Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (6): 34-45.doi: 10.11959/j.issn.2096-109x.2023081
• Papers • Previous Articles
Haiyong WANG, Mengning JI
Revised:
2023-08-18
Online:
2023-12-01
Published:
2023-12-01
Supported by:
CLC Number:
Haiyong WANG, Mengning JI. Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding[J]. Chinese Journal of Network and Information Security, 2023, 9(6): 34-45.
"
测试图像 | 能够压缩的位平面数量 | HB数量 | LM的总长度/bit | 净嵌入容量/bit | |||||||
文献[ | 本文算法 | 文献[ | 本文算法 | 文献[ | 本文算法 | 文献[ | 本文算法 | ||||
Lena | 4 | 5 | 191 894 | 250 987 | 262 144 | 165 465 | 313 446 | 838 427 | |||
Baboon | 3 | 3 | 100 459 | 137 063 | 196 608 | 134 035 | 104 697 | 414 079 | |||
Jetplane | 6 | 6 | 249 925 | 283 759 | 393 216 | 207 185 | 356 427 | 927 780 | |||
Tiffany | 4 | 4 | 182 534 | 214 437 | 262 144 | 133 508 | 285 366 | 724 080 | |||
Airplane | 6 | 5 | 280 806 | 294 212 | 393 216 | 130 269 | 449 070 | 1 046 404 | |||
Man | 4 | 5 | 181 523 | 238 940 | 262 144 | 198 585 | 282 333 | 757 097 |
[1] | ZHANG X P . Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011,18(4): 255-258. |
[2] | HONG W , CHEN T S , WU H Y . An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Processing Letters, 2012,19(4): 199-202. |
[3] | YI S , ZHOU Y , HUA Z . Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion[J]. Signal Processing:Image Communication, 2018,64: 78-88. |
[4] | WANG Y , HE W . High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Transactions on Multimedia, 2022,24: 1288-1298. |
[5] | YIN Z X , LUO B , HONG W . Separable and error-free reversible data hiding in encrypted image with high payload[J]. The Scientific World Journal,2014, 2014:604876. |
[6] | HUANG F J , HUANG J W , SHI Y Q . New framework for reversible data hiding in encrypted domain[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12): 2777-2789. |
[7] | YI S , ZHOU Y C . Separable and reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2019,21(1): 51-64. |
[8] | WU Y Q , XIANG Y Z , GUO Y T ,et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Transactions on Multimedia, 2020,22(8): 1929-1938. |
[9] | MA K , MING Z W , FENG Z X ,et al. Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Transactions on Information Forensics and Security, 2013,8(3): 553-562. |
[10] | YI S , ZHOU Y C . Binary-block embedding for reversible data hiding in encrypted images[J]. Signal Processing, 2017,133: 40-51. |
[11] | 袁源, 和红杰, 陈帆 . 减少相邻位平面间冗余度的加密图像可逆信息隐藏[J]. 中国图象图形学报, 2019,24(1): 13-22. |
YUAN Y , HE H J , CHEN F . Reduction of the redundancy of adjacent bit planes for reversible data hiding in encrypted images[J]. Journal of Image and Graphics, 2019,24(1): 13-22. | |
[12] | PUTEAUX P , PUECH W . An efficient MSB prediction based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018,13(7): 1670-1681. |
[13] | YANG Y P , YIN Z , QIAN Z . Reversible data hiding in encrypted images with two-msb prediction[C]// Proceedings of 2018 IEEE International Workshop on Information Forensics and Security(WIFS). 2018: 1-7. |
[14] | REN H L , LU W , CHEN B . Reversible data hiding in encrypted binary images by pixel prediction[J]. Signal Processing, 2019,165: 268-277. |
[15] | CHEN K M , CHANG C C . High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. Journal of Visual Communication and Image Representation, 2019,58: 334-344. |
[16] | YIN Z X , PENG Y Y , XIANG Y Z . Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J]. IEEE Transactions on Dependable and Secure Computing, 2020,19(2): 992-1002. |
[17] | 吴友情, 张睿灵, 汤进 ,等. 定长编码和哈夫曼编码的密文域可逆信息隐藏[J]. 中国图象图形学报, 2022,27(1): 277-288. |
WU Y Q , ZHANG R L , TANG J ,et al. Reversible data hiding in encrypted images based on joint fixed-length coding and Huffman coding[J]. Journal of Image and Graphics, 2022,27(1): 277-288. | |
