[1]张敏情,孔咏骏,彭菓玉,等.基于像素值排序的鲁棒可逆信息隐藏方法[J].东南大学学报(自然科学版),2019,49(5):873-882.[doi:10.3969/j.issn.1001-0505.2019.05.009]
 Zhang Minqing,Kong Yongjun,Peng Guoyu,et al.Robust reversible data hiding method based on pixel value ordering[J].Journal of Southeast University (Natural Science Edition),2019,49(5):873-882.[doi:10.3969/j.issn.1001-0505.2019.05.009]
点击复制

基于像素值排序的鲁棒可逆信息隐藏方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
49
期数:
2019年第5期
页码:
873-882
栏目:
计算机科学与工程
出版日期:
2019-09-20

文章信息/Info

Title:
Robust reversible data hiding method based on pixel value ordering
作者:
张敏情孔咏骏彭菓玉李天雪
武警工程大学网络与信息安全武警部队重点实验室, 西安 710086
Author(s):
Zhang Minqing Kong Yongjun Peng Guoyu Li Tianxue
Key Laboratory of Network and Information Security Armed Police Force, Engineering University of the People’s Armed Police, Xi’an 710086, China
关键词:
图像处理 可逆信息隐藏 像素值排序 差分统计量 鲁棒性
Keywords:
image processing reversible data hiding pixel value ordering difference statistics robustness
分类号:
TP309.7
DOI:
10.3969/j.issn.1001-0505.2019.05.009
摘要:
针对嵌入秘密信息后载体图像鲁棒性较低的问题,提出了一种基于像素值排序的鲁棒可逆信息隐藏方法.首先将图像划分为多个非重叠块,对块内像素值进行排序并计算相应复杂度,将其与阈值进行比较从而选取平滑的像素块进行信息嵌入.然后对平滑像素块进行二次划分,通过对划分后的排序差分统计量整体平移实现信息可逆嵌入.仿真结果表明,测试图像在4×4像素块划分下,嵌入容量达到4 096 bit时,峰值信噪比达到了41.54 dB,较传统基于像素对模型的鲁棒可逆方法减少了图像失真.测试图片经质量因子为100的压缩攻击后,平均峰值信噪比可达39.69 dB,平均误码率降至0.42%,对于JPEG压缩或者非恶意攻击造成的噪声微扰具有鲁棒性.8×8像素块划分下,测试图像在达到现有鲁棒方法嵌入容量基础上,存活率更低,抗压缩鲁棒性更好.
Abstract:
Aiming at the low robustness of images after being embedded secret information, a robust reversible data hiding method based on pixel value sorting was proposed. First, the image was divided into several non-overlapping blocks. The pixel values in the blocks were sorted and the corresponding complexity was calculated. Then, the smoothed blocks were selected for information embedding by comparing the complexity with the thresholds. Secondly, the smooth pixel blocks were segmented again, and the information was reversibly embedded by the overall translation of the sorted differential statistics. The simulation results show that the peak signal-to-noise ratio of the test image can reach 41.54 dB when the embedding capacity reaches 4 096 bit for 4×4 pixel block partition, thus reducing image distortion compared with the traditional robust reversible algorithm based on difference-pair-pattern. After the compression attack with a quality factor of 100, the average peak signal-to-noise ratio can reach 39.69 dB and the average bit error rate can drop to 0.42%. Therefore, it is robust to the noise perturbation caused by JPEG compression or non-malicious attacks. For 8×8 pixel block partition, the test image has lower survival bit rate on the basis of satisfying the embedding capacity of the existing robust algorithm, and the robustness against compression is better.

