CN106530204B - Adaptive image information hiding method based on critical value - Google Patents

Adaptive image information hiding method based on critical value Download PDF

Info

Publication number
CN106530204B
CN106530204B CN201611021446.8A CN201611021446A CN106530204B CN 106530204 B CN106530204 B CN 106530204B CN 201611021446 A CN201611021446 A CN 201611021446A CN 106530204 B CN106530204 B CN 106530204B
Authority
CN
China
Prior art keywords
algorithm
block
image
equal
aihc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611021446.8A
Other languages
Chinese (zh)
Other versions
CN106530204A (en
Inventor
唐明伟
蒋忠远
陈晓亮
曾晟珂
夏梅宸
何明星
赵成芳
邓英
高振伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xihua University
Original Assignee
Xihua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xihua University filed Critical Xihua University
Priority to CN201611021446.8A priority Critical patent/CN106530204B/en
Publication of CN106530204A publication Critical patent/CN106530204A/en
Application granted granted Critical
Publication of CN106530204B publication Critical patent/CN106530204B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing

Abstract

The invention provides a method for hiding self-adaptive image information based on a critical value, which provides an AIHC information hiding algorithm by combining the critical value of a sub-block and a self-adaptive judgment critical block. The AIHC algorithm increases the capacity for image concealment and the security is enhanced by the adaptive embedded secret information. The algorithm can be completed under the polynomial time complexity, and is simple to implement. The AIHC algorithm does not require additional information in extracting the secret information. The capacity is increased while maintaining the image quality. The performance of the proposed AIHC algorithm is obviously better than that of other similar algorithms.

