首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This study presents a simple method for high-hiding capacity. The basic concept uses a modulus operation. The proposed method has the following advantages: (1) the proposed method outperforms the simple LSB substitution method given the same range (0–m−1) of data digits in the embedded data; (2) the proposed method achieves good image vision quality without the need for post-processing; (3) the proposed method is almost as simple as the LSB method in both coding and decoding; (4) the smaller error advantage over the simple LSB substitution method can also be mathematically verified; (5) the error is smaller than (m−1)/2 for almost every pixel; (6) the proposed method has high-hiding capacity (for example, the proposed method can hide a 256×256 or 256×512 image in a 512×512 host image).  相似文献   

2.
A reversible data hiding scheme using complementary embedding strategy   总被引:3,自引:0,他引:3  
Obtaining good visual quality and high hiding capacity with reversible data hiding systems is a technically challenging problem. In this paper, we propose a simple reversible data hiding scheme that uses a complementary hiding strategy. The proposed method embeds one secret bit horizontally and vertically into one cover pixel of a grayscale cover image by decreasing odd-valued pixels and increasing even-valued pixels by one. Experimental results show that the hiding capacity measured by bit per pixel (bpp) of the proposed scheme is at least 1.21 bpp with a PSNR (peak signal-to-noise ratio) value greater than 52 dB for all standard test images. Especially in the case of four-layer embedding, the PSNR value of the proposed method is still greater than 51 dB at a hiding capacity of about 5 bpp for all standard test images. In addition, the proposed method is quite simple because it primarily uses additions and subtractions. These results indicate that the proposed scheme is superior to many existing reversible data hiding schemes introduced in the literature.  相似文献   

3.
In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing the pixel-value differencing technique (PVD). The hiding capacity of the two consecutive pixels depends on the difference value. In other words, the smoother area is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret data can be embedded. This way, the stego-image quality degradation is more imperceptible to the human eye. Second, the remainder of the two consecutive pixels can be computed by using the modulus operation, and then secret data can be embedded into the two pixels by modifying their remainder. In our scheme, there is an optimal approach to alter the remainder so as to greatly reduce the image distortion caused by the hiding of the secret data. The values of the two consecutive pixels are scarcely changed after the embedding of the secret message by the proposed optimal alteration algorithm. Experimental results have also demonstrated that the proposed scheme is secure against the RS detection attack.  相似文献   

4.
Most of the real-world signals we encounter in real-life applications have low information content. In other words, these signals can be well approximated by sparse signals in a proper basis. Compressive sensing framework uses this fact and attempts to represent signals by using far fewer measurements as compared to conventional acquisition systems. While the CS acquisition is linear, the reconstruction of the signal from its sparse samples is nonlinear and complex. The sparse nature of the signal allows enough room for some additional data sequence to be inserted and exactly recovered along with the reconstructed signal. In this study, we propose to linearly embed and hide data in compressively sensed signals and nonlinearly reconstruct both of them using a deflationary approach. We investigate the embedding capacity as a function of signal sparsity and signal compression, as well as the noise sensitivity of the proposed algorithm.  相似文献   

5.
Data hiding, also known as information hiding, plays an important role in information security for various purposes. Reversible data hiding is a technique that allows distortion-free recovery of both the cover image and the secret information. In this paper, we propose a new, reversible data hiding scheme that is based on the Sudoku technique and can achieve higher embedding capacity. The proposed scheme allows embedding more secret bits into a pair of pixels while guaranteeing the good quality of the stego-image. The experimental results showed that the proposed scheme obtained higher embedding capacity than some other previous schemes. In addition, our proposed scheme maintained the good visual quality of the stego-image (i.e., PSNR > 46 dB), which outperforms some existing schemes.  相似文献   