[18] | 吴友情, 郭玉堂, 汤进 ,等. 基于自适应哈夫曼编码的密文可逆信息隐藏算法[J]. 计算机学报, 2021,44(4): 846-858. |
WU Y Q , GUO Y T , TANG J ,et al. Reversible data hiding in encrypted image using adaptive huffman encoding stratrgy[J]. Chinese Journal of Computers, 2021,44(4): 846-858. | |
[19] | 李锦伟, 张晓雅, 姚远志 ,等. 基于细粒度嵌入空间预留的密文域图像可逆信息隐藏方法[J]. 网络与信息安全学报, 2022,8(1): 106-117. |
LI J W , ZHANG X Y , YAO Y Z ,et al. Reversible data hiding in encrypted images based on fine-grained embedding room reservation[J]. Chinese Journal of Network and Information Security, 2022,8(1): 106-117. | |
[20] | WEINBERGER M J , SEROUSSI G , SAPIRO G . The LOCO-I lossless image compression algorithm:principles and standardization into JPEG-LS[J]. IEEE Transactions on Image Processing, 2000,9(8): 1309-1324. |
[21] | BAS P , FILLER T , PEVN T . Break our steganographic system:the ins and outs of organizing BOSS[C]// Proceedings of the 13th International Workshop on Information Hiding. 2011: 59-70. |
[22] | BAS P , FURON T . Image database of BOWS-2[EB]. |
[23] | GERALD S , MICHAL S . UCID-an uncompressed colour image database[C]// Proceedings of the International Conference on Storage Retrieval Methods Applications for Multimedia. 2004: 472-480. |
[24] | YE R . A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism[J]. Optics Communications, 2011,284(22): 5290-5298. |
[1] | Wenqian XIAO, Gaobo YANG, Dewang WANG, Ming XIA. Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 121-133. |
[2] | Ziyang ZHOU, Yun TAN, Jiaohua QIN, Xuyu XIANG. JPEG reversible data hiding method based on optimal DCT frequency embedding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 166-177. |
[3] | Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU. Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38. |
[4] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[5] | Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE. Survey on explainable knowledge graph reasoning methods [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25. |
[6] | Jinghan WANG, Hui ZHU, Helin LI, Hui LI, Xiaopeng YANG. Reversible data hiding scheme based on enhanced image smoothness [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 66-75. |
[7] | Jinwei LI, Xiaoya ZHANG, Yuanzhi YAO, Nenghai YU. Reversible data hiding in encrypted images based on fine-grained embedding room reservation [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 106-117. |
[8] | Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI. Research on extended access control mechanism in online social network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131. |
[9] | Jin LI, Jin CAO, Yueyu ZHANG, Meiru ZHANG, Hui LI. Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 166-174. |
[10] | Guojie LIU,Jianbiao ZHANG. TPCM-based trusted PXE boot method for servers [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111. |
[11] | Qiao HU,Yupeng HU,Xin LIAO,Zheng QIN,Jianhua SUN,Jiliang ZHANG. Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 153-158. |
[12] | Qiang QU,Hongtao YU,Ruiyang HUANG. Attention-based approach of detecting spam in social networks [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61. |
[13] | Yufen HE, Zhaoxia YIN, Jin TANG, Lei LIU, Shilei HUANG. Reversible data hiding algorithm based on asymmetric histogram shifting [J]. Chinese Journal of Network and Information Security, 2019, 5(5): 80-89. |
[14] | JIA Chunfu,LI Ruiqi,TIAN Meiqi,CHENG Xiaoyang. Discuss on cultivating mode of information security and law inter-disciplinary talents [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 31-35. |
[15] | Jinxin ZUO,Ziyu GUO,Jin LI,Jie ZHANG,Yueming LU. Security evaluation method for confidential and stable complex systems [J]. Chinese Journal of Network and Information Security, 2019, 5(2): 58-65. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|