CN106530204B - Adaptive image information hiding method based on critical value - Google Patents
Adaptive image information hiding method based on critical value Download PDFInfo
- Publication number
- CN106530204B CN106530204B CN201611021446.8A CN201611021446A CN106530204B CN 106530204 B CN106530204 B CN 106530204B CN 201611021446 A CN201611021446 A CN 201611021446A CN 106530204 B CN106530204 B CN 106530204B
- Authority
- CN
- China
- Prior art keywords
- algorithm
- block
- image
- equal
- aihc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
Abstract
The invention provides a method for hiding self-adaptive image information based on a critical value, which provides an AIHC information hiding algorithm by combining the critical value of a sub-block and a self-adaptive judgment critical block. The AIHC algorithm increases the capacity for image concealment and the security is enhanced by the adaptive embedded secret information. The algorithm can be completed under the polynomial time complexity, and is simple to implement. The AIHC algorithm does not require additional information in extracting the secret information. The capacity is increased while maintaining the image quality. The performance of the proposed AIHC algorithm is obviously better than that of other similar algorithms.
Description
Technical Field
The invention belongs to the field of information processing, and relates to a self-adaptive image information hiding method based on a critical value.
Background
The method for hiding graphic information in the prior art comprises TBPC Hou, C. -L, Lu, C, Tsai, S. -C, & Tzeng, W. -G. (2011). An optional data recording scheme with tree-based syntax, IEEE Transactions on Image Processing, 20(3), 880-886. Although the TBPC algorithm has larger capacity, the safety is poorer.
EALSB-MR is Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image based on LSB matched accessed revising IEEE transaction information Formations and Security, 5(2), 201-. Luo et al designed the EALSB-MR algorithm. The algorithm breaks the association between the vertical direction and the horizontal direction, and the security of the algorithm needs to be improved.
SEMX Hayat Al-Dmour, Ahmed Al-Ani (2016), A steganographic embedded method based on information and XOR coding, Expert Systems Withapplications,46, 293-. Hayat Al-Dmour et Al propose an SEMX algorithm that uses boundary values and XOR operations to improve security, but has limited capacity.
Disclosure of Invention
In view of the defects of the prior art, the present invention aims to provide a simple adaptive image information hiding method based on a critical value, which improves the capacity of image hiding and enhances the security of the adaptively embedded secret information.
In order to achieve the purpose, the technical solution of the invention is as follows:
a method for hiding self-adaptive image information based on a critical value comprises the following steps:
step one, defining a pixel block B of non-overlapped images, wherein the size of the pixel block B is nxn, and n is a positive integer;
step two, defining the maximum difference D, D = MAX (B) of the pixel block B i )- MIN(B i )
Wherein, MAX (B) i ) Represents the maximum value, MIN, of the pixel block B (B) i ) Represents the minimum value of the pixel block B;
step three, defining critical value TH and setting secret information m1,m2Let a pixel I1,I2And I3Then, then
(1) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I1Is S1And ensure MIN (B) i )<S1<MAX(B i );
(2) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Etc. ofAt m2Then modify I2Is S2And ensure MIN (B) i )<S2<MAX(B i );
(3) If LSB (I)1)⊕LSB(I2) Is equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I3Is S3And ensure MIN (B) i )<S3<MAX(B i );
LSB(I1) Get I1Is the least significant bit, LSB (I)2) Get I2Is the least significant bit, LSB (I)3) Get I3The least significant bit of;
(4) otherwise, remain unchanged;
whether the pixel block B is a critical block and is used for information hiding is determined by calculating the maximum difference D of the pixel block B in the image.
The invention avoids missing critical blocks, and improves the hidden capacity; self-adaptive embedded information, and the safety of the embedded information is improved; and the method in the third step is adopted, so that the modification to the image is reduced, and the quality of the image is improved.
By combining the critical value of the sub-block and the self-adaptive judgment critical block, an AIHC information hiding algorithm is provided. The AIHC algorithm increases the capacity for image concealment and the security is enhanced by the adaptive embedded secret information. The algorithm can be completed under the polynomial time complexity, and is simple to implement. The AIHC algorithm does not require additional information in extracting the secret information. The capacity is increased while maintaining the image quality. The performance of the proposed AIHC algorithm is obviously better than that of other similar algorithms.
Drawings
FIG. 1.3 × 3 pixel block
FIG. 2 is a flow chart of the AIHC algorithm
FIG. 3. graph of embedding rate and MSE
FIG. 4 is a graph of embedding rate and PSNR (dB)
FIG. 5.300 Capacity comparison of the sub-images
FIG. 6. AIHC algorithm for randomly selecting 300 images compares the rate of SEMX increase;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention are described below clearly and completely, and it is obvious that the described embodiments are some, not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention comprises the following steps:
define 1. non-overlapping blocks of pixels B of the image, of size n × n, such as n =3, as shown in fig. 1.
