Journal on Communications ›› 2019, Vol. 40 ›› Issue (11): 65-75.doi: 10.11959/j.issn.1000-436x.2019220
• Papers • Previous Articles Next Articles
Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU
Revised:
2019-09-05
Online:
2019-11-25
Published:
2019-12-06
Supported by:
CLC Number:
Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU. Image privacy preservation scheme based on QR code and reversible visible watermarking[J]. Journal on Communications, 2019, 40(11): 65-75.
"
载体图像 | Huang等算法 | Mohammad等算法 | Yao等算法 | 本文提出的算法 | |||||||
PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | ||||
Jetplane | 18.445 | 0.793 1 | 23.201 | 0.943 6 | 27.401 | 0.954 3 | 26.750 | 0.976 5 | |||
Lena | 17.146 | 0.755 0 | 22.493 | 0.941 2 | 25.746 | 0.944 7 | 27.903 | 0.974 5 | |||
Living room | 17.482 | 0.795 7 | 21.500 | 0.935 2 | 25.892 | 0.945 6 | 29.692 | 0.975 1 | |||
Mandril | 18.939 | 0.867 5 | 21.827 | 0.934 0 | 28.159 | 0.945 1 | 29.008 | 0.973 7 | |||
Peppers | 17.325 | 0.746 2 | 21.810 | 0.940 3 | 26.791 | 0.944 3 | 28.755 | 0.973 7 | |||
Woman | 17.400 | 0.800 8 | 21.471 | 0.935 4 | 26.069 | 0.938 1 | 28.269 | 0.972 5 | |||
均值 | 17.790 | 0.793 1 | 22.050 | 0.938 3 | 26.676 | 0.945 4 | 28.396 | 0.974 3 | |||
标准差 | 0.725 | 0.043 0 | 0.673 | 0.003 9 | 0.958 | 0.005 2 | 1.015 | 0.001 4 |
"
载体图像 | Huang等算法 | Mohammad等算法 | Yao等算法 | 本文提出的算法 | |||||||
PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | PSNR | SSIM | ||||
Jetplane | 11.736 | 0.554 3 | 17.990 | 0.786 8 | 21.734 | 0.818 8 | 18.102 | 0.857 6 | |||
Lena | 11.062 | 0.435 1 | 17.099 | 0.773 9 | 20.132 | 0.795 1 | 20.456 | 0.853 9 | |||
Living room | 11.460 | 0.560 5 | 16.787 | 0.774 6 | 20.770 | 0.808 4 | 21.069 | 0.858 8 | |||
Mandril | 11.644 | 0.647 1 | 16.591 | 0.753 5 | 21.486 | 0.804 8 | 19.389 | 0.851 8 | |||
Peppers | 11.657 | 0.471 1 | 16.411 | 0.774 3 | 21.510 | 0.783 5 | 21.034 | 0.853 9 | |||
Woman | 12.103 | 0.539 9 | 16.711 | 0.766 9 | 21.597 | 0.783 8 | 20.686 | 0.854 6 | |||
均值 | 11.610 | 0.534 7 | 16.932 | 0.771 7 | 21.205 | 0.799 1 | 20.123 | 0.855 1 | |||
标准差 | 0.342 | 0.074 4 | 0.567 | 0.011 0 | 0.624 | 0.014 1 | 1.164 | 0.002 6 |
[1] | 李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11. |
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11. | |
[2] | 中国互联网信息中心. 第43次中国互联网发展状况统计报告[R].(2019-02-28)[2019-07-08]. |
China Internet Network Information Center. The 43rd China statistical report on internet development[R].(2019-02-28)[2019-07-08]. | |
[3] | 李维皓, 曹进, 李晖 . 基于位置服务隐私自关联的隐私保护方案[J]. 通信学报, 2019,40(5): 57-66. |
LI W H , CAO J , LI H . Privacy self-correlation privacy-preserving scheme in LBS[J]. Journal on Communications, 2019,40(5): 57-66. | |
[4] | 王新宇, 牛犇, 李凤华 ,等. APP隐私泄露风险评估与保护方案[J]. 通信学报, 2019,40(5): 13-23. |
WANG X Y , NIU B , LI F H ,et al. Risk assessing and priva-cy-preserving scheme for privacy leakage in APP[J]. Journal on Communications, 2019,40(5): 13-23. | |
[5] | 严文博, 姚远志, 张卫明 ,等. 基于二维码和信息隐藏的物流系统隐私保护方案[J]. 网络与信息安全学报, 2017,3(11): 22-28. |
YAN W B , YAO Y Z , ZHANG W M ,et al. Privacy-preserving scheme for logistics systems based on 2D code and information hiding[J]. Chinese Journal of Network and Information Security, 2017,3(11): 22-28. | |
[6] | MOHANTY S P , RAMAKRISHNAN K R , KANKANHALLI M S . A DCT domain visible watermarking technique for images[C]// International Conference on Multimedia and Expo. IEEE, 2000: 1029-1032. |
[7] | SHI Y Q , LI X , ZHANG X ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4: 3210-3237. |
[8] | HU Y , JEON B . Reversible visible watermarking and lossless recovery of original images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(11): 1423-1429. |
[9] | YIP S K , AU O C , HO C W ,et al. Lossless visible watermarking[C]// International Conference on Multimedia and Expo. IEEE, 2006: 853-856. |
[10] | TSAI H M , Chang L W . A high secure reversible visible watermarking scheme[C]// International Conference on Multimedia and Expo. IEEE, 2007: 2106-2109. |
[11] | LIU T Y , TSAI W H . Generic lossless visible watermarking—a new approach[J]. IEEE Transactions on Image Processing, 2010,19(5): 1224-1235. |
[12] | YANG Y , SUN X , YANG H ,et al. A contrast-sensitive reversible visible image watermarking technique[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009,19(5): 656-667. |
[13] | MOHAMMAD N , SUN X , YANG H ,et al. Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images[J]. Multimedia Tools and Applications, 2017,76(11): 13301-13313. |
[14] | LIN Y K , YANG C H , TSAI J T . More secure lossless visible watermarking by DCT[J]. Multimedia Tools and Applications, 2018,77(7): 8579-8601. |
