期刊文献+
共找到218篇文章
< 1 2 11 >
每页显示 20 50 100
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
1
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
在线阅读 下载PDF
Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation 被引量:4
2
作者 Qun Mo Heng Yao +2 位作者 Fang Cao Zheng Chang Chuan Qin 《Computers, Materials & Continua》 SCIE EI 2019年第4期119-133,共15页
Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on blo... Recently,reversible data hiding in encrypted image(RDHEI)has attracted extensive attention,which can be used in secure cloud computing and privacy protection effectively.In this paper,a novel RDHEI scheme based on block classification and permutation is proposed.Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively.After block classification,content owner utilizes a specific encryption method,including stream cipher encryption and block permutation to protect image content securely.For the encrypted image,data hider embeds additional secret information in the most significant bits(MSB)of the encrypted pixels in smooth blocks and the final marked image can be obtained.At the receiver side,secret data will be extracted correctly with data-hiding key.When receiver only has encryption key,after stream cipher decryption,block scrambling decryption and MSB error prediction with threshold,decrypted image will be achieved.When data hiding key and encryption key are both obtained,receiver can find the smooth and non-smooth blocks correctly and MSB in smooth blocks will be predicted correctly,hence,receiver can recover marked image losslessly.Experimental results demonstrate that our scheme can achieve better rate-distortion performance than some of state-of-the-art schemes. 展开更多
关键词 reversible data hiding image encryption image recovery
在线阅读 下载PDF
Reversible Data Hiding in Classification-Scrambling Encrypted-Image Based on Iterative Recovery
3
作者 Yuyu Chen Bangxu Yin +3 位作者 Hongjie He Shu Yan Fan Chen Hengming Tai 《Computers, Materials & Continua》 SCIE EI 2018年第8期299-312,共14页
To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification s... To improve the security and quality of decrypted images,this work proposes a reversible data hiding in encrypted image based on iterative recovery.The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR(XOR),which improves the security of encrypted images.And then,a pixel-typemark generation method based on block-compression is designed to reduce the extra burden of key management and transfer.At last,an iterative recovery strategy is proposed to optimize the marked decrypted image,which allows the original image to be obtained only using the encryption key.The proposed reversible data hiding scheme in encrypted image is not vulnerable to the ciphertext-only attack due to the fact that the XOR-encrypted pixels are scrambled in the corresponding encrypted image.Experimental results demonstrate that the decrypted images obtained by the proposed method are the same as the original ones,and the maximum embedding rate of proposed method is higher than the previously reported reversible data hiding methods in encrypted image. 展开更多
关键词 reversible data hiding image encryption scrambling encryption iterative recovery
在线阅读 下载PDF
High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources 被引量:2
4
作者 Di Xiao Jia Liang +2 位作者 Qingqing Ma Yanping Xiang Yushu Zhang 《Computers, Materials & Continua》 SCIE EI 2019年第1期1-13,共13页
To fulfill the requirements of data security in environments with nonequivalent resources,a high capacity data hiding scheme in encrypted image based on compressive sensing(CS)is proposed by fully utilizing the adapta... To fulfill the requirements of data security in environments with nonequivalent resources,a high capacity data hiding scheme in encrypted image based on compressive sensing(CS)is proposed by fully utilizing the adaptability of CS to nonequivalent resources.The original image is divided into two parts:one part is encrypted with traditional stream cipher;the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously.The collected non-image data is firstly encrypted with simple stream cipher.For data security management,the encrypted non-image data is then embedded into the encrypted image,and the scrambling operation is used to further improve security.Finally,the original image and non-image data can be separably recovered and extracted according to the request from the valid users with different access rights.Experimental results demonstrate that the proposed scheme outperforms other data hiding methods based on CS,and is more suitable for nonequivalent resources. 展开更多
