《计算机应用》唯一官方网站 ›› 2024, Vol. 44 ›› Issue (3): 780-787.DOI: 10.11772/j.issn.1001-9081.2023030321
所属专题: 网络空间安全
收稿日期:
2023-03-31
修回日期:
2023-05-13
接受日期:
2023-05-17
发布日期:
2023-06-15
出版日期:
2024-03-10
通讯作者:
袁卿宇
作者简介:
高铁杠(1966—),男,河北石家庄人,教授,博士生导师,博士,主要研究方向:软件工程、信息安全。
基金资助:
Received:
2023-03-31
Revised:
2023-05-13
Accepted:
2023-05-17
Online:
2023-06-15
Published:
2024-03-10
Contact:
Qingyu YUAN
About author:
GAO Tiegang, born in 1966, Ph. D., professor. His research interests include software engineering, information security.
Supported by:
摘要:
为增强图像加密的安全性以及增加加密图像的信息隐藏容量,提出一种基于像素预测和秘密图像共享的可逆信息隐藏算法。首先,利用共享矩阵逐行处理图像并分存为四个共享图像;其次,利用二维混沌映射生成随机密钥加密共享图像;再次,利用中值边缘检测器(MED)预测共享图像中可嵌入位置的像素值,预测值与原像素从高位开始比对相同的位数,根据规则记录标签值,提取参考像素的高三位与认证信息存入可嵌入位;最后,将标签值存入参考像素高位,剩余的可嵌入位为所提算法的嵌入容量。实验结果表明,所提算法不仅能够为信息隐藏提供大容量的嵌入空间,而且能够实现可逆数据隐藏并根据(k,n)阈值策略实现加密图像的无损复原。
中图分类号:
袁卿宇, 高铁杠. 基于像素预测和秘密图像共享的可逆信息隐藏[J]. 计算机应用, 2024, 44(3): 780-787.
Qingyu YUAN, Tiegang GAO. Reversible information hiding based on pixel prediction and secret image sharing[J]. Journal of Computer Applications, 2024, 44(3): 780-787.
高位相同个数 | 标签值 | 可嵌入位 |
---|---|---|
0 | 000 | 1 |
1 | 001 | 2 |
2 | 010 | 3 |
3 | 011 | 4 |
4 | 100 | 5 |
5 | 101 | 6 |
6 | 110 | 7 |
111 | 7 |
表1 标签值与可嵌入位对应关系
Tab. 1 Mapping between label values and embeddable bit
高位相同个数 | 标签值 | 可嵌入位 |
---|---|---|
0 | 000 | 1 |
1 | 001 | 2 |
2 | 010 | 3 |
3 | 011 | 4 |
4 | 100 | 5 |
5 | 101 | 6 |
6 | 110 | 7 |
111 | 7 |
秘密图序号 | PSNR | 秘密图序号 | PSNR |
---|---|---|---|
a,b | 13.478 8 | c,d | 13.500 9 |
a,c | 13.572 3 | a,b,c | 60.511 0 |
a,d | 13.489 0 | a,b,d | 57.425 1 |
b,c | 13.474 8 | b,c,d | 60.661 4 |
b,d | 13.506 1 | a,b,c,d | 60.511 0 |
表2 不同秘密共享图复原的峰值信噪比 (dB)
Tab. 2 Restoration PSNRs of different secret shared images
秘密图序号 | PSNR | 秘密图序号 | PSNR |
---|---|---|---|
a,b | 13.478 8 | c,d | 13.500 9 |
a,c | 13.572 3 | a,b,c | 60.511 0 |
a,d | 13.489 0 | a,b,d | 57.425 1 |
b,c | 13.474 8 | b,c,d | 60.661 4 |
b,d | 13.506 1 | a,b,c,d | 60.511 0 |
算法 | NPCR | UACI |
---|---|---|
本文算法 | 99.612 5 | 33.530 2 |
文献[ | 99.601 8 | 33.464 0 |
文献[ | 99.606 3 | 33.467 6 |
文献[ | 99.591 0 | 33.421 2 |
表3 抗差分攻击的性能对比 (%)
Tab. 3 Comparison of performance against differential attacks
算法 | NPCR | UACI |
---|---|---|
本文算法 | 99.612 5 | 33.530 2 |
文献[ | 99.601 8 | 33.464 0 |
文献[ | 99.606 3 | 33.467 6 |
文献[ | 99.591 0 | 33.421 2 |
秘密图 | b0 | b1 | b2 | b3 | b4 | b5 | b6 | b7 | 嵌入空间S | 嵌入率/bpp |
---|---|---|---|---|---|---|---|---|---|---|
平均 | 9 446 | 8 050 | 4 154 | 3 985 | 5 628 | 5 350 | 3 379 | 3 954 | 165 519 | 3.766 |
Mr1 | 9 349 | 7 675 | 4 082 | 3 984 | 5 770 | 5 359 | 3 433 | 4 294 | 167 974 | 3.822 |
