首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Wu  Haibin  Li  Fengyong  Qin  Chuan  Wei  Weimin 《Multimedia Tools and Applications》2019,78(18):25349-25372

This paper proposes a new separable reversible data hiding method for encrypted images. Proposed scheme employs the pixel redundancy of natural images to construct embedding space. First, cover image is divided into multiple blocks with different scales. According to the pixel average value of each block, the lowest two bits of every pixel are vacated as reserved rooms. Subsequently, the whole image is encrypted by using stream cipher and the secret messages are finally embedded into the reserved rooms by the embedding key. Proposed scheme is separable in the sense that the recipient can achieve different function by the following ways: (a) If the recipient has only decryption key, an approximation plaintext image containing the embedded information can be obtained. (b) If the recipient has only embedded key, secret messages can be extracted correctly. (c) If the recipient has both decryption key and embedded key, he can not only extract the secret messages, but recover the original cover image perfectly. Extensive experiments are performed to show that our proposed schemes outperform existing reversible data hiding schemes in terms of visual quality, embedding capacity and security performance, even if a large-scale image database is used.

  相似文献   

3.
Hui  Shi  Baoyue  Hu  Meihan  Chen  Yanni  Li  Yonggong  Ren 《Pattern Analysis & Applications》2023,26(1):123-161
Pattern Analysis and Applications - Data hiding is a noteworthy research topic in digital technology for years. It can be used for copyright protection, authentication, content-ownership...  相似文献   

4.
Xiao  Di  Zhao  Juan  Wang  Mengdi  Wang  Yong 《Multimedia Tools and Applications》2018,77(18):23949-23968
Multimedia Tools and Applications - In this paper, a separable data hiding algorithm in encrypted images with controllable and high-capacity is proposed. Firstly, the original image is decomposed...  相似文献   

5.

To better protect the security of users’ private data in the cloud environment, the technology for separable reversible data hiding in encrypted images has been attracting increasing attention from researchers. In this paper, we propose a separable reversible data hiding scheme in encrypted images based on the flexible preservation of differences. This scheme has three parts: 1) For the content owner, the original image is divided into non-overlapping blocks, for which block-mean is computed. Then the differences between the values of every pixel and the block-mean are obtained and an initial label map is generated. Because most of the differences tend to concentrate around 0, we use two bits to dynamically record the range of the differences to vacate space for hiding. Further, introducing the block-mean differences also serves to vacate more space, for which the label map is amended accordingly. Finally, the image with free space is encrypted into the encrypted image using an encryption key. 2) For the data hider, the secret bits are embedded into the encrypted image by directly replacing the spare bits without obtaining any information of the original image. 3) For the receiver, he/she can achieve the desired information according to the key in his/her possession. Experimental results show that our proposed scheme is able to achieve an average embedding capacity as large as 1.785 bpp and 1.709 bpp when block size is set to 2?×?2 and 2?×?4, respectively. Comparison with those of previous schemes, the proposed scheme has excellent embedding capacity, especially for smoother images.

  相似文献   

6.
Ponuma  R.  Amutha  R.  Aparna  S.  Gopal  Gayatri 《Multimedia Tools and Applications》2019,78(18):25707-25729

A visually secure multiple image encryption using chaotic map and compressive sensing is proposed. The existing image encryption algorithms transform a secret image into a random noise like cipher image which can lead to cryptanalysis by an intruder. In the proposed method, compressive sampling is done using a chaos based, key controlled measurement matrix. An image dependent key generation scheme is used to generate the parameters of the chaotic map. The secret images are transformed into wavelet coefficients, and scrambled along a zigzag path, so that the high correlation among them can be reduced and thereby provide increased security level. The sparse coefficients are measured using the chaotic map-based measurement matrix, whose initial parameters are obtained from the keys generated. Then the reduced measurements are embedded into the sub-bands of the wavelet transformed cover image. Therefore, the proposed algorithm is highly sensitive to the secret images and can effectively withstand known-plaintext and chosen-plaintext attacks. Additionally, the cipher image and the secret images are of same size and do not require additional transmission bandwidth and storage space.

  相似文献   

7.
Li  Qi  Yan  Bin  Li  Hui  Chen  Na 《Multimedia Tools and Applications》2018,77(23):30749-30768
Multimedia Tools and Applications - Reversible data hiding (RDH) has to be conducted in the encrypted images when original images are encrypted for privacy protection in some open environments,...  相似文献   

8.
Multimedia Tools and Applications - In this paper, a novel separable reversible data hiding in homomorphic encrypted images (RDHEI) using POB number system is proposed. The frame of the proposed...  相似文献   

9.
We propose a method of reversible data hiding in encrypted image. Proposed method achieves reserving room before encryption, and separates data extraction from image decryption. Our method is an improvement of Ma’s method [IEEE Trans Inf Forensic Secur 8(3):554–558, 2013]. Our improvements mainly focus on two aspects. (1) We improved the interpolation error estimate method via using Bicubic interpolation instead of pixel estimation that calculates the weighted sum of four surrounding pixels. Thus more sharp interpolation error histogram is obtained to increase the hidden information capacity. (2) We use partitioned local histogram shift instead of traditional histogram shift to reduce the amount of shifted pixels. This directly results in a higher quality of stego image in the same embedding capacity. The experimental results indicate that the improved method offers better performance. It is superior to Ma’s work in both embedding rate and the PSNR values of stego images.  相似文献   

