CN105447808A - Reversible data hiding method and recovering method - Google Patents

Reversible data hiding method and recovering method Download PDF

Info

Publication number
CN105447808A
CN105447808A CN201510778642.9A CN201510778642A CN105447808A CN 105447808 A CN105447808 A CN 105447808A CN 201510778642 A CN201510778642 A CN 201510778642A CN 105447808 A CN105447808 A CN 105447808A
Authority
CN
China
Prior art keywords
pixel
value
block
max
class block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510778642.9A
Other languages
Chinese (zh)
Other versions
CN105447808B (en
Inventor
项洪印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China Electric Power University
Original Assignee
North China Electric Power University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China Electric Power University filed Critical North China Electric Power University
Priority to CN201510778642.9A priority Critical patent/CN105447808B/en
Publication of CN105447808A publication Critical patent/CN105447808A/en
Application granted granted Critical
Publication of CN105447808B publication Critical patent/CN105447808B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention relates to a reversible data hiding method and a recovering method. The reversible data hiding method comprises a preprocessing step in which an original pixel-domain image is divided into blocks and the blocks are sorted according to the gray values, a marking step in which the sequence after sorting is detected and identified and feature-class blocks are marked, a watermark information embedding step in which watermark information is embedded into the feature-class blocks through a second embedding method, and an auxiliary information embedding step in which corresponding auxiliary information is embedded. According to the invention, on-demand watermark information embedding is realized, equal-maximum pixel redundancy in the image is fully exploited, 'one-position multi-bit embedding' is realized, and the information capacity is improved effectively. Meanwhile, seamless integration of a first embedding method and the second embedding method is achieved effectively.

Description

Reversible data concealing method and restoration methods
Technical field
The present invention relates to data hiding technique field, be specifically related to a kind of reversible data concealing method and restoration methods, the Sensitive Domains such as medical science, law and military affairs can be used in.
Background technology
Image watermarking became the research field of reinforcement in recent years.In data hiding process, therefore most of multi-medium data concealing technology amendment overwrite media also makes overwrite media distortion.Even if the usually very little and human visual system (HVS) of distortion can not perceive, but usually can not recover original cover media completely.In other words, these data hiding techniques are most of irreversible, to some sensitive application, as law and medical image, are unacceptable.For law, medical science and other sensitive application, need hiding reversible data to extract the data of embedding and to recover original host signal, so the shortcoming that prior art is brought, real to be improved.
In the face of shortcoming above, have Mr. Bruce Lee etc. to propose a kind of new embedding grammar, the present invention is called the first embedding grammar, and this first embedding grammar mainly achieves at the maximal value of each piecemeal and minimum value place embedding data, can embed at most two bits.Original image is divided into the identical but block n of non-overlapping copies of size 1× n 2, and by gray-scale value, ascending sort is carried out to pixel in block, please refer to Fig. 1.
As shown in Figure 1, original pixels sequence is (p 1, p 2..., p n-1, p n)=(162,161,159,157,163,158), after ascending sort, become (p s 1, p s 2..., p s n-1, p s n)=(157,158,159,161,162,163), wherein n=n 1× n 2.
By secondary maximal value prediction maximal value, by time minimum value prediction minimum value, perform data and embed.Maximal value predicated error e max=p s n-p s n-1, minimum value predicated error e min=p s 1-p s 2, embedding formula is
p ~ n s = p s n i f e m a x = 0 p s n + b i f e m a x = 1 p s n + 1 i f e max > 1 - - - ( 1 )
p ~ 1 s = p s 1 i f e min = 0 p s 1 - b i f e min = - 1 p s 1 - 1 i f e min < - 1 - - - ( 2 )
Can find out, the first embedding grammar mainly make use of one pole value piecemeal, achieves the reversible of information and hides, please refer to Fig. 2.There is following features:
1, the two ends that the pixel embedded is positioned at the rear gray value sequence of sequence are performed
2, each piecemeal has influence at most 2 pixels, and the maximum change 1 of pixel value, therefore have and can ensure very high fidelity
Although 3 each piecemeals can embed 2 Bit datas at most, only utilize the two ends of gray value sequence, do not make full use of multipole value piecemeal, therefore embedding capacity is less, needs to excavate pixel redundancy further, remains to be further improved in fact.
Summary of the invention
The object of this invention is to provide a kind of reversible data concealing method and restoration methods.
