首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
黄清龙  刘建岚  陈瑾 《光电工程》2007,34(9):35-40,77
提出了一种新的基于多重菲涅耳衍射变换和像素替代的盲信息隐藏算法.需隐藏的图像经多重菲涅耳衍射变换为一密文复矩阵,然后将其实部和虚部分别嵌入到原始宿主图像中,同时将此已嵌入信息的原像素值用其近邻的未嵌入信息的像素均值来替代,从而实现盲信息隐藏.数值仿真计算结果表明:该隐藏算法对JPEG有损压缩、图像剪切,噪声污染、重采样攻击和亮度、对比度、直方图、灰度曲线调整等具有一定的抵抗能力;由于采用一系列加密密钥(光波长、透镜焦距,多个衍射距离等),只有当所有密钥都正确时,才能解密恢复所隐藏的信息,所以该算法具有较强的鲁棒性和很高的安全性.  相似文献   

2.
Wang Y  Wen Z  Nashed Z  Sun Q 《Applied optics》2006,45(13):3111-3126
We consider reconstruction of signals by a direct method for the solution of the discrete Fourier system. We note that the reconstruction of a time-limited signal can be simply realized by using only either the real part or the imaginary part of the discrete Fourier transform (DFT) matrix. Therefore, based on the study of the special structure of the real and imaginary parts of the discrete Fourier matrix, we propose a fast direct method for the signal reconstruction problem, which utilizes the numerically truncated singular value decomposition. The method enables us to recover the original signal in a stable way from the frequency information, which may be corrupted by noise and/or some missing data. The classical inverse Fourier transform cannot be applied directly in the latter situation. The pivotal point of the reconstruction is the explicit computation of the singular value decomposition of the real part of the DFT for any order. Numerical experiments for 1D and 2D signal reconstruction and image restoration are given.  相似文献   

3.
He MZ  Cai LZ  Liu Q  Yang XL 《Applied optics》2005,44(13):2600-2606
Generally, the reconstruction of an object image from its diffraction field requires both the amplitude and the phase information of this field. We systematically investigated the effects of using only the real part, the imaginary part, or the phase information of the diffraction field to reconstruct the original image for both the binary and the gray-level images. We show that the phase information can yield a better result of image retrieval than the real or imaginary part and that the recovered image from the phase information is satisfactory especially for binary input. On the basis of this idea, a new technique of image encryption and watermarking by use of only one delivered image-the phase map of the diffraction field of the original image-through double random-phase encoding is proposed and verified by computer simulations with phase-shifting interferometry. This method can greatly cut down the communication load and is suitable for Internet transmission.  相似文献   

4.
Information hiding technique with double phase encoding   总被引:8,自引:0,他引:8  
Kishk S  Javidi B 《Applied optics》2002,41(26):5462-5470
We propose a technique for information hiding using double phase encoding. The proposed method uses a weighted double phase-encoded hidden image added to a host image referred to as the transmitted image. We develop an analytical presentation for the system performance using the statistical properties of double phase encoding. The peak signal-to-noise-ratio metric is used as a measure for the degradation in the quality of the host image and the recovered hidden image. We test, analytically, the distortion of the hidden image that is due to the host image and the effect of occlusion of the pixels of the transmitted image (that is, the host image containing the hidden image). Moreover, we discuss the effect of using only the real part of the transmitted image to recover the hidden image. Computer simulations are presented to test the system performance against these types of distortion. The simulations illustrate the system ability to recover the hidden image under distortions and the robustness of the hidden image against removal trials.  相似文献   

5.
To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded into the encrypted image, and the scrambling operation is used to further improve security. Finally, the original image and non-image data can be separably recovered and extracted according to the request from the valid users with different access rights. Experimental results demonstrate that the proposed scheme outperforms other data hiding methods based on CS, and is more suitable for nonequivalent resources.  相似文献   

6.
To improve the security and quality of decrypted images, this work proposes a reversible data hiding in encrypted image based on iterative recovery. The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR (XOR), which improves the security of encrypted images. And then, a pixel-type-mark generation method based on block-compression is designed to reduce the extra burden of key management and transfer. At last, an iterative recovery strategy is proposed to optimize the marked decrypted image, which allows the original image to be obtained only using the encryption key. The proposed reversible data hiding scheme in encrypted image is not vulnerable to the ciphertext-only attack due to the fact that the XOR-encrypted pixels are scrambled in the corresponding encrypted image. Experimental results demonstrate that the decrypted images obtained by the proposed method are the same as the original ones, and the maximum embedding rate of proposed method is higher than the previously reported reversible data hiding methods in encrypted image.  相似文献   