Mr2 | 9 166 | 8 360 | 4 246 | 4 065 | 5 523 | 5 291 | 3 281 | 4 014 | 165 310 | 3.762 |
Mr3 | 10 366 | 8 533 | 3 767 | 3 804 | 5 320 | 5 064 | 3 242 | 3 850 | 160 577 | 3.654 |
Mr4 | 8 901 | 7 634 | 4 520 | 4 085 | 5 902 | 5 687 | 3 558 | 3 659 | 168 220 | 3.828 |
表4 各个标签的数量与可嵌入位
Tab. 4 Number of each label and embeddable bits
秘密图 | b0 | b1 | b2 | b3 | b4 | b5 | b6 | b7 | 嵌入空间S | 嵌入率/bpp |
---|---|---|---|---|---|---|---|---|---|---|
平均 | 9 446 | 8 050 | 4 154 | 3 985 | 5 628 | 5 350 | 3 379 | 3 954 | 165 519 | 3.766 |
Mr1 | 9 349 | 7 675 | 4 082 | 3 984 | 5 770 | 5 359 | 3 433 | 4 294 | 167 974 | 3.822 |
Mr2 | 9 166 | 8 360 | 4 246 | 4 065 | 5 523 | 5 291 | 3 281 | 4 014 | 165 310 | 3.762 |
Mr3 | 10 366 | 8 533 | 3 767 | 3 804 | 5 320 | 5 064 | 3 242 | 3 850 | 160 577 | 3.654 |
Mr4 | 8 901 | 7 634 | 4 520 | 4 085 | 5 902 | 5 687 | 3 558 | 3 659 | 168 220 | 3.828 |
算法 | Peppers | Jetplane | Lena |
---|---|---|---|
文献[ | 2.340 | 2.599 | 2.374 |
文献[ | 1.977 | 2.193 | 2.018 |
文献[ | 2.042 | 2.191 | 2.014 |
文献[ | 2.424 | 2.561 | 2.133 |
文献[ | 3.584 | 3.409 | 3.127 |
本文算法 | 3.766 | 3.803 | 3.386 |
表5 不同算法的平均嵌入率对比
Tab. 5 Average embedding rate comparison of different algorithms
算法 | Peppers | Jetplane | Lena |
---|---|---|---|
文献[ | 2.340 | 2.599 | 2.374 |
文献[ | 1.977 | 2.193 | 2.018 |
文献[ | 2.042 | 2.191 | 2.014 |
文献[ | 2.424 | 2.561 | 2.133 |
文献[ | 3.584 | 3.409 | 3.127 |
本文算法 | 3.766 | 3.803 | 3.386 |
1 | P-L CHIU, LEE K-H. An XOR-based progressive visual cryptography with meaningful shares [C]// Proceedings of the 2016 1st IEEE International Conference on Computer Communication and the Internet. Piscataway: IEEE, 2016: 362-365. 10.1109/cci.2016.7778943 |
2 | 曾珂,禹思敏,胡迎春,等.基于3D-LSCM的图像混沌加密算法[J].电子技术应用,2020,46(1):86-91. 10.16157/j.issn.0258-7998.190966 |
ZENG K, YU S M, HU Y C, et al. Image encryption algorithm using 3D Logistic-Sine cascade map [J]. Application of Electronic Technique, 2020,46(1):86-91. 10.16157/j.issn.0258-7998.190966 | |
3 | 周连兵,周湘贞,崔学荣.基于双重二维混沌映射的压缩图像加密方案[J].计算机科学, 2022, 49(8): 344-349. 10.11896/jsjkx.210700235 |
ZHOU L B, ZHOU X Z, CUI X R. Compressed image encryption scheme based on dual two dimensional chaotic map [J]. Computer Science, 2022, 49(8): 344-349. 10.11896/jsjkx.210700235 | |
4 | YASSER I, KHALIL A T, MOHAMED M A, et al. A robust chaos-based technique for medical image encryption [J]. IEEE Access, 2022, 10: 244-257. 10.1109/access.2021.3138718 |
5 | LUO J, SHI H. Research of chaos encryption algorithm based on logistic mapping [C]// Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2006: 381-383. 10.1109/iih-msp.2006.265022 |