To achieve these goals, the technical solution used in the present invention is:
A kind of reversible data concealing method, comprising:
Pre-treatment step, carries out piecemeal by original, pixel domain image and sorts by gray-scale value in block;
Identification of steps, is undertaken the sequence after sequence detecting, identifying and identification characteristics class block;
Embed watermark information step, to feature class block by the second embedding grammar embed watermark information, this second embedding grammar comprises:
Determine secondary maximum value: the secondary maximum value location of pixels in identification characteristics class block is 1, form secondary maximum value location of pixels figure;
Computational prediction difference: the difference calculating maximum value and secondary maximum value in feature class block;
Embed watermark information: when difference equals 1, be then added on multipole value sequence by the binary code of watermark data;
Embed supplementary step, embed corresponding supplementary.
Further, this pre-treatment step comprises:
Block: original image is divided into the identical but block of non-overlapping copies of size;
Sequence: pixel in block is sorted by gray-scale value.
Further, in this block, pixel is ascending order or descending by gray-scale value sortord.
On above-mentioned any embodiment basis, further, the feature class block in this identification of steps comprises: k 1class block, k 2class block and mixing k class block.
On above-mentioned any embodiment basis, further, this k 1class block is minimum gray-value pixel quantity is 1, equivalent greatly number of gray values 1<n p-max≤ n-1, wherein k 1=n p-maxand 1<k1≤n-1.
On above-mentioned any embodiment basis, further, this k 2class block is very big gray-value pixel quantity is 1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 2=n p-minand 1<k2≤n-1.
On above-mentioned any embodiment basis, further, this mixing k class block is equivalent greatly gray-value pixel quantity 1<n p-max≤ n-1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 1=n p-max, k 2=n p-minand k 1+ k 2≤ n-1.
On above-mentioned any embodiment basis, further, the gray-scale value order sequence by size of this block pixel, secondary maximum value is called secondary maximum base p s b-max, respective pixel is called secondary maximum base pixel p b-max; Secondary minimum value is called secondary minimum base p s b-min, respective pixel is called secondary minimum base pixel p b-min.
On above-mentioned any embodiment basis, further, this embedding supplementary step comprises:
Replace least significant bit (LSB): calculate supplementary length, extract the least significant bit (LSB) of the front and supplementary equal length number pixel of image, and replace by supplementary;
Embed least significant bit (LSB): the least significant bit (LSB) sequence extracted be embedded in the later pixel of the last embedded block of data.
On above-mentioned any embodiment basis, further, the supplementary in this embedding supplementary step comprises: the location drawing and supplementary mark.
Further, the location drawing in this embedding supplementary step comprises spilling location of pixels figure, the full smooth block location drawing and base location of pixels figure.
On above-mentioned any embodiment basis, further, the supplementary in this embedding supplementary step identifies the location drawing size after comprising payload size, block size, compression, last embedded block index and finally embeds pixel index.
A restoration methods for hiding reversible data, comprising:
Read supplementary step, after receiving the image of embed watermark information, read and obtain complete supplementary, this supplementary comprises the location drawing and supplementary mark;
Pre-treatment step, carries out piecemeal by the image of embed watermark information and sorts by gray-scale value in block;
Identification of steps, is undertaken the sequence after sequence detecting, identifying and identification characteristics class block;
Treatment step, the secondary maximum that decompresses out from location drawing value location of pixels figure, determines each piece of location drawing, identification block type; Determine secondary maximum value pixel: according to the secondary maximum value location of pixels figure decompressed, determine the secondary maximum value pixel of each piece, be called secondary maximum base pixel; Calculate the difference of the large pixel of secondary maximum base grey scale pixel value and secondary maximum base pixel, difference is 1 extraction watermark information 0, and grey scale pixel value is constant; Difference is 2 extraction watermark informations 1, and grey scale pixel value subtracts 1; Difference is greater than 2 marks without embedding information, and grey scale pixel value is constant; From the pixel that the last embedded block of data is later, extract the least significant bit (LSB) sequence of embedding, and be substituted in the pixel that supplementary takies;
Extract watermark information and Recovery image step, duplicate marking step and treatment step, process each block successively and extract watermark information and each maximum pixel gray-scale value in recovery block, obtaining original image.
Further, this supplementary identifies the location drawing size after comprising payload size, block size, compression, last embedded block index and finally embeds pixel index.
On above-mentioned any embodiment basis, further, this location drawing comprises spilling location of pixels figure, the full smooth block location drawing and base location of pixels figure.
On above-mentioned any embodiment basis, further, this feature class block comprises: k 1class block, k 2class block and mixing k class block.
Further, this k 1class block is minimum gray-value pixel quantity is 1, equivalent greatly number of gray values 1<n p-max≤ n-1, wherein k 1=n p-maxand 1<k 1≤ n-1.