关键词 COMPRESSIVE SENSinG encrypted image data hiding PREDICTION ERROR nonequivalent RESOURCES
在线阅读 下载PDF
A Reversible Data Hiding Algorithm Based on Image Camouflage and Bit-Plane Compression
5
作者 Jianyi Liu Ru Zhang +3 位作者 Jing Li Lei Guan Cheng Jie Jiaping Gui 《Computers, Materials & Continua》 SCIE EI 2021年第8期2634-2650,共17页
Reversible data hiding in encrypted image(RDHEI)is a widely used technique for privacy protection,which has been developed in many applications that require high confidentiality,authentication and integrity.Proposed R... Reversible data hiding in encrypted image(RDHEI)is a widely used technique for privacy protection,which has been developed in many applications that require high confidentiality,authentication and integrity.Proposed RDHEI methods do not allow high embedding rate while ensuring losslessly recover the original image.Moreover,the ciphertext form of encrypted image in RDHEI framework is easy to cause the attention of attackers.This paper proposes a reversible data hiding algorithm based on image camouflage encryption and bit plane compression.A camouflage encryption algorithm is used to transform a secret image into another meaningful target image,which can cover both secret image and encryption behavior based on“plaintext to plaintext”transformation.An edge optimization method based on prediction algorithm is designed to improve the image camouflage encryption quality.The reversible data hiding based bit-plane level compression,which can improve the redundancy of the bit plane by Gray coding,is used to embed watermark in the camouflage image.The experimental results also show the superior performance of the method in terms of embedding capacity and image quality. 展开更多
关键词 reversible data hiding image camouflage bit plane compression ENCRYPTION edge optimization
在线阅读 下载PDF
Dual Image Reversible Data Hiding by Modifying Least Significant-Bit Matching Revisited Rules
6
作者 Chi-Shiang Chan Chao-Liang Liu Yuan-Yu Tsai 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期217-221,共5页
The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted ... The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted from two camouflage images but also the original image can be recovered.To achieve high image quality,Lu et al.'s method applied least-significant-bit(LSB) matching revisited to DIRDH.In order to further improve the image quality,the proposed method modifies LSB matching revisited rules and applies them to DIRDH.According to the experimental results,the image quality of the proposed method is better than that of Lu et al.'s method. 展开更多
关键词 index Terms-data hiding dual imaging technique least-significant-bit (LSB) matching revisited reversible
在线阅读 下载PDF
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment 被引量:2
7
作者 Mahmoud Ragab Samah Alshehri +3 位作者 Hani A.Alhadrami Faris Kateb Ehab Bahaudien Ashary SAbdel-khalek 《Computers, Materials & Continua》 SCIE EI 2022年第7期1323-1338,共16页
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication w... Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically,AI techniques can be utilized to design image steganographic techniques in IIoT.In addition,encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment,this study presents novel encryption with image steganography based data hiding technique(EISDHT)for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization(QBWO)to competently choose the pixel values for hiding secrete data in the cover image.In addition,the multi-level discrete wavelet transform(DWT)based transformation process takes place.Besides,the secret image is divided into three R,G,and B bands which are then individually encrypted using Blowfish,Twofish,and Lorenz Hyperchaotic System.At last,the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique,a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security. 展开更多