7.
数字全息水印在印刷半色调图像中的应用   总被引:10,自引:8,他引:2  
在印刷半色调图像中嵌入特定信息可用于印刷品的保护和认证。设计了一种新颖的应用于非数字形式印刷半色调图像中的信息隐藏算法,将原始水印信息制成菲涅耳全息图,以此作为水印信息,利用离散小波变换算法嵌入到宿主图像中,以实现信息隐藏。该算法利用全息图独特的不可撕毁性来增强水印的鲁棒性。实验结果表明,该算法对图像半色调化攻击具有较好的鲁棒性。  相似文献   

8.
An efficient and fast watermarking algorithm based on ordered Hadamard transform (HT) is proposed. Since it uses a few information of watermark image in secret key, it is categorised as a semi-blind method. In our algorithm, both host and watermark images are decomposed into non-overlapping blocks. Next, they are mapped into transform domain as Hadamard coefficients. Then, several high frequency AC components of host image are substituted with watermark coefficients without using any strength factor. Not employing this factor guarantees the embedded image to be retrieved with primary quality. Moreover, using HT offers several advantages of fastness, higher image fidelity, greater reliability of watermark detection and higher data hiding capacity. The experimental results show that our method keeps the quality of host image and is robust to common attacks. Compared to frequency domain and hybrid methods, it has advantages of shorter processing time, acceptable robustness and ease of hardware implementation.  相似文献   

9.
The dual stego images based on data hiding has become popular in recent days. Since the embedding rate in dual stego images is very high. This paper proposes a new data encoding method based on maximum to the minimum histogram in reversible data hiding. This method estimates the encoded intensity from the message intensity and embeds the encoded intensity in the cover image. The stego image quality decreases the intensity of the hidden data which is high. The intensity of the data must be kept low to maintain a high-quality stego image. It is achieved using data encoding. Therefore, the proposed method uses new data encoding which converts the higher histogram data to lower intensity and the lower histogram data to higher intensity during the data embedding process. In the extraction process, the encoded intensities are decoded to message intensities to obtain the original data. The proposed data hiding approach has improved in terms of image quality (PSNR), structure similarity index measurements and embedding rate.  相似文献   

10.
Reversible data hiding methods have drawn considerable attention in the last decade, which allow full recovery of the original image used for embedding secret data as well as avert the third parties who should not realise the existence of hidden data. In this paper, we propose a high-capacity reversible data hiding method called HCRHide based on the Neighbour Mean Interpolation (NMI) method and the R-weighted Coding Method (RCM). Throughout a joint imperceptibility and data hiding capacity evaluation, results have approved high performance of the proposed method over the existing reversible data hiding methods.  相似文献   

11.
LSB扩展的图像自嵌入方法   总被引:1,自引:0,他引:1  
本文描述了一种基于LSB扩展的图像自嵌入方法.该方法在使用LSB数据隐藏的同时,对图像的高层位平面采用无损数据嵌入方法,将图像的压缩信息与认证信息嵌入到图像自身中.当原图像有缺损或被篡改时,使用认证信息可较准确地定位受损位置;使用从偏移图像子块中提取的数据,可近似地恢复原图像的受损部分;同时图像的高层位平面还可无损恢复.该方法增加了数据嵌入的容量,提高了恢复图像的质量.  相似文献   

12.
Meng XF  Cai LZ  Yang XL  Xu XF  Dong GY  Shen XX  Zhang H  Wang YR 《Applied optics》2007,46(21):4694-4701
A novel single-channel color-image watermarking with digital-optics means based on phase-shifting interferometry (PSI) and a neighboring pixel value subtraction algorithm in the discrete-cosine-transform (DCT) domain is proposed. The converted two-dimensional indexed image matrix from an original color image is encrypted to four interferograms by a PSI and double random-phase encoding technique. Then the interferograms are embedded in one chosen channel of an enlarged color host image in the DCT domain. The hidden color image can be retrieved by DCT, the improved neighboring pixel value subtraction algorithm, an inverse encryption process, and color image format conversion. The feasibility of this method and its robustness against some types of distortion and attacks from the superposed image with different weighting factors are verified and analyzed by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition, enhance the imperceptibility of hidden data, and improve the efficiency of data transmission.  相似文献   

13.
The techniques that allow to obtain hidden data and recover the image has recently been much sought after. The basic objective of the method provided in this study was to analyse coefficients of digital images achieved by wavelet transform in the frequency space, to hide data, and to recover original image without loss. Wavelet transform is an efficient method to find pixel coefficient characteristic of digital images. The proposed method (NON-R) hides data using shifted histogram high-frequency Haar coefficients without rounding into integer. Thus, both hidden data and cover image can be easily recovered. Reversibility is provided by retrieving the cover image after hiding into high-frequency wavelet coefficients and extracting the message from wavelet coefficients. Experimental results show that the NON-R has a better performance than its counterparts in terms of statistical and perceptual outcomes.  相似文献   

