CN110362964B - High-capacity reversible information hiding method based on multi-histogram modification - Google Patents

High-capacity reversible information hiding method based on multi-histogram modification Download PDF

Info

Publication number
CN110362964B
CN110362964B CN201910486319.2A CN201910486319A CN110362964B CN 110362964 B CN110362964 B CN 110362964B CN 201910486319 A CN201910486319 A CN 201910486319A CN 110362964 B CN110362964 B CN 110362964B
Authority
CN
China
Prior art keywords
embedding
embedded
information
image
parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910486319.2A
Other languages
Chinese (zh)
Other versions
CN110362964A (en
Inventor
郭宗明
张彤
亓文法
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN201910486319.2A priority Critical patent/CN110362964B/en
Publication of CN110362964A publication Critical patent/CN110362964A/en
Application granted granted Critical
Publication of CN110362964B publication Critical patent/CN110362964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The invention provides a high-capacity reversible information hiding method based on multi-histogram modification, which can be used for losslessly recovering an image carrier while extracting secret information at a receiving end, greatly improving the embedding capacity by selecting a plurality of pairs of histograms for information embedding, quickly obtaining an approximately optimal solution of an optimization problem through a greedy search algorithm, and further improving the embedding performance by adaptively selecting a plurality of parameters according to load requirements and image contents.

Description

High-capacity reversible information hiding method based on multi-histogram modification
Technical Field
The invention relates to the technical field of information hiding, in particular to a reversible information hiding method for a high-capacity image based on multi-histogram modification.
Background
Information Hiding (Information Hiding) technology is intended to protect the contents of digital multimedia from being stolen or tampered by unauthorized parties, and is widely used for content authentication, copyright protection, and the like. However, in some sensitive application scenarios, such as military and medical image processing, not only the embedded secret information needs to be extracted, but also the carrier data needs to be recovered without any distortion. To meet this demand, Reversible Data Hiding (Reversible Data Hiding) technology has been developed and is attracting more and more attention of researchers.
Embedding capacity and Peak Signal-to-Noise Ratio (Peak Signal-to-Noise Ratio) are generally considered as criteria for measuring the performance of information hiding techniques. As the embedding capacity increases, the carrier image is modified more and the degree of distortion of the image is higher. Therefore, it is a goal of researchers how to introduce as much lower distortion as possible when embedding capacity is higher. In addition, when the method is applied to the mobile internet, the mobile terminal and other scenes, how to reduce the computational complexity of the information hiding algorithm to meet the requirement of real-time application is another problem to be solved.
Li et al propose a reversible information hiding algorithm based on multiple histogram modifications. In the method of Li et al, for each pixel x in the carrier imageiCalculating to obtain a prediction error e by using a diamond predictoriAnd calculating the corresponding complexity n according to the neighborhood pixelsiWherein i is more than or equal to 1 and less than or equal to N, and N represents the total pixel number of the image. Then according to the complexity n of the pixeliUniformly dividing pixels of an image into M subsets, and correspondingly generating a prediction error histogram h by calculating the frequency of prediction errors of each set of pixelsn
hn(e)=#{1≤i≤N:ei=e,ni=n},
Wherein n is more than or equal to 1 and less than or equal to M. Finally, M prediction error histograms are obtained.
For each prediction error histogram hnSelecting two parameters anAnd bn(an<bn) So that the prediction error value is anAnd bnIs expanded to embed information with a prediction error value less than anAnd is greater than bnThe columns of the graph are shifted to the left and right, respectively, and the prediction error value is at anAnd bnThe figure pillars of (a) remain unchanged. Therefore, the prediction error after embedding the information is:
Figure BDA0002085508390000011
where m ∈ {0,1} is the embedded binary information bit. FIG. 1 illustrates an embedding rule based on multiple histogram modification, where the points identified by rectangles represent the parameter a selected on each histogramnAnd bn
Parameter anAnd bnTo be able to adaptively select parameters for different image contents and embedding load requirements, the method of Li et al employs an exhaustive search to determine the most suitableAnd (4) a good parameter. For a on each histogramnAnd bnLet a ben+bn-1 and for histograms of low to high complexity, parameter bnIs non-decreasing and the maximum value does not exceed 7. These two assumptions were set up from an observation of the distribution of the prediction error histogram, which resembles a laplacian distribution, taking a peak at 0 and strongly decaying at the tails on both sides. Under the set limiting conditions, exhaustive search is carried out on the parameters, wherein in the case that the embedding capacity meets the load requirement, the solution which enables the ratio of the embedding distortion to the embedding capacity to be minimum is the optimal solution. It can be seen that the complexity of the method is exponential, assuming that the size of the parameter candidate set is S, the algorithm complexity is O (S)M)。
In the method of Li et al, a plurality of histograms are generated by dividing a set of pixels of different complexity, making full use of the spatial redundancy of image information, and achieving good performance by adaptively fine-tuning parameters. This method still has very significant drawbacks. On the one hand, the method selects only one pair of bins for information embedding per histogram, so that the maximum allowable embedding capacity is very limited. For example, for the image Lena, the maximum allowable embedding capacity is only 62,000 bits. On the other hand, the method searches for the optimal solution in an exhaustive manner, which is time-consuming, and thus leads to a situation that the solution cannot be expanded to high-capacity embedding.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a high-capacity reversible information hiding method based on multi-histogram modification, which can be used for nondestructively recovering an image carrier while extracting secret information at a receiving end, and can be used for carrying out information embedding by selecting a plurality of pairs of histograms on each histogram, thereby greatly improving the embedding capacity, quickly obtaining an approximately optimal solution of an optimization problem through a greedy search algorithm, and adaptively selecting a plurality of parameters according to load requirements and image contents, thereby further improving the embedding performance.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a high-capacity reversible information hiding method based on multi-histogram modification comprises the following steps:
firstly, preprocessing a carrier image, and performing partial pixel x with the value in a specific range in the imageiModifying, and establishing a position table to record the position of the modified pixel;
specifically, the partial pixel xiModified according to the following formula:
Figure BDA0002085508390000021
computing pixel x from neighborhoodiPrediction error e ofiAnd complexity niGenerating M prediction error histograms;
at each histogram hnSelecting K pairs of columns, corresponding to K parameters, and determining optimal parameters according to a greedy search algorithm;
generating auxiliary information capable of ensuring lossless recovery of the carrier image, wherein the auxiliary information comprises a position table, M-1 thresholds for dividing the histogram and parameters corresponding to the histogram;
dividing all pixels of the carrier image into two layers, and embedding the secret information and the auxiliary information to be embedded into the K pairs of image columns in a layering manner according to the determined optimal parameters, wherein the auxiliary information is embedded into the head of the image;
obtaining modified prediction error after embedding
Figure BDA0002085508390000031
According to the embedded pixels
Figure BDA0002085508390000032
An embedded carrier image is obtained.
Further, information is embedded in the sequence from left to right and from top to bottom, and information is embedded in the first layer and then in the second layer.
Further, the prediction error
Figure BDA0002085508390000033
Figure BDA0002085508390000034
The prediction value of the pixel is calculated according to the diamond predictor.
Further, complexity niThe calculation method comprises the following steps: in the neighborhood of 12 pixels, the average value of the difference values of every two consecutive pixels in the horizontal and vertical directions is calculated, namely the complexity ni
Further, the corresponding parameter of K to the figure column is { (a)n,k,bn,k) L 1 is less than or equal to K, wherein an,K<…<an,1<0≤bn,1<…<bn,KThen, the embedding rule of the multiple pairs of the drawing columns is as follows:
Figure BDA0002085508390000035
wherein
Figure BDA0002085508390000036
And m ∈ {0,1} represents the prediction error of the embedded image, and is an embedded binary information bit.
Further, the optimal parameter determination according to the greedy search algorithm comprises the following steps:
calculating to obtain a single histogram hnCapacity of embedding EC when using multiple parametersnAnd embedding distortion EDn
Figure BDA0002085508390000037
Figure BDA0002085508390000038
Wherein h () represents a prediction error histogram, and h (a) represents the frequency count of the prediction error of a;
solving an optimization problem by using a greedy search algorithm, and determining optimal parameters, wherein the optimization problem is as follows:
Figure BDA0002085508390000039
where P denotes a given load requirement and consists of secret information and side information to be embedded.
Further, the value ranges of the parameters are as follows:
Figure BDA0002085508390000041
where T represents an integer threshold.
Further, the greedy search algorithm is that in a solution space, an origin of the solution space is used as an initial state, from the initial state, a current optimal direction is selected to advance to search for a next state, and the search is performed iteratively until an end point in the solution space is reached.
Further, solving the optimization problem by using a greedy search algorithm specifically comprises:
constructing an M-dimensional solution space, points (X) in the solution space1,…XM) Represents a complete parameter required for embedding, wherein XnIs represented in histogram hnThe parameters are selected, and all candidates are arranged in ascending order according to the size of the embedding capacity in each dimension of the space;
with the origin of the solution space as the initial state W0Selecting a candidate which enables the ratio of embedding distortion to embedding capacity to be minimum as a next state, and iteratively searching the next state until an end point in a solution space is reached to obtain a search path in the solution space;
on this path, finding the point where the ratio of embedding distortion to embedding capacity is minimal while satisfying the load requirement is the optimal solution.
Further, the auxiliary information is embedded in the header of the picture by least significant bit replacement.
A method for extracting information aiming at the embedded carrier image obtained by the method comprises the following steps:
extracting auxiliary information from the header of the embedded carrier image;
and extracting the embedded secret information from the image and recovering the carrier according to the position table in the auxiliary information, the threshold values of the M-1 partition histograms and the parameters corresponding to the histograms.
Compared with the prior art, the invention has the beneficial effects that:
the invention can realize the embedding and extraction of the secret information in the image, can provide higher embedding capacity, and can quickly realize the approximately optimal embedding, thereby ensuring that the distortion degree of the carrier image with the secret information is lower than that of the prior reversible information hiding algorithm. Therefore, the method is a reversible information hiding algorithm with good performance and can be used in the fields of content authentication, secret communication and the like.
Drawings
FIG. 1 is a schematic diagram of embedding rules based on multiple histogram modifications;
FIG. 2 is a schematic diagram of the histogram mapping rule using multiple pairs of bins for the present method;
FIG. 3 is a schematic diagram of the ordered solution space (M ═ 2) and the greedy search mechanism constructed by the method, (a) is 2 pairs of pillars (-2,1) and (-4,3), (b) is 3 pairs of pillars (-1,0), (-2,1) and (-3, 2);
FIG. 4 is a comparison of the performance of the present method and the prior art method;
FIG. 5 is a schematic diagram of the dual layer embedding scheme of the present method;
FIG. 6 is a diagram of a diamond predictor;
fig. 7 is a schematic diagram of pixel complexity calculation.
Detailed Description
In order to make the aforementioned and other features and advantages of the invention more comprehensible, embodiments accompanied with figures are described in detail below.
The embodiment provides a high-capacity reversible information hiding method based on multi-histogram modification, which realizes the function of reversibly embedding and extracting secret information in an image and obtains a carrier image with small distortion degree, and the method comprises the following steps:
1. the method uses a double-layer embedding mode to divide all pixels of the whole image into two parts, and then layered embedding is carried out. As shown in fig. 5, the empty area pixels represent the first layer and the shaded area pixels represent the second layer. When embedding information, the information is embedded from left to right and from top to bottom, and the information is embedded in the first layer and then embedded in the second layer.
2. Preprocessing a carrier image: to prevent overflow of the modified pixel values, some pixels xiModifications need to be made in advance, where K is the logarithm of the graph columns selected in the algorithm (number of calls):
Figure BDA0002085508390000051
and a position table is established to record the position of the modified pixel, which becomes part of the auxiliary information after compression.
3. Computing the prediction error e of a pixel from the neighborhoodiAnd complexity niAnd generating M prediction error histograms. Computing prediction values for pixels using diamond predictors
Figure BDA0002085508390000052
Fig. 6 shows the calculation of the diamond predictor:
Figure BDA0002085508390000053
after obtaining the predicted value, calculating to obtain the prediction error
Figure BDA0002085508390000054
Complexity n of a pixeliThe calculation of (a) is as follows, i.e. the average value of the difference values of every two consecutive pixels in the horizontal and vertical directions is calculated in the neighborhood of 12 pixels:
ni=|u2-u5|+|u5-u9|+|u6-u10|+|u3-u7|+|u7-u11|+|u1-u4|+|u4-u8|+|u8-u12|+|u3-u4|+|u5-u6|+|u6-u7|+|u7-u8|+|u9-u10|+|u10-u11|+|u11-u12|
in order to improve the embedding capacity, for the generated M histograms, K is selected on each histogram for information embedding, namely the corresponding parameter is { (a)n,k,bn,k) L 1 is less than or equal to K, wherein an,K<…<an,1<0≤bn,1<…<bn,K. The embedding rule using pairs of pillars is then:
Figure BDA0002085508390000061
wherein
Figure BDA0002085508390000062
And m ∈ {0,1} represents the prediction error of the embedded image, and is an embedded binary information bit.
Fig. 2 shows a histogram mapping method for embedding information into a histogram using 2 pairs of bins and 3 pairs of bins, respectively. Wherein the points identified by the rectangles represent a plurality of parameters a selected on each histogramn,kAnd bn,k
4. Determining approximately optimal parameters according to a greedy search algorithm, for each histogram bnIn other words, there are K parameters { b }n,k|1≤k≤K}。
Specifically, a single histogram h is calculatednCapacity of embedding EC when using multiple parametersnAnd embedding distortion EDn
Figure BDA0002085508390000063
Figure BDA0002085508390000064
In order to find the optimal parameters, the following optimization problem needs to be solved:
Figure BDA0002085508390000065
where P denotes a given load requirement and consists of secret information and side information to be embedded.
Here, the value range of the parameter is limited based on the distribution property of the prediction error histogram, as follows:
Figure BDA0002085508390000066
where T represents a threshold value of an integer, which can be adjusted to define the range of the parameter, bn,kInfinity means that k-1 is used at most for information embedding in the graph column. For a given logarithm of the bin K,
Figure BDA0002085508390000067
representing the number of all possible parameter selection cases. If an exhaustive search is used, the computational complexity is O (S)M). For example, when K is 4, M is 16, and T is 8, the computational complexity approaches O (2)118). In the face of such a large solution space, it is impractical to use an exhaustive approach.
In order to quickly solve the optimization problem, the method provides a greedy search algorithm. Definition of Xn=(bn,1,...,bn,K) For the nth histogram hnCandidate of (1), ECn(Xn) And EDn(Xn) Respectively its corresponding embedding capacity and embedding distortion. First, an M-dimensional solution space is constructed, points (X) in the solution space1,…XM) Represents an embedding schemeRequired complete parameter, wherein XnIs represented in histogram hnThe above selected parameters. In particular, in each dimension of space, all candidates are arranged in ascending order according to the size of the embedding capacity. Thus, the optimization problem described above can be viewed as searching for an optimal solution in the constructed ordered solution space. Fig. 3 shows the constructed solution space, where M is 2 and the horizontal axis represents the space at h1The vertical axis represents the value in h2The above parameters are selected.
Next, a greedy search strategy is implemented in the constructed solution space. With the origin of the solution space as the initial state W0The embedding capacity at this time is 0. Then iteratively find the next state WmUntil reaching an end point W in the solution spaceendThe end point represents the parameter scheme with the maximum embedding capacity. At each iteration, only one histogram is selected to increase capacity, i.e. only W is modified at a timemOne of the items corresponds to that the current point selects one of the M dimensions at a time in the solution space, and moves one step forward along the dimension. Therefore, the next state, which has a total of M possibilities, is selected as the next state W as the candidate that minimizes the ratio of embedding distortion to embedding capacitym+1. This is the greedy idea of selecting the current optimal direction to proceed each time one step is taken in the direction of increasing capacity. For example, in FIG. 3, WmRepresenting the current state, the next reachable states are A and B, and A with smaller ratio is selected as the next state W by comparing ED (A)/EC (A) with ED (B)/EC (B)m+1. Repeating the above process until reaching WendAnd finally obtaining a search path in the solution space. The point on this path that minimizes the ratio of embedding distortion to embedding capacity while meeting the load requirements is the optimal solution. W in FIG. 3optIs an example of the resulting optimal solution.
Obviously, the complexity of determining parameters is greatly reduced by using the proposed greedy search algorithm, and the algorithm complexity is O (MS). Efficient algorithms make it possible to extend the multi-histogram based modification approach to high-volume solutions and can be adapted to real-time application scenarios.
It can be seen that the computational complexity of the greedy search depends on the number M of histograms and the size S of the candidate set, where S is determined by the logarithm K of the parameter. Table 1 shows the average run time of the proposed greedy search algorithm over the test picture set for different parameter pairs K when M ═ 16. The result display algorithm is very efficient and can meet the requirements of real-time application.
TABLE 1 running time of the greedy search algorithm of the present method
K 1 2 3 4
Average run time (seconds) 0.013 0.023 0.038 0.059
5. Auxiliary information is generated which ensures a lossless restoration of the carrier image. The auxiliary information comprises a compression position table obtained in the process, M-1 thresholds for dividing the histogram and a parameter b obtained by algorithm solutionn,k. The auxiliary information is embedded in the header of the image by using a least significant bit replacement method.
6. Embedding information according to the optimal parameters determined in the process to obtain the modified prediction error
Figure BDA0002085508390000071
The embedded carrier pixel is
Figure BDA0002085508390000081
An embedded carrier image is obtained.
7. The extraction process and the embedding process are in reverse order, auxiliary information is extracted from the image header, and information can be extracted from the image and the carrier can be recovered according to parameters in the auxiliary information.
At the receiving end, the original prediction error is recovered by the following formula,
Figure BDA0002085508390000082
further, the secret information is extracted according to the following formula,
Figure BDA0002085508390000083
fig. 4 shows the performance comparison of the method and four other classical reversible information hiding algorithms, namely the comparison of PSNR of the embedded image when the embedding capacity is from 10,000 bits to 160,000 bits for a gray scale image Lena of 512x512 size. Where the solid dots identify the original multi-histogram modification based approach of Li et al, it can be seen that the embedding capacity of this approach is much smaller than that of the present approach. Compared with other methods, the method has better embedding performance, namely, the same information is embedded, and the image distortion is smaller.
The above embodiments are only intended to illustrate the technical solution of the present invention and not to limit the same, and a person skilled in the art can modify the technical solution of the present invention or substitute the same without departing from the spirit and scope of the present invention, and the scope of the present invention should be determined by the claims.

Claims (10)

1. A high-capacity reversible information hiding method based on multi-histogram modification comprises the following steps:
preprocessing a carrier image, and performing partial pixel x with the value in the image within a specific rangeiThe modification is performed according to the following formula, a position table is established to record the position of the modified pixel,
Figure FDA0002924348820000011
computing pixel x from neighborhoodiPrediction error e ofiAnd complexity niGenerating M prediction error histograms;
at each histogram hnSelecting K pairs of columns, corresponding to K parameters, and determining optimal parameters according to a greedy search algorithm;
generating auxiliary information capable of ensuring lossless recovery of the carrier image, wherein the auxiliary information comprises a position table, M-1 thresholds for dividing the histogram and parameters corresponding to the histogram;
dividing all pixels of the carrier image into two layers, and embedding the secret information and the auxiliary information to be embedded into the K pairs of image columns in a layering manner according to the determined optimal parameters, wherein the auxiliary information is embedded into the head of the image;
obtaining modified prediction error after embedding
Figure FDA0002924348820000012
According to the embedded pixels
Figure FDA0002924348820000013
An embedded carrier image is obtained.
2. The method of claim 1, wherein the prediction error is
Figure FDA0002924348820000014
Figure FDA0002924348820000015
The prediction value of the pixel is calculated according to the diamond predictor.
3. The method of claim 1, in which complexity niThe calculation method comprises the following steps: in the neighborhood of 12 pixels, the average value of the difference values of every two consecutive pixels in the horizontal and vertical directions is calculated, namely the complexity ni
4. The method of claim 1, wherein the parameters for K pairs of columns are { (a)n,k,bn,k) L 1 is less than or equal to K, wherein an,K<…<an,1<0≤bn,1<…<bn,KThen, the embedding rule of the multiple pairs of the drawing columns is as follows:
Figure FDA0002924348820000016
wherein
Figure FDA0002924348820000017
And m ∈ {0,1} represents the prediction error of the embedded image, and is an embedded binary information bit.
5. The method of claim 4, wherein determining optimal parameters according to a greedy search algorithm comprises the steps of:
calculating to obtain a single histogram hnCapacity of embedding EC when using multiple parametersnAnd embedding distortion EDn
Figure FDA0002924348820000018
Figure FDA0002924348820000019
Where h () represents the frequency count of the prediction error for a certain value;
solving an optimization problem by using a greedy search algorithm, and determining optimal parameters, wherein the optimization problem is as follows:
Figure FDA0002924348820000021
where P denotes a given load requirement and consists of secret information and side information to be embedded.
6. The method of claim 5, wherein the parameters have the following ranges:
Figure FDA0002924348820000022
where T represents an integer threshold.
7. The method as claimed in claim 1 or 5, wherein the greedy search algorithm is that in the solution space, the origin of the solution space is used as an initial state, from the initial state, the current optimal direction is selected to advance to search for the next state, and the search is performed iteratively until the end point in the solution space is reached.
8. The method of claim 7, wherein solving the optimization problem using a greedy search algorithm is specifically:
constructing an M-dimensional solution space, points (X) in the solution space1,…XM) Represents a complete parameter required for embedding, wherein XnIs represented in histogram hnThe parameters are selected, and all candidates are arranged in ascending order according to the size of the embedding capacity in each dimension of the space;
with the origin of the solution space as the initial state W0Selecting the candidate which minimizes the ratio of embedding distortion to embedding capacity as the next state, and iteratively searching the next state until the next state is reachedReaching the end point in the solution space to obtain a search path in the solution space;
on this path, finding the point where the ratio of embedding distortion to embedding capacity is minimal while satisfying the load requirement is the optimal solution.
9. The method of claim 1, wherein the information is embedded in a left-to-right, top-to-bottom order, with the information being embedded first at a first layer and then at a second layer.
10. A method for extracting information from an embedded carrier image obtained by the method of any one of claims 1 to 9, comprising the steps of:
extracting auxiliary information from the header of the embedded carrier image;
and extracting the embedded secret information from the image and recovering the carrier according to the position table in the auxiliary information, the threshold values of the M-1 partition histograms and the parameters corresponding to the histograms.
CN201910486319.2A 2019-06-05 2019-06-05 High-capacity reversible information hiding method based on multi-histogram modification Active CN110362964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910486319.2A CN110362964B (en) 2019-06-05 2019-06-05 High-capacity reversible information hiding method based on multi-histogram modification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910486319.2A CN110362964B (en) 2019-06-05 2019-06-05 High-capacity reversible information hiding method based on multi-histogram modification

Publications (2)

Publication Number Publication Date
CN110362964A CN110362964A (en) 2019-10-22
CN110362964B true CN110362964B (en) 2021-06-01

Family

ID=68215611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910486319.2A Active CN110362964B (en) 2019-06-05 2019-06-05 High-capacity reversible information hiding method based on multi-histogram modification

Country Status (1)

Country Link
CN (1) CN110362964B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111898136A (en) * 2020-06-12 2020-11-06 北京大学 High-fidelity reversible information hiding method and device based on prediction error value sequencing
CN113507547B (en) * 2021-07-07 2023-07-14 福建工程学院 Reversible information hiding method combining self-adaptive coefficient multi-histogram with high-dimensional histogram
CN114466112A (en) * 2022-01-11 2022-05-10 山东师范大学 Reversible data hiding method and system based on multiple histogram adaptive modification
CN114979403B (en) * 2022-05-10 2023-05-30 北京交通大学 Reversible information hiding method and system based on pixel residual histogram modification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102044061A (en) * 2010-12-20 2011-05-04 北京大学 Embedding method and extracting method of reversible watermarks
CN106097241A (en) * 2016-06-13 2016-11-09 西安交通大学 Reversible information hidden method based on eight neighborhood pixel
CN108009975A (en) * 2017-11-17 2018-05-08 中山大学 Jpeg image reversible information hidden method based on two-dimensional histogram modification
CN109671010A (en) * 2018-11-02 2019-04-23 中山大学 It is a kind of based on multiple two-dimensional histograms modification reversible information hide and extracting method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7974477B2 (en) * 2007-02-19 2011-07-05 New Jersey Institute Of Technology Apparatus and method for reversible data hiding for JPEG images
US8175324B2 (en) * 2008-10-17 2012-05-08 New Jersey Institute Of Technology Reversible data hiding
CN103310406B (en) * 2013-06-25 2016-04-06 同济大学 Based on the image reversible data concealing method that histogram is right
CN108200435B (en) * 2018-01-29 2020-10-27 郑州轻工业学院 Reversible information hiding method for fractal image

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102044061A (en) * 2010-12-20 2011-05-04 北京大学 Embedding method and extracting method of reversible watermarks
CN106097241A (en) * 2016-06-13 2016-11-09 西安交通大学 Reversible information hidden method based on eight neighborhood pixel
CN108009975A (en) * 2017-11-17 2018-05-08 中山大学 Jpeg image reversible information hidden method based on two-dimensional histogram modification
CN109671010A (en) * 2018-11-02 2019-04-23 中山大学 It is a kind of based on multiple two-dimensional histograms modification reversible information hide and extracting method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Efficient Reversible Data Hiding Based on Multiple Histograms Modification;Xiaolong Li 等;《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》;20150611;第10卷(第9期);第2016-2027页 *
Multiple Histograms-Based Reversible Data Hiding: Framework and Realization;Junxiang Wang 等;《IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY》;20190508;第30卷(第8期);第2313-2328页 *
Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding;Xiaochao Qu 等;《Signal Processing》;20150110;第111卷(第1期);第249-260页 *
图像可逆隐藏综述;李晓龙;《信息安全研究》;20160805;第2卷(第8期);第729-734页 *

Also Published As

Publication number Publication date
CN110362964A (en) 2019-10-22

Similar Documents

Publication Publication Date Title
CN110362964B (en) High-capacity reversible information hiding method based on multi-histogram modification
Li et al. General framework to histogram-shifting-based reversible data hiding
Li et al. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion
Qi et al. Optimal reversible data hiding scheme based on multiple histograms modification
Hong et al. A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification
Weng et al. Optimal PPVO-based reversible data hiding
CN111898136A (en) High-fidelity reversible information hiding method and device based on prediction error value sequencing
Cao et al. Local complexity based adaptive embedding mechanism for reversible data hiding in digital images
Uyyala et al. Reversible data hiding using improved gradient based prediction and adaptive histogram bin shifting
Uyyala et al. Reversible data hiding using B‐tree triangular decomposition based prediction
Chuang et al. Joint index coding and reversible data hiding methods for color image quantization
Kouhi et al. Prediction error distribution with dynamic asymmetry for reversible data hiding
CN113032813B (en) Reversible information hiding method based on improved pixel local complexity calculation and multi-peak embedding
Su et al. Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering
Tang et al. Reversible data hiding based on improved rhombus predictor and prediction error expansion
CN112954318A (en) Data coding method and device
US20100239019A1 (en) Post processing of motion vectors using sad for low bit rate video compression
CN108510425B (en) Reversible watermarking method based on IPPVO and optimized MHM
CN114399419B (en) Reversible image watermarking algorithm based on prediction error expansion
Bhatnagar et al. Reversible Data Hiding scheme for color images based on skewed histograms and cross-channel correlation
Wu et al. PVO-Based Reversible Data Hiding Using Global Sorting and Fixed 2D Mapping Modification
Song et al. Reversible data hiding based on directional prediction and multiple histograms modification
Tang et al. Reversible data hiding based on improved block selection strategy and pixel value ordering
He et al. Reversible data hiding based on multi‐predictor and adaptive expansion
EP3319318B1 (en) Intra compression of screen content based on soft context formation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20191022

Assignee: BEIJING SHUKE WANGWEI TECHNOLOGY Co.,Ltd.

Assignor: Peking University

Contract record no.: X2022990000249

Denomination of invention: A high capacity reversible information hiding method based on multi histogram modification

Granted publication date: 20210601

License type: Common License

Record date: 20220609

EE01 Entry into force of recordation of patent licensing contract