关键词 IIoT SECURITY data hiding technique image steganography ENCRYPTION secure communication
在线阅读 下载PDF
Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor
8
作者 Ziyi ZHOU Chengyue WANG +2 位作者 Kexun YAN Hui SHI Xin PANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第9期1250-1265,共16页
Reversible data hiding in encrypted images(RDHEI)is essential for safeguarding sensitive information within the encrypted domain.In this study,we propose an intelligent pixel predictor based on a residual group block ... Reversible data hiding in encrypted images(RDHEI)is essential for safeguarding sensitive information within the encrypted domain.In this study,we propose an intelligent pixel predictor based on a residual group block and a spatial attention module,showing superior pixel prediction performance compared to existing predictors.Additionally,we introduce an adaptive joint coding method that leverages bit-plane characteristics and intra-block pixel correlations to maximize embedding space,outperforming single coding approaches.The image owner employs the presented intelligent predictor to forecast the original image,followed by encryption through additive secret sharing before conveying the encrypted image to data hiders.Subsequently,data hiders encrypt secret data and embed them within the encrypted image before transmitting the image to the receiver.The receiver can extract secret data and recover the original image losslessly,with the processes of data extraction and image recovery being separable.Our innovative approach combines an intelligent predictor with additive secret sharing,achieving reversible data embedding and extraction while ensuring security and lossless recovery.Experimental results demonstrate that the predictor performs well and has a substantial embedding capacity.For the Lena image,the number of prediction errors within the range of[-5,5]is as high as 242500 and our predictor achieves an embedding capacity of 4.39 bpp. 展开更多
关键词 reversible data hiding in encrypted images(rdhei) Additive secret sharing Adaptive joint coding intelligent predictor
原文传递
High-payload completely reversible data hiding in encrypted images by an interpolation technique 被引量:3
9
作者 Di XIAO Ying WANG +1 位作者 Tao XIANG Sen BAI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第11期1732-1743,共12页
We present a new high-payload joint reversible data-hiding scheme for encrypted images. Instead of embedding data in the encrypted image directly, the content owner first uses an interpolation technique to estimate wh... We present a new high-payload joint reversible data-hiding scheme for encrypted images. Instead of embedding data in the encrypted image directly, the content owner first uses an interpolation technique to estimate whether the location can be used for embedding and generates a location map before encryption. Next, the data hider embeds the additional data through flipping the most significant bits (MSBs) of the encrypted image according to the location map. At the receiver side, before extracting the additional data and reconstructing the image, the receiver decrypts the image first. Experimental results demonstrate that the proposed method can achieve real reversibility, which means data extraction and image recovery are free of error. Moreover, our scheme can embed more payloads than most existing reversible data hiding schemes in encrypted images. 展开更多
关键词 encrypted image data hiding image recovery Real reversibility inTERPOLATION
原文传递
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction 被引量:2
10
作者 Kaili QI Minqing ZHANG +1 位作者 Fuqiang DI Yongjun KONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第8期1156-1168,共13页