Description

Adaptive image information hiding method based on critical value
Technical Field
The invention belongs to the field of information processing, and relates to a self-adaptive image information hiding method based on a critical value.
Background
The method for hiding graphic information in the prior art comprises TBPC Hou, C. -L, Lu, C, Tsai, S. -C, & Tzeng, W. -G. (2011). An optional data recording scheme with tree-based syntax, IEEE Transactions on Image Processing, 20(3), 880-886. Although the TBPC algorithm has larger capacity, the safety is poorer.
EALSB-MR is Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image based on LSB matched accessed revising IEEE transaction information Formations and Security, 5(2), 201-. Luo et al designed the EALSB-MR algorithm. The algorithm breaks the association between the vertical direction and the horizontal direction, and the security of the algorithm needs to be improved.
SEMX Hayat Al-Dmour, Ahmed Al-Ani (2016), A steganographic embedded method based on information and XOR coding, Expert Systems Withapplications,46, 293-. Hayat Al-Dmour et Al propose an SEMX algorithm that uses boundary values and XOR operations to improve security, but has limited capacity.
Disclosure of Invention
In view of the defects of the prior art, the present invention aims to provide a simple adaptive image information hiding method based on a critical value, which improves the capacity of image hiding and enhances the security of the adaptively embedded secret information.
In order to achieve the purpose, the technical solution of the invention is as follows:
a method for hiding self-adaptive image information based on a critical value comprises the following steps:
step one, defining a pixel block B of non-overlapped images, wherein the size of the pixel block B is nxn, and n is a positive integer;
step two, defining the maximum difference D, D = MAX (B) of the pixel block B i )- MIN(B i
Wherein, MAX (B) i ) Represents the maximum value, MIN, of the pixel block B (B) i ) Represents the minimum value of the pixel block B;
step three, defining critical value TH and setting secret information m1,m2Let a pixel I1,I2And I3Then, then
(1) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I1Is S1And ensure MIN (B) i )<S1<MAX(B i );
(2) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Etc. ofAt m2Then modify I2Is S2And ensure MIN (B) i )<S2<MAX(B i );
(3) If LSB (I)1)⊕LSB(I2) Is equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I3Is S3And ensure MIN (B) i )<S3<MAX(B i );
LSB(I1) Get I1Is the least significant bit, LSB (I)2) Get I2Is the least significant bit, LSB (I)3) Get I3The least significant bit of;
(4) otherwise, remain unchanged;
whether the pixel block B is a critical block and is used for information hiding is determined by calculating the maximum difference D of the pixel block B in the image.
The invention avoids missing critical blocks, and improves the hidden capacity; self-adaptive embedded information, and the safety of the embedded information is improved; and the method in the third step is adopted, so that the modification to the image is reduced, and the quality of the image is improved.
By combining the critical value of the sub-block and the self-adaptive judgment critical block, an AIHC information hiding algorithm is provided. The AIHC algorithm increases the capacity for image concealment and the security is enhanced by the adaptive embedded secret information. The algorithm can be completed under the polynomial time complexity, and is simple to implement. The AIHC algorithm does not require additional information in extracting the secret information. The capacity is increased while maintaining the image quality. The performance of the proposed AIHC algorithm is obviously better than that of other similar algorithms.
Drawings
FIG. 1.3 × 3 pixel block
FIG. 2 is a flow chart of the AIHC algorithm
FIG. 3. graph of embedding rate and MSE
FIG. 4 is a graph of embedding rate and PSNR (dB)
FIG. 5.300 Capacity comparison of the sub-images
FIG. 6. AIHC algorithm for randomly selecting 300 images compares the rate of SEMX increase;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention are described below clearly and completely, and it is obvious that the described embodiments are some, not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention comprises the following steps:
define 1. non-overlapping blocks of pixels B of the image, of size n × n, such as n =3, as shown in fig. 1.
Define 2. maximum difference of blocks D
D=MAX(B i )- MIN(B i
Wherein, MAX (B) i ) Denotes the maximum value of block B, MIN (B) i ) Representing the minimum value of block B.
Definition 3. threshold value TH
Rule 1. let secret information m1,m2Let a pixel I1,I2And I3Then, then
(1) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I1Is S1And ensure MIN (B) i )<S1<MAX(B i )。
(2) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Is equal to m2Then modify I2Is S2And ensure MIN (B) i )<S2<MAX(B i )。
(3) If LSB (I)1)⊕LSB(I2) Is equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I3Is S3And ensure MIN (B) i )<S3<MAX(B i )。
(4) Otherwise, remain unchanged
FIG. 2 is a flow chart of the AIHC algorithm
(1) Start of
(2) An image is input, and a TH value is set.
(3) The image I is divided into non-adjacent blocks of size n × n.
(4) If the block has been selected to be completed, step (9), otherwise, step (5).
(5) And selecting the ith block B, and calculating the maximum difference value D of the ith block.
(6) If D is greater than or equal to the critical TH, which is a critical block, step (7); otherwise, step (4).
(7) If MIN (B)<Bi<MAX (B), then Ii=BiSecret information is embedded according to rule 1.
(8) If the secret information is embedded completely, step (9); otherwise, step (4).
(9) And outputting the secret image.
(10) End up
3. Results of the experiment
The gallery of experiments is from UCID and internet. The experimental tool used MATLAB version R2009. At the beginning of the experiment, all images will be converted to grayscale images. 1338 images from the test gallery were selected as the experimental images. Next, the results of some experiments will prove the validity of the proposed AIHC algorithm.
Experiment one: from these 1338 images, one of which was randomly selected, the results of the comparisons of the TBPC algorithm, the easbs-MR algorithm, the SEMX algorithm, and the AIHC algorithm are shown in fig. 3 and 4. Fig. 3 shows that in the test results of the TBPC algorithm, the easbl-MR algorithm, the SEMX algorithm, and the AIHC algorithm, the MSE of the AIHC algorithm is minimum, which indicates that the modification of the image by the AIHC algorithm is minimum and the distortion is kept low.
Fig. 4 shows that the PSNR values of the AIHC algorithm are taught among the test results of the TBPC algorithm, the easbl-MR algorithm, the SEMX algorithm, and the AIHC algorithm, indicating that the AIHC algorithm has the best authenticity of image retention.
Experiment two: from these 1338 images, 300 of them were randomly selected, and the results of the comparison of the SEMX algorithm and the AIHC algorithm are shown in FIGS. 5 and 6. Fig. 5 shows that, in the test results of the SEMX algorithm and the AIHC algorithm, the capacity of the AIHC algorithm is large, indicating that the capacity of embedding the image by the AIHC algorithm is large.
Fig. 6 shows the capacity of the AIHC algorithm in the SEMX algorithm improvement rate IC in the test results of the SEMX algorithm and the AIHC algorithm. Of the 1338 images, IC was positive for 89.09%. This indicates that the capacity of the AIHC algorithm is higher than the SEMX algorithm.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (1)

1. A method for hiding adaptive image information based on a critical value is characterized by comprising the following steps:
defining 1, defining a pixel block B of non-overlapped images, wherein the size of the pixel block B is nxn, and n is a positive integer;
definition 2: defining a block of pixels B with a maximum difference D, D-MAX (B)i)-MIN(Bi)
Wherein, MAX (B)i) Represents the maximum value, MIN, of the pixel block B (B)i) Represents the minimum value of the pixel block B;
definition 3: critical value TH
Rule 1: setting secret information m1,m2Let a pixel I1,I2And I3Then, then
(1) If it is notIs not equal to m1And is and
Figure FDA0002320179020000012
is not equal to m2Then modify I1Is S1And ensure MIN (B)i)<S1<MAX(Bi);
(2) If it is not
Figure FDA0002320179020000013
Is not equal to m1And is and
Figure FDA0002320179020000014
is equal to m2Then modify I2Is S2And ensure MIN (B)i)<S2<MAX(Bi);
(3) If it is not
Figure FDA0002320179020000015
Is equal to m1And is and
Figure FDA0002320179020000016
is not equal to m2Then modify I3Is S3And ensure MIN (B)i)<S3<MAX(Bi);
LSB(I1) Get I1Is the least significant bit, LSB (I)2) Get I2Is the least significant bit, LSB (I)3) Get I3The least significant bit of;
(4) otherwise, remain unchanged;
determining whether the pixel block B is a critical block and is used for information hiding by calculating the maximum difference D of the pixel block B in the image;
the AIHC algorithm includes the following steps:
(1) start of
(2) Inputting an image and setting a TH value;
(3) dividing the image into non-adjacent blocks with the size of n multiplied by n;
(4) if the block is used up, step (9), otherwise, step (5);
(5) selecting an ith block B, and calculating the maximum difference D of the ith block;
(6) if D is greater than or equal to the critical TH, which is a critical block, step (7); otherwise, step (4);
(7) if MIN (B)i)<Bij<MAX(Bi) Then, Ik=BijEmbedding secret information according to rule 1;
(8) if the secret information is embedded completely, step (9); otherwise, step (4);
(9) outputting a secret-carrying image;
(10) and (6) ending.
CN201611021446.8A 2016-11-21 2016-11-21 Adaptive image information hiding method based on critical value Expired - Fee Related CN106530204B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611021446.8A CN106530204B (en) 2016-11-21 2016-11-21 Adaptive image information hiding method based on critical value

