least significant bits) sorting technique which is a content-dependent and low distortion data embedding method. Experimental results show that the proposed method has a good performance in both hiding capacity and decrypted image quality.  相似文献   

19.
Applications on the cloud server have matured, and protecting the privacy of the content owner has attracted more attention. Privacy-Preserving Reversible data hiding (PP-RDH) is an efficient technique for embedding additional data into an encrypted image. In this paper, we propose a privacy-preserving reversible data hiding scheme using the quad-tree partition and Integer Wavelet Transform (IWT) techniques. Our scheme focuses on improving the embedding rate and quality of the recovered image when a 2 × 2-sized, block-based image encryption method is applied to ensure relative higher security. On this basis, the IWT technique transforms the encrypted image, and coefficients in three high frequency subbands are converted into 8-bit binary system. Then, the quad-tree partition technique encodes each 8 × 8-sized coefficient block, since there are many zeroes in the front bit planes. The experimental results indicated that our proposed scheme significantly improved the embedding rate, and guaranteed lossless image recovery and data extraction.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号