用户名: 密码: 验证码:
减少相邻位平面间冗余度的加密图像可逆信息隐藏
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Reduction of the redundancy of adjacent bit planes for reversible data hiding in encrypted images
  • 作者:袁源 ; 和红杰 ; 陈帆
  • 英文作者:Yuan Yuan;He Hongjie;Chen Fan;Sichuan Key Laboratory of Signal and Information Processing,Southwest Jiaotong University;
  • 关键词:位平面冗余度 ; 图像加密域 ; 可逆信息隐藏 ; BBE(binary-block ; embeding) ; 位平面压缩 ; 高嵌入率
  • 英文关键词:bit plane redundancy;;image encryption;;reversible data hiding;;binary-block embeding(BBE);;bit plane compression;;high embedding rate
  • 中文刊名:ZGTB
  • 英文刊名:Journal of Image and Graphics
  • 机构:西南交通大学信号与信息处理四川省重点实验室;
  • 出版日期:2019-01-16
  • 出版单位:中国图象图形学报
  • 年:2019
  • 期:v.24;No.273
  • 基金:国家自然科学基金项目(61872303,61461047);; 四川省科技厅科技创新人才计划基金项目(2018RZ0143)~~
  • 语种:中文;
  • 页:ZGTB201901002
  • 页数:10
  • CN:01
  • ISSN:11-3758/TB
  • 分类号:17-26
摘要
目的针对现有的加密域可逆信息隐藏算法在对位平面压缩时未能充分利用位平面间的相关性的问题,为了降低位平面的压缩率从而提高嵌入容量,提出一种减少相邻位平面间冗余度的加密域可逆信息隐藏算法。方法算法将图像进行分块并将块的位置进行置乱,置乱并未改变位平面的块内像素的相关性,使得位平面的块同样利于压缩。将块置乱后的图像的高位平面与次高位进行异或操作后得到新的次高位平面,再用新的次高位异或比它低一位的位平面。依次对其余的低位平面进行同样的操作后得到新的低7个位平面,将它们与原始最高位相结合得到新的图像的8个位平面。使用BBE(binary-block embeding)算法对新的图像的位平面进行压缩为嵌入信息腾出空间。为了保证加密图像的安全性,对腾出空间后的图像进行异或加密。结果对相邻位平面进行异或后使除了最高位平面外的低位平面更平滑,减少了不能使用BBE算法压缩的块及压缩的不好的块的个数,更有利于用BBE算法对图像进行压缩。提出的算法与现有的基于位平面压缩的算法相比得到了较高的嵌入率,对不同纹理的图像而言,嵌入的容量平均提高了0. 4 bit/像素。结论实验结果表明,提出的算法在保证安全性的同时可以腾出更多的空间来嵌入额外的信息,在实际生活中能根据需求灵活地嵌入信息。嵌入的信息能无损地提取,且图像能完全恢复。总的来说,提出的算法具有良好的性能。
        Objective For the existing reversible data hiding algorithm in encrypted images,the correlation between bit planes is not fully utilized when the bit plane is compressed. To reduce the compression ratio of bit planes and improve the embedding capacity,this study proposes a reversible data hiding algorithm in encrypted images to reduce the redundancy between adjacent bit planes. Method The proposed algorithm is mainly divided into the following steps: image block scrambling,image preprocessing,exclusive encryption,additional information embedding,information extraction,and image decryption/recovery. The proposed algorithm initially divides the image into non-overlapping blocks( such as 4 × 4) and scrambles the position of these blocks. The value of the bit plane does not change because the scrambling operation does not change the pixels of the image. In this way,the correspondence between the bit planes is unaffected,and compression can be performed based on the correlation. XOR operation is performed on adjacent bit planes because the binary images be-tween the bit planes of the original image are similar. After the image is divided and the block is scrambled,XOR operation is performed on the highest-order and second-highest bit planes to obtain a new second-highest bit plane. Next,the new second-highest bit plane XOR is combined with a lower one to obtain the third-highest bit plane. The same operation is performed on the remaining lower bit planes to obtain a new lower seven bit planes,which combines the original highest bit plane to obtain the eight bit planes of the new image. The compression method of a binary-block embedding( BBE) algorithm identifies the binary image and records the structural information of the block. The BBE algorithm remarkably increases the embedding rate. The bit plane can be regarded as a binary value,thus,the compression method has been applied to grayscale images and achieved good results. The BBE algorithm has good effect on marking the block and storing structure information; thus,the proposed algorithm in the present work is also applied to this compression method. We use the BBE algorithm to compress the bit plane of an image after an adjacent bit plane XOR operation to accommodate the embedded information. To ensure the security of the encrypted image,the image that vacates the room through compression is XOR-encrypted by using an encryption key. The additional information that does not exceed the maximum embedded capacity are encrypted and embedded in the vacated space to ensure their security. The extraction and embedding of information are reverse processes. Therefore,if the corresponding key is obtained,then the information can be extracted without loss. Information extraction or image decryption/restoration is based on the key held by the user. If the user has an encryption key,then the image can be decrypted or the image can be completely restored. After complete restoration,XOR operation should be initially performed on the image. Then,the high-order data are restored by the BBE algorithm,and XOR operation is performed on the adjacent bit plane to obtain a restored image that is consistent with the original image. Image decryption and information extraction are two independent processes,which realize the separation of the algorithm. If the user has the data encryption key,then the data embedded in the image can be extracted without loss. Result Experiments have shown that the XOR operation of adjacent bit planes makes the lower bit planes smooth except for the highest bit plane. This operation reduces the number of incompressible blocks and compresses poor blocks in bit planes. It is also conducive in compressing the images with the BBE algorithm. Image compression can be improved; thus,considerable space can be freed to embed additional information. In comparison with several existing algorithms for reversible data hiding in encrypted images based on bit-plane compression,the average embedding rate of the proposed algorithm is increased by 0. 