浏览全部资源
扫码关注微信
1. 信息工程大学,河南 郑州450001
2. 数学工程与先进计算国家重点实验室,河南 郑州450001
3. 中国科学院 信息工程研究 所信息安全国家重点实验室,北京 100093
[ "刘九芬(1963-),女,河南温县人,博士,信息工程大学教授,主要研究方向为密码学和信息隐藏。" ]
[ "韩涛(1986-),男,四川彭州人,信息工程大学博士生,主要研究方向为密码学和信息隐藏。" ]
[ "田雨果(1986-),男,四川雅安人,信息工程大学硕士生,主要研究方向为密码学和信息隐藏。" ]
[ "刘文彬(1989-),男,河南许昌人,信息工程大学硕士生,主要研究方向为信息隐藏。" ]
网络出版日期:2016-09,
纸质出版日期:2015-09-25
移动端阅览
刘九芬, 韩涛, 田雨果, 等. 基于重复压缩的密文图像可逆数据隐藏方法[J]. 通信学报, 2015,36(9):13-25.
Jiu-fen LIU, Tao HAN, Yu-guo TIAN, et al. Reversible data hiding in encrypted images using recompression[J]. Journal on communications, 2015, 36(9): 13-25.
刘九芬, 韩涛, 田雨果, 等. 基于重复压缩的密文图像可逆数据隐藏方法[J]. 通信学报, 2015,36(9):13-25. DOI: 10.11959/j.issn.1000-436x.2015166.
Jiu-fen LIU, Tao HAN, Yu-guo TIAN, et al. Reversible data hiding in encrypted images using recompression[J]. Journal on communications, 2015, 36(9): 13-25. DOI: 10.11959/j.issn.1000-436x.2015166.
为了提高密文图像上的可逆数据隐藏方法的性能,在加密前处理图像以获得数据嵌入空间。首先,分析了在解压缩分块上进行可逆嵌入的可行性;其次,计算了成功恢复解压缩分块的理论概率;最后,提出了基于解压缩分块的密文图像可逆数据隐藏算法,主要过程包括预处理、加密、数据嵌入、数据提取与图像恢复。从图像恢复错误率、嵌入容量和PSNR这3个方面与3种已有方法进行对比,表明所提方法实现了数据提取和图像解密在操作上的完全分离,且图像恢复错误率更低,嵌入容量更大,PSNR更高。
To improve the performance of RDH (reversible data hiding) method in encrypted images
the embedding room was reserved before encryption and realizes the real separation of the data extraction from image decryption in op-eration.First
the feasibility of RDH in JPEG decompressed image blocks was researched.Then the theoretical probabil-ity of successful recovery of decompressed image blocks was calculated.Finally
a method of RDH in encrypted images was proposed and the main steps of the method include pretreatment
encryption
data embedding
data extraction and image recovery.The performance of the proposed method was compared with three existing RDH methods in encrypted images.The results demonstrate the proposed method has less error in image recovery
and for given embedding rates
the PSNR of decrypted image containing the embedded data are significantly improved.
KALKER T , WILLEMS F M J . Capacity bounds and constructions for reversible data hiding [A ] . Proceedings of the 14th International Confer-ence on Digital Signal Processing [C ] . Santorini,Greece , 2002 . 71 - 76 .
ZHANG W , CHEN B , YU N . Capacity bounds and constructions for reversible data hiding [A ] . Proc of the Information Hiding [C ] . Springer Berlin Heidelberg , 2011 . 255 - 269 .
ZHANG W , CHEN B , YU N . Improving various reversible data hiding schemes via optimal codes for binary covers [J ] . IEEE Transactions on Image Processing , 2012 , 21 ( 6 ): 2991 - 3003 .
FRIDRICH J , GOLJAN M , DU R . Lossless data embedding for all image formats [A ] . Proc of the Electronic Imaging,International Soci-ety for Optics and Photonics [C ] . Santorini,Greece , 2002 . 572 - 583 .
TIAN J . Reversible data embedding using a difference expansion [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2003 , 13 ( 8 ): 890 - 896 .
NI Z , SHI Y Q , ANSARI N , et al . Reversible data hiding [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2006 , 16 ( 3 ): 354 - 362 .
LI X , YANG B , ZENG T . Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection [J ] . IEEE Transactions on Image Processing , 2011 , 20 ( 12 ): 3524 - 3533 .
TSAI P , HU Y C , YEH H L . Reversible image hiding scheme using predictive coding and histogram shifting [J ] . Signal Processing , 2009 , 89 ( 6 ): 1129 - 1143 .
LUO L , CHEN Z , CHEN M , et al . Reversible image watermarking using interpolation technique [J ] . IEEE Transactions on Information Forensics and Security , 2010 , 5 ( 1 ): 187 - 193 .
MENEZES A J , VAN OORSCHOT P C , VANSTONE S A . Handbook of Applied Cryptography [M ] . Boca Raton,FL,USA:CRC , 1996 .
HWANG K , LI D . Trusted cloud computing with secure resources and data coloring [J ] . Internet Computing,IEEE , 2010 , 14 ( 5 ): 14 - 22 .
ZHANG X , LI D . Reversible data hiding in encrypted image [J ] . Signal Processing Letters,IEEE , 2011 , 18 ( 4 ): 255 - 258 .
HONG W , CHEN T S , WU H Y . An improved reversible data hiding in encrypted images using side match [J ] . Signal Processing Letters,IEEE , 2012 , 19 ( 4 ): 199 - 202 .
ZHANG X . Separable reversible data hiding in encrypted image [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 2 ): 826 - 832 .
JOHNSON M , ISHWAR P , PRABHAKARAN V , et al . On compress-ing encrypted data [J ] . IEEE Transactions on Signal Processing , 2004 , 52 ( 10 ): 2992 - 3006 .
LIU W , ZENG W , DONG L , et al . Efficient compression of encrypted grayscale images [J ] . IEEE Transactions on Image Processing , 2010 , 19 ( 4 ): 1097 - 1102 .
MA K , ZHANG W , ZHAO X . IEEE Transactions on Information Forensics and Security [J ] . IEEE Transactions on Image Processing , 2013 , 8 ( 3 ): 553 - 562 .
NRCS Photo Gallery [EB/OL ] . http://photogallery.nrcs.usda.gov/ http://photogallery.nrcs.usda.gov/ . 2011 .
LUO W , HUANG J , QIU G . JPEG error analysis and its applications to digital image forensics [J ] . IEEE Transactions on Information Foren-sics and Security , 2010 , 5 ( 3 ): 480 - 491 .
LAM E Y , GOODMAN J W . A mathematical analysis of the DCT coefficient distributions for images [J ] . IEEE Transactions on Image Processing , 2000 , 9 ( 10 ): 1661 - 1666 .
FRIDRICH J , GOLJAN M , SOUKAL D . Perturbed quantization steganography [J ] . Multimedia Systems , 2005 , 11 ( 2 ): 98 - 107 .
Miscelaneous gray level images [EB/OL ] . http://decsai.ugr.es/cvg/dbimagenes/g512.php http://decsai.ugr.es/cvg/dbimagenes/g512.php .
0
浏览量
935
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构