Further, when identifying k 1during class block, in the case, the information bit extracted is:
b = p ~ i s - ( p s n - k 1 + 1 ) ,
Image recovery scheme is:
p s i = p ~ i s i f 1 &le; i &le; n - k 1 p ~ i s - b i f n - k 1 + 1 &le; i &le; n a n d e ~ max k &Element; { 1 , 2 } p ~ i s - 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k > 2
The image intensity value recovered is:
p s i = p ~ i s - b = p ~ i s - ( p ~ i s - ( p s n - k 1 + 1 ) ) = p s n - k 1 + 1.
On above-mentioned any embodiment basis, further, this k 2class block is very big gray-value pixel quantity is 1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 2=n p-minand 1<k 2≤ n-1.。
Further, when identifying k 2during class block, in the case, i &Element; { 1 , 2 , ... , n } , e ~ m i n k = p ~ k 2 s - p s k 2 + 1 , The information bit extracted is:
b = ( p s k 2 - 1 ) - p ~ i s
Image recovery scheme is:
p s i = p ~ i s i f k 2 + 1 &le; i &le; n p ~ i s + b i f 1 &le; i &le; k 2 a n d e ~ min k &Element; { - 1 , - 2 } p ~ i s + 1 i f 1 &le; i &le; k 2 a n d e ~ min k < - 2
The image intensity value recovered is:
p s i = p ~ i s + b = p ~ i s + ( ( p s k 2 - 1 ) - p ~ i s ) = p s k 2 + 1.
On above-mentioned any embodiment basis, further, this mixing k class block is equivalent greatly gray-value pixel quantity 1<n p-max≤ n-1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 1=n p-max, k 2=n p-min, and k 1+ k 2≤ n-1.
Further, when identifying mixing k class block, in the case, the information bit that equivalent maximum value place extracts is:
b 1 = p ~ i s - ( p s n - k 1 + 1 )
The information bit that equivalent minimal value place extracts is:
b 2 = ( p s k 2 - 1 ) - p ~ i s
Image recovery scheme is:
p s i = p ~ i s i f k 2 + 1 &le; i &le; n - k 1 p ~ i s - b 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k &Element; { 1 , 2 } p ~ i s - 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k > 2 p ~ i s + b 2 i f 1 &le; i &le; k 2 a n d e ~ min k &Element; { - 1 , - 2 } p ~ i s + 1 i f 1 &le; i &le; k 2 a n d e ~ min k < - 2
The image intensity value recovered is:
p s i = p ~ i s - b = p ~ i s - ( p ~ i s - ( p s n - k 1 + 1 ) ) = p s n - k 1 + 1.
On above-mentioned any embodiment basis, further, this pre-treatment step comprises:
Block: original image is divided into the identical but block of non-overlapping copies of size;
Sequence: pixel in block is sorted by gray-scale value.
Further, in this block, pixel is ascending order or descending by gray-scale value sortord.
Other features and advantages of the present invention will be set forth in the following description, and, partly become apparent from instructions, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in write instructions, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Fig. 1 is the block of pixels ordering chart of picture in prior art first embedding grammar;
Fig. 2 is the ordering chart of the embed watermark information of prior art first embedding grammar;
Fig. 3 is the outline flowchart of embed watermark information in reversible data concealing method of the present invention;
Fig. 4 is the block diagram of embed watermark information in reversible data concealing method of the present invention;
Fig. 5 a-Fig. 5 h is the comparison diagram of reversible data concealing method of the present invention and other three kinds of methods, wherein, the comparison diagram of Fig. 5 a to be Lena picture be example, the comparison diagram of 5b to be Baboon picture be example, the comparison diagram of 5c to be Airplane picture be example, the comparison diagram of 5d to be Barbara picture be example, the comparison diagram of 5e to be Elaine picture be example, the comparison diagram of 5f to be Lake picture be example, the comparison diagram of Fig. 5 g to be Boat picture be example, the comparison diagram of Fig. 5 h to be Peppers picture be example.
Embodiment
The present invention relates to data hiding technique field, be specifically related to a kind of reversible data concealing method.Reversible data hiding technique, refers in Digital Image Processing process, and to carrier image embed watermark information, authorized user can extract watermark information from the image after embed watermark, also can revert to original carrier image simultaneously.
