首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
This paper proposes a novel reversible data hiding method in encrypted images based on specific encryption process. In the proposed specific encryption algorithm, the stream cipher and prediction error are combined to vacate room for data embedding. After that, a permutation operation is performed on the encrypted image to improve the security. In the embedding process, we can embed a large amount of secret data in the encrypted image by pixel value expansion because most of the pixel values are less than 128 by the specific encryption process. At the receiver end, the encrypted image can be recovered from the marked encrypted image without knowing the secret data. Therefore, even if the recipient only has the encryption key, the original image will be perfectly recovered. If the recipient only has the data-hiding key, the secret data will be extracted. And if the recipient has both keys, the original image and the secret data are both available. The proposed method achieves a higher embedding capacity than that of methods based on vacating room after encryption. It does not require the image owner to perform reversible data hiding techniques on the original image, which is more convenient than methods based on reserving room before encryption. Experimental results demonstrate that the proposed method outperforms other state-of-the-art methods.  相似文献   

2.
提出一种编码压缩和加密的图像可逆信息隐藏算 法。计算载体像素预测值与其像素值的差值, 对差值进行哈夫曼编码压缩,通过压缩数据和随机数据加密重构图像,得到载体数据。将哈 夫曼编码的码 表和秘密信息隐藏在载体数据中,实现信息隐藏。在载密数据中提取码表数据和秘密信息, 对加密压缩数 据进行解密,结合码表和预测方法恢复原始图像。实验结果表明,本文算法具有较大的隐藏 容量,不仅能 正确提取秘密信息,还能无损恢复原始图像。  相似文献   

3.
一种新的基于魔方变换的数字图像置乱加密算法   总被引:2,自引:1,他引:1  
提出一种基于魔方变换的数字图像置乱加密算法,突破了传统的不改变图像像素值、仅通过重新排列图像像素点的位置实现图像置乱加密的方法,在三维空间上实现了对图像数据的置乱加密,打破了原有图像的所有特征.提出了一种新的密钥与魔方变化的编码对应法则,使该加密算法的加密密钥不受类型、大小的限制,具有密钥空间大的特点.仿真结果表明,该算法具有很好的加密、解密结果.  相似文献   

4.
Traditional information hiding algorithms cannot maintain a good balance of capacity, invisibility and robustness. In this paper, a novel blind colour image information hiding algorithm based on grey prediction and grey relational analysis in the Discrete Cosine Tran-sform (DCT) domain is proposed. First, this algorithm compresses the secret image losslessly based on the improved grey predic-tion GM(1,1) (IGM) model. It then chooses the blocks of rich texture in the cover image as the embedding regions using Double-dimension Grey Relational Analysis (DGRA). Finally, it adaptively embeds the compressed secret bits stream into the DCT domain mid-frequency coefficients, which are decided by those blocks’ Double-Dimension Grey Correlation Degree (DGCD) and Human Visual System (HVS). This method can ensure an adequate balance between invisibility, capacity and robustness. Experimental results show that the proposed algorithm is robust against JPEG compression (46.724 6 dB when the compression quality factor is 90%), Gaussian noise (45.531 3 dB when the parameter is (0,0.000 5)) etc., and it is a blind information hiding algorithm that can be extracted without an original carrier.  相似文献   

5.
刘玉婷  陈峥  付占方  郑逢勋 《激光与红外》2016,46(10):1290-1294
针对原始红外图像信息在压缩转换中数据信息丢失或弱化的问题,提出一种基于CLAHE(对比度受限自适应直方图均衡)的红外图像增强算法。该算法首先对14位原始红外图像的像素灰度级进行调整,然后通过CLAHE算法获得基图像,再通过原始图像与双边滤波后图像的差值获得细节图像,进一步通过高斯滤波算法滤除细节图像的噪声,最后合成得到输出图像。仿真结果显示:通过该算法,原始图像的对比度及边缘细节信息得到很大程度的增强。本文算法的图像增强效果优于PE算法和CLAHE算法。  相似文献   

6.
邓晓曼  潘志斌  高风娟 《信号处理》2012,28(8):1139-1147
为了改善信息隐藏后的图像质量,减少失真,并提高嵌入信息的容量,本文提出了一种新的改进的基于快速相关矢量量化(MFCVQ,modified fast correlation VQ)的信息隐藏方法。由于图像本身的相关性,快速相关矢量量化利用了当前索引的相邻矢量进行替代编码,计算编码时使用的相邻矢量所产生的失真与事先设定的门限做比较,当失真小于门限时可以进行替代编码,一步完成了编码和嵌入信息;当失真大于门限时不能进行替代编码,从而控制了当前索引的嵌入和最后生成图像的视觉质量。同时,增加了相邻矢量的数目,提高了嵌入信息的容量。实验结果表明改进后的算法能够显著改善图像失真,在门限为18时对不同复杂程度的图像其PSNR分别提高了0.018dB-2.125dB,并且有效地提高了嵌入容量,进而大幅度的提高了嵌入效率。改进算法的嵌入效率达到了Yang算法的1.967-4.683倍。   相似文献   