Define 2. maximum difference of blocks D
D=MAX(B i )- MIN(B i )
Wherein, MAX (B) i ) Denotes the maximum value of block B, MIN (B) i ) Representing the minimum value of block B.
Definition 3. threshold value TH
Rule 1. let secret information m1,m2Let a pixel I1,I2And I3Then, then
(1) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I1Is S1And ensure MIN (B) i )<S1<MAX(B i )。
(2) If LSB (I)1)⊕LSB(I2) Is not equal to m1And LSB (I)1)⊕LSB(I3) Is equal to m2Then modify I2Is S2And ensure MIN (B) i )<S2<MAX(B i )。
(3) If LSB (I)1)⊕LSB(I2) Is equal to m1And LSB (I)1)⊕LSB(I3) Is not equal to m2Then modify I3Is S3And ensure MIN (B) i )<S3<MAX(B i )。
(4) Otherwise, remain unchanged
FIG. 2 is a flow chart of the AIHC algorithm
(1) Start of
(2) An image is input, and a TH value is set.
(3) The image I is divided into non-adjacent blocks of size n × n.
(4) If the block has been selected to be completed, step (9), otherwise, step (5).
(5) And selecting the ith block B, and calculating the maximum difference value D of the ith block.
(6) If D is greater than or equal to the critical TH, which is a critical block, step (7); otherwise, step (4).
(7) If MIN (B)<Bi<MAX (B), then Ii=BiSecret information is embedded according to rule 1.
(8) If the secret information is embedded completely, step (9); otherwise, step (4).
(9) And outputting the secret image.
(10) End up
3. Results of the experiment
The gallery of experiments is from UCID and internet. The experimental tool used MATLAB version R2009. At the beginning of the experiment, all images will be converted to grayscale images. 1338 images from the test gallery were selected as the experimental images. Next, the results of some experiments will prove the validity of the proposed AIHC algorithm.
Experiment one: from these 1338 images, one of which was randomly selected, the results of the comparisons of the TBPC algorithm, the easbs-MR algorithm, the SEMX algorithm, and the AIHC algorithm are shown in fig. 3 and 4. Fig. 3 shows that in the test results of the TBPC algorithm, the easbl-MR algorithm, the SEMX algorithm, and the AIHC algorithm, the MSE of the AIHC algorithm is minimum, which indicates that the modification of the image by the AIHC algorithm is minimum and the distortion is kept low.
Fig. 4 shows that the PSNR values of the AIHC algorithm are taught among the test results of the TBPC algorithm, the easbl-MR algorithm, the SEMX algorithm, and the AIHC algorithm, indicating that the AIHC algorithm has the best authenticity of image retention.
Experiment two: from these 1338 images, 300 of them were randomly selected, and the results of the comparison of the SEMX algorithm and the AIHC algorithm are shown in FIGS. 5 and 6. Fig. 5 shows that, in the test results of the SEMX algorithm and the AIHC algorithm, the capacity of the AIHC algorithm is large, indicating that the capacity of embedding the image by the AIHC algorithm is large.
Fig. 6 shows the capacity of the AIHC algorithm in the SEMX algorithm improvement rate IC in the test results of the SEMX algorithm and the AIHC algorithm. Of the 1338 images, IC was positive for 89.09%. This indicates that the capacity of the AIHC algorithm is higher than the SEMX algorithm.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (1)
1. A method for hiding adaptive image information based on a critical value is characterized by comprising the following steps:
defining 1, defining a pixel block B of non-overlapped images, wherein the size of the pixel block B is nxn, and n is a positive integer;
definition 2: defining a block of pixels B with a maximum difference D, D-MAX (B)i)-MIN(Bi)
Wherein, MAX (B)i) Represents the maximum value, MIN, of the pixel block B (B)i) Represents the minimum value of the pixel block B;
definition 3: critical value TH
Rule 1: setting secret information m1,m2Let a pixel I1,I2And I3Then, then
(1) If it is notIs not equal to m1And is andis not equal to m2Then modify I1Is S1And ensure MIN (B)i)<S1<MAX(Bi);
(2) If it is notIs not equal to m1And is andis equal to m2Then modify I2Is S2And ensure MIN (B)i)<S2<MAX(Bi);
(3) If it is notIs equal to m1And is andis not equal to m2Then modify I3Is S3And ensure MIN (B)i)<S3<MAX(Bi);
LSB(I1) Get I1Is the least significant bit, LSB (I)2) Get I2Is the least significant bit, LSB (I)3) Get I3The least significant bit of;
(4) otherwise, remain unchanged;
determining whether the pixel block B is a critical block and is used for information hiding by calculating the maximum difference D of the pixel block B in the image;
the AIHC algorithm includes the following steps:
(1) start of
(2) Inputting an image and setting a TH value;
(3) dividing the image into non-adjacent blocks with the size of n multiplied by n;
(4) if the block is used up, step (9), otherwise, step (5);
(5) selecting an ith block B, and calculating the maximum difference D of the ith block;
(6) if D is greater than or equal to the critical TH, which is a critical block, step (7); otherwise, step (4);
(7) if MIN (B)i)<Bij<MAX(Bi) Then, Ik=BijEmbedding secret information according to rule 1;
(8) if the secret information is embedded completely, step (9); otherwise, step (4);