6.
刘开会  徐江峰 《计算机应用》2011,31(7):1917-1919
Lee等人(LEE C F, CHEN H L. A novel data hiding scheme based on modulus function. The Journal of Systems and Software, 2010, 83(5): 832-843)提出了一种基于模函数的数据隐写方法,在图像质量可接受的情况下,每个像素的最大嵌入容量为4位二进制数。但是当每个像素的嵌入量为4位时,隐写图像的质量较差,容易引起攻击者的注意。对该方法进行了改进,缩小了像素改变的范围。理论分析及模拟实验表明,改进方法不但保留了原方法的各种优点,而且使PSNR值增加1.5~3.5dB,提高了隐写图像的视觉不可见性及抵御RS攻击的能力。  相似文献   

7.
In this paper, we shall propose a novel image-hiding scheme. Our new scheme classifies the host image pixels into two groups of pixels according to the pixel values. For each group of pixels, the corresponding secret pixel values go through an optimal substitution process and are transformed into other pixel values by following the dynamic programming strategy. Then, we can embed the transformed pixel values in the host pixels by using the modulus functions and obtain the stego-image. Extensive experimental results demonstrate that our new method is capable of offering better stego-image quality than a number of well-accepted schemes.  相似文献   

8.
This paper presents a lossless robust data hiding scheme. The original cover image can be recovered without any distortion after the hidden data have been extracted if the stego-image remains intact, and on the other hand, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. The proposed scheme divides a cover image into a number of non-overlapping blocks and calculates the arithmetic difference of each block. Bits are embedded into blocks by shifting the arithmetic difference values. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, owing to the separation of bit-0-zone and bit-1-zone as well as the particularity of arithmetic difference, minor alteration applying to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0-zone and the bit-1-zone to overlap, and robustness is achieved. Experimental results show that, compared with previous works, the performance of the proposed scheme is significantly improved.  相似文献   

9.
This paper proposes a high capacity data hiding scheme for binary images based on block patterns, which can facilitate the authentication and annotation of scanned images. The scheme proposes block patterns for a 2 × 2 block to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. In addition, two kinds of matching pair (MP) methods, internal adjustment MP and external adjustment MP, are designed to decrease the embedding changes. Shuffling is applied before embedding to reduce the distortion and improve the security. Experimental results show that the proposed scheme gives a significantly improved embedding capacity than previous approaches in the same level of embedding distortion. We also analyze the perceptual impact and discuss the robustness and security issues.  相似文献   

10.
An information hiding scheme with minimal image distortion   总被引:1,自引:0,他引:1  
This paper proposes an embedding scheme which can embed a message into an image and obtain minimal image distortion for applications which need a high-visual-quality stego-image. The message to be embedded is divided into sub-messages each of which is embedded into a pixel vector with three pixels. A sub-message is extracted from a stego-pixel vector by calculating the differences between pixels. The embedding capacity of an image using the proposed scheme can be more than one bit per pixel and the modification of a pixel is not more than one. Since the modification of pixels is minimal, applications using the proposed scheme can obtain a stego-image with higher visual quality than existing studies.  相似文献   

11.
To enhance the embedding capacity of a reversible data hiding system, in this paper, a novel multiple-base lossless scheme based on JPEG-LS pixel value prediction and reversible difference expansion will be presented. The proposed scheme employs a pixel value prediction mechanism to decrease the distortion caused by the hiding of the secret data. In general, the prediction error value tends to be much smaller in smooth areas than in edge areas, and more secret data embedded in smooth areas still meets better stego-image quality. The multiple-base notational system, on the other hand, is applied to increase the payload of the image. With the system, the payload of each pixel, determined by the complexity of its neighboring pixels, can be very different. In addition, the cover image processed by the proposed scheme can be fully recovered without any distortion. Experimental results, as shown in this paper, have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible.  相似文献   