7.
陈庄  于溯  罗颂  蔡定雯 《电讯技术》2021,61(12):1562-1572
针对传统图像加密算法难以保证在云环境下密钥配送的安全性,以及DNA编码在抗统计学分析效果欠佳等问题提出了一种面向云环境的彩色图像混合加密算法。提出了一种自适应DNA编码对传统方法进行改善,通过国产SM2与SM3加密算法作为散列值的生成函数与控制参数的非对称加密,运用盲水印技术镶嵌至密文图像中。实验结果表明,该算法密钥空间大且加密图像相邻像素相关性较低,具有更为接近理想值的像素改变率与像素平均改变强度,具有较为理想的安全性同时在密钥的传输过程中由非对称加密算法保证其安全可靠。  相似文献   

8.
基于图像分割和平台直方图均衡的红外图像增强算法   总被引:2,自引:1,他引:1  
针对原始红外图像模糊、对比度低的特点,提出了一种基于图像分割的平台直方图均衡算法.首先采取实时阈值提取方法选取阈值,将图像目标灰度与背景灰度分开;然后利用对数、指数结合的非线性变换抑制背景区域,扩展目标区域的动态范围;最后利用改进的双平台直方图均衡算法处理非线性变换后的灰度图像.实验结果表明:该方法有效地增强了原始红外图像,提高图像对比度的同时很好地保留了图像的细节和边缘信息,且避免了过亮现象,视觉效果得到改善.  相似文献   

9.
This research presents a multi-resolution reversible data-hiding algorithm to enable multi-scale marked images that are transmitted progressively to be exactly recovered at the receiver side once hidden data has been extracted. Based on the spatially hierarchical multi-layer structures of progressive-image transmission, the proposed algorithm first decimates the incoming image pixels into a pre-specified number of hierarchical layers of pixels. Then, it modifies pixel values in each hierarchical layer by shifting the interpolated-difference-values histogram between two neighboring layers of pixels to embed secret information into the corresponding hierarchical layer images. The proposed algorithm offers a reversible data-hiding ability for applications that use progressive image transmission to render progressive-image authentication, information-tagging, covert communications, etc. With progressive-reversible data-hiding, users of progressive image transmission can receive each original progressive image and complete hidden messages related to the received progressive image. This allows users to make real-time definite decisions according to an application's requirements. In contrast to other reversible data-hiding schemes, the algorithm proposed in this study features reversible data-hiding in progressive-image transmission based on a hierarchical decimation and interpolation technique. The interpolating process is used to reduce the difference values between the target pixel values in one progressive layer and their interpolated ones. This increases the hiding capacity of interpolation-differences histogram shifting. The experimental results demonstrate that the proposed method provides a greater embedding capacity and maintains marked images at a higher quality. Moreover, the proposed method has a low computational complexity as it requires only simple arithmetic computations.  相似文献   

10.
基于数字图像的缩放算法,提出一种不携带隐秘信息的安全隐写模型.其利用缩放算法推演秘密信息,并非直接将秘密信息嵌入载体图像中.首先选取载体图像,通过相应放大算法将其放大到一定倍数,然后找出秘密图像与新图像中像素信息的相关性,最后再缩小为原图像大小进行传输.由于没有直接修改图像内容,其隐蔽性较好.实验证明,该方法实现简单,运算量小,安全性高,并且对嵌入的信息提取方便,满足隐藏信息的不可检测性,适应于图像隐蔽通信.  相似文献   

11.
Conventional secret image sharing schemes, which are constructed based on Shamir’s method, often suffer from random-liked shares, lossy reconstruction and high computation complexity. In addition, their generated shares are generally in original image format which may lead to more storage and suspicion from invaders. In this paper, we propose a user-friendly secret image sharing scheme based on block truncation coding (BTC) and error diffusion, where meaningful shares can be directly generated without any extra process. The meaningful shares by the proposed scheme are in BTC-compressed format which can reduce the capacity of transfer and storage. In the reconstructing phase, the secret image can be losslessly reconstructed by performing XOR operations on bit planes of sufficient BTC-compressed shares. Further, the proposed scheme provides extra verification ability to identify cheaters and check false shares. Theoretical analysis and simulation results demonstrate the feasibility of the proposed scheme.  相似文献   

12.
为了提高图像的加密效率,提出了一种基于三步 相移数字全息和混沌随机相位编码的 双图像加密方法。两幅图像分别作为振幅部分和相位部分被编码为一幅复数图像,该复数图 像被置于物光路中不同位置处的两块混沌随机相位板编码后与参考光进行干涉,从而将两幅 图像的信息隐藏于三幅全息图中。在该方法中,混沌系统的初值和控制参数取代随机相位板 做密钥,使密钥的管理和传输更为便捷。此外,衍射距离和入射波长也可作为解密过程中的 密钥,使该方法的安全性得以进一步提高。计算机模拟结果表明,任何一个密钥错误时,都 不能解密得到原图像的任何有效信息。此外,该方法对噪声攻击和剪切攻击具有较强的鲁棒 性。  相似文献   