4 bit/pixel for images with different textures. This finding illustrates the effectiveness of the proposed algorithm in improving the embedding capacity. The XOR operation of adjacent bit planes not only increases the capacity but also has a smaller time complexity than that the BBE method used in grayscale images. In the literature,this operation increases the efficiency of bit-plane coding since prediction and XOR operation making the bit plane smoother. The embedded information can be extracted without loss,and the image can be completely recovered,thereby realizing the complete reversibility of the algorithm. Conclusion Experimental results show that the proposed algorithm provides considerable spaces to embed additional information and ensures their security,which enables the flexibility to embed information based on the requirements. Generally,the proposed algorithm has good performance,and the XOR operation of adjacent bit planes can be applied to several bit-plane processing algorithms. In the future,our focus will be on the application of the algorithm in real life. In cloud storage,a certain amount of user space and transmission traffic is wasted when the cloud manager is not required to embed considerable data for some reversible information hiding algorithms with high embedding rate. The solution to these practical problems will be investigated in our future work. In this way,the algorithm of reversible data hiding in encrypted images can be suitable in real-life applications.
引文
[1]Fridrich J,Goljan M,Du R.Lossless data embedding-new paradigm in digital watermarking[J].Journal on Applied Signal Processing,2002,2002(2):185-196.[DOI:10.1155/S1110865702000537]
    [2]Celik M U,Sharma G,Tekalp A M,et al.Lossless generalizedLSB data embedding[J].IEEE Transactions on Image Processing,2005,14(2):253-266.[DOI:10.1109/TIP.2004.840686]
    [3]Ni Z C,Shi Y Q,Ansari N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.[DOI:10.1109/TCSVT.2006.869964]
    [4]Tian J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.[DOI:10.1109/TCSVT.2003.815962]
    [5]Li R,Li X Y.Pixel value ordering reversible data hiding algorithm based on image block selection[J].Journal of Image and Graphics,2017,22(12):1664-1676.[李蓉,李向阳.图像分区选择的像素值排序可逆数据隐藏[J].中国图象图形学报,2017,22(12):1664-1676.][DOI:10.11834/jig.170101]
    [6]Zhang X P.Reversible data hiding in encrypted image[J].IEEESignal Processing Letters,2011,18(4):255-258.[DOI:10.1109/LSP.2011.2114651]
    [7]Hong W E,Chen T S,Wu H Y.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.[DOI:10.1109/LSP.2012.2187334]
    [8]Liao X,Shu C W.Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels[J].Journal of Visual Communication and Image Representation,2015,28:21-27.[DOI:10.1016/j.jvcir.2014.12.007]
    [9]Cheng H,Wang Z C,Zhang X P.Reversible data hiding for encrypted image based on image blocks grouping[J].Journal of Beijing University of Technology,2016,42(5):722-728.[程航,王子驰,张新鹏.基于图像块分组的加密域可逆信息隐藏[J].北京工业大学学报,2016,42(5):722-728.][DOI:10.11936/bjutxb2015080007]
    [10]Qian Z X,Dai S,Jiang F,et al.Improved joint reversible data hiding in encrypted images[J].Journal of Visual Communication and Image Representation,2016,40:732-738.[DOI:10.1016/j.jvcir.2016.08.020]
    [11]Ma K D,Zhang W M,Zhao X F,et al.Reversible data hiding in encrypted images by reserving room before encryption[J].IEEE Transactions on Information Forensics and Security,2013,8(3):553-562.[DOI:10.1109/TIFS.2013.2248725]
    [12]Zhang W M,Ma K D,Yu N H.Reversibility improved data hiding in encrypted images[J].Signal Processing,2014,94:118-127.[DOI:10.1016/j.sigpro.2013.06.023]
    [13]Qian Z X,Zhang X P.Reversible data hiding in encrypted images with distributed source encoding[J].IEEE Transactions on Circuits and Systems for Video Technology,2016,26(4):636-646.[DOI:10.1109/TCSVT.2015.2418611]
    [14]Wu X T,Sun W.High-capacity reversible data hiding in encrypted images by prediction error[J].Signal Processing,2014,104:387-400.[DOI:10.1016/j.sigpro.2014.04.032]
    [15]Zhang X P,Qian Z X,Feng G R,et al.Efficient reversible data hiding in encrypted images[J].Journal of Visual Communication and Image Representation,2014,25(2):322-328.[DOI:10.1016/j.jvcir.2013.11.001]
    [16]Yi S,Zhou Y C.Binary-block embedding for reversible data hiding in encrypted images[J].Signal Processing,2017,133:40-51.[DOI:10.1016/j.sigpro.2016.10.017]
    [17]Liu Z L,Pun C M.Reversible data-hiding in encrypted images by redundant space transfer[J].Information Sciences,2018,433-434:188-203.[DOI:10.1016/j.ins.2017.12.044]

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700