[15] | YAO Y , ZHANG W , WANG H ,et al. Content-adaptive reversible visible watermarking in encrypted images[J]. Signal Processing, 2019,164: 386-401. |
[16] | HUANG H C , CHANG F C , FANG W C . Reversible data hiding with histogram-based difference expansion for QR code applications[J]. IEEE Transactions on Consumer Electronics, 2011,57(2): 779-787. |
[17] | FRAGOSO-NAVARRO E , CEDILLO-HERNáNDEZ M, M , NAKANO-MIYATAKE M . Visible watermarking assessment metrics based on just noticeable distortion[J]. IEEE Access, 2018,6: 75767-75788. |
[18] | GAO X , LU W , TAO D ,et al. Image quality assessment based on multiscale geometric analysis[J]. IEEE Transactions on Image Processing, 2009,18(7): 1409-1423. |
[19] | WU H R , REIBMAN A R , LIN W ,et al. Perceptual visual signal compression and transmission[J]. Proceedings of the IEEE, 2013,101(9): 2025-2043. |
[20] | LIU A , LIN W , PAUL M ,et al. Just noticeable difference for images with decomposition model for separating edge and textured regions[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2010,20(11): 1648-1652. |
[21] | WU J , LIN W , SHI G ,et al. Pattern masking estimation in image with structural uncertainty[J]. IEEE Transactions on Image Processing, 2013,22(12): 4892-4904. |
[22] | WU J , LI L , DONG W ,et al. Enhanced just noticeable difference model for images with pattern complexity[J]. IEEE Transactions on Image Processing, 2017,26(6): 2682-2693. |
[23] | SACHNEV V , KIM H J , NAM J ,et al. Reversible watermarking algorithm using sorting and prediction[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009,19(7): 989-999. |
[24] | WANG Z , BOVIK A C , SHEIKH H R ,et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004,13(4): 600-612. |
[25] | MENEZES A J , VAN OORSCHOT P C , VANSTONE S A . Handbook of applied cryptography[M]. CRC Press, 1996. |
[26] | 荣辉桂, 莫进侠, 常炳国 ,等. 基于Shamir秘密共享的密钥分发与恢复算法[J]. 通信学报, 2015,36(3): 265-274. |
RONG H G , MO J X , CHANG B G ,et al. Key distribution and recovery algorithm based on Shamir’s secret sharing[J]. Journal on Communications, 2015,36(3): 265-274. |
[1] | Youqing WU, Wenjing MA, Zhaoxia YIN, Yinyin PENG, Xinpeng ZHANG. Reversible data hiding in encrypted image based on bit-plane compression of prediction error [J]. Journal on Communications, 2022, 43(8): 219-230. |
[2] | Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU. Edge computing privacy protection method based on blockchain and federated learning [J]. Journal on Communications, 2021, 42(11): 28-40. |
[3] | Qinglei ZHOU,Shaohuan BAN,Yingjie HAN,Feng FENG. Mimic defense authentication method for physical access control [J]. Journal on Communications, 2020, 41(6): 80-87. |
[4] | Zhu WANG,Kun HE,Xinyu WANG,Ben NIU,Fenghua LI. Traffic characteristic based privacy leakage assessment scheme for Android device [J]. Journal on Communications, 2020, 41(2): 155-164. |
[5] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[6] | Yatao YANG,Xinguang HAN,Jierun HUANG,Yang ZHAO. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE [J]. Journal on Communications, 2019, 40(11): 180-186. |
[7] | Xi YIN,Weiqing HUANG. Research on color QR code watermarking technology based on chaos theory [J]. Journal on Communications, 2018, 39(7): 50-58. |
[8] | Xiaoying ZHANG,Hui PENG,Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks [J]. Journal on Communications, 2018, 39(10): 130-142. |
[9] | Chang-li ZHOU,Hui TIAN,Chun-guang MA,Song-tao YANG. Research on LBS privacy preservation based on pseudorandom permutation in road network [J]. Journal on Communications, 2017, 38(6): 19-29. |
[10] | Jia-hui WANG,Chuan-yi LIU,Bin-xing FANG. Survey on data preserving for the search of internet of things [J]. Journal on Communications, 2016, 37(9): 142-153. |
[11] | Xiao-qian LIU,Qian-mu LI. Differentially private data release based on clustering anonymization [J]. Journal on Communications, 2016, 37(5): 125-129. |
[12] | Jian-gao LUO,Guo-qiang HAN,Yan WO. Novel reversible data hiding based on difference expansion [J]. Journal on Communications, 2016, 37(2): 54-63. |
[13] | Chao LI,Li-hua YIN,Kui GENG,Bin-xing FANG. Location privacy preservation approach towards to content sharing on mobile online social network [J]. Journal on Communications, 2016, 37(11): 31-41. |
[14] | Yong-hao GU,Jiu-chuan LIN. Privacy-utility tradeoff method using multi-variable source coding [J]. Journal on Communications, 2015, 36(12): 172-177. |
[15] | Xiao-hong DENG,Zhi-gang CHEN,Di-qing LIANG,Yi-min MAO. Region-based lossless data hiding with high capacity for medical images [J]. Journal on Communications, 2015, 36(1): 189-198. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|