Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (4): 166-177.doi: 10.11959/j.issn.2096-109x.2023062
• Papers • Previous Articles
Ziyang ZHOU, Yun TAN, Jiaohua QIN, Xuyu XIANG
Revised:
2023-01-30
Online:
2023-08-01
Published:
2023-08-01
Supported by:
CLC Number:
Ziyang ZHOU, Yun TAN, Jiaohua QIN, Xuyu XIANG. JPEG reversible data hiding method based on optimal DCT frequency embedding[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 166-177.
"
图像 | 方法 | 嵌入容量/bit(QF = 70) | 嵌入容量/bit(QF = 80) | 嵌入容量/bit(QF = 90) | ||||||||
5 000 | 8000 | 11 000 | 10 000 | 13 000 | 16 000 | 15 000 | 18 000 | 21 000 | ||||
文献[ | 6 904 | 11 272 | 15 416 | 13 960 | 18 440 | 22 736 | 21 904 | 25 000 | 30 464 | |||
文献[ | 6 512 | 10 504 | 14 512 | 12 936 | 17 400 | 21 736 | 19 904 | 24 440 | 28 864 | |||
Lena | 文献[ | 6 712 | 10 904 | 15 288 | 14 088 | 18 424 | 22 288 | 18 712 | 25 376 | 29 160 | ||
文献[ | 6 496 | 10 304 | 14 760 | 12 848 | 17 384 | 21 576 | 19 792 | 23 928 | 28 768 | |||
文献[ | 6 992 | 10 688 | 15 104 | 12 392 | 16 984 | 21 552 | 18 416 | 23 312 | 27 960 | |||
本文 | ||||||||||||
文献[ | 7 416 | 11 600 | 15 568 | 14 304 | 18 648 | 23 072 | 22 656 | 27 000 | 31 256 | |||
文献[ | 6 304 | 10 080 | 14 168 | 14 064 | 16 896 | 19 768 | 20 024 | 23 432 | 28 376 | |||
Peppers | 文献[ | 7 080 | 11 296 | 15 184 | 13 808 | 17 896 | 21 056 | 18 968 | 23 360 | 28 392 | ||
文献[ | 5 824 | 9 928 | 14 144 | 12 448 | 16 536 | 20 168 | 20 448 | 24 856 | 30 240 | |||
文献[ | 6 216 | 10 192 | 14 168 | 11 232 | 15 896 | 20 344 | 18 872 | 22 248 | 27 208 | |||
本文 | ||||||||||||
文献[ | 7 368 | 11 600 | 15 952 | 14 312 | 18 352 | 22 976 | 21 120 | 25 024 | 29 984 | |||
文献[ | 6 096 | 10 760 | 14 320 | 12 456 | 16 832 | 21 592 | 19 688 | 23 152 | 27 808 | |||
Tiffany | 文献[ | 7 112 | 11 496 | 15 440 | 13 352 | 17 488 | 22 544 | 18 920 | 23 152 | 28 152 | ||
文献[ | 6 256 | 10 584 | 14 496 | 12 912 | 16 952 | 21 816 | 19 104 | 24 536 | 28 504 | |||
文献[ | 6 992 | 10 688 | 15 104 | 12 208 | 17 576 | 21 648 | 18 408 | 23 120 | 28 640 | |||
本文 | ||||||||||||
文献[ | 7 632 | 11 928 | 16 592 | 14 632 | 20 144 | 25 168 | 25 840 | 30 824 | 35 960 | |||
文献[ | 7 824 | 11 400 | 17 952 | 17 072 | 21 728 | 26 528 | 30 240 | 34 720 | 38 640 | |||
Baboon | 文献[ | 6 992 | 10 984 | 15 752 | 14 472 | 19 880 | 25 056 | 25 552 | 30 808 | 35 504 | ||
文献[ | 10 832 | 15 648 | 14 120 | 18 600 | 23 360 | 24 056 | 34 360 | |||||
文献[ | 6 856 | 11 312 | 15 328 | 13 184 | 18 648 | 24 192 | 24 200 | 29 720 | 35 224 | |||
本文 | 6 512 | |||||||||||
文献[ | 7 696 | 11 288 | 14 440 | 13 400 | 17 480 | 20 624 | 21 312 | 24 720 | 28 776 | |||
文献[ | 6 840 | 9 112 | 13 872 | 11 504 | 15 000 | 19 496 | 17 096 | 22 144 | 25 080 | |||
