Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (6): 1880-1888.DOI: 10.11772/j.issn.1001-9081.2023060900
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Yue LI1,2, Dan TANG1,2(), Minjun SUN1,2, Xie WANG1,3, Hongliang CAI1,2, Qiong ZENG1,2
Received:
2023-07-11
Revised:
2023-09-25
Accepted:
2023-09-25
Online:
2023-10-31
Published:
2024-06-10
Contact:
Dan TANG
About author:
LI Yue, born in 1997, M. S. candidate. Her research interests include information hiding, digital watermarking.Supported by:
李越1,2, 唐聃1,2(), 孙敏钧1,2, 王燮1,3, 蔡红亮1,2, 曾琼1,2
通讯作者:
唐聃
作者简介:
李越(1997—),女,四川成都人,硕士研究生,主要研究方向:信息隐藏、数字水印基金资助:
CLC Number:
Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG. Efficient reversible data hiding scheme based on two-dimensional modulo operations[J]. Journal of Computer Applications, 2024, 44(6): 1880-1888.
李越, 唐聃, 孙敏钧, 王燮, 蔡红亮, 曾琼. 基于二维模运算的高效率可逆信息隐藏方案[J]. 《计算机应用》唯一官方网站, 2024, 44(6): 1880-1888.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023060900
方案 | 密钥值 | PSNR/dB | SSIM | ||||
---|---|---|---|---|---|---|---|
平均值 | 平均值 | ||||||
本文方案 | 56.38 | 56.41 | 56.40 | 0.999 87 | 0.999 87 | 0.999 87 | |
53.41 | 53.40 | 53.41 | 0.999 75 | 0.999 75 | 0.999 75 | ||
50.97 | 50.97 | 50.97 | 0.999 54 | 0.999 54 | 0.999 54 | ||
49.28 | 49.30 | 49.29 | 0.999 35 | 0.999 35 | 0.999 35 | ||
文献[ | 51.26 | 49.52 | 50.39 | 0.999 61 | 0.999 42 | 0.999 52 | |
文献[ | 47.70 | 47.70 | 0.999 13 | 0.999 13 | |||
文献[ | 60.17 | 57.16 | 58.67 | 0.999 95 | 0.999 94 | 0.999 95 | |
57.16 | 54.15 | 55.66 | 0.999 90 | 0.999 92 | 0.999 91 | ||
50.17 | 47.87 | 49.02 | 0.999 54 | 0.999 28 | 0.999 41 | ||
45.17 | 44.24 | 44.71 | 0.999 23 | 0.999 22 | 0.999 23 | ||
文献[ | 56.93 | 50.91 | 53.92 | 0.999 94 | 0.999 78 | 0.999 86 |
Tab.1 Comparative results of PSNR and SSIM
方案 | 密钥值 | PSNR/dB | SSIM | ||||
---|---|---|---|---|---|---|---|
平均值 | 平均值 | ||||||
本文方案 | 56.38 | 56.41 | 56.40 | 0.999 87 | 0.999 87 | 0.999 87 | |
53.41 | 53.40 | 53.41 | 0.999 75 | 0.999 75 | 0.999 75 | ||
50.97 | 50.97 | 50.97 | 0.999 54 | 0.999 54 | 0.999 54 | ||
49.28 | 49.30 | 49.29 | 0.999 35 | 0.999 35 | 0.999 35 | ||
文献[ | 51.26 | 49.52 | 50.39 | 0.999 61 | 0.999 42 | 0.999 52 | |
文献[ | 47.70 | 47.70 | 0.999 13 | 0.999 13 | |||
文献[ | 60.17 | 57.16 | 58.67 | 0.999 95 | 0.999 94 | 0.999 95 | |
57.16 | 54.15 | 55.66 | 0.999 90 | 0.999 92 | 0.999 91 | ||
50.17 | 47.87 | 49.02 | 0.999 54 | 0.999 28 | 0.999 41 | ||
45.17 | 44.24 | 44.71 | 0.999 23 | 0.999 22 | 0.999 23 | ||
文献[ | 56.93 | 50.91 | 53.92 | 0.999 94 | 0.999 78 | 0.999 86 |
密钥值 | MER/bpp | 密钥值 | MER/bpp |
---|---|---|---|
5 | 0.99 | 13 | 1.73 |
9 | 1.48 | 17 | 1.97 |
Tab.2 MER statistics
密钥值 | MER/bpp | 密钥值 | MER/bpp |
---|---|---|---|
5 | 0.99 | 13 | 1.73 |
9 | 1.48 | 17 | 1.97 |
方案 | 密钥值 | 溢出处理范围 |
---|---|---|
本文方案 | ||
文献[ | ||
文献[ | ||
文献[ | ||
文献[ |
Tab.3 Overflow processing range comparison among various schemes
方案 | 密钥值 | 溢出处理范围 |
---|---|---|
本文方案 | ||
文献[ | ||
文献[ | ||
文献[ | ||
文献[ |
方案 | 时间复杂度 |
---|---|
本文方案 | |
文献[ | |
文献[ | |
文献[ | |
文献[ |
Tab. 4 Time complexity comparison among various schemes
方案 | 时间复杂度 |
---|---|
本文方案 | |
文献[ | |
文献[ | |
文献[ | |
文献[ |
1 | 欧博,殷赵霞,项世军. 明文图像可逆信息隐藏综述[J]. 中国图象图形学报,2022,27(1): 111-124. |
OU B, YIN Z X, XIANG S J. Overview of reversible data hiding in plaintext image[J]. Journal of Image and Graphics, 2022, 27(1): 111-124. | |
2 | TIAN J. Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890-896. |
3 | NI Z, SHI Y-Q, ANSARI N, et al. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362. |
4 | HUSSAIN M, WAHAB A W A, IDRIS Y I BIN, et al. Image steganography in spatial domain: a survey[J]. Signal Processing: Image Communication, 2018, 65: 46-66. |
