通信学报 ›› 2015, Vol. 36 ›› Issue (9): 13-25.doi: 10.11959/j.issn.1000-436x.2015166

• 学术论文 • 上一篇    下一篇

基于重复压缩的密文图像可逆数据隐藏方法

刘九芬1,2,3,韩涛1,2,田雨果1,2,刘文彬1,2   

  1. 1 信息工程大学,河南 郑州450001
    2 数学工程与先进计算国家重点实验室,河南 郑州450001
    3 中国科学院 信息工程研究 所信息安全国家重点实验室,北京 100093
  • 出版日期:2015-09-25 发布日期:2017-09-15
  • 基金资助:
    国家自然科学基金资助项目

Reversible data hiding in encrypted images using recompression

Jiu-fen LIU1,2,3,Tao HAN1,2,Yu-guo TIAN1,2,Wen-bin LIU1,2   

  1. 1 Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China
    3 State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
  • Online:2015-09-25 Published:2017-09-15
  • Supported by:
    The National Natural Science Foundation of China

摘要:

为了提高密文图像上的可逆数据隐藏方法的性能,在加密前处理图像以获得数据嵌入空间。首先,分析了在解压缩分块上进行可逆嵌入的可行性;其次,计算了成功恢复解压缩分块的理论概率;最后,提出了基于解压缩分块的密文图像可逆数据隐藏算法,主要过程包括预处理、加密、数据嵌入、数据提取与图像恢复。从图像恢复错误率、嵌入容量和PSNR这3个方面与3种已有方法进行对比,表明所提方法实现了数据提取和图像解密在操作上的完全分离,且图像恢复错误率更低,嵌入容量更大,PSNR更高。

关键词: 重复压缩, 可逆数据隐藏, 图像加密, 隐私保护, 差分扩展

Abstract:

To improve the performance of RDH (reversible data hiding) method in encrypted images,the embedding room was reserved before encryption and realizes the real separation of the data extraction from image decryption in op-eration.First,the feasibility of RDH in JPEG decompressed image blocks was researched.Then the theoretical probabil-ity of successful recovery of decompressed image blocks was calculated.Finally,a method of RDH in encrypted images was proposed and the main steps of the method include pretreatment,encryption,data embedding,data extraction and image recovery.The performance of the proposed method was compared with three existing RDH methods in encrypted images.The results demonstrate the proposed method has less error in image recovery,and for given embedding rates,the PSNR of decrypted image containing the embedded data are significantly improved.

Key words: recompression, RDH, image encryption, privacy protection, difference expansion

No Suggested Reading articles found!