To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according t... To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)prediction.First,according to the smoothness of the image,the image is partitioned into blocks based on adaptive quadtree partitioning,and then blocks of different sizes are encrypted and scrambled at the block level to resist the analysis of the encrypted images.In the data embedding stage,the adaptive MSB prediction method proposed by Wang and He(2022)is improved by taking the upper-left pixel in the block as the target pixel,to predict other pixels to free up more embedding space.To the best of our knowledge,quadtree partitioning is first applied to RDH-EI.Simulation results show that the proposed method is reversible and separable,and that its average embedding capacity is improved.For gray images with a size of 512×512,the average embedding capacity is increased by 25565 bits.For all smooth images with improved embedding capacity,the average embedding capacity is increased by about 35530 bits. 展开更多
关键词 Adaptive quadtree partitioning Adaptive most significant bit(MSB)prediction reversible data hiding in encrypted images(RDH-EI) High embedding capacity
原文传递
A Reversible Data Hiding with Quality Controllable Scheme for Encrypted-Compressed Image
11
作者 LI Xinyan MOU Huajian +1 位作者 YAN Bing GAO Li 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第5期383-390,共8页
In order to achieve image encryption and data embedding simultaneously, a reversible data hiding(RDH) algorithm for encrypted-compressed image in wavelet domain is proposed. This scheme employs the quality controllabl... In order to achieve image encryption and data embedding simultaneously, a reversible data hiding(RDH) algorithm for encrypted-compressed image in wavelet domain is proposed. This scheme employs the quality controllable parameter. Moreover it has larger embedding capacity and smaller quality control parameters than other methods in literatures. Meanwhile, the cross chaotic map is employed to generate chaotic sequences, and the total keys of the algorithm is far large. Experimental results and comparisons show that the proposed scheme has large capacity, high security, and strong resistance to brute-force. 展开更多
关键词 reversible data hiding in encrypted image cross CHAOTIC map DIFFUSE and SCRAMBLE encryption-compression
原文传递
High Payload Reversible Data Hiding for Encrypted Image with Homomorphic Encryption
12
作者 LI Xinyan MOU Huajian 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第5期445-451,共7页
This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts,... This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts, which are to be encrypted by applying the homomorphic application based on the Paillier algorithm. Then a serial of operations are carried out in the encrypted domain so as to embed the additional data into the encrypted image. Finally, the embedded additional data can be perfectly extracted, and the host image can be recovered without error when the marked image is decrypted directly. Security analysis, extensive experiment results and comparisons illustrate that it has high security, and the original image recovery is free of any error. Meanwhile, the embedding capacity of this algorithm is enhanced when compared with other literatures. 展开更多
关键词 reversible data hiding homomorphic encryption high payload encrypted domain
原文传递
Secure separable reversible data hiding of halftone image in blockchain
13
作者 Ding Haiyang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2022年第2期85-96,共12页