Airplane | 文献[ | 7 000 | 10 504 | 14 912 | 12 472 | 15 352 | 20 936 | 19 128 | 23 656 | 27 728 | ||
文献[ | 5 920 | 9 848 | 14 224 | 11 408 | 15 928 | 20 616 | 18 616 | 22 336 | 26 456 | |||
文献[ | 6 304 | 9 864 | 14 944 | 11 432 | 15 112 | 20 288 | 18 240 | 21 632 | 25 616 | |||
本文 | ||||||||||||
文献[ | 7 403 | 11 537 | 15 593 | 14 121 | 18 612 | 22 915 | 22 566 | 26 513 | 31 288 | |||
文献[ | 6 627 | 10 371 | 14 964 | 13 605 | 17 571 | 21 616 | 21 390 | 24 936 | 29 753 | |||
平均值 | 文献[ | 6 979 | 11 036 | 15 315 | 13 638 | 17 808 | 22 376 | 20 256 | 25 270 | 29 787 | ||
文献[ | 6 180 | 10 299 | 14 654 | 12 747 | 17 080 | 21 507 | 20 403 | 24 979 | 29 665 | |||
文献[ | 6 672 | 10 548 | 14 929 | 12 089 | 16 843 | 21 604 | 19 627 | 24 006 | 28 929 | |||
本文 |
"
图像 | 方法 | 嵌入容量/bit(QF = 70) | 嵌入容量/bit(QF = 80) | 嵌入容量/bit(QF = 90) | ||||||||
5 000 | 8 000 | 11 000 | 10 000 | 13 000 | 16 000 | 15 00015 000 | 18 00018 000 | 21 000 | ||||
文献[ | 48.186 1 | 45.336 4 | 43.165 4 | 47.141 8 | 45.313 3 | 43.613 0 | 48.616 3 | 47.527 4 | 46.321 1 | |||
文献[ | 46.880 4 | 44.571 8 | 42.484 4 | 45.828 2 | 44.493 6 | 43.175 8 | 47.808 1 | 47.137 1 | 46.386 6 | |||
Lena | 文献[ | 48.581 0 | 45.628 9 | 43.435 3 | 47.320 8 | 45.498 6 | 43.807 9 | 48.853 8 | 47.607 3 | 46.390 1 | ||
文献[ | 49.144 3 | 47.829 1 | 46.640 3 | |||||||||
文献[ | 48.720 8 | 45.781 6 | 43.485 0 | 47.491 9 | 45.638 8 | 44.070 1 | ||||||
本文 | 48.502 1 | 45.573 2 | 43.164 6 | 47.216 4 | 45.290 5 | 43.581 1 | 49.137 0 | 47.818 7 | 46.539 4 | |||
文献[ | 48.005 5 | 45.514 7 | 43.453 0 | 46.714 3 | 45.138 5 | 43.647 1 | 46.693 0 | 45.587 4 | 44.570 0 | |||
文献[ | 47.658 9 | 44.934 6 | 43.161 9 | 45.905 3 | 45.345 3 | 43.912 2 | 48.070 2 | 47.177 3 | 46.210 1 | |||
Peppers | 文献[ | 48.654 6 | 46.043 6 | 44.053 9 | 47.270 2 | 45.649 6 | 44.269 1 | 47.943 0 | 46.771 0 | 45.695 7 | ||
文献[ | 44.589 7 | 47.716 0 | 46.398 4 | 45.175 1 | ||||||||
文献[ | 49.044 7 | 46.217 9 | 44.217 9 | 47.622 8 | 45.973 4 | |||||||
本文 | 48.967 2 | 46.168 8 | 44.053 8 | 47.375 9 | 45.809 3 | 44.322 1 | 48.418 2 | 47.330 9 | 46.278 0 | |||
文献[ | 48.142 0 | 44.949 2 | 42.632 8 | 46.717 3 | 44.817 4 | 43.206 4 | 48.703 6 | 47.421 7 | 46.197 0 | |||
文献[ | 47.143 4 | 45.047 0 | 43.053 5 | 46.647 1 | 45.105 5 | 43.653 9 | 48.632 8 | 47.568 1 | 46.513 7 | |||
Tiffany | 文献[ | 48.719 9 | 45.747 6 | 43.620 1 | 47.551 5 | 45.613 1 | 43.805 7 | 49.215 8 | 47.943 0 | 46.631 4 | ||
文献[ | 44.028 7 | 49.435 6 | 47.957 3 | 46.591 7 | ||||||||
文献[ | 48.821 4 | 45.865 3 | 43.683 8 | 47.720 3 | 45.865 8 | |||||||
本文 | 48.943 8 | 45.765 1 | 43.439 5 | 47.511 3 | 45.453 2 | 43.811 6 | 49.544 4 | 48.143 4 | 46.696 0 | |||