5 | KADHIM I J, PREMARATNE P, VIAL P J, et al. Comprehensive survey of image steganography: techniques, evaluations, and trends in future research[J]. Neurocomputing, 2019, 335: 299-326. |
6 | W-C KUO, S-H KUO, WANG C-C, et al. High capacity data hiding scheme based on multi-bit encoding function[J]. Optik, 2016, 127(4): 1762-1769. |
7 | PRADHAN A, SEKHAR K R, SWAIN G. Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks[J]. Security and Communication Networks, 2017, 2017: 1924618. |
8 | SONAR R, SWAIN G. Steganography based on quotient value differencing and pixel value correlation[J]. CAAI Transactions on Intelligence Technology, 2021, 6(4): 504-519. |
9 | HAMEED M A, ABDEL-ALEEM O A, HASSABALLAH M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques[J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14: 4639-4657. |
10 | CHEFRANOV A G, ÖZ G. Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images[J]. Journal of Information Security and Applications, 2022, 70: 103314. |
11 | XU W-L, CHANG C-C, CHEN T-S, et al. An improved least-significant-bit substitution method using the modulo three strategy[J].Displays, 2016, 42: 36-42. |
12 | KUMAR S, GUPTA A, WALIA G S. Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges[J]. Applied Intelligence, 2022, 52:7373-7406. |
13 | MANIRIHO P, AHMAD T. Information hiding scheme for digital images using difference expansion and modulus function[J]. Journal of King Saud University — Computer and Information Sciences, 2019, 31(3): 335-347. |
14 | OU B, ZHAO Y. High capacity reversible data hiding based on multiple histograms modification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 30(8): 2329-2342. |
15 | HU R, XIANG S. Efficient 2D mapping for reversible data hiding[J]. IEEE Signal Processing Letters, 2023, 30: 329-333. |
16 | WANG W, YE J, WANG T, et al. A high capacity reversible data hiding scheme based on right-left shift[J]. Signal Processing, 2018, 150: 102-115. |
17 | FU Z, GONG M, LONG G, et al. Efficient capacity-distortion reversible data hiding based on combining multipeak embedding with local complexity[J]. Applied Intelligence, 2022, 52: 13006-13026. |
18 | LIN J-Y, CHEN Y, CHANG C-C, et al. Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction[J]. Multimedia Tools and Applications, 2019, 78: 25855-25872. |
19 | LU T-C, C-Y TSENG, WU J-H. Dual imaging-based reversible hiding technique using LSB matching[J]. Signal Processing, 2015, 108: 77-89. |
20 | JAFAR I F, DARABKH K A, AL-ZUBI R T, et al. An efficient reversible data hiding algorithm using two steganographic images[J]. Signal Processing, 2016, 128: 98-109. |
21 | SHASTRI S, THANIKAISELVAN V. Dual image reversible data hiding using trinary assignment and centre folding strategy with low distortion[J]. Journal of Visual Communication and Image Representation, 2019, 61: 130-140. |
22 | SAHU M, PADHY N, GANTAYAT S S, et al. Local binary pattern‑based reversible data hiding[J]. CAAI Transactions on Intelligence Technology, 2022, 7(4): 695-709. |
23 | CHEN X, HONG C. An efficient dual-image reversible data hiding scheme based on exploiting modification direction[J]. Journal of Information Security and Applications, 2021, 58: 102702. |
24 | LU T-C, WU J-H, HUANG C-C. Dual-image-based reversible data hiding method using center folding strategy[J]. Signal Processing, 2015, 115: 195-213. |
25 | JANA S, JANA B, LU T C, et al. Reversible data hiding scheme exploiting center folding with fuzzy weight strategy[J]. Journal of Information Security and Applications, 2022, 69: 103276. |