13.
高红霞 《电视技术》2015,39(11):19-22
为提高嵌入秘密图像的信息量和嵌入后载体图像的质量,在行程编码、菱形编码和DCT域的基础上,提出了基于DCT域的菱形编码图像隐写改进算法.采用菱形编码有效地提高了嵌入率,对JPEG标准化量化表进行了改进,更有利于秘密信息的嵌入.对行程编码进行了改进,使秘密图像的压缩效率更大.经过与F5隐写算法对比实验表明,F5隐写算法只能嵌入一幅尺寸为64×64的灰度图像,而改进算法能够嵌入一幅尺寸为240×240的灰度图像,且PSNR> 30 dB,大大提高了加密信息的嵌入量,并保持了嵌入后载体图像的质量.  相似文献   

14.
This work proposes a separable reversible data hiding scheme in encrypted images based on pixel value ordering (PVO). After the original image is encrypted using homomorphism encryption by the content owner, the data hider embeds the secret data in encrypted domain. The PVO strategy realizes hiding data in each block. Additive homomorphism guarantees the performance of PVO in encrypted domain is close to that in plain domain. Besides, the homomorphism encryption does not cause data expansion, and the payload can be further improved. With the watermarked encrypted image, if the receiver has only the data hiding key, he can extract the additional data. If the receiver has only the encryption key, he can obtain a decrypted image similar to the original one. If the receiver has both the data hiding key and the encryption key, he can extract the additional data without any error and recover the original image losslessly.  相似文献   

15.
基于插值预测和块分类的低失真可逆数据隐藏   总被引:4,自引:3,他引:1  
提出一种基于插值预测和块分类模型的低失真可 逆数据隐藏算法。首先,对原始图像 进行插值预测, 得到预测误差图像;然后根据误差图像建立直方图,使得产生的直方图更陡峭,峰值点出现 频率更大;接 着对误差图像进行分块,利用块分类模型,在隐藏块内利用直方图平移隐藏信息,尽可能地 减少平移点的 数量;最后,相应地修改原始像素的灰度值,得到低失真的隐秘图像。实验结果表明,本文 算法不仅可以实现可逆数据隐藏,而且隐藏效果较好,有效载荷较高。  相似文献   

16.
Contrary to conventional protecting data such as cryptographic techniques which encrypt the data with a secret key, secret sharing takes an approach to ensure well protection of transmitted information by allowing a secret message M to be divided into n pieces. Secret message M can be held by n participants to avoid the secret from incidentally or intentionally being lost. In a secret sharing scheme, secret information leaks from shadows, attack on shadow image, and large shadow image issues which has arisen when developing an algorithm. Although existing algorithms provide remedies for such problems, the computational complexity of existing algorithms is still questionable. Therefore, we propose a low computational complexity Quadri-Directional Searching Algorithm (QDSA) for secret image sharing. Experiment results show that the proposed algorithm ensures that generated shares are of high quality and no secret information is leaked from these shares, thus it guarantees high security of our scheme.  相似文献   

17.
基于真彩色图像的信息隐藏算法   总被引:1,自引:0,他引:1  
传统的数字图像隐藏算法是直接将隐藏信息嵌入到载体图像中,并采用融合技术进行隐藏。提出了一种基于DES加密算法思想的图像置乱技术并采用改进的融合技术来实现信息的隐藏,提高了隐藏信息的安全性并可无失真地恢复隐藏图像。  相似文献   

18.
传统的数字图像隐藏算法是直接将隐藏信息嵌入到载体图像中,并采用融合技术进行隐藏。提出了一 种基于DES加密算法思想的图像置乱技术并采用改进的融合技术来实现信息的隐藏,提高了隐藏信息的安全性并 可无失真地恢复隐藏图像。  相似文献   

19.
密文图像的可逆数据隐藏技术既能保证载体内容不被泄露,又能传递附加信息。本文提出了一种基于块容量标签(block capacity label, BCL)的高容量密文图像可逆数据隐藏算法。该方案在图像加密之前进行预处理,首先将图像分为两个区域:参考像素区域和预测像素区域。然后将预测像素区域分为不重叠的块,根据所提出的算法确定分块的BCL,在对图像进行加密之后嵌入BCL,生成加密图像;在秘密数据嵌入阶段,根据BCL和数据隐藏密钥嵌入秘密数据。实验测试了BOWS-2数据集,平均嵌入容量为3.806 8 bpp,与现有方法相比,该方法可以获得更高的秘密数据嵌入容量,并可以实现原始图像的完美重建。  相似文献   

20.
针对基于非负矩阵分解(non-negative matrix factorization, NMF)的偏振图像融合方法效率低的不足,提出一种基于稀疏性NMF的偏振图像快速融合方法。首先,以偏振信息解析得到的各偏振参量图像构造原始数据集,其次,对NMF增加稀疏性约束,利用稀疏表示下的在线字典学习算法进行快速分解,然后对分解得到的三幅特征基图像按清晰度和方差进行排序,将排序后的特征基图像经直方图匹配及HSI颜色映射后,变换到RGB颜色空间,得到融合图像。与基于NMF的方法相比,运行时间提高约120倍,达到约1.5 s完成一次融合过程。实验结果验证了该方法在改善融合效果的同时,运行效率明显提高。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号