文献[ | 45.384 2 | 42.547 2 | 40.107 5 | 42.689 6 | 40.654 5 | 39.033 7 | 42.729 6 | 41.404 4 | 40.332 2 | |||
文献[ | 42.886 5 | 40.899 0 | 38.903 6 | 41.139 2 | 39.997 0 | 38.861 6 | 41.942 3 | 40.869 5 | 40.199 2 | |||
Baboon | 文献[ | 45.765 4 | 42.851 2 | 40.584 2 | 42.861 6 | 40.770 8 | 39.165 4 | 42.717 2 | 41.474 5 | 40.373 1 | ||
文献[ | 43.163 6 | 40.846 1 | 43.104 5 | 41.159 6 | 39.574 7 | 43.046 3 | 41.725 6 | 40.603 9 | ||||
文献[ | 46.007 7 | |||||||||||
本文 | 45.795 2 | 42.865 9 | 40.603 9 | 42.779 8 | 40.771 9 | 39.228 5 | 42.661 2 | 41.392 5 | 40.307 7 | |||
文献[ | 49.826 2 | 47.525 2 | 44.137 4 | 48.993 7 | 47.532 1 | 46.069 2 | 50.429 9 | 49.448 2 | 48.678 5 | |||
文献[ | 49.674 4 | 47.001 2 | 44.708 5 | 48.999 3 | 47.455 7 | 45.336 1 | 50.174 5 | 49.780 9 | 48.965 3 | |||
平均值 | 文献[ | 50.032 9 | 47.629 7 | 45.209 7 | 49.188 0 | 47.750 9 | 46.175 5 | 50.839 7 | 49.838 8 | 48.976 3 | ||
文献[ | 50.012 8 | 49.022 6 | ||||||||||
文献[ | 50.073 5 | 47.726 8 | 45.159 1 | 49.344 6 | 47.873 6 | 46.242 9 | 51.048 6 | |||||
本文 | 50.471 0 | 47.753 9 | 44.676 6 | 49.430 8 | 47.797 1 | 45.809 8 | 51.049 6 | 50.014 6 | 49.111 9 | |||
文献[ | 47.908 8 | 45.174 5 | 42.699 2 | 46.451 3 | 44.691 1 | 43.113 8 | 47.434 4 | 46.277 8 | 45.219 7 | |||
文献[ | 46.848 7 | 44.490 7 | 42.462 3 | 45.703 8 | 44.479 4 | 42.987 9 | 47.325 5 | 46.506 5 | 45.654 9 | |||
Average | 文献[ | 48.350 7 | 45.580 2 | 43.380 6 | 46.838 4 | 45.056 6 | 43.444 7 | 47.913 9 | 46.726 9 | 45.613 3 | ||
文献[ | 45.363 0 | 48.093 4 | 46.782 6 | 45.606 7 | ||||||||
文献[ | 48.525 9 | 45.756 7 | 43.520 9 | 47.132 1 | 43.805 4 | 48.558 5 | ||||||
本文 | 48.535 8 | 45.625 3 | 43.187 6 | 46.862 8 | 45.024 4 | 43.350 6 | 48.162 0 | 46.940 0 | 45.786 6 |
[1] | SHI Y Q , LI X L , ZHANG X P ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4(1): 3210-3237. |
[2] | BARTON J M . Method and apparatus for embedding authentication information within digital data[P]. United States Patent,No:5646997, 1997. |
[3] | FRIDRICH J , GOLJAN M , DU R . Lossless data embedding for all image formats[J]. Security and Watermarking of Multimedia Contents IV, 2002,4675(1): 572-583. |
[4] | WANG K , LU Z M , HU Y J . A high capacity lossless data hiding scheme for JPEG images[J]. Journal of Systems and Software, 2013,86(7): 1965-1975. |
[5] | CHEN L S T , LIN S J , LIN J C . Reversible JPEG-based hiding method with high hiding-ratio[J]. International Journal of Pattern Recognition and Artificial Intelligence, 2010,24(3): 433-456. |
[6] | MOBASSERI B G , BERGER R J , MARCINAK M P ,et al. Data embedding in JPEG bitstream by code mapping[J]. IEEE Transactions on Image Processing, 2009,19(4): 958-966. |
[7] | QIAN Z X , ZHANG X PENG . Lossless data hiding in JPEG bitstream[J]. Journal of Systems and Software. 2012,85(2): 309-313. |
