Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (3): 780-787.DOI: 10.11772/j.issn.1001-9081.2023030321
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Received:
2023-03-31
Revised:
2023-05-13
Accepted:
2023-05-17
Online:
2023-06-15
Published:
2024-03-10
Contact:
Qingyu YUAN
About author:
GAO Tiegang, born in 1966, Ph. D., professor. His research interests include software engineering, information security.
Supported by:
通讯作者:
袁卿宇
作者简介:
高铁杠(1966—),男,河北石家庄人,教授,博士生导师,博士,主要研究方向:软件工程、信息安全。
基金资助:
CLC Number:
Qingyu YUAN, Tiegang GAO. Reversible information hiding based on pixel prediction and secret image sharing[J]. Journal of Computer Applications, 2024, 44(3): 780-787.
袁卿宇, 高铁杠. 基于像素预测和秘密图像共享的可逆信息隐藏[J]. 《计算机应用》唯一官方网站, 2024, 44(3): 780-787.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023030321
高位相同个数 | 标签值 | 可嵌入位 |
---|---|---|
0 | 000 | 1 |
1 | 001 | 2 |
2 | 010 | 3 |
3 | 011 | 4 |
4 | 100 | 5 |
5 | 101 | 6 |
6 | 110 | 7 |
111 | 7 |
Tab. 1 Mapping between label values and embeddable bit
高位相同个数 | 标签值 | 可嵌入位 |
---|---|---|
0 | 000 | 1 |
1 | 001 | 2 |
2 | 010 | 3 |
3 | 011 | 4 |
4 | 100 | 5 |
5 | 101 | 6 |
6 | 110 | 7 |
111 | 7 |
秘密图序号 | PSNR | 秘密图序号 | PSNR |
---|---|---|---|
a,b | 13.478 8 | c,d | 13.500 9 |
a,c | 13.572 3 | a,b,c | 60.511 0 |
a,d | 13.489 0 | a,b,d | 57.425 1 |
b,c | 13.474 8 | b,c,d | 60.661 4 |
b,d | 13.506 1 | a,b,c,d | 60.511 0 |
Tab. 2 Restoration PSNRs of different secret shared images
秘密图序号 | PSNR | 秘密图序号 | PSNR |
---|---|---|---|
a,b | 13.478 8 | c,d | 13.500 9 |
a,c | 13.572 3 | a,b,c | 60.511 0 |
a,d | 13.489 0 | a,b,d | 57.425 1 |
b,c | 13.474 8 | b,c,d | 60.661 4 |
b,d | 13.506 1 | a,b,c,d | 60.511 0 |
算法 | NPCR | UACI |
---|---|---|
本文算法 | 99.612 5 | 33.530 2 |
文献[ | 99.601 8 | 33.464 0 |
文献[ | 99.606 3 | 33.467 6 |
文献[ | 99.591 0 | 33.421 2 |
Tab. 3 Comparison of performance against differential attacks
算法 | NPCR | UACI |
---|---|---|
本文算法 | 99.612 5 | 33.530 2 |
文献[ | 99.601 8 | 33.464 0 |
文献[ | 99.606 3 | 33.467 6 |
文献[ | 99.591 0 | 33.421 2 |
秘密图 | b0 | b1 | b2 | b3 | b4 | b5 | b6 | b7 | 嵌入空间S | 嵌入率/bpp |
---|---|---|---|---|---|---|---|---|---|---|
平均 | 9 446 | 8 050 | 4 154 | 3 985 | 5 628 | 5 350 | 3 379 | 3 954 | 165 519 | 3.766 |
Mr1 | 9 349 | 7 675 | 4 082 | 3 984 | 5 770 | 5 359 | 3 433 | 4 294 | 167 974 | 3.822 |
Mr2 | 9 166 | 8 360 | 4 246 | 4 065 | 5 523 | 5 291 | 3 281 | 4 014 | 165 310 | 3.762 |
Mr3 | 10 366 | 8 533 | 3 767 | 3 804 | 5 320 | 5 064 | 3 242 | 3 850 | 160 577 | 3.654 |
Mr4 | 8 901 | 7 634 | 4 520 | 4 085 | 5 902 | 5 687 | 3 558 | 3 659 | 168 220 | 3.828 |
Tab. 4 Number of each label and embeddable bits
秘密图 | b0 | b1 | b2 | b3 | b4 | b5 | b6 | b7 | 嵌入空间S | 嵌入率/bpp |
---|---|---|---|---|---|---|---|---|---|---|
平均 | 9 446 | 8 050 | 4 154 | 3 985 | 5 628 | 5 350 | 3 379 | 3 954 | 165 519 | 3.766 |
Mr1 | 9 349 | 7 675 | 4 082 | 3 984 | 5 770 | 5 359 | 3 433 | 4 294 | 167 974 | 3.822 |
Mr2 | 9 166 | 8 360 | 4 246 | 4 065 | 5 523 | 5 291 | 3 281 | 4 014 | 165 310 | 3.762 |
Mr3 | 10 366 | 8 533 | 3 767 | 3 804 | 5 320 | 5 064 | 3 242 | 3 850 | 160 577 | 3.654 |
Mr4 | 8 901 | 7 634 | 4 520 | 4 085 | 5 902 | 5 687 | 3 558 | 3 659 | 168 220 | 3.828 |
算法 | Peppers | Jetplane | Lena |
---|---|---|---|
文献[ | 2.340 | 2.599 | 2.374 |
文献[ | 1.977 | 2.193 | 2.018 |
文献[ | 2.042 | 2.191 | 2.014 |
文献[ | 2.424 | 2.561 | 2.133 |
文献[ | 3.584 | 3.409 | 3.127 |
本文算法 | 3.766 | 3.803 | 3.386 |
Tab. 5 Average embedding rate comparison of different algorithms
算法 | Peppers | Jetplane | Lena |
---|---|---|---|
文献[ | 2.340 | 2.599 | 2.374 |
文献[ | 1.977 | 2.193 | 2.018 |
文献[ | 2.042 | 2.191 | 2.014 |