6 | 陈虹,赵菊芳,郭鹏飞,等. 基于混沌映射的分块循环DNA图像加密算法[J].计算机应用研究, 2022,39(6):1865-1871. |
CHEN H, ZHAO J F, GUO P F, et al. Block cyclic DNA image encryption algorithm based on chaotic map [J]. Application Research of Computers, 2022, 39(6): 1865-1871. | |
7 | LIU Y, YANG C. Scalable secret image sharing scheme with essential shadows [J]. Signal Processing: Image Communication, 2017, 58: 49-55. 10.1016/j.image.2017.06.011 |
8 | YAN X, LU Y, LIU L, et al. Reversible image secret sharing [J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 3848-3858. 10.1109/tifs.2020.3001735 |
9 | BISWAS A K, DASGUPTA M, RAY S, et al. A probable cheating-free (t,n) threshold secret sharing scheme with enhanced blockchain [J]. Computers & Electrical Engineering, 2022, 100(1): 107925. 10.1016/j.compeleceng.2022.107925 |
10 | KANSO A, GHEBLEH M. An efficient (t,n)-threshold secret image sharing scheme [J]. Multimedia Tools & Applications, 2017, 76:16369-16388. 10.1007/s11042-016-3917-x |
11 | 黄东平, 王道顺, 黄连生,等. 一种新的(k,n)阈值可视密钥分存方案[J]. 电子学报, 2006, 34(3): 503-507. 10.3321/j.issn:0372-2112.2006.03.027 |
HUANG D P, WANG D S, HUANG L S, et al. A novel (k,n) threshold scheme for visual secret sharing [J]. Acta Electronica Sinica, 2006, 34(3): 503-507. 10.3321/j.issn:0372-2112.2006.03.027 | |
12 | BAI L. A reliable (k, n) image secret sharing scheme with low information overhead [J]. International Journal of Computers and Applications, 2010, 32(1):9-14. 10.1080/1206212x.2010.11441955 |
13 | 田小平, 田慧明, 吴成茂. 基于共享矩阵和混沌的图像分存算法[J]. 西安邮电学院学报, 2018, 32(2): 22-31. |
TIAN X P, TIAN H M, WU C M. Image sharing algorithm based on shared matrix and chaos[J]. Journal of Xi’an University of Posts and Telecommunications, 2018, 32(2): 22-31. | |
14 | LI B, FENG Y, XIONG Z, et al. Research on AI security enhanced encryption algorithm of autonomous IoT systems [J]. Information Sciences, 2021, 575: 379-398. 10.1016/j.ins.2021.06.016 |
15 | 刘雁孝, 吴萍, 孙钦东. 基于区域卷积神经网络的图像秘密共享方案[J]. 计算机研究与发展, 2021, 58(5): 1065-1074. 10.7544/issn1000-1239.2021.20200898 |
LIU Y X, WU P, SUN Q D. Secret image sharing schemes based on region convolution neural network [J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. 10.7544/issn1000-1239.2021.20200898 | |
16 | 熊竞达, 邓智颖. 一种基于非线性混沌与数据共享的图像流加密算法[J]. 电子技术与软件工程, 2017(4): 194. |
XIONG J D, DENG Z Y. An image stream encryption algorithm based on nonlinear chaos and data sharing [J]. Electronic Technology & Software Engineering, 2017(4): 194. | |
17 | LIU Y, YANG C, WANG Y, et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial [J]. Information Sciences, 2018, 453: 21-29. 10.1016/j.ins.2018.04.043 |