[8] | DU Y , YIN Z X , ZHANG X P . Improved lossless data hiding for JPEG images based on histogram modification[J]. Comput Mater Cont, 2018,55(3): 495-507. |
[9] | DU Y , YIN Z X , ZHANG X P . High capacity lossless data hiding in JPEG bitstream based on general VLC mapping[J]. IEEE Transactions on Dependable and Secure Computing, 2020,55(3): 1420-1433. |
[10] | QIU Y Q , HE H , QIAN Z X ,et al. Lossless data hiding in JPEG bitstream using alternative embedding[J]. Journal of Visual Communication and Image Representation, 2018,52: 86-91. |
[11] | QIU Y Q , QIAN Z X , HE H ,et al. Optimized lossless data hiding in JPEG bitstream and relay transfer-based extension[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,31(4): 1380-1394. |
[12] | ZHANG C , OU B , TIAN H W ,et al. Reversible data hiding in JPEG bitstream using optimal VLC mapping[J]. Journal of Visual Communication and Image Representation, 2020,71:102821. |
[13] | DU Y , YIN Z X . New framework for code-mapping-based reversible data hiding in JPEG images[J]. Information Sciences, 2022,609: 319-338. |
[14] | XUAN G R , SHI Y Q , NI Z C ,et al. Reversible data hiding for JPEG images based on histogram pairs[C]// Proceeding of the International Conference Image Analysis and Recognition. 2007: 715-727. |
[15] | HUANG F J , QU X C , KIM H J ,et al. Reversible data hiding in JPEG images[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016,26(9): 1610-1621. |
[16] | WEDAJ F T , KIM S , KIM H J ,et al. Improved reversible data hiding in JPEG images based on new coefficient selection strategy[J]. EURASIP Journal on Image and Video Processing, 2017,2017: 1-11. |
[17] | HOU D D , WANG H Q , ZHANG W M ,et al. Reversible data hiding in JPEG image based on DCT frequency and block selection[J]. Signal Processing, 2018,148: 41-47. |
[18] | YIN Z X , JI Y , LUO B . Reversible data hiding in JPEG images with multi-objective optimization[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(8): 2343-2352. |
[19] | HE J H , CHEN J X , TANG S H . Reversible data hiding in JPEG images based on negative influence models[J]. IEEE Transaction Security, 2020,15: 2121-2133. |
[20] | DI F Q , ZHANG M Q , HUANG F J ,et al. Reversible data hiding in JPEG images based on zero coefficients and distortion cost function[J]. Multimedia Tools and Applications, 2019,78(24): 34541-34561. |
[21] | YAO H , MAO F Y , QIN C ,et al. Dual-JPEG-image reversible data hiding[J]. Information Sciences, 2021,563: 130-149. |
[22] | LYU W , GUO H N , DU Y ,et al. Multi-domain reversible data hiding in JPEG images[C]// ACM Turing Award Celebration Conference. 2021: 241-247. |
