首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Wang  Weiqing  Wang  Weihua 《Multimedia Tools and Applications》2020,79(25-26):18143-18165

Recently, reversible-data-hiding (RDH) scheme has been developed rapidly. In this paper, based on the local distribution of pixels in a block, (30) a histogram shifting (HS) based RDH scheme using median prediction error is proposed to increase the embedding capacity (EC) and decrease the distortion of stego image. First, we scan an original image to form the non-overlapping blocks. Then each block is sorted for locating its median. So, the median is used as the center to embed data into the pixels distributing on both sides of the median pixel in the block. Finally, the receiver can seek the same median of the block for data extraction and the recovery of the original image. Besides, we use the decomposed location message to modify the original pixels with overflow/underflow. (12) As the median is close to the mean value of block, the generated prediction error histogram is sharper than other schemes, which can provide a high capacity and lower distortion. Thus, the EC of the proposed algorithm outperforms that of the other algorithms. Experiments show the proposed scheme can provide a higher embedding rate and lower distortion as it takes advantage of the local correlation in a block.

  相似文献   

2.
Ponuma  R.  Amutha  R.  Aparna  S.  Gopal  Gayatri 《Multimedia Tools and Applications》2019,78(18):25707-25729

A visually secure multiple image encryption using chaotic map and compressive sensing is proposed. The existing image encryption algorithms transform a secret image into a random noise like cipher image which can lead to cryptanalysis by an intruder. In the proposed method, compressive sampling is done using a chaos based, key controlled measurement matrix. An image dependent key generation scheme is used to generate the parameters of the chaotic map. The secret images are transformed into wavelet coefficients, and scrambled along a zigzag path, so that the high correlation among them can be reduced and thereby provide increased security level. The sparse coefficients are measured using the chaotic map-based measurement matrix, whose initial parameters are obtained from the keys generated. Then the reduced measurements are embedded into the sub-bands of the wavelet transformed cover image. Therefore, the proposed algorithm is highly sensitive to the secret images and can effectively withstand known-plaintext and chosen-plaintext attacks. Additionally, the cipher image and the secret images are of same size and do not require additional transmission bandwidth and storage space.

  相似文献   

3.
Transmission of block-coded images through error prone radio mobile channel often results in lost blocks. To this aim, this paper proposes a protection mechanism for discrete cosine transform based compressed image(s) through error concealment without affecting the compatibility of standard JPEG coding. The goal is achieved by embedding a low-resolution version (image-digest) of an image into itself during encoding using M-ary quantization index modulation. Halftoning technique is used to obtain the image digest from the host image. At the decoder, this embedded watermark is extracted first and is then used as a reference one to conceal the transmission losses in the received image. Mathematical analysis as well as simulation results show that the use of M-ary modulation offers significant performance improvement than traditional quantization index modulation based methods in large number of lost block (packet) scenario. Relative compensation for visual quality improvement is also tested in Rayleigh fading wireless channel and is compared with the few other existing methods.  相似文献   

4.
5.
Data hiding is to conceal the existence of secret data. A reversible data hiding method can extract the cover image without any distortion from the stego-image after the hidden data have been extracted. This paper proposes a new interpolation and a data hiding method. The proposed scaling-up neighbor mean interpolation method has a low-time complexity and high-calculation speed. The proposed data hiding method is based on interpolation. Comparison on data hiding methods is divided into reversible or not. Our experimental results show the proposed method can embed a large amount of secret data while keeping a very high visual quality, the PSNR is guaranteed to be higher than 35 dB compared with other reversible data hiding methods. And also capacity is larger than any other reversible data hiding methods and comparable to other data hiding methods.  相似文献   