参考文献/References:

[1] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E辑:信息科学),2007,37(2):129-150. DOI:10.3969/j.issn.1674-7259.2007.02.001.
Shen C X, Zhang H G, Feng D G, et al. Summary of information security[J]. Science in China(Series E: Information Sciences), 2007, 37(2): 129-150. DOI:10.3969/j.issn.1674-7259.2007.02.001. (in Chinese)
[2] Shi Y Q, Li X L, Zhang X P, et al. Reversible data hiding: Advances in the past two decades[J]. IEEE Access, 2016, 4: 3210-3237. DOI:10.1109/access.2016.2573308.
[3] Fallahpour M, Megias D, Ghanbari M. Reversible and high-capacity data hiding in medical images[J]. IET Image Processing, 2011, 5(2):190-197. DOI:10.1049/iet-ipr.2009.0226.
[4] Yang Y, Zhang W M, Liang D, et al. Reversible data hiding in medical images with enhanced contrast in texture area[J]. Digital Signal Processing, 2016, 52: 13-24. DOI:10.1016/j.dsp.2016.02.006.
[5] 夏颖慧,吴昊天.用于实现医学图像ROI对比度增强的可逆数据隐藏算法[J].计算机工程与应用,2017,53(18):186-191.
  Xia Y H, Wu H T. Reversible data hiding in medical image for contrast enhancement of ROI[J]. Computer Engineering and Application, 2017, 53(18): 633-637.(in Chinese)
[6] 岳鑫,周城,甘文道,等.军事图像加密通信中数据隐藏算法研究与仿真[J].计算机仿真,2015,32(3):238-241. DOI:10.3969/j.issn.1006-9348.2015.03.052.
Yue X, Zhou C, Gan W D, et al. Research and simulation of data hiding algorithm in military image encryption communication[J]. Computer Simulation, 2015, 32(3): 238-241. DOI:10.3969/j.issn.1006-9348.2015.03.052. (in Chinese)
[7] Singh S,Siddiqui T J. Robust image data hiding technique for copyright protection[J]. International Journal of Information Security and Privacy, 2013, 7(2): 44-56. DOI:10.4018/jisp.2013040103.
[8] Chang C C, Chen T S, Wang Y K, et al. A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator[J]. Multimedia Tools and Applications, 2018, 77(7): 9039-9053. DOI:10.1007/s11042-017-4800-0.
[9] Ni Z C, Shi Y Q,Ansari N, et al. Robust lossless image data hiding[C]//2004 IEEE International Conference on Multimedia and Expo(ICME). Taipei, Taiwan, China, 2004, 1-3: 2199-2202. DOI:10.1109/icme.2004.1394706.
[10] Xiao L, Wan X Y, Lu X Z, et al. IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?[J]. IEEE Signal Processing Magazine, 2018, 35(5): 41-49. DOI:10.1109/msp.2018.2825478.
[11] Li X L, Zhang W M,Gui X L, et al. Efficient reversible data hiding based on multiple histograms modification[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 2016-2027. DOI:10.1109/tifs.2015.2444354.
[12] Li X L, Zhang W M,Gui X L, et al. A novel reversible data hiding scheme based on two-dimensional difference-histogram modification[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(7): 1091-1100. DOI:10.1109/tifs.2013.2261062.
[13] Hu X C, Zhang W M, Li X L, et al. Minimum rate prediction and optimized histograms modification for reversible data hiding[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3): 653-664. DOI:10.1109/tifs.2015.2392556.
[14] Vasiliy S, Kim H J, Xiang S J, et al. An improved reversible difference expansion watermarking algorithm[M]// Shi Y Q, Kim H J, Katzenbeisser S. Lecture Notes in Computer Science. Berlin: Springer, 2008, 5041: 254-263.
[15] Arham A, Nugroho H A, Adji T B. Multiple layer data hiding scheme based on difference expansion of quad[J]. Signal Processing, 2017, 137: 52-62. DOI:10.1016/j.sigpro.2017.02.001.
[16] Yi S, Zhou Y C,Hua Z Y. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion[J]. Signal Processing: Image Communication, 2018, 64: 78-88. DOI:10.1016/j.image.2018.03.001.
[17] Rahmani P, Dastghaibyfard G. A reversible data hiding scheme based on prediction-error expansion using pixel-based pixel value ordering predictor[C]// 2017 19th CSI International Symposium on Artificial Intelligence and Signal Processing Conference(AISP). Shiraz, Iran, 2017: 219-223. DOI: 10.1109/aisp.2017.8324085.
[18] de Vleeschouwer C, Delaigle J F, Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management[J]. IEEE Transactions on Multimedia, 2003, 5(1): 97-105. DOI:10.1109/tmm.2003.809729.
[19] Ni Z C, Shi Y Q,Ansari N, et al. Robust lossless image data hiding designed for semi-fragile image authentication[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(4): 497-509. DOI:10.1109/tcsvt.2008.918761.
[20] Zeng X T, Ping L D, Pan X Z. A lossless robust data hiding scheme[J]. Pattern Recognition, 2010, 43(4): 1656-1667. DOI:10.1016/j.patcog.2009.09.016.
[21] Zhu L H,Quanr Z. Robust lossless data hiding scheme based on region selection[C]// 2013 Seventh International Conference on Image and Graphics. Qingdao, China, 2013:130-134. DOI:10.1109/icig.2013.32.
[22] Wang W Q, Ye J Y, Wang T Q, et al. Reversible data hiding scheme based on significant-bit-difference expansion[J]. IET Image Processing, 2017, 11(11): 1002-1014. DOI:10.1049/iet-ipr.2017.0151.
[23] 于爽,李健.基于直方图平移的鲁棒可逆信息隐藏方案[J].武汉大学学报(工学版),2018,51(3):268-275,282.
  Yu S, Li J. A novel robust-reversible data hiding scheme based on histogram shifting[J]. Engineering Journal of Wuhan University, 2018, 51(3): 268-275, 282.(in Chinese)
[24] 项世军,杨乐.基于同态加密系统的图像鲁棒可逆水印算法[J].软件学报,2018,29(4):957-972.
  Xiang S J, Yang L. Robust and reversible image watermarking algorithm in homomorphic encrypted domain[J]. Journal of Software, 2018, 29(4): 957-972.(in Chinese)