(9) outputting a secret-carrying image;
(10) and (6) ending.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611021446.8A CN106530204B (en) | 2016-11-21 | 2016-11-21 | Adaptive image information hiding method based on critical value |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611021446.8A CN106530204B (en) | 2016-11-21 | 2016-11-21 | Adaptive image information hiding method based on critical value |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106530204A CN106530204A (en) | 2017-03-22 |
CN106530204B true CN106530204B (en) | 2020-02-18 |
Family
ID=58352833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611021446.8A Expired - Fee Related CN106530204B (en) | 2016-11-21 | 2016-11-21 | Adaptive image information hiding method based on critical value |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106530204B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107820093B (en) * | 2017-11-15 | 2019-09-03 | 深圳大学 | Information detecting method, device and receiving device based on grouping energy differences |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248854A (en) * | 2013-04-27 | 2013-08-14 | 东北大学 | Medical image encryption method based on uniform scrambling and chaotic mapping |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6831991B2 (en) * | 2001-06-22 | 2004-12-14 | The Research Foundation Of Suny State University Plaza | Reliable detection of LSB steganography in color and grayscale images |
US20140355760A1 (en) * | 2013-05-30 | 2014-12-04 | Chiou-Haun Lee | Method of Third Party Identification for Cryptographic Communications |
CN103413269A (en) * | 2013-08-20 | 2013-11-27 | 宁波大学 | Image steganography method and secret information extraction method |
CN104159118A (en) * | 2014-07-30 | 2014-11-19 | 天津大学 | Image byte XOR algorithm based on pseudo random sequence and LSB algorithm |
CN104537601B (en) * | 2014-12-23 | 2017-12-08 | 中山大学 | A kind of gray level image spatial domain steganography method based on nine grids |
-
2016
- 2016-11-21 CN CN201611021446.8A patent/CN106530204B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248854A (en) * | 2013-04-27 | 2013-08-14 | 东北大学 | Medical image encryption method based on uniform scrambling and chaotic mapping |
Non-Patent Citations (2)
Title |
---|
《Chaos based Edge Adaptive Image Steganography》;Ratnakirti Roy等;《Procedia Technology》;20131231;第138-146页 * |
《基于图像内容的隐写分析技术研究》;汪然;《中国博士学位论文全文数据库信息科技辑》;20160715;I138-6 * |
Also Published As
Publication number | Publication date |
---|---|
CN106530204A (en) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | Reversible data hiding using controlled contrast enhancement and integer wavelet transform | |
Qin et al. | An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism | |
Jung et al. | A new histogram modification based reversible data hiding algorithm considering the human visual system | |
Yang et al. | Improving histogram-based reversible data hiding by interleaving predictions | |
Sherly et al. | A compressed video steganography using TPVD | |
Kumar et al. | Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context | |
CN110232651B (en) | Reversible information hiding method based on block prediction and differential value histogram translation | |
US8260065B2 (en) | Data hiding with wavelet transform histogram shifting | |
Hussain et al. | Embedding data in edge boundaries with high PSNR | |
Abdullah et al. | Recursive reversible image watermarking using enhancement of difference expansion techniques | |
CN113538197B (en) | Watermark extraction method, watermark extraction device, storage medium and electronic equipment | |
Wu et al. | Reversible data hiding with brightness preserving contrast enhancement by two-dimensional histogram modification | |
Wang et al. | A novel image restoration scheme based on structured side information and its application to image watermarking | |
CN106530204B (en) | Adaptive image information hiding method based on critical value | |
Lin et al. | Efficient electronic patient information hiding scheme with tamper detection function for medical images | |
Lin et al. | A reversible data hiding scheme for block truncation compressions based on histogram modification | |
Chen et al. | A zero-watermark method based on texture characteristic of image blocks for stereo images | |
Zhu et al. | Image sanitization in online social networks: A general framework for breaking robust information hiding | |
Kim et al. | A study on improved jpeg steganography algorithm to prevent steganalysis | |
CN103440615A (en) | High-volume reversible watermarking method based on remainder invariance | |
CN103440616A (en) | High volume reversible watermarking method based on self-adaptive prediction model | |
CN109167892B (en) | Video image detail enhancement method and system | |
Yang et al. | High‐Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm | |
El-Alfy et al. | High-capacity image steganography based on overlapped pixel differences and modulus function | |
CN113766084B (en) | Reversible information hiding method and system for enhancing image smoothness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200218 Termination date: 20211121 |