文献[ | 2.424 | 2.561 | 2.133 |
文献[ | 3.584 | 3.409 | 3.127 |
本文算法 | 3.766 | 3.803 | 3.386 |
1 | P-L CHIU, LEE K-H. An XOR-based progressive visual cryptography with meaningful shares [C]// Proceedings of the 2016 1st IEEE International Conference on Computer Communication and the Internet. Piscataway: IEEE, 2016: 362-365. 10.1109/cci.2016.7778943 |
2 | 曾珂,禹思敏,胡迎春,等.基于3D-LSCM的图像混沌加密算法[J].电子技术应用,2020,46(1):86-91. 10.16157/j.issn.0258-7998.190966 |
ZENG K, YU S M, HU Y C, et al. Image encryption algorithm using 3D Logistic-Sine cascade map [J]. Application of Electronic Technique, 2020,46(1):86-91. 10.16157/j.issn.0258-7998.190966 | |
3 | 周连兵,周湘贞,崔学荣.基于双重二维混沌映射的压缩图像加密方案[J].计算机科学, 2022, 49(8): 344-349. 10.11896/jsjkx.210700235 |
ZHOU L B, ZHOU X Z, CUI X R. Compressed image encryption scheme based on dual two dimensional chaotic map [J]. Computer Science, 2022, 49(8): 344-349. 10.11896/jsjkx.210700235 | |
4 | YASSER I, KHALIL A T, MOHAMED M A, et al. A robust chaos-based technique for medical image encryption [J]. IEEE Access, 2022, 10: 244-257. 10.1109/access.2021.3138718 |
5 | LUO J, SHI H. Research of chaos encryption algorithm based on logistic mapping [C]// Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2006: 381-383. 10.1109/iih-msp.2006.265022 |
6 | 陈虹,赵菊芳,郭鹏飞,等. 基于混沌映射的分块循环DNA图像加密算法[J].计算机应用研究, 2022,39(6):1865-1871. |
CHEN H, ZHAO J F, GUO P F, et al. Block cyclic DNA image encryption algorithm based on chaotic map [J]. Application Research of Computers, 2022, 39(6): 1865-1871. | |
7 | LIU Y, YANG C. Scalable secret image sharing scheme with essential shadows [J]. Signal Processing: Image Communication, 2017, 58: 49-55. 10.1016/j.image.2017.06.011 |
8 | YAN X, LU Y, LIU L, et al. Reversible image secret sharing [J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 3848-3858. 10.1109/tifs.2020.3001735 |
9 | BISWAS A K, DASGUPTA M, RAY S, et al. A probable cheating-free (t,n) threshold secret sharing scheme with enhanced blockchain [J]. Computers & Electrical Engineering, 2022, 100(1): 107925. 10.1016/j.compeleceng.2022.107925 |
10 | KANSO A, GHEBLEH M. An efficient (t,n)-threshold secret image sharing scheme [J]. Multimedia Tools & Applications, 2017, 76:16369-16388. 10.1007/s11042-016-3917-x |
11 | 黄东平, 王道顺, 黄连生,等. 一种新的(k,n)阈值可视密钥分存方案[J]. 电子学报, 2006, 34(3): 503-507. 10.3321/j.issn:0372-2112.2006.03.027 |
HUANG D P, WANG D S, HUANG L S, et al. A novel (k,n) threshold scheme for visual secret sharing [J]. Acta Electronica Sinica, 2006, 34(3): 503-507. 10.3321/j.issn:0372-2112.2006.03.027 | |
12 | BAI L. A reliable (k, n) image secret sharing scheme with low information overhead [J]. International Journal of Computers and Applications, 2010, 32(1):9-14. 10.1080/1206212x.2010.11441955 |
13 | 田小平, 田慧明, 吴成茂. 基于共享矩阵和混沌的图像分存算法[J]. 西安邮电学院学报, 2018, 32(2): 22-31. |
TIAN X P, TIAN H M, WU C M. Image sharing algorithm based on shared matrix and chaos[J]. Journal of Xi’an University of Posts and Telecommunications, 2018, 32(2): 22-31. | |
14 | LI B, FENG Y, XIONG Z, et al. Research on AI security enhanced encryption algorithm of autonomous IoT systems [J]. Information Sciences, 2021, 575: 379-398. 10.1016/j.ins.2021.06.016 |
15 | 刘雁孝, 吴萍, 孙钦东. 基于区域卷积神经网络的图像秘密共享方案[J]. 计算机研究与发展, 2021, 58(5): 1065-1074. 10.7544/issn1000-1239.2021.20200898 |
LIU Y X, WU P, SUN Q D. Secret image sharing schemes based on region convolution neural network [J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. 10.7544/issn1000-1239.2021.20200898 | |
16 | 熊竞达, 邓智颖. 一种基于非线性混沌与数据共享的图像流加密算法[J]. 电子技术与软件工程, 2017(4): 194. |