26 | SAIRAM T D, BOOPATHYBAGAN K. An improved high capacity data hiding scheme using pixel value adjustment and modulus operation[J]. Multimedia Tools and Applications, 2020, 79: 17003-17013. |
27 | LEE C-F, HUANG Y-L. Reversible data hiding scheme based on dual stegano-images using orientation combinations[J]. Telecommunication Systems, 2013, 52: 2237-2247. |
28 | CHANG C-C, KIEU T D, Y-C CHOU. Reversible data hiding scheme using two steganographic images[C]// Proceedings of the 2007 IEEE Region 10 International Conference. Piscataway: IEEE,2007: 1-4. |
29 | RAI P, GURUNG S, GHOSE M K. Analysis of image steganography techniques: a survey[J]. International Journal of Computer Applications, 2015, 114(1):11-17. |
[1] | Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG. Medical image privacy protection based on thumbnail encryption and distributed storage [J]. Journal of Computer Applications, 2023, 43(10): 3149-3155. |
[2] | Hongwei GUO, Xiangsuo FAN, Shuai LIU, Xiang WEI, Lingli ZHAO. Video coding optimization algorithm based on rate-distortion characteristic [J]. Journal of Computer Applications, 2022, 42(3): 946-952. |
[3] | Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG. High-capacity reversible data hiding in encrypted videos based on histogram shifting [J]. Journal of Computer Applications, 2022, 42(11): 3633-3638. |
[4] | Cong XU, Xingtian WANG, Yongpeng TAO. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022, 42(1): 171-177. |
[5] | JIANG Lin, SHI Jiaqi, LI Yuancheng. Parallel design and implementation of synthetic view distortion change algorithm in reconfigurable structure [J]. Journal of Computer Applications, 2021, 41(6): 1734-1740. |
[6] | ZHOU Yizhao, WANG Xiaodong, ZHANG Lianjun, LAN Qiongqiong. Selective encryption scheme based on Logistic and Arnold transform in high efficiency video coding [J]. Journal of Computer Applications, 2019, 39(10): 2973-2979. |
[7] | CAI Xue, YANG Yang, XIAO Xingxing. Reversible data hiding method based on texture partition for medical images [J]. Journal of Computer Applications, 2018, 38(8): 2293-2300. |
[8] | LI Tianxue, ZHANG Minqing, WANG Jianping, MA Shuangpeng. Reversible data hiding algorithm based on pixel value order [J]. Journal of Computer Applications, 2018, 38(8): 2311-2315. |
[9] | LI Zhuo, XU Zhe, CHEN Xin, LI Shuqin. Embedded real-time compression for hyper-spectral images based on KLT and HEVC [J]. Journal of Computer Applications, 2018, 38(8): 2393-2397. |
[10] | GUO Lei, WANG Xiaodong, XU Bowen, WANG Jian. Fast intra mode prediction decision and coding unit partition algorithm based on high efficiency video coding [J]. Journal of Computer Applications, 2018, 38(4): 1157-1163. |
[11] | LIU Yanjun, ZHAO Zhiqiang, LIU Yan, CUI Ying, WANG Dayong, RAN Peng, GUO Yijun. Fast intra algorithm based on quality scalable high efficiency video coding [J]. Journal of Computer Applications, 2018, 38(10): 2960-2964. |
[12] | REN Shuai, SUO Li, ZHANG Tao, YANG Tao, MU Dejun. Information hiding algorithm based on 3D high efficiency video coding background [J]. Journal of Computer Applications, 2017, 37(6): 1616-1619. |
[13] | CAI Chunting, FENG Gui, WANG Chi, HAN Xue. Robust video watermarking algorithm for HEVC based on intra-frame prediction modes of muli-partitioning [J]. Journal of Computer Applications, 2017, 37(6): 1772-1776. |
[14] | CHEN Yongna, ZHOU Yu, WANG Xiaodong, GUO Lei. Video information hiding algorithm based on diamond coding [J]. Journal of Computer Applications, 2017, 37(10): 2806-2812. |
[15] | ZHAO Liping, LIN Tao, GONG Xunwei, ZHU Rong. Intra mini-block copy algorithm for screen content coding [J]. Journal of Computer Applications, 2016, 36(7): 1938-1943. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||