山东大学学报(理学版) ›› 2018, Vol. 53 ›› Issue (1): 46-52.doi: 10.6040/j.issn.1671-9352.2.2017.377
孙泽锐1,王继军2,李国祥1,夏国恩1
SUN Ze-rui1, WANG Ji-jun2, LI Guo-xiang1, XIA Guo-en1
摘要: 为了提高可逆信息隐藏算法的容量,提出一种基于插值图像的可逆信息隐藏算法。将原始图像用最近邻插值算法放大,以放大后的图像作为载体图像进行隐藏。计算插值像素与相邻两个原始像素均值的差值,根据差值控制嵌入秘密信息的位数,根据秘密信息的数值修改插值像素实现秘密信息的隐藏。接收方提取秘密信息后,可对载密图像下采样恢复出载体图像,实现可逆信息隐藏。实验表明提出的算法可实现较大容量的信息隐藏,同时,在相同隐藏容量的情况下,具有较好的视觉效果。
中图分类号:
[1] BENDER W R, GRUHL D, MORIMOTO N. Techniques for data hiding [C] //IS&T/SPIE's Symposium on Electronic Imaging: Science & Technology. [S.l.] :International Society for Optics and Photonics, 1995:313-336. [2] FRIDRICH J, GOLJAN M, DU R. Lossless data embedding——new paradigm in digital watermarking [J]. Eurasip Journal on Applied Signal Processing, 2002, 2002(2): 185-196. [3] FRIDRICH A J, GOLJAN M, DU R. Lossless data embedding for all image formats [J]. Proceedings of SPIE-The International Society for Optical Engineering, 2002, 4675:572-583. [4] CELIK M U, SHARMA G, TEKALP A M, et al. Lossless generalized-LSB data embedding [J]. IEEE Trans Image Process, 2005, 14(2): 253-266. [5] TIAN J. Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):890-896. [6] ALATTAR A M. Reversible watermark using the difference expansion of a generalized integer transform [J]. IEEE Transactions on Image Processing, 2004, 13(8):1147-1156. [7] TSENG H W, CHANG C C. An extended difference expansion algorithm for reversible watermarking [J]. Image and Vision Computing, 2008, 26(8), 1148-1153. [8] LEE C C, WU H C, TSAI C S, et al. Adaptive lossless steganographic scheme with centralized difference expansion [J]. Pattern Recognition, 2008, 41(6):2097-2106. [9] LIU Y C, WU H C, YU S S. Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map [J]. Multimedia Tools & Applications, 2011, 52(2-3):263-276. [10] NI Z, SHI Y Q, ANSARI N, et al. Reversible data hiding [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2006, 16(3):354-362. [11] FALLAHPOUR M, SEDAAGHI M H. High capacity lossless data hiding based on histogram modification [J]. Ieice Electronics Express, 2007, 4(7):205-210. [12] CHANG C C, TAI W L, CHEN K N. Lossless data hiding based on histogram modification for image authentication [C] //International Conference on Embedded and Ubiquitous Computing. [S.l.] :IEEE Computer Society, 2008:506-511. [13] TAI W L, YEH C M, CHANG C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2009, 19(6):906-910. [14] 王继军. 图像插值空间大容量可逆数字水印算法[J]. 中国图象图形学报, 2014, 19(4):527-533. WANG Jijun. High capacity reversible watermarking for image interpolation space [J]. Journal of Image and Graphics, 2014, 19(4):527-533. [15] 熊祥光. 基于图像插值的大容量可逆水印算法[J]. 光电子·激光, 2016(6):646-654. XIONG Xiangguang. High capacity reversible watermarking algorithm based on image interpolation [J]. Journal of Optoelectronics·Laser, 2016, 27(6):646-654. [16] JUNG K H, YOO K Y. Data hiding method using image interpolation [J]. Computer Standards & Interfaces, 2009, 31(2):465-470. [17] LEE C F, HUANG Y L. An efficient image interpolation increasing payload in reversible data hiding [J]. Expert Systems with Applications, 2011, 38(7):6712-6719. [18] HONG W, CHEN T S. Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism [J]. Journal of Visual Communication & Image Representation, 2011, 22(2):131-140. [19] ZHANG X Q, SUN Z R, TANG Z J, et al. High capacity data hiding based on interpolated image[J]. Multimedia Tools & Applications, 2016:1-24. [20] USC-SIPI Image Database [EB/OL]. [2017-05-21]. http://sipi.usc.edu/database/. [21] LEE C F, HUANG Y L. An efficient image interpolation increasing payload in reversible data hiding[J]. Expert Systems with Applications, 2012, 39(8):6712-6719. |
[1] | 丁义涛,杨海滨,杨晓元,周潭平. 一种同态密文域可逆隐藏方案[J]. 山东大学学报(理学版), 2017, 52(7): 104-110. |
[2] | 王尧,周云,任艳丽. 强2-好环[J]. 山东大学学报(理学版), 2017, 52(2): 14-18. |
[3] | 罗欣荣, 项世军. 基于整数变换的加密图像可逆信息隐藏算法[J]. 山东大学学报(理学版), 2016, 51(9): 76-83. |
[4] | 魏杰, 董珺. 强α-可逆环的推广[J]. 山东大学学报(理学版), 2015, 50(03): 88-94. |
[5] | 陈权1,2,项世军2*. 基于intDCT和扩展嵌入的可逆脆弱认证水印研究[J]. J4, 2012, 47(11): 24-30. |
[6] | 任俊玲1,王承权2. 基于标记字典的网页信息隐藏算法[J]. J4, 2012, 47(11): 40-44. |
[7] | 董珺, 魏杰. α-可逆环的一点注记[J]. J4, 2010, 45(4): 54-59. |
[8] | 董珺 魏杰. α-可逆环的推广[J]. J4, 2009, 44(8): 62-67. |
[9] | 张丽梅,乔立山,李 莹 . 可逆坡矩阵与坡矩阵的秩[J]. J4, 2007, 42(9): 122-126 . |
|