18 | FUKUMITSU M, HASEGAWA S, IWAZAKI J, et al. A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain [C]// Proceedings of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications. Piscataway: IEEE, 2017: 803-810. 10.1109/aina.2017.11 |
19 | CHENG Y, FU Z, YU B. Improved visual secret sharing scheme for QR code applications [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2393-2403. 10.1109/tifs.2018.2819125 |
20 | ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. 10.1109/lsp.2011.2114651 |
21 | ZHANG W, WANG H, HOU D, et al. Reversible data hiding in encrypted images by reversible image transformation [J]. IEEE Transactions on Multimedia, 2016, 18(8): 1469-1479. 10.1109/tmm.2016.2569497 |
22 | MOHAMMADI A. A general framework for reversible data hiding in encrypted images by reserving room before encryption [J]. Journal of Visual Communication and Image Representation, 2022, 85: 103478. 10.1016/j.jvcir.2022.103478 |
23 | SHI M, YANG Y, MENG J, et al. Reversible data hiding with enhancing contrast and preserving brightness in medical image[J]. Journal of Information Security and Applications, 2022, 70: 103324. 10.1016/j.jisa.2022.103324 |
24 | QIAN Z, ZHANG X. Reversible data hiding in encrypted images with distributed source encoding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4): 636-646. 10.1109/tcsvt.2015.2418611 |
25 | YI S, ZHOU Y. Separable and reversible data hiding in encrypted images using parametric binary tree labeling [J]. IEEE Transactions on Multimedia, 2019, 21(1): 51-64. 10.1109/tmm.2018.2844679 |
26 | LIU Z-L, C-M PUN. Reversible data hiding in encrypted images by lossless pixel conversion [EB/OL]. [2022-09-28]. . |
27 | YIN Z, XIANG Y, ZHANG X. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding [J]. IEEE Transactions on Multimedia, 2020, 22(4): 874-884. 10.1109/tmm.2019.2936314 |
28 | PUTEAUX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. 10.1109/tifs.2018.2799381 |
29 | YI P, YIN Z, QIAN Z. Reversible data hiding in encrypted images with two-MSB prediction [C]// Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security. Piscataway: IEEE, 2018: 1-7. 10.1109/wifs.2018.8630785 |
30 | CHEN K, CHANG C-C. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement [J]. Journal of Visual Communication and Image Representation, 2019, 58: 334-344. 10.1016/j.jvcir.2018.12.023 |
31 | LAI Q, HU G, ERKAN U, et al. High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map [J]. Applied Mathematics and Computation, 2023, 442: 127738. 10.1016/j.amc.2022.127738 |