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611021446.8A CN106530204B (en) 2016-11-21 2016-11-21 Adaptive image information hiding method based on critical value

Publications (2)

Publication Number Publication Date
CN106530204A CN106530204A (en) 2017-03-22
CN106530204B true CN106530204B (en) 2020-02-18

Family

ID=58352833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611021446.8A Expired - Fee Related CN106530204B (en) 2016-11-21 2016-11-21 Adaptive image information hiding method based on critical value

Country Status (1)

Country Link
CN (1) CN106530204B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107820093B (en) * 2017-11-15 2019-09-03 深圳大学 Information detecting method, device and receiving device based on grouping energy differences

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248854A (en) * 2013-04-27 2013-08-14 东北大学 Medical image encryption method based on uniform scrambling and chaotic mapping

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6831991B2 (en) * 2001-06-22 2004-12-14 The Research Foundation Of Suny State University Plaza Reliable detection of LSB steganography in color and grayscale images
US20140355760A1 (en) * 2013-05-30 2014-12-04 Chiou-Haun Lee Method of Third Party Identification for Cryptographic Communications
CN103413269A (en) * 2013-08-20 2013-11-27 宁波大学 Image steganography method and secret information extraction method
CN104159118A (en) * 2014-07-30 2014-11-19 天津大学 Image byte XOR algorithm based on pseudo random sequence and LSB algorithm
CN104537601B (en) * 2014-12-23 2017-12-08 中山大学 A kind of gray level image spatial domain steganography method based on nine grids

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248854A (en) * 2013-04-27 2013-08-14 东北大学 Medical image encryption method based on uniform scrambling and chaotic mapping

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《Chaos based Edge Adaptive Image Steganography》;Ratnakirti Roy等;《Procedia Technology》;20131231;第138-146页 *
《基于图像内容的隐写分析技术研究》;汪然;《中国博士学位论文全文数据库信息科技辑》;20160715;I138-6 *

Also Published As

Publication number Publication date
CN106530204A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
Gao et al. Reversible data hiding using controlled contrast enhancement and integer wavelet transform
Qin et al. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism
Jung et al. A new histogram modification based reversible data hiding algorithm considering the human visual system
Yang et al. Improving histogram-based reversible data hiding by interleaving predictions
Sherly et al. A compressed video steganography using TPVD
Kumar et al. Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context
CN110232651B (en) Reversible information hiding method based on block prediction and differential value histogram translation
US8260065B2 (en) Data hiding with wavelet transform histogram shifting
Hussain et al. Embedding data in edge boundaries with high PSNR
Abdullah et al. Recursive reversible image watermarking using enhancement of difference expansion techniques
CN113538197B (en) Watermark extraction method, watermark extraction device, storage medium and electronic equipment
Wu et al. Reversible data hiding with brightness preserving contrast enhancement by two-dimensional histogram modification
Wang et al. A novel image restoration scheme based on structured side information and its application to image watermarking
CN106530204B (en) Adaptive image information hiding method based on critical value
Lin et al. Efficient electronic patient information hiding scheme with tamper detection function for medical images
Lin et al. A reversible data hiding scheme for block truncation compressions based on histogram modification
Chen et al. A zero-watermark method based on texture characteristic of image blocks for stereo images
Zhu et al. Image sanitization in online social networks: A general framework for breaking robust information hiding
Kim et al. A study on improved jpeg steganography algorithm to prevent steganalysis
CN103440615A (en) High-volume reversible watermarking method based on remainder invariance
CN103440616A (en) High volume reversible watermarking method based on self-adaptive prediction model
CN109167892B (en) Video image detail enhancement method and system
Yang et al. High‐Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm
El-Alfy et al. High-capacity image steganography based on overlapped pixel differences and modulus function
CN113766084B (en) Reversible information hiding method and system for enhancing image smoothness

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200218

Termination date: 20211121