12.
The simple least-significant-bit (LSB) substitution technique is the easiest way to embed secret data in the host image. To avoid image degradation of the simple LSB substitution technique, Wang et al. proposed a method using the substitution table to process image hiding. Later, Thien and Lin employed the modulus function to solve the same problem. In this paper, the proposed scheme combines the modulus function and the optimal substitution table to improve the quality of the stego-image. Experimental results show that our method can achieve better quality of the stego-image than Thien and Lin’s method does. The text was submitted by the authors in English. Chin-Shiang Chan received his BS degree in Computer Science in 1999 from the National Cheng Chi University, Taipei, Taiwan and the MS degree in Computer Science and Information Engineering in 2001 from the National Chung Cheng University, ChiaYi, Taiwan. He is currently a Ph.D. student in Computer Science and Information Engineering at the National Chung Cheng University, Chiayi, Taiwan. His research fields are image hiding and image compression. Chin-Chen Chang received his BS degree in applied mathematics in 1977 and his MS degree in computer and decision sciences in 1979, both from the National Tsing Hua University, Hsinchu, Taiwan. He received his Ph.D. in computer engineering in 1982 from the National Chiao Tung University, Hsinchu, Taiwan. During the academic years of 1980–1983, he was on the faculty of the Department of Computer Engineering at the National Chiao Tung University. From 1983–1989, he was on the faculty of the Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan. From 1989 to 2004, he has worked as a professor in the Institute of Computer Science and Information Engineering at National Chung Cheng University, Chiayi, Taiwan. Since 2005, he has worked as a professor in the Department of Information Engineering and Computer Science at Feng Chia University, Taichung, Taiwan. Dr. Chang is a Fellow of IEEE, a Fellow of IEE and a member of the Chinese Language Computer Society, the Chinese Institute of Engineers of the Republic of China, and the Phi Tau Phi Society of the Republic of China. His research interests include computer cryptography, data engineering, and image compression. Yu-Chen Hu received his Ph.D. degree in Computer Science and Information Engineering from the Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan in 1999. Dr. Hu is currently an assistant professor in the Department of Computer Science and Information Engineering, Providence University, Sha-Lu, Taiwan. He is a member of the SPIE society and a member of the IEEE society. He is also a member of the Phi Tau Phi Society of the Republic of China. His research interests include image and data compression, information hiding, and image processing.  相似文献   

13.
Abstract

The perceptibility and capacity are two vital criteria of data hiding scheme. Concerning these criteria, data hiding algorithm used images as cover object based on the graph theory is proposed in this study. Images are quantised according to determined range and then quantised images are divided into n × n sized blocks. Each block is accepted as a graph and vertexes which have the same quantisation value are accepted as neighbours. Neighbourhood degrees of vertexes are calculated and indices of vertexes that have a neighbourhood degree over the threshold value are stored in the codebook. Pixel values indicated by these indices in the codebook are used for data hiding process. In this algorithm, there is no need for edge extraction because of hiding data to pixels containing vertexes having high neighbourhood degrees. The proposed method is compared with similar methods in literature in terms of the perceptibility and capacity. More successful results are provided than the others.  相似文献   

14.
Data hiding is an important technique for covert communication that embeds secret data into a cover image with minimal perceptible degradation. Lossless data hiding is a special type of data hiding technique that guarantees not only the secret data but the cover media can be reconstructed without any distortion. In this paper, a novel path optional lossless data hiding scheme based on the joint neighboring coding (JNC) of the vector quantization (VQ) index table is proposed. The proposed scheme generates a VQ index table based on the cover image first. Next, according to an initial key and secret data content, different adjacent indices may be chosen to perform joint neighboring coding for each index and hide secret data. Finally, an appropriate output codestream is generated based on the minimal length principle. Our main contributions lie in three aspects: (1) the method combines the novel path_based shift method with the traditional JNC method to improve the capacity and stego image quality simultaneously. (2) The secret data extraction and cover image recovering processes are separated and both can be publicized to users. (3) The method is path optional to meet various users’ requirements. To testify the superiority of the proposed method, we compare it with the side match VQ (SMVQ)-based and modified fast correlation VQ (MFCVQ)-based algorithms. According to the experimental results, the proposed scheme outperforms the SMVQ-based and MFCVQ-based algorithms in four aspects, i.e., hiding capacity, stego image quality, transmission efficiency and security level.  相似文献   