To realize the distributed storage and management of a secret halftone image in blockchain,a secure separable reversible data hiding(RDH)of halftone image in blockchain(SSRDHB)was proposed.A secret halftone image can ... To realize the distributed storage and management of a secret halftone image in blockchain,a secure separable reversible data hiding(RDH)of halftone image in blockchain(SSRDHB)was proposed.A secret halftone image can be used as the original image to generate multiple share images which can be distributed storage in each point of blockchain,and additional data can be hidden to achieve management of each share image.Firstly,the secret halftone image was encrypted through Zu Chongzhi(ZUC)algorithm by using the encryption key(EK).Secondly,the method of using odd or even of share data was proposed to hide data,and a share dataset can be generated by using polynomial operation.Thirdly,multiple share images can be obtained through selecting share data,and different additional data can be hidden through controlling odd or even of share data,and additional data can be protected by using data-hiding key(DK).After sharing process,if the receiver has both keys,the halftone image can be recovered and additional data can be revealed,and two processes are separable.Experiment results show that multiple share images hidden additional data can be obtained through SSRDHB,and the halftone image can be recovered with 100%by picking any part of share images,and one additional data can be revealed with 100%by picking any one share image. 展开更多
关键词 separable reversible data hiding(RDH) halftone image secret sharing blockchain additional data
原文传递
基于四叉树加密与自适应块编码的密文图像可逆数据隐藏
14
作者 韩娟 周思琪 平萍 《计算机工程》 北大核心 2025年第2期202-212,共11页
随着云计算和云存储场景中图像安全和用户隐私需求日益增加,密文图像可逆数据隐藏技术备受关注。相较于加密前预留空间(RRBE)的方法,传统的加密后腾出空间(VRAE)技术通常在加密过程中破坏了原始图像像素间的相关性,导致嵌入率降低,从而... 随着云计算和云存储场景中图像安全和用户隐私需求日益增加,密文图像可逆数据隐藏技术备受关注。相较于加密前预留空间(RRBE)的方法,传统的加密后腾出空间(VRAE)技术通常在加密过程中破坏了原始图像像素间的相关性,导致嵌入率降低,从而限制其应用广泛性。为提升VRAE的嵌入率同时确保图像安全,提出一种可用于云计算环境的基于四叉树加密和自适应预测误差编码的加密图像可逆数据隐藏方案。首先,采用基于四叉树的分区置乱加密算法,在确保图像安全性的同时保证块内像素的相关性,并利用中值边缘预测器获取块内像素值的预测误差;其次,对预测误差的数值位进行自适应块编码,根据块的大小采用不同的编码方法,从而有效压缩数据并腾出空间供数据嵌入。实验结果表明,与现有的密文域可逆数据隐藏方案相比,该方案更有效地利用了像素间的相关性,提高了秘密信息的嵌入能力,在BOSSBase和BOWS-2数据集上平均嵌入率分别达到3.332 bit/pixel和3.289 bit/pixel,比现有先进的VRAE方法分别提高0.117 bit/pixel和0.175 bit/pixel。 展开更多
关键词 可逆数据隐藏 图像安全 自适应块编码 预测误差 四叉树加密
在线阅读 下载PDF
基于像素调制自适应编码密文域的可逆信息隐藏算法
15
作者 王玉 孔祥婷 吴媛媛 《湖北大学学报(自然科学版)》 CAS 2025年第1期109-117,共9页
针对图像信息隐藏不能产生理想的有效负载问题,提出一种基于像素调制自适应编码密文域的可逆信息隐藏算法。首先,对灰度图像做块间置乱并进行像素调制预处理,设计块内像素位置变换矩阵保证分块置乱前后中心像素的预测误差不变。接着,利... 针对图像信息隐藏不能产生理想的有效负载问题,提出一种基于像素调制自适应编码密文域的可逆信息隐藏算法。首先,对灰度图像做块间置乱并进行像素调制预处理,设计块内像素位置变换矩阵保证分块置乱前后中心像素的预测误差不变。接着,利用最邻近像素差分方法保持加密图像块内的空间冗余,根据预测误差的频率自适应生成哈夫曼编码,并对比哈夫曼编码中比特位将信息嵌入到预留空间中。最后,对所提出算法进行实验分析,实验结果表明:提出的算法具有可逆性和信息分离性,与自适应差分图像恢复算法相比,平均嵌入率提高了0.299 bpp。 展开更多
关键词 可逆信息隐藏 密文域 自适应编码 分块置乱 图像加密
在线阅读 下载PDF
基于颜色通道关联性和熵编码的彩色密文图像可逆信息隐藏
16
作者 高光勇 季驰 夏志华 《计算机研究与发展》 北大核心 2025年第4期1050-1064,共15页
随着云计算领域数据安全和用户隐私的需求发展,密文图像可逆信息隐藏(reversible data hiding in encrypted images,RDHEI)技术已经越来越受到人们的关注,但目前大多数的密文图像可逆信息隐藏都是基于灰度图像,它们与彩色图像相比在应... 随着云计算领域数据安全和用户隐私的需求发展,密文图像可逆信息隐藏(reversible data hiding in encrypted images,RDHEI)技术已经越来越受到人们的关注,但目前大多数的密文图像可逆信息隐藏都是基于灰度图像,它们与彩色图像相比在应用场景上有很大局限性.此外,由于目前关于密文域的可逆信息隐藏方法主要集中于灰度图像,同时针对彩色图像的特性优化较少,往往无法对彩色载体图像实现更好的性能,所以进一步加强对基于彩色密文图像的可逆信息隐藏算法的研究具有很高的价值.首次提出了一种可以用于云计算环境的基于颜色通道相关性和熵编码的高性能彩色密文图像可逆信息隐藏算法(RDHEI-CE).首先,原始彩色图像的RGB通道被分离并分别得出预测误差.接下来,通过自适应熵编码和预测误差直方图生成嵌入空间.之后通过颜色通道相关性进一步扩展嵌入空间,并将秘密信息嵌入加密图像中.最后,对载密图像进行可逆置乱以抵御唯密文攻击.与大多数最先进的可逆信息隐藏方法相比,实验表明RDHEI-CE算法提供了更高的嵌入率和更好的安全性,并且拓宽了可逆信息隐藏在云端的应用场景. 展开更多
关键词 可逆信息隐藏 密文图像 彩色图像 颜色通道相关性 熵编码
在线阅读 下载PDF
基于多层次插值预测和全局排序的彩色图像可逆信息隐藏
17
作者 任前龙 熊礼治 《南京信息工程大学学报》 北大核心 2025年第2期191-202,共12页
为了有效解决现有彩色图像可逆数据隐藏(Reversible Data Hiding,RDH)算法中隐写图像视觉质量低的问题,提出一种多层次插值预测和全局排序的彩色图像RDH方案.首先,为了充分利用图像中不同纹理区域的特征,设计一种多层次插值预测方法,显... 为了有效解决现有彩色图像可逆数据隐藏(Reversible Data Hiding,RDH)算法中隐写图像视觉质量低的问题,提出一种多层次插值预测和全局排序的彩色图像RDH方案.首先,为了充分利用图像中不同纹理区域的特征,设计一种多层次插值预测方法,显著地提升了像素的预测精度;然后,设计一种基于复杂度的全局排序策略,分别对彩色图像三个通道中的预测误差进行排序,充分利用每个通道中预测误差的全局特征,生成分布更加集中的三维预测误差直方图(Three-Dimensional Prediction Error Histogram,3D PEH);最后,利用自适应三维映射策略修改误差直方图,嵌入秘密数据.实验结果表明,与最新的一些方案相比,所提的方法实现了更好的嵌入性能. 展开更多
关键词 彩色图像 可逆信息隐藏 多层次插值预测 全局排序
在线阅读 下载PDF
A Steganography Based on Optimal Multi-Threshold Block Labeling
18
作者 Shuying Xu Chin-Chen Chang Ji-Hwei Horng 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期721-739,共19页