10.
In this paper, we propose a new digital watermarking algorithm in encrypted image based on compressive sensing measurements and 2-D discrete wavelet transform (DWT). Firstly, we process the original image through 2-D DWT to highlight the important part and unimportant part. For the important LL2 coefficient, before encrypting it by the traditional stream cipher, we divide it into blocks, and mark the blocks to get a sequence as the watermark position key. For other wavelet coefficients, we select two different compressive sensing measurement matrices to simultaneously encrypt and compress them, respectively. Then we embed a watermark into the high frequency coefficient measurements except HH1 section based on the watermark position key. Finally, the watermarked image is scrambled to enhance the security. In this algorithm, compressive sensing is adopted for compression and encryption, and watermark is embedded in the measurements values. It can not only increase the watermark embedding capacity and robustness, but also utilize the reconstruction characteristic of compressive sensing to get higher-quality recovered image. The experimental results verify the validity and the reliability of the proposed algorithm.  相似文献   

11.
12.
13.
改进了一种图像加密域可分离可逆信息隐藏的算法,设计并实现了一个图像加密域的可分离可逆信息隐藏软件系统。在此系统中,内容拥有者对未压缩的原始图像使用加密密钥进行加密。然后,信息隐藏者使用信息隐藏密钥把加密图像的最低位平面进行压缩,在压缩所得的空余空间里嵌入额外数据。最后得到包含嵌入信息的加密图像:拥有信息隐藏密钥的接收方,尽管不知道原始图片内容也可以提取出隐藏信息;拥有加密密钥的接收方可以获得原始图像的近似图,但是不能提取隐藏信息;如果同时拥有加密密钥和信息隐藏密钥,那么既可以提取出隐藏信息,也可以利用自然图像的空间相关性恢复出图像的相似图像。实例测试的结果表明,算法具有嵌入容量大、操作更灵活的优点。  相似文献   

14.
Although many data hiding schemes have been proposed in the frequency domain, the tradeoff between hiding capacity and image quality is still an existing problem to be solved. In this paper, we proposed a novel reversible data hiding scheme based on the Haar discrete wavelet transform (DWT) and interleaving-prediction method. First, a one-level Haar discrete wavelet transform (DWT) is implemented to the cover image, and four sub-bands, LL?,??HL?,??LH and?HH, are obtained. Sub-bands HL, LH??and?HH are chosen for embedding. After that, the wavelet coefficients of the chosen sub-bands are zig-zag scanned and two adjacent coefficients are used for prediction. The secret data is embedded in the prediction errors, which is the difference between the original value and the predicted value of the wavelet coefficients. The experimental results showed that our scheme has good performance compared with other existing reversible data hiding schemes.  相似文献   

15.
针对传统的图像预测误差算法预测精度弱、嵌入容量较低以及在密文域应用局限等问题。结合Paillier同态加密算法,提出了一种基于插值预测误差的密文域可逆信息隐藏算法。该方案首先对原始载体图像进行采样,然后引入权重,利用采样像素点对非采样像素点进行预测,而后采样像素点利用序列密码进行加密,非采样像素点利用Paillier同态算法加密,最后在加密后的图像上进行秘密信息的嵌入。实验仿真结果表明,该方案在保证预测精度的前提下,可以达到的最高嵌入容量为1.2 bpp,同时具有一定的安全性保证。  相似文献   

16.
针对密文图像可逆信息隐藏中存在信息嵌入率不高的问题,提出一种基于图像位平面循环异或的可逆信息隐藏算法.将图像高位平面和其相邻的位平面依次循环异或构造新的图像,利用块重排列对新图像的位平面进行无损压缩以便腾出空间,对压缩后的图像进行加密之后在腾出的空间位置嵌入额外的秘密信息.接收方接收含有秘密信息的加密图像后,根据需求可以对图像进行可分离式的提取信息和无损恢复原始图像.实验结果表明,通过循环异或操作后的图像位平面更适合无损压缩,算法的嵌入容量得到显著提升.  相似文献   

17.
18.
Li  Fengyong  Zhu  Hengjie  Yu  Jiang  Qin  Chuan 《Multimedia Tools and Applications》2021,80(2):2141-2159

Existing prediction-based works on reversible data hiding in encrypted images usually embed the secret messages by referring to the difference between current pixel and its predicted value. An accurate prediction model may promote an improvement of embedding capacity. Existing schemes, however, may not work well due to involving a bad prediction model so that their embedding capacity cannot be improved further. To address the problem, this paper proposes a new reversible data hiding scheme in encrypted images by designing double linear regression prediction model. Proposed model can significantly improve the prediction accuracy of current pixel based on neighboring pixels, more auxiliary rooms are thus vacated to embed secret data. Furthermore, a prediction error map is constructed to mark the error positions caused by inaccurate prediction, which can be further compressed lossless to lower the capacity of auxiliary data. Reversible recovery for original image can be finally achieved successfully. Experimental results demonstrate that the proposed scheme significantly improves prediction accuracy and data embedding capacity by combining double linear regression prediction model and prediction error map, and then can achieve separable and lossless recovery for the original image. Compared with existing works, the proposed scheme can implement a higher visual quality of decrypted images, while maintaining a larger embedding capacity.

  相似文献   

19.
Yin  Zhaoxia  Niu  Xuejing  Zhang  Xinpeng  Tang  Jin  Luo  Bin 《Multimedia Tools and Applications》2018,77(14):18067-18083
Multimedia Tools and Applications - Signal processing in the encrypted domain has attracted a lot of attention due to the requirement for content security and privacy protection. Reversible data...  相似文献   

20.
Multimedia Tools and Applications - Recently, a reversible data hiding (RDH) scheme based on code division multiplexing (CDM) has been reported, in which secret information and pseudo bits are...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号