XIONG J D, DENG Z Y. An image stream encryption algorithm based on nonlinear chaos and data sharing [J]. Electronic Technology & Software Engineering, 2017(4): 194. | |
17 | LIU Y, YANG C, WANG Y, et al. Cheating identifiable secret sharing scheme using symmetric bivariate polynomial [J]. Information Sciences, 2018, 453: 21-29. 10.1016/j.ins.2018.04.043 |
18 | FUKUMITSU M, HASEGAWA S, IWAZAKI J, et al. A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain [C]// Proceedings of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications. Piscataway: IEEE, 2017: 803-810. 10.1109/aina.2017.11 |
19 | CHENG Y, FU Z, YU B. Improved visual secret sharing scheme for QR code applications [J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2393-2403. 10.1109/tifs.2018.2819125 |
20 | ZHANG X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4): 255-258. 10.1109/lsp.2011.2114651 |
21 | ZHANG W, WANG H, HOU D, et al. Reversible data hiding in encrypted images by reversible image transformation [J]. IEEE Transactions on Multimedia, 2016, 18(8): 1469-1479. 10.1109/tmm.2016.2569497 |
22 | MOHAMMADI A. A general framework for reversible data hiding in encrypted images by reserving room before encryption [J]. Journal of Visual Communication and Image Representation, 2022, 85: 103478. 10.1016/j.jvcir.2022.103478 |
23 | SHI M, YANG Y, MENG J, et al. Reversible data hiding with enhancing contrast and preserving brightness in medical image[J]. Journal of Information Security and Applications, 2022, 70: 103324. 10.1016/j.jisa.2022.103324 |
24 | QIAN Z, ZHANG X. Reversible data hiding in encrypted images with distributed source encoding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(4): 636-646. 10.1109/tcsvt.2015.2418611 |
25 | YI S, ZHOU Y. Separable and reversible data hiding in encrypted images using parametric binary tree labeling [J]. IEEE Transactions on Multimedia, 2019, 21(1): 51-64. 10.1109/tmm.2018.2844679 |
26 | LIU Z-L, C-M PUN. Reversible data hiding in encrypted images by lossless pixel conversion [EB/OL]. [2022-09-28]. . |
27 | YIN Z, XIANG Y, ZHANG X. Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding [J]. IEEE Transactions on Multimedia, 2020, 22(4): 874-884. 10.1109/tmm.2019.2936314 |
28 | PUTEAUX P, PUECH W. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(7): 1670-1681. 10.1109/tifs.2018.2799381 |
29 | YI P, YIN Z, QIAN Z. Reversible data hiding in encrypted images with two-MSB prediction [C]// Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security. Piscataway: IEEE, 2018: 1-7. 10.1109/wifs.2018.8630785 |
30 | CHEN K, CHANG C-C. High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement [J]. Journal of Visual Communication and Image Representation, 2019, 58: 334-344. 10.1016/j.jvcir.2018.12.023 |
31 | LAI Q, HU G, ERKAN U, et al. High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map [J]. Applied Mathematics and Computation, 2023, 442: 127738. 10.1016/j.amc.2022.127738 |
32 | BENAISSI S, CHIKOUCHE N, HAMZA R. A novel image encryption algorithm based on hybrid chaotic maps using a key image [J]. Optik, 2023, 272: 170316. 10.1016/j.ijleo.2022.170316 |
33 | WANG J, JIANG W, XU H, et al. Image encryption based on Logistic-Sine self-embedding chaotic sequence [J]. Optik, 2022, 271: 170075. 10.1016/j.ijleo.2022.170075 |
34 | 杨尧林, 和红杰, 陈帆, 等. 基于预测误差自适应编码的图像加密可逆数据隐藏[J]. 计算机研究与发展, 2021, 58(6): 1340-1350. 10.7544/issn1000-1239.2021.20200172 |
YANG Y L, HE H J, CHEN F, et al. Reversible data hiding of image encryption based on prediction error adaptive coding [J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. 10.7544/issn1000-1239.2021.20200172 | |