相似文献/References:

[1]陈开志,胡爱群.基于二值化图像的指纹细节点精确提取方法[J].东南大学学报(自然科学版),2010,40(3):471.[doi:10.3969/j.issn.1001-0505.2010.03.007]
 Chen Kaizhi,Hu Aiqun.Method of accurate minutiae detection from binary fingerprint image[J].Journal of Southeast University (Natural Science Edition),2010,40(5):471.[doi:10.3969/j.issn.1001-0505.2010.03.007]
[2]曹铁勇,杨吉斌,张雄伟.基于势能平衡的图像骨架抽取算法[J].东南大学学报(自然科学版),2003,33(6):724.[doi:10.3969/j.issn.1001-0505.2003.06.011]
 Cao Tieyong,Yang Jibin,Zhang Xiongwei.Potential balance-based image skeleton extraction algorithm[J].Journal of Southeast University (Natural Science Edition),2003,33(5):724.[doi:10.3969/j.issn.1001-0505.2003.06.011]
[3]宋永江,夏良正,杨世周.多直线全局运动估计及其在图像稳定中的应用[J].东南大学学报(自然科学版),2002,32(2):211.[doi:10.3969/j.issn.1001-0505.2002.02.014]
 Song Yongjiang,Xia Liangzheng,Yang Shizhou.Global motion estimation using multi-line feature for image stabilization application[J].Journal of Southeast University (Natural Science Edition),2002,32(5):211.[doi:10.3969/j.issn.1001-0505.2002.02.014]

备注/Memo

备注/Memo:
收稿日期: 2019-02-23.
作者简介: 张敏情(1967—),女,博士,教授,博士生导师,api_zmq@126.com.
基金项目: 国家自然科学基金资助项目(61872384).
引用本文: 张敏情,孔咏骏,彭菓玉,等.基于像素值排序的鲁棒可逆信息隐藏方法[J].东南大学学报(自然科学版),2019,49(5):873-882. DOI:10.3969/j.issn.1001-0505.2019.05.009.
更新日期/Last Update: 2019-09-20