6.
Data hiding used to embed data, such as copyright information, into various forms of media such as image, audio, or text with a minimum amount of perceivable degradation to the “host” signal. Therefore, in many cases, the cover media contain distortions even after the hidden data have been extracted. Thus, to extend the application of data hiding to some sensitive domains such as military, medical, and fine arts, which require the embedded cover images to be properly covered, reversible data hiding has become another new branch of this field. Our proposed scheme is inspired by Chang et al.’s idea. In this paper, we propose adaptive real-time reversible data hiding for JPEG images using successive zero coefficients in zigzag sequences of discrete cosine transformation blocks. The contribution of our proposed scheme successfully enhances the hiding capacity while the image quality of stego image and reversibility are maintained. The result of experiments conducted indicates that the proposed scheme enhances data hiding capacity, image quality, and improves performance.  相似文献   

7.
We propose a method of reversible data hiding in encrypted image. Proposed method achieves reserving room before encryption, and separates data extraction from image decryption. Our method is an improvement of Ma’s method [IEEE Trans Inf Forensic Secur 8(3):554–558, 2013]. Our improvements mainly focus on two aspects. (1) We improved the interpolation error estimate method via using Bicubic interpolation instead of pixel estimation that calculates the weighted sum of four surrounding pixels. Thus more sharp interpolation error histogram is obtained to increase the hidden information capacity. (2) We use partitioned local histogram shift instead of traditional histogram shift to reduce the amount of shifted pixels. This directly results in a higher quality of stego image in the same embedding capacity. The experimental results indicate that the improved method offers better performance. It is superior to Ma’s work in both embedding rate and the PSNR values of stego images.  相似文献   

8.
Multimedia Tools and Applications - In this paper, we propose a new reversible data-hiding method in encrypted images. The method is a vacating room after encryption (VRAE) method that attempts to...  相似文献   

9.
We investigate the use of parabolic interpolation in data hiding and propose a novel data hiding algorithm with high capacity based on interpolated image. Specifically, the proposed algorithm creates an interpolated image from input image by parabolic interpolation, and embeds secret bits into interpolated pixels in terms of the relation between the interpolated value and the mean value. Ten standard benchmark images are taken as test images for validating efficiency of our algorithm. The results illustrate that our algorithm has better performances than some popular data hiding methods in embedding capacity and visual quality with respect to PSNR and SSIM.  相似文献   

10.
In this paper, we propose an image interpolation based reversible data hiding scheme using pixel value adjusting feature. This scheme consists of two phases, namely: image interpolation and data hiding. In order to interpolate the original image, we propose a new image interpolation method which is based on the existing neighbor mean interpolation method. Our interpolation method takes into account all the neighboring pixels like the NMI method. However, it uses different weight-age as per their proximity. Thus, it provides the better quality interpolated image. In case of data hiding phase, secret data is embedded in the interpolated pixels in two passes. In the first pass, it embeds the secret data into the odd valued pixels and then in the second pass, the even valued pixels are used to embed the secret data. To ensure the reversibility of the proposed scheme, the location map is constructed for every pass. Basically, the proposed scheme only increases/decreases the pixel values during data hiding phase, which improves the performance of the proposed scheme in terms of computation complexity. Experimentally, our scheme is superior to the existing scheme in terms of data hiding capacity, image quality and computation complexity.  相似文献   

11.
Multimedia Tools and Applications - In this paper, we propose a new dual-image based reversible data hiding scheme through (7,4) Hamming code (RDHHC) using shared secret key. A block of seven...  相似文献   

12.
Multimedia Tools and Applications - Protecting the security of information transmission over the Internet has become a critical contemporary issue. Compressed images are now widely used in mobile...  相似文献   