35 | FU Y, KONG P, YAO H, et al. Effective reversible data hiding in encrypted image with adaptive encoding strategy [J]. Information Sciences, 2019,494: 21-36. 10.1016/j.ins.2019.04.043 |
36 | WU Y, XIANG Y, GUO Y, et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling [J]. IEEE Transactions on Multimedia, 2020, 22(8): 1929-1938. 10.1109/tmm.2019.2952979 |
37 | 佘晓萌,杜洋,马文静,等. 基于像素预测和块标记的图像密文可逆信息隐藏[J]. 计算机研究与发展, 2022, 59(9): 2089-2100. 10.7544/issn1000-1239.20210495 |
SHE X M, DU Y, MA W J, et al. Reversible data hiding in encrypted images based on pixel prediction and block labeling[J]. Journal of Computer Research and Development, 2022, 59(9): 2089-2100. 10.7544/issn1000-1239.20210495 |
[1] | Yue LI, Dan TANG, Minjun SUN, Xie WANG, Hongliang CAI, Qiong ZENG. Efficient reversible data hiding scheme based on two-dimensional modulo operations [J]. Journal of Computer Applications, 2024, 44(6): 1880-1888. |
[2] | Na ZHOU, Ming CHENG, Menglin JIA, Yang YANG. Medical image privacy protection based on thumbnail encryption and distributed storage [J]. Journal of Computer Applications, 2023, 43(10): 3149-3155. |
[3] | Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN. Reversible data hiding in encrypted image based on multi-objective optimization [J]. Journal of Computer Applications, 2022, 42(6): 1716-1723. |
[4] | Zexi WANG, Minqing ZHANG, Yan KE, Yongjun KONG. Reversible data hiding algorithm in encrypted domain based on secret image sharing [J]. Journal of Computer Applications, 2022, 42(5): 1480-1489. |
[5] | Pei CHEN, Shuaiwei ZHANG, Yangping LIN, Ke NIU, Xiaoyuan YANG. High-capacity reversible data hiding in encrypted videos based on histogram shifting [J]. Journal of Computer Applications, 2022, 42(11): 3633-3638. |
[6] | Cong XU, Xingtian WANG, Yongpeng TAO. Reversible data hiding method based on high-order bit-plane redundancy [J]. Journal of Computer Applications, 2022, 42(1): 171-177. |
[7] | Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG. Nonlinear scrambling diffusion synchronization image encryption based on dynamic network [J]. Journal of Computer Applications, 2022, 42(1): 162-170. |
[8] | LI Shanshan, ZHAO Li, ZHANG Hongli. Image grey level encryption based on cat map [J]. Journal of Computer Applications, 2021, 41(4): 1148-1152. |
[9] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[10] | GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui. Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption [J]. Journal of Computer Applications, 2019, 39(1): 239-244. |
[11] | CAI Xue, YANG Yang, XIAO Xingxing. Reversible data hiding method based on texture partition for medical images [J]. Journal of Computer Applications, 2018, 38(8): 2293-2300. |
[12] | LI Tianxue, ZHANG Minqing, WANG Jianping, MA Shuangpeng. Reversible data hiding algorithm based on pixel value order [J]. Journal of Computer Applications, 2018, 38(8): 2311-2315. |
[13] | WANG Jianping, ZHANG Minqing, LI Tianxue, MA Shuangpeng. Double-level encryption reversible data hiding based on code division multiple access [J]. Journal of Computer Applications, 2018, 38(4): 1023-1028. |
[14] | JIN Jianguo, XIAO Ying, DI Zhigang. Image encryption based on chaotic dynamic random grouping and modulating fractional Fourier transform rotation factor [J]. Journal of Computer Applications, 2016, 36(4): 966-972. |
[15] | KE Yan, ZHANG Minqing, LIU Jia, YANG Xiaoyuan. Overview on reversible data hiding in encrypted domain [J]. Journal of Computer Applications, 2016, 36(11): 3067-3076. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||