Hiding secret data in digital images is one of the major researchfields in information security.Recently,reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud servi... Hiding secret data in digital images is one of the major researchfields in information security.Recently,reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services.This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique(OMTBL-RDHEI).In our scheme,the content owner encrypts the cover image with block permutation,pixel permutation,and stream cipher,which preserve the in-block correlation of pixel values.After uploading to the cloud service,the data hider applies the prediction error rearrangement(PER),the optimal threshold selection(OTS),and the multi-threshold labeling(MTL)methods to obtain a compressed version of the encrypted image and embed secret data into the vacated room.The receiver can extract the secret,restore the cover image,or do both according to his/her granted authority.The proposed MTL labels blocks of the encrypted image with a list of threshold values which is optimized with OTS based on the features of the current image.Experimental results show that labeling image blocks with the optimized threshold list can efficiently enlarge the amount of vacated room and thus improve the embedding capacity of an encrypted cover image.Security level of the proposed scheme is analyzed and the embedding capacity is compared with state-of-the-art schemes.Both are concluded with satisfactory performance. 展开更多
关键词 reversible data hiding encryption image prediction error compression multi-threshold block labeling
在线阅读 下载PDF
A Block Mean Insertion and Dual Stego Generation Based Embedding Strategy
19
作者 Md. Habibur Rahman A. H. M. Kamal 《Journal of Computer and Communications》 2021年第3期70-87,共18页
In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel val... In reversible data hiding, pixel value ordering is an up-to-the-minute research idea in the field of data hiding. Secret messages are embedded in the maximum or the minimum value among the pixels in a block. Pixel value ordering helps identify the embeddable pixels in a block but suffers from fewer embedding payloads. It leaves many pixels in a block without implanting any bits there. The proposed scheme in this paper resolved that problem by allowing every pixel to conceive data bits. The method partitioned the image pixels in blocks of size two. In each block, it first orders these two pixels and then measures the average value. The average value is placed in the middle of these two pixels. Thus, the scheme extends the block size from two to three. After applying the embedding method of Weng <i><span>et al</span></i><span>., the implantation task removed the average value from the block to reduce its size again to two. These two alive pixels are called stego pixels, which produced a stego image. A piece of state information is produced during implanting to track whether a change is happening to the block’s cover pixels. This way, after embedding in all blocks, a binary stream of state information is produced, which has later been converted to decimal values. Thus, image data were assembled in a two-dimensional array. Considering the array as another image plane, Weng </span><i><span>et al</span></i><span>.’s method is again applied to embed further to produce another stego image. Model validation ensured that the proposed method performed better than previous work </span><span>i</span><span>n this field.</span> 展开更多
关键词 reversible data hiding Stego image Multilayer Embedding Block Partition Embedding Payload
在线阅读 下载PDF
基于预测误差绝对值标记的加密图像可逆信息隐藏方法
20
作者 顼聪 朱毅 +1 位作者 陶永鹏 王兴田 《南京师大学报(自然科学版)》 CAS 北大核心 2024年第4期126-134,共9页
随着云计算的发展,加密图像可逆信息隐藏技术得到了越来越多研究者的关注,并广泛应用于司法、军事、医疗等领域.本文提出了一种基于预测误差绝对值标记的加密图像可逆信息隐藏算法.首先,使用中值边缘检测器获取原始图像像素预测值,并计... 随着云计算的发展,加密图像可逆信息隐藏技术得到了越来越多研究者的关注,并广泛应用于司法、军事、医疗等领域.本文提出了一种基于预测误差绝对值标记的加密图像可逆信息隐藏算法.首先,使用中值边缘检测器获取原始图像像素预测值,并计算预测误差的绝对值;然后根据其二进制序列从最高有效位到最低有效位存在多个连续0值的分布状况,构建最优二叉树以生成自适应的哈夫曼编码;最后通过哈夫曼编码标记对应的预测误差绝对值像素,以腾出空间进行信息嵌入.实验结果表明:该算法能够实现信息的完整提取和图像的无损恢复,与同类算法相比,能够有效地提高图像机密信息的嵌入率. 展开更多
关键词 加密图像 可逆信息隐藏 预测误差绝对值 哈夫曼编码
在线阅读 下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部