32 | BENAISSI S, CHIKOUCHE N, HAMZA R. A novel image encryption algorithm based on hybrid chaotic maps using a key image [J]. Optik, 2023, 272: 170316. 10.1016/j.ijleo.2022.170316 |
33 | WANG J, JIANG W, XU H, et al. Image encryption based on Logistic-Sine self-embedding chaotic sequence [J]. Optik, 2022, 271: 170075. 10.1016/j.ijleo.2022.170075 |
34 | 杨尧林, 和红杰, 陈帆, 等. 基于预测误差自适应编码的图像加密可逆数据隐藏[J]. 计算机研究与发展, 2021, 58(6): 1340-1350. 10.7544/issn1000-1239.2021.20200172 |
YANG Y L, HE H J, CHEN F, et al. Reversible data hiding of image encryption based on prediction error adaptive coding [J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. 10.7544/issn1000-1239.2021.20200172 | |
35 | FU Y, KONG P, YAO H, et al. Effective reversible data hiding in encrypted image with adaptive encoding strategy [J]. Information Sciences, 2019,494: 21-36. 10.1016/j.ins.2019.04.043 |
36 | WU Y, XIANG Y, GUO Y, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling [J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929-1938. 10.1109/tmm.2019.2952979 |
37 | 佘晓萌,杜洋,马文静,等. 基于像素预测和块标记的图像密文可逆信息隐藏[J]. 计算机研究与发展, 2022, 59(9): 2089-2100. 10.7544/issn1000-1239.20210495 |
SHE X M, DU Y, MA W J, et al. Reversible data hiding in encrypted images based on pixel prediction and block labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089-2100. 10.7544/issn1000-1239.20210495 |
[1] | 张翔宇, 杨阳, 冯国徽, 秦川. 基于多目标优化的加密图像可逆信息隐藏[J]. 《计算机应用》唯一官方网站, 2022, 42(6): 1716-1723. |
[2] | 郭媛, 王学文, 王充, 姜津霖. 基于动态网络的非线性置乱扩散同步图像加密[J]. 《计算机应用》唯一官方网站, 2022, 42(1): 162-170. |
[3] | 李珊珊, 赵莉, 张红丽. 基于猫映射的图像灰度值加密[J]. 计算机应用, 2021, 41(4): 1148-1152. |
[4] | 沈子懿, 王卫亚, 蒋东华, 荣宪伟. 基于Hopfield混沌神经网络和压缩感知的可视化图像加密算法[J]. 计算机应用, 2021, 41(10): 2893-2899. |
[5] | 葛江峡, 齐文韬, 兰林, 田雨, 朱和贵. 二维反三角超混沌系统及其在图像加密上的应用[J]. 计算机应用, 2019, 39(1): 239-244. |
[6] | 金建国, 肖莹, 邸志刚. 基于混沌动态随机分组与调制分数阶FFT旋转因子的图像加密[J]. 计算机应用, 2016, 36(4): 966-972. |
[7] | 江帆, 吴小天, 孙伟. 基于稀疏矩阵的Arnold数字图像加密算法[J]. 计算机应用, 2015, 35(3): 726-731. |
[8] | 徐光宪 郭晓娟. 基于混沌系统的DNA图像加密算法[J]. 计算机应用, 2014, 34(11): 3177-3179. |
[9] | 张文全 张烨 周南润. 基于随机分数梅林变换的非线性图像加密算法[J]. 计算机应用, 2013, 33(10): 2865-2867. |
[10] | 王雅庆 周尚波. 基于分数阶陈氏混沌系统的图像加密算法[J]. 计算机应用, 2013, 33(04): 1043-1046. |
[11] | 刘乐鹏 张雪峰. 基于混沌和位运算的图像加密算法[J]. 计算机应用, 2013, 33(04): 1070-1073. |
[12] | 向涛 王安. 安全的LZW编码算法及其在GIF图像加密中的应用[J]. 计算机应用, 2012, 32(12): 3462-3465. |
[13] | 黄斌 史亮 邓小鸿 陈志刚. 自适应高容量医学图像可逆数据隐藏算法[J]. 计算机应用, 2012, 32(10): 2779-2782. |
[14] | 龚黎华 曾绍阳 周南润. 基于频谱切割和二维Arnold变换的彩色图像加密算法[J]. 计算机应用, 2012, 32(09): 2599-2602. |
[15] | 唐宋 徐桂兰 李清都. 基于高维超混沌系统和矩阵张量积的图像分组加密新算法[J]. 计算机应用, 2012, 32(08): 2262-2264. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||