[23] | ZHAN W Y , YAO H . Reversible data hiding for JPEG images with a cascaded structure[J]. IET Image Processing, 2022,16(5): 1486-1499. |
[24] | CHEN K J , ZHOU H , HOU D D ,et al. Reversible data hiding in JPEG images under multi-distortion metric[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,31(10): 3942-3953. |
[25] | 陆兴, 黄方军 . 基于二维直方图修改的 JPEG 图像可逆信息隐藏[J]. 网络空间安全, 2019,10(8): 55-64. |
LU X , HUANG F J . Reversible information hiding in JPEG images based on two-dimensional histogram modification[J]. Security in Cyberspace, 2019,10(8): 55-64. | |
[26] | LI N , HUANG F J . Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion[J]. Signal Processing, 2020,171:107476. |
[27] | HE B , Chen Y , Zhou Y ,et al. A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images[J]. International Journal of Distributed Sensor Networks, 2022,18(3). |
[28] | OU B , LI X L , ZHAO Y ,et al. Pairwise prediction-error expansion for efficient reversible data hiding[J]. IEEE Transactions on Image Processing, 2013,22(12): 5010-5021. |
[1] | Wenqian XIAO, Gaobo YANG, Dewang WANG, Ming XIA. Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 121-133. |
[2] | Jinghan WANG, Hui ZHU, Helin LI, Hui LI, Xiaopeng YANG. Reversible data hiding scheme based on enhanced image smoothness [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 66-75. |
[3] | Jinwei LI, Xiaoya ZHANG, Yuanzhi YAO, Nenghai YU. Reversible data hiding in encrypted images based on fine-grained embedding room reservation [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 106-117. |
[4] | Yufen HE, Zhaoxia YIN, Jin TANG, Lei LIU, Shilei HUANG. Reversible data hiding algorithm based on asymmetric histogram shifting [J]. Chinese Journal of Network and Information Security, 2019, 5(5): 80-89. |
[5] | Zhiheng LYU,Lei LIU,Si CHEN,Zhaoxia YIN. Reversible data hiding scheme based on asymmetric histogram modification [J]. Chinese Journal of Network and Information Security, 2018, 4(5): 69-75. |
[6] | Wei HUANG,Tian-qiang HUANG,Xue-li ZHANG,Hui XIAO. JPEG recapture image tamper detection method based on block effect grid offset [J]. Chinese Journal of Network and Information Security, 2017, 3(12): 38-44. |
[7] | Yang YANG,Wei-ming ZHANG,ong-dong HOUD,Hui WANG,Neng-hai YU. Research and prospect of reversible data hiding method with contrast enhancement [J]. Chinese Journal of Network and Information Security, 2016, 2(4): 12-20. |
[8] | Jia-jia XU,Wei-ming ZHANG,Rui-qi JIANG,Neng-hai YU,Xiao-cheng HU. Optimal structural similarity constraint for reversible data hiding [J]. Chinese Journal of Network and Information Security, 2016, 2(2): 55-61. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|