15.
Reversible data hiding has drawn considerable attention in recent years. Reversibility allows original media to be completely recovered from marked media without distortion after embedded message has been extracted. In this paper we propose a multilevel reversible data hiding scheme based on the difference image histogram modification that uses the peak point to hide messages. Through a joint imperceptibility and hiding capacity evaluation, we show that our proposed scheme uses a multilevel hiding strategy to achieve large hiding capacity and keep distortion low. Performance comparisons with other existing reversible hiding schemes are provided to demonstrate the validity of our proposed scheme.  相似文献   

16.
Image interpolation is a very important branch in image processing. It is widely used in imaging world, for example, image interpolation is often used in 3-D medical image to compensate for information insufficiency during image reconstruction by simulating additional images between two-dimensional images. Reversible data hiding has become significant branch in information hiding field. Reversibility allows the original media to be completely restored without any degradation after the embedded messages have been extracted. This study proposes a high-capacity image hiding scheme by exploiting an interpolating method called Interpolation by Neighboring Pixels (INP) on Maximum Difference Values to improve the performance of data hiding scheme proposed by Jung and Yoo. The proposed scheme offers the benefits of high embedding capacity with low computational complexity and good image quality. The experimental results showed that the proposed scheme has good performance for payload up to 2.28 bpp. Moreover, the INP yields higher PSNRs than other interpolating methods such as NMI, NNI and BI.  相似文献   

17.
随着互联网技术的发展和社交网络的普及,可逆信息隐藏技术因其具有无损恢复载体信息的特性而被广泛应用于医疗、军事等领域的隐蔽信息传输。传统的可逆信息隐藏方案大多聚焦于嵌入容量提升和载密图像失真率降低,并未过多关注人们对图像视觉细节的要求,难以抵抗隐藏信息检测方法。针对上述挑战,从增强图像视觉平滑度方面入手,提出了一种增强图像平滑度的可逆信息隐藏方案,在嵌入隐蔽信息的同时提升载密图像最终的视觉质量。具体来说,所提方案将目标图像分为参考区域与非参考区域,利用非参考区域的图像像素预测值与原始像素值的差值作为信息嵌入的判断依据,通过差值平移来嵌入信息;进而构造图像平滑机制,采用高斯滤波作为秘密信息嵌入时像素值修改的模板,对预测值进行滤波计算,将滤波差值无损地加入载体图像中,以达到图像平滑的效果;同时将参考区域的像素值作为边信息,用于实现信息提取方对原始载体图像和秘密信息的无损恢复和提取;并以高斯函数中的滤波系数作为预置秘密信息对嵌入信息进行加密处理以保证嵌入信息的机密性。大量经典图像数据集的测试与分析结果表明,所提方案处理过的载密图像视觉平滑度得到了显著增强,具有较低的失真率、较高的嵌入率和较高的嵌入提取效率。在典型环境下,其生成的载密图像与高斯滤波后的图像相似度可达0.996 3,且可获得37.346的峰值信噪比和0.328 9的嵌入容量。  相似文献   

18.
This paper proposes a novel data hiding method using pixel-value difference and modulus function for color image with the large embedding capacity(hiding 810757 bits in a 512×512 host image at least) and a high-visual-quality of the cover image. The proposed method has fully taken into account the correlation of the R, G and B plane of a color image. The amount of information embedded the R plane and the B plane determined by the difference of the corresponding pixel value between the G plane and the median of G pixel value in each pixel block. Furthermore, two sophisticated pixel value adjustment processes are provided to maintain the division consistency and to solve underflow and overflow problems. The most importance is that the secret data are completely extracted through the mathematical theoretical proof.  相似文献   

19.
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding.  相似文献   

20.
In order to raise the embedding capacity and simultaneously reduce the artifact effect caused by embedding secret messages into binary images, a novel data hiding method based on the combination theory is proposed. In the proposed scheme, a secret position matrix is designed to improve the hiding capacity which is capable of preventing the least distortion based on the combination theory. Our new scheme enables users to conceal more than one bit of secret data by changing at most one pixel in one subimage. We have derived a formula for computing the payload and the possible modification pixels of a block. Compared with the existing schemes in terms of the hiding capacity and the visual artifacts, as our experimental results show, the proposed scheme is capable of providing a better image quality protector even with a more efficient secret data hider.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号