Invention thinking of the present invention is that after image is carried out piecemeal, in each piecemeal, pixel grey scale has maximal value and minimum value, can have a lot of extreme value for whole original image, comprises maximum value and minimal value.When use first embedding grammar embeds, only make use of the one pole value pixel in piecemeal.In order to better utilize piecemeal etc. extreme value pixel carry information bit, the present invention proposes the second embedding grammar.Specifically, usage flag strengthens and utilizes secondary extreme value pixel of image, and namely secondary maximum gray-scale pixels of piecemeal and time minimal gray pixel, go to predict maximum gray-scale pixels and minimal gray pixel, the secondary extreme value location of pixels figure of formation.On this basis, secondary maximum value pixel in the figure marking image of use location, with its predict in each piecemeal etc. maximal value pixel, realize the embedding as required of watermark information, fully excavated in image etc. maximum value pixel redundancy, achieve " 1 position, Multi-bit embedding ", effectively improve information capacity.Meanwhile, the seamless fusion of the first embedding grammar and the second embedding grammar has effectively been accomplished.
As shown in Figure 3, Fig. 3 is the outline flowchart of embed watermark information in reversible data concealing method of the present invention.Pre-treatment step comprises overflow block identification and full smooth block identification.Overflow block identification is mainly set up and is overflowed location of pixels figure.
Be exactly mainly recognition feature class block below, the feature class set out carries out embed watermark information according to the second embedding grammar soon.At analytical characteristic class block, according to k 1class block, k 2class block and mixing k class block embed again.If be that non-feature class is fast, just carry out the first embedding grammar and carry out embed watermark information.So the first embedding grammar and the second embedding grammar are seamless fusions, flexible embed watermark information as required.
Herein, term " watermark information " is information, and it can form a part for coherent message, and scrambler it can be embedded in the picture and demoder can be extracted subsequently from image.So, the uncoded form of the watermark information before also existing watermark information embedded images.Once be embedded in image, by adopting the demoder according to the method for one or more embodiment of the present invention, watermark information is reversibly complete to be recovered.
The terminological interpretation that the present invention also uses is as follows:
Difference expansion: calculate the difference between two pixels, utilizes difference to carry out the expanded application of information insertion.
Etc. maximal value pixel: after pixel presses gray-scale value sequence in image class block, have multiple size identical, and the pixel that numerical value is maximum.
Etc. maximum value pixel: the maximal value pixel in image class block, for whole image, the maximum value pixel such as to be called.
Secondary maximal value pixel: after pixel presses gray-scale value sequence in image class block, the maximum pixel less than maximal value.
Secondary maximum value pixel: the secondary maximal value pixel in image class block, for whole image, is called secondary maximum value pixel.
Below by embodiment, above term and technical scheme of the present invention are described in further detail.
A kind of reversible data concealing method, comprises pre-treatment step, identification of steps, embed watermark information step and embedding supplementary step.
Pre-treatment step, just original, pixel domain image carries out piecemeal and sorts by gray-scale value in block.
Pre-treatment step comprises: piecemeal and sequence.Piecemeal is exactly original image is divided into the identical but block of non-overlapping copies of size.Original image is divided into the identical but block n of non-overlapping copies of size 1× n 2, and by gray-scale value, ascending sort is carried out to pixel in block.
Sequence is sorted by gray-scale value to pixel in block exactly.In this block, pixel is ascending order or descending by gray-scale value sortord.
Pre-treatment step also comprises overflow block identification and full smooth block identification.Wherein, overflow block identification is mainly set up and is overflowed location of pixels figure, and pixel 0 and 255 is adjusted to 1 and 254 respectively.Full smooth block identification refers to that the gray-scale value of all pixels in piecemeal is identical, sets up the full smooth block location drawing.In complete level and smooth identification, as above this type of pixel (pixel 0 and 255) in full smooth block remains unchanged, and only identifies with the smooth block location drawing.Run into this type of block to be no longer further analyzed, monoblock pixel value remains unchanged.
When base location of pixels figure refers to scanning point block type, run into certain kinds block, then identify secondary maximum base pixel and secondary minimum base pixel, set up base location of pixels figure, be convenient to the invertible operation realizing information in follow-up embedding, extraction and recovery link.
, there is this type of situation and be namely designated " 1 ", otherwise be designated " 0 " in above-mentioned three kinds of locations drawing.After each position figure sets up, Lossless Compression is just adopted to reduce its size.
This identification of steps, is undertaken the sequence after sequence detecting, identifying and identification characteristics class block.This feature class block comprises: k 1class block, k 2class block and mixing k class block.