13.
A novel reversible watermarking (RW) scheme based on a local smoothness estimator and multi-step embedding strategy is proposed in this paper. All the pixels are divided into four equal parts. Correspondingly, the watermark embedding process is separated into four independent steps. Thus each step is performed to embed watermark information into its corresponding image part. In each step, for each to-be-embedded pixel, a local smoothness estimator defined as the variance of its total neighbors is presented to estimate its local smoothness. An obvious advantage of introducing this estimator is that it can determine those pixels in smooth regions accurately. In fact, accurate determination means the decrease in embedding distortion. At the low embedding rate (ER), modifications induced by difference expansion (DE) are done only to those pixels located in smooth regions. Hence, the proposed method can obtain high embedding capacity while maintaining good visual quality. With ER gradually increased, adaptive embedding is employed. In adaptive embedding, for one to-be-embedded pixel, 1 or 2 bits are adaptively embedded according to the strength of relationship among all the pixels surrounding it. The experimental results demonstrate that the proposed method is effective.  相似文献   

14.
Multimedia Tools and Applications - Data hiding is a technique that embeds a cluster of secret messages into the original image. The image with secret messages can be distributed on the Internet...  相似文献   

15.
A new data hiding scheme for binary image authentication that has a small distortion of the cover image is proposed in this paper. Using the data-embedding algorithm that is based on Hamming codes, the proposed scheme embeds authentication information into the cover image with flipping only a small number of pixels. A special type of the pixels are selected and flipped by a new algorithm to minimize visual distortion. This new algorithm is based on ELSSM (Edge Line Segment Similarity Measure). Randomly shuffling the bit-order of the authentication information to be embedded, the information can only be extracted by the designated receiver who has the symmetric key. We employ two measurement metrics: miss detection rates for the degree of security and PSNR (Peak Signal-to-Noise Ratio) and ELSSM for the degree of the image distortion to demonstrate the feasibility of the proposed scheme. Using these metrics, we analyze the proposed scheme and the previous schemes. The analysis reveals that the proposed scheme requires less image distortion than the previous schemes whilst achieving the same level of the miss detection rate. Experimental results demonstrate that the proposed scheme is more resilient against recent steganalysis attacks than the previous schemes.  相似文献   

16.
Image interpolation is a very important branch in image processing. It is widely used in imaging world, for example, image interpolation is often used in 3-D medical image to compensate for information insufficiency during image reconstruction by simulating additional images between two-dimensional images. Reversible data hiding has become significant branch in information hiding field. Reversibility allows the original media to be completely restored without any degradation after the embedded messages have been extracted. This study proposes a high-capacity image hiding scheme by exploiting an interpolating method called Interpolation by Neighboring Pixels (INP) on Maximum Difference Values to improve the performance of data hiding scheme proposed by Jung and Yoo. The proposed scheme offers the benefits of high embedding capacity with low computational complexity and good image quality. The experimental results showed that the proposed scheme has good performance for payload up to 2.28 bpp. Moreover, the INP yields higher PSNRs than other interpolating methods such as NMI, NNI and BI.  相似文献   

17.
The principal components transformation is used to highlight regions of localized change evident in satellite multispectral imagery associated with bushfire damage and with vegetation regrowth following fire burns. In line with previous studies by other investigators it is the higher order components that are seen to lead to change enhancement. These components are classified by unsupervised techniques to yield thematic maps on which change classes are recorded. In this manner, confusion of class signatures between dynamic and static cover types is avoided. In the present case this relates to confusion between fire burn regions and water edge mixed pixels.  相似文献   

18.
19.
Multimedia Tools and Applications - Data hiding in multimedia objects such as text, images, audio and video clips is a technique that has been widely used to achieve security for applications...  相似文献   

20.
针对现有可逆信息隐藏算法嵌入容量不高并且不适合多光谱图像的问题,提出一种基于谱段交织预测的多光谱图像可逆信息隐藏算法.利用含秘图像像素值与原始图像像素值相差不大于1的特点,结合含秘谱段对多光谱图像进行多波段预测,通过预测误差直方图移位技术嵌入秘密信息.Landsat卫星和Terra卫星多光谱图像仿真结果表明,提出的算法和典型可逆信息隐藏算法相比具有更好的视觉质量和隐藏容量.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号