14.
Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits (MSB) of the encrypted pixels in smooth blocks and the final marked image can be obtained. At the receiver side, secret data will be extracted correctly with data-hiding key. When receiver only has encryption key, after stream cipher decryption, block scrambling decryption and MSB error prediction with threshold, decrypted image will be achieved. When data hiding key and encryption key are both obtained, receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly, hence, receiver can recover marked image losslessly. Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes.  相似文献   

15.
Shi X  Zhao D 《Applied optics》2011,50(14):2134-2139
A new (to our knowledge) method is proposed in this paper for color image hiding and extracting using the phase retrieval algorithm in the fractional Fourier transform (FRFT) domain and Arnold transform (ART). Based on a cascaded phase iterative FRFT algorithm, the three channels (R, G, and B) of the secret color image permuted by ART are encrypted. Then the encoded information is embedded in the blue channel (B channel) of the enlarged color host image. Using the security enhanced encryption method, not only the random phase mask and the wavelength but also the transform parameters of ART and FRFT are provided as additional keys for decryption. It is shown that the security of information hiding will be enhanced. Computer simulations are performed to show the hiding capacity of the proposed system. Numerical results are presented to verify the validity and efficiency of the proposed method.  相似文献   

16.
Abstract

An image watermarking model based on visual secret sharing (VSS) is proposed for protection of ownership. In the embedding phase, the watermark is first divided by VSS into two parts: a hiding watermark and a secret watermark. Then only the hiding watermark is embedded into the original image and the secret watermark is reserved for watermark extracting by the owner. In the extracting phase, the hiding watermark is extracted from the watermarked image first and then directly superimposed on the secret watermark to recover the watermark information.  相似文献   

17.
《成像科学杂志》2013,61(6):467-474
Abstract

Data hiding technique can hide a certain amount of secret data into digital content such as image, document, audio or video. Reversible compressed image data hiding can loosely restore the cover image after extracting the secret data from the stego-image. In this paper, we present an efficient reversible image data hiding scheme based on side match vector quantisation. Mapping concept is useful for this scheme because it converts the ternary into binary. The proposed scheme significantly increases the payload size of a block, and the quality analysis of the proposed scheme showed that it contains a better peak signal to noise than other schemes.  相似文献   

18.
This tutorial reviews the recent computational advances in two-dimensional (2D) correlation spectroscopy, presents the theory, and provides examples applying 2D correlation analysis. Two-dimensional correlation analysis is a method for visualizing the relationships among the variables in multivariate data and their temporal behavior by applying the complex cross-correlation function. This function measures correlations that occur at the same rate or frequency with respect to the data acquisition time. The complex cross-correlation function yields real and imaginary components that contain information about the phase behavior of the variables. The real component provides information about mutually dependent in-phase variations. Variations that occur out-of-phase (with time lags or leads) are given by the imaginary component. Two-dimensional correlation analysis is a general analysis method that can be used for the treatment of data from a variety of applications including image, distribution, environmental, and kinetic analysis.  相似文献   

19.
Lévesque L  Paton BE  Payne SH 《Applied optics》1994,33(34):8036-8040
Surface plasmons generated at a silver-polyimide interface and the guided modes coupled into planar films cause dips in the reflectivity curve of a transparent dielectric-silver-polyimide-air structure. These minima in the reflectivity curve were used to measure the polyimide thickness as well as the real and imaginary parts of the polymer refractive index (extinction). Precision within 1% of the polymer coat thickness was achieved through the use of this technique over the range 0.5-10 μm. In some cases, this technique is capable of yielding a precision of ~ 10% on the imaginary part of the polymer refractive index and provides a useful method for determining the performance of a low-loss polymer waveguide. Techniques in fitting the experimental reflectivity data to obtain the optical constants are also described.  相似文献   

20.
Reversible data hiding in encrypted images (RDH-EI) technology is widely used in cloud storage for image privacy protection. In order to improve the embedding capacity of the RDH-EI algorithm and the security of the encrypted images, we proposed a reversible data hiding algorithm for encrypted images based on prediction and adaptive classification scrambling. First, the prediction error image is obtained by a novel prediction method before encryption. Then, the image pixel values are divided into two categories by the threshold range, which is selected adaptively according to the image content. Multiple high-significant bits of pixels within the threshold range are used for embedding data and pixel values outside the threshold range remain unchanged. The optimal threshold selected adaptively ensures the maximum embedding capacity of the algorithm. Moreover, the security of encrypted images can be improved by the combination of XOR encryption and classification scrambling encryption since the embedded data is independent of the pixel position. Experiment results demonstrate that the proposed method has higher embedding capacity compared with the current state-ofthe-art methods for images with different texture complexity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号