This minimum gray-value pixel quantity is 1, equivalent greatly number of gray values 1<n p-max≤ n-1, is called k 1class block, wherein k 1=n p-max, be designated as
c(k 1)=1<k 1≤n-1(5)
This very big gray-value pixel quantity is 1, equivalent minimum number of gray values 1<n p-min≤ n-1, is called k 2class block, wherein k 2=n p-min, be designated as
c(k 2)=1<k 2≤n-1(6)
This equivalence is gray-value pixel quantity 1<n greatly p-max≤ n-1, equivalent minimum number of gray values 1<n p-min≤ n-1, is called mixing k class block, wherein k 1=n p-max, k 2=n p-min, and k 1+ k 2≤ n-1, is designated as
c ( k 1 , k 2 ) = 1 < k 1 &le; n - 1 1 < k 2 &le; n - 1 k 1 + k 2 &le; n - 1 - - - ( 7 )
The gray-scale value order sequence by size of this piecemeal pixel, secondary maximum value is called secondary maximum base p s b-max, respective pixel is called secondary maximum base pixel p b-max; Secondary minimum value is called secondary minimum base p s b-min, respective pixel is called secondary minimum base pixel p b-min.
In sum, except waiting gray-scale value piecemeal, k 1p is only had in class block b-max, gray-scale value is k 2p is only had in class block b-min, gray-scale value is then existing p in mixing k class block and non-k class block b-maxalso p is had b-min, and likely p s b-max=p s b-min.
As shown in Figure 4, Fig. 4 is the block diagram of embed watermark information in reversible data concealing method of the present invention.The situation of the only maximum value embedding such as analysiss in the present embodiment.As can be seen from Figure 4, the 1st piecemeal, Label k=0, represent that this is not a k class block, be suitable for the embedding method of conventional P VO, here, e max=163-162=1, can embed information, herein b=0 at maximum gray scale 163 pixel place, therefore, and e min=157-158=-1, can embed information, herein b=1 at minimal gray 157 pixel place, therefore,
2nd, 3,4 piecemeals, represent that these are all k 1class block, is suitable for the embedding method of PVO-kAdaptive.In 2nd piecemeal, k 1=2, p b-maxpixel place mark position figure Label k 1 = 1 , Size remains unchanged, and e k m a x = p s n - k 1 + 1 - p s n - k 1 = p s 5 - p s 4 = 162 - 161 = 1 , Therefore at eq (k 1)={ n-k 1+ 1, n-k 1+ 2 ..., the pixel of the positions such as n}={5,6} embed information bit, herein b 5=0, b 6=1, perform p ~ e q ( k 1 ) s = p s e q ( k 1 ) + b , Obtain p ~ 5 s = p s 5 + b = 162 + 0 = 162 , p ~ 6 s = p s 6 + b = 162 + 1 = 163. In 3rd piecemeal, k 1=2, p b-maxpixel place mark position figure size remains unchanged, and e k m a x = p s n - k 1 + 1 - p s n - k 1 = p s 5 - p s 4 = 162 - 160 = 2 > 1 , Therefore by eq (k 1)={ n-k 1+ 1, n-k 1+ 2 ..., the pixel of the positions such as n}={5,6} right shift, performs p ~ e q ( k 1 ) s = p s e q ( k 1 ) + 1 , Obtain p ~ 5 s = p s 5 + 1 = 162 + 1 = 163 , p ~ 6 s = p s 6 + 1 = 162 + 1 = 163. In 4th piecemeal, k 1=4, p b-maxpixel place mark position figure size remains unchanged, and e k max = p s n - k 1 + 1 - p s n - k 1 = p s 3 - p s 2 = 160 - 159 = 1 , Therefore at eq (k 1)={ n-k 1+ 1, n-k 1+ 2 ..., n}={3, the pixel of the positions such as 4,5,6} embed information bit, herein b 3=0, b 4=1, b 5=1, b 6=0, perform obtain p ~ 4 s = p s 4 + b = 160 + 1 = 161 , p ~ 5 s = p s 5 + b = 160 + 1 = 161 , p ~ 6 s = p s 6 + b = 160 + 0 = 160.
It should be noted that the 2nd, 3, no matter its neighbor size of 157 pixels in 4 piecemeals, remain constant, this is different from the embedding condition of the first embedding grammar.Therefore the second embedding grammar and the first embedding grammar parallel running, do not interfere with each other.
Said process is with k 1class block is illustrational, k 2class block method is similar, and feature is identical.Be not difficult to find, the second embedding grammar of the present invention and the first embedding grammar independently carry out, and is independent of each other, enormously simplify data processing complexity.Certainly, now sacrifice the one pole value pixel in part k class block, available first embedding grammar embeds originally, but cannot carry information bit because being judged to be feature class block, have lost the capacity of being partially submerged into.In fact, because there is the pixel of k>1 bit to utilize in feature class block, and can sequentially embed, therefore population size does not reduce, and improves on the contrary.
