您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (9): 76-83.doi: 10.6040/j.issn.1671-9352.2.2015.221

• • 上一篇    下一篇

基于整数变换的加密图像可逆信息隐藏算法

罗欣荣, 项世军*   

  1. 暨南大学信息科学技术学院, 广东 广州 510632
  • 收稿日期:2015-08-17 出版日期:2016-09-20 发布日期:2016-09-23
  • 通讯作者: 项世军(1974— ),男,博士,教授,主要研究方向为信息隐藏和多媒体信息安全.E-mail:12935711@qq.com; E-mail:610377796@qq.com
  • 作者简介:罗欣荣(1990— ),男,硕士研究生,主要研究方向为多媒体信息安全、可逆水印.E-mail:610377796@qq.com
  • 基金资助:
    国家自然科学基金资助项目(61272414);暨南大学“挑战杯”科技创新创业竞赛项目(141213029)

Reversible data hiding in encrypted image based on an integer transform

  1. Jinan University, School of Information Science and Technology, Guangzhou 510632, Guangdong, China
  • Received:2015-08-17 Online:2016-09-20 Published:2016-09-23

摘要: 兼顾嵌入容量和算法安全性,提出了一种基于整数变换的加密图像可逆信息隐藏算法。内容所有者利用变换密钥,选取相应的两相邻像素为一组进行整数变换。变换后的像素组受该整数变换特性的约束,使得其中任意一个最低有效位(LSB Least Significant Bit)被替换后,仍能恢复出原始像素组。因此,信息隐藏者可根据相同的密钥找到加密图像中已进行变换的像素组,利用嵌入密钥替换对应像素的LSB完成隐秘信息可逆嵌入。只有同时拥有变换密钥和嵌入密钥,才能正确提取嵌入信息;只有同时拥有变换密钥及加密密钥,才能恢复出原图像,所以算法安全性较高。实验结果表明,该算法能够有效地在加密域中直接进行信息的嵌入及提取,并在解密后无损地恢复出原图像;而且该算法的嵌入率可高达0.47 bpp(bit per pixel)。

关键词: 可逆信息隐藏, 整数变换, 图像加密, 大容量

Abstract: This paper proposed a novel reversible data hiding scheme in encrypted image which exploits an integer transform to achieve both high embedding capacity and security.In the proposed scheme, content owner implements an integer transform on the pixel groups which are selected by a transform key and composed of two adjacent pixels.Based on properties of the transform,the original pixels values can be recovered perfectly if one of LSBs(Least Significant Bit)in the transformed pixel group is altered.Data hider can seek the transformed pixel groups out from the encrypted image with the same transform key, select one pixel in each transformed group using an embedding key and embed additional data reversibly by replacing corresponding LSBs of the chosen pixels. Only if the receiver has both the transform key and embedding key, can the secret data be extracted without error.Only if the receiver has both the transform key and encryption key, can the original image be recovered perfectly. The experimental results demonstrate that additional data can be embedded and extracted directly in encrypted domain and the original image can be recovered losslessly. Besides, the embedding rate can reach 0.47 bpp(bit per pixel).

Key words: image encryption, integer transform, high embedding capacity, reversible data hiding

中图分类号: 