Embed the average interference brought from information bit, the square error of k class block is
MSE k = 1 n 1 &times; n 2 &Sigma; i k = 1 n 1 &Sigma; j k = 1 n 2 || I k ( i k , j k ) - I k e ( i k , j k ) || 2 = 1 n &Sigma; i = 1 n ( p i - p i e ) 2 = 1 n ( &Sigma; i = 1 k 2 ( p i - p i e ) 2 + &Sigma; i = n - k 1 + 1 n ( p i - p i e ) 2 ) - - - ( 8 )
And
&Sigma; i = 1 k 2 ( p i - p e i ) 2 = k 2 / 2 i f e k m i n = 1 k 2 i f e k m i n > 1 - - - ( 9 )
&Sigma; i = n - k 1 + 1 n ( p i - p e i ) 2 = k 1 / 2 i f e k max = 1 k 1 i f e k max > 1 - - - ( 10 )
Thus, k 1the embedding interference of class block
MSE k 1 = k 1 / 2 n i f e k max = 1 k 1 / n i f e k max > 1 - - - ( 11 )
K 2the embedding interference of class block
MSE k 2 = k 2 / 2 n i f e k m i n = 1 k 2 / n i f e k m i n > 1 - - - ( 12 )
The embedding interference of mixing k class block
MSE k h = ( k 1 + k 2 ) / 2 n i f e k max = 1 a n d e k min = 1 ( k 1 / 2 + k 2 ) / n i f e k max = 1 a n d e k min > 1 ( k 1 + k 2 ) / 2 n i f e k max > 1 a n d e k min = 1 ( k 1 + k 2 ) / n i f e k max > 1 a n d e k min > 1 - - - ( 13 )
As mentioned above, embedding flexibility ratio and practicality has comparatively had very large lifting, makes each equivalent extreme value can carry information bit as required, embeds quality simultaneously and also obtain enhancing.
This embed watermark information step passes through the second embedding grammar embed watermark information to feature class block.In this embed watermark information step, the second embedding grammar comprises: determine secondary maximum value: the secondary maximum value location of pixels in identification characteristics class block is 1, forms secondary maximum value location of pixels figure; Computational prediction difference: the difference calculating maximum value and secondary maximum value in feature class block; Embed watermark information: when difference equals 1, then perform and be added on this multipole value sequence by the binary code of watermark data.
Specifically, recognition feature class block, carries out embedding information according to the second embedding grammar.This feature class block comprises: k 1class block, k 2class block and mixing k class block.After searching out feature class block, according to the piecemeal grey scale pixel value after ascending order arrangement, obtain the maximum value of sequence and minimal value size, number and position, and the size of secondary maximum value and secondary minimum value and position, carry out information bit embedding according to three kind blocks.
First kind block, is k 1class block.Some maximum value pixels are only had likely to be modified.Mark i ∈ 1,2 ..., n}, e k m a x = p s n - k 1 + 1 - p s n - k 1 , Then have
p ~ i s = p s i i f 1 &le; i &le; n - k 1 p s i + b i f n - k 1 + 1 &le; i &le; n a n d e k max = 1 p s i + 1 i f n - k 1 + 1 &le; i &le; n a n d e k max > 1 - - - ( 14 )
Herein, e k maxbe the predicated error of maximum value, { 0,1} is the information bit that will embed to b ∈.Clearly, just information insertion is performed when only having maximal value predicated error to be 1.
Equations of The Second Kind block, is k 2class block.Some minimal value pixels are only had likely to be modified.Mark i ∈ 1,2 ..., n}, e k min = p s k 2 - p s k 2 + 1 , Then have
p ~ i s = p s i i f k 2 + 1 &le; i &le; n p s i - b i f 1 &le; i &le; k 2 a n d e k min = - 1 p s i - 1 i f 1 &le; i &le; k 2 a n d e k min < - 1 - - - ( 15 )
Herein, e k minbe minimizing predicated error, { 0,1} is the information bit that will embed to b ∈.Clearly, just information insertion is performed when only having minimum value predicated error to be 1.
3rd class block, is mixing k class block.Existing some maximum value pixels are likely modified, and also have some minimal value pixels to be likely modified.Mark i ∈ 1,2 ..., n}, e k maxand e k minrespectively with k 1class block and k 2class block is identical, then have
p ~ i s = p s i i f k 2 + 1 &le; i &le; n - k 1 p s i + b i f n - k 1 + 1 &le; i &le; n a n d e k max = 1 p s i + 1 i f n - k 1 + 1 &le; i &le; n a n d e k max > 1 p s i - b i f 1 &le; i &le; k 2 a n d e k min = - 1 p s i - 1 i f 1 &le; i &le; k 2 a n d e k min < - 1 - - - ( 16 )
Herein, { 0,1} is the information bit that will embed to b ∈.Clearly, only have maximum value error be 1 and minimal value predicated error for-1 time just perform information insertion.