  • TP309
[1] HONSINGER C W, JONES P W, RABBAN I M, et al.Lossless recoveryof an original image containing embedded data: U.S. 6278791[P]. 2001-08-21.
[2] MACQ B. Lossless multiresolution transform for image authenticatingwatermarking [J]. European Signal Processing Conference, 2000, 23(4):731-753.
[3] FRIDRICH A J, GOLJAN M, DU R. Lossless data embedding for all image formats [J]. Electronic Imaging, 2002, 4675:572-583.
[4] CELIK M U, SHARMA G, TEKALP A M, et al.Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing, 2005, 14(2):253-266.
[5] TIAN J. Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):890-896.
[6] THODI D M, RODRÍGUEZ J J. Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007, 16(3):721-730.
[7] NI Z, SHI Y, ANSARI N, et al. Reversible data hiding[J]. IEEE Transactions on Circuitsand Systemsfor Video Technology, 2006, 16(3):354-362.
[8] SACHNEV V, KIM H J, NAM J H, et al.Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuitsand Systems for Video Technology, 2009, 19(7):989-999.
[9] LUO L, CHEN Z, CHEN M. Reversible imagewatermarking using interpolation technique[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):187-193.
[10] COLTUC D. Improved embedding for prediction-based reversible watermarking[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):873-882.
[11] LIX L, YANG B, ZENGT Y. Efficient reversible watermarkingbased on adaptive prediction-error expansion and pixel selection[J]. IEEE Transactions on Image Processing, 2011, 20(12):3524-3533.
[12] PUECH W, CHAUMONT M, STRAUSS O. A reversible data hiding method for encrypted images[J]. Proceedings of SPIE, 2008, 6819.
[13] ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.
[14] HONG W, CHENT S, WU H Y. An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012, 19(4):199-202.
[15] YU J, ZHU G, LI X, et al. An improved algorithm for reversible data hiding in encrypted image[J]. International Workshop on Digital-Forensics and Watermark, 2012, 7809:384-394.
[16] ZHANG X. Separable reversible data hiding in encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2):826-832.
[17] QIAN Z, ZHANG X, WANG S.Reversible data hiding in encrypted JPEG bit stream[J]. IEEE Transactions on Multimedia, 2014, 16(5):1486-1491.
[18] MA K, ZHANG W, ZHAO X, et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(3):553-562.
[19] COLTUC D, CHASSERY J M. High capacity reversible watermarking[J]. IEEE International Conference on Image Processing. Piscataway: IEEE, 2006: 2565-2568.
[1] 晏燕,郝晓弘. 差分隐私密度自适应网格划分发布方法[J]. 山东大学学报(理学版), 2018, 53(9): 12-22.
[2] 焦鸿儒,秦静. 可实现全部超星量子存取结构的量子秘密共享方案[J]. 山东大学学报(理学版), 2018, 53(9): 62-68.
[3] 许力冬,王明强. 对10轮AES-128的中间相遇攻击[J]. 山东大学学报(理学版), 2018, 53(7): 39-45.
[4] 张建标,李志刚,刘国杰,王超,王玮. 面向Windows环境进程主动动态度量方法[J]. 山东大学学报(理学版), 2018, 53(7): 46-50.
[5] 崔朝阳,孙甲琦,徐松艳,蒋鑫. 适用于集群无人机的自组网安全分簇算法[J]. 山东大学学报(理学版), 2018, 53(7): 51-59.
[6] 刘政,牛芳琳,钱大兴,蔡希彪,郭颖. 基于喷泉码的防窃听编码设计[J]. 山东大学学报(理学版), 2018, 53(7): 60-64.
[7] 刘明明,张敏情,刘佳,高培贤. 一种基于浅层卷积神经网络的隐写分析方法[J]. 山东大学学报(理学版), 2018, 53(3): 63-70.
[8] 阮树骅,瓮俊昊,毛麾,陈雪莲. 云安全风险评估度量模型[J]. 山东大学学报(理学版), 2018, 53(3): 71-76.
[9] 康海燕,黄渝轩,陈楚翘. 基于视频分析的地理信息隐私保护方法[J]. 山东大学学报(理学版), 2018, 53(1): 19-29.
[10] 孟博,鲁金钿,王德军,何旭东. 安全协议实施安全性分析综述[J]. 山东大学学报(理学版), 2018, 53(1): 1-18.
[11] 谭韧,殷肖川,焦贤龙,廉哲,陈玉鑫. 一种软件定义APT攻击移动目标防御网络架构[J]. 山东大学学报(理学版), 2018, 53(1): 38-45.
[12] 孙泽锐,王继军,李国祥,夏国恩. 基于插值图像的可逆信息隐藏算法[J]. 山东大学学报(理学版), 2018, 53(1): 46-52.
[13] 孙亮,陈小春,钟阳,林志鹏,任彤. 基于可信BMC的服务器安全启动机制[J]. 山东大学学报(理学版), 2018, 53(1): 89-94.
[14] 姚克,朱斌瑞,秦静. 基于生物信息的可验证公钥可搜索加密协议[J]. 山东大学学报(理学版), 2017, 52(11): 11-22.
[15] 韩盼盼,秦静. 云计算中可验证的外包数据库加密搜索方案[J]. 山东大学学报(理学版), 2017, 52(9): 41-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!