This embedding supplementary step, embeds corresponding supplementary.This embedding supplementary step comprises: replace least significant bit (LSB): calculate supplementary length, extracts the least significant bit (LSB) of the front and supplementary equal length number pixel of image, and replaces by supplementary; Embed least significant bit (LSB): the least significant bit (LSB) sequence extracted is embedded into data and finally embeds in the later pixel of piecemeal.
Supplementary in this embedding supplementary step comprises: the location drawing and supplementary mark.The location drawing in this embedding supplementary step comprises spilling location of pixels figure, the full smooth block location drawing and base location of pixels figure.Supplementary in this embedding supplementary step identifies the location drawing size after comprising payload size, point block size, compression, finally embedding block index and finally embeds pixel index.
Specifically, supplementary mainly refers to embedding capacity, point block size, overflows location of pixels figure and finally embeds block index.The special supplementary of feature class block then comprises the full smooth block location drawing, base location of pixels figure and finally embed pixel index.
In sum, the total information of embedding can be designated watermark payload (PWP)+location drawing (LM)+supplementary mark (All), and wherein the location drawing comprises spilling location of pixels figure, the full smooth block location drawing and base location of pixels figure; For the image of picture size 512*512, supplementary mark (All) has 112bits, comprises
Payload size (18bits)
Divide block size n1*n2 (4bits)
Location drawing size 54bits after compression
Finally embed block index (18bits)
Finally embed pixel index (18bits)
The present invention and the first embedding grammar and two kinds of prior aries carry out control methods.Adopt MatlabR2013a platform, 64 Windows7 Ultimate operating systems, Intel (R) Core (TM) i7-2600CPU, dominant frequency 3.40Hz, internal memory 4.00GB environment carries out constant load and embeds experiment simulation.Consider n 1, n 2{ different partitioned mode in totally 16 such as 2,3,4,5} etc., is promoted to target determines that point block size is to obtain the highest PSNR value with fidelity for ∈.
For ease of comparison, the present invention selects identical test picture, mainly comprises Lena, Baboon, Airplane, Barbara, Elaine, Lake, Boat and Peppers eight comparative result of standard grayscale picture of width 512*512 resolution.Method of the present invention mainly embeds information bit by revising at most certain grey scale pixel value 1 unit, puts forth effort to promote to embed quality.Herein, contrast examination embeds 5000bits to PSNR value during maximum embedding capacity, and step size settings is 1000bits.The maximum embedding capacity of this eight width image is followed successively by 37000,13000,47000,21000,23000,26000, and 26000 and 31000bits.
As shown in Figure 5, wherein, Fig. 5 is the comparison diagram of reversible data concealing method of the present invention and other three kinds of methods, wherein, the comparison diagram of Fig. 5 a to be Lena picture be example, the comparison diagram of 5b to be Baboon picture be example, the comparison diagram of 5c to be Airplane picture be example, the comparison diagram of 5d to be Barbara picture be example, the comparison diagram of 5e to be Elaine picture be example, the comparison diagram of 5f to be Lake picture be example, the comparison diagram of Fig. 5 g to be Boat picture be example, the comparison diagram of Fig. 5 h to be Peppers picture be example.On figure, the first control methods is referred to as " Sachnevetal "..Second control methods referred to as " Lietal. ", namely the first embedding grammar.3rd control methods is referred to as Ouetal.).The present invention is referred to as " Proposed ".
As can be seen from Figure 5, compared with the 3rd control methods, the two Performance comparision is close.At the low embedding rate place of Lena and Airplane two width picture, performance is lower, but middle high embedding rate part then has obvious improvement, this is because low embedding rate place, 3rd control methods have employed thresholding preference policy, and our rule causes greatly higher interference due to location drawing accounting; In Baboon and Barbara picture, performance is slightly low, this is because this two width picture texture level is complicated, and the 3rd control methods performs embed wholly, and has coordinated thresholding preference policy.Elaine, Lake, Boat and Peppers tetra-in width picture performance then promote a lot, this illustrates that this method has more outstanding fidelity performance in middle high embedding rate application.Reference table 1 and table 2, the method for method of the present invention corresponding 10000bits embedding ratio the 3rd control methods on average improves 0.66dB, and corresponding 20000bits embeds and improves 1.13dB.
Table 1
Table 2
As can be seen from table 1 above and table 2, at given embedding load in most cases, the method that the present invention proposes can obtain higher PSNR value.
Relatively the first control methods, the method that the present invention proposes all achieves better performance in most circumstances, but when close to max cap., performance is equally matched.Reference table 1 and table 2, the method for method of the present invention corresponding 10000bits embedding ratio first control methods on average improves 2.91dB, and corresponding 20000bits embeds and improves 2.73dB.
Comparatively speaking, corresponding all test pictures, the method that the present invention proposes all obtains better performance.Reference table 1 and table 2, the method for method of the present invention corresponding 10000bits embedding ratio second control methods on average improves 1.53dB, and corresponding 20000bits embeds and improves 2.02dB.
In general, method of the present invention achieves good performance, and embedding flexibility ratio and practicality has comparatively had very large lifting, makes each equivalent extreme value can carry information bit as required, embeds quality simultaneously and also obtain enhancing.
The present invention also provides a kind of information extraction and image recovery method.Because the present invention has effectively accomplished the seamless fusion of the first embedding grammar and the second embedding grammar, when recovery, the first embedding grammar and the two or two embedding grammar independently carry out, find that there is the image section of employing first embedding grammar, then use extraction and the Postprocessing technique of the first embedding grammar, owing to being prior art, be not repeated.Find feature class block employing second embedding grammar information extraction and image recovery process.
Specifically, this feature class block comprises: k 1class block, k 2class block and mixing k class block, recover according to the difference of class block below.
When identifying k 1during class block, in the case, the information bit extracted is
b = p ~ i s - ( p s n - k 1 + 1 ) - - - ( 17 )
Image recovery scheme is,
p s i = p ~ i s i f 1 &le; i &le; n - k 1 p ~ i s - b i f n - k 1 + 1 &le; i &le; n a n d e ~ max k &Element; { 1 , 2 } p ~ i s - 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k > 2 - - - ( 18 )
Herein, it is the predicated error of maximum value.Clearly, for the pixel embedding information bit, the information bit b utilizing formula [17] to extract is with secondary maximum base p s b-maxbased on weigh, the image intensity value therefore recovered is
p s i = p ~ i s - b = p ~ i s - ( p ~ i s - ( p s n - k 1 + 1 ) ) = p s n - k 1 + 1 - - - ( 19 )
That is, the image intensity value of recovery is completely by secondary maximum base p s b-maxdecide.And with then identify b=0 and b=1 respectively.
When setting out k 2during class block, in the case, the information bit extracted is
b = ( p s k 2 - 1 ) - p ~ i s - - - ( 20 )
Image recovery scheme is,
p s i = p ~ i s i f k 2 + 1 &le; i &le; n p ~ i s + b i f 1 &le; i &le; k 2 a n d e ~ min k &Element; { - 1 , - 2 } p ~ i s + 1 i f 1 &le; i &le; k 2 a n d e ~ min k < - 2 - - - ( 21 )
Herein, it is minimizing predicated error.Clearly, for the pixel embedding information bit, the information bit b utilizing formula [20] to extract is the following minimal basis p s b-maxbased on weigh, the image intensity value therefore recovered is
p s i = p ~ i s + b = p ~ i s + ( ( p s k 2 - 1 ) - p ~ i s ) = p s k 2 - 1 - - - ( 22 )
That is, the image intensity value of recovery is completely by secondary minimum base p s b-mindecide.And with then identify b=0 and b=1 respectively.
When identifying mixing k class block, in the case, i &Element; { 1 , 2 , ... , n } , e ~ m a x k = p ~ n - k 1 + 1 s - p s n - k 1 , e ~ min k = p ~ k 2 s - p s k 2 + 1 , The information bit that equivalent maximum value place extracts is
b 1 = p ~ i s - ( p s n - k 1 + 1 ) - - - ( 23 )
The information bit that equivalent minimal value place extracts is
b 2 = ( p s k 2 - 1 ) - p ~ i s - - - ( 24 )
Image recovery scheme is,
p s i = p ~ i s i f k 2 + 1 &le; i &le; n - k 1 p ~ i s - b 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k &Element; { 1 , 2 } p ~ i s - 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k > 2 p ~ i s + b 2 i f 1 &le; i &le; k 2 a n d e ~ min k &Element; { - 1 , - 2 } p ~ i s + 1 i f 1 &le; i &le; k 2 a n d e ~ min k < - 2 - - - ( 25 )
Herein, with maximum value and minimizing predicated error respectively.Clearly, for the pixel embedding information bit, the information bit b that formula [23] extracts is utilized 1with secondary maximum base p s b-maxbased on weigh, the image intensity value therefore recovered is
p s i = p ~ i s - b = p ~ i s - ( p ~ i s - ( p s n - k 1 + 1 ) ) = p s n - k 1 + 1 - - - ( 26 )
That is, the image intensity value of recovery is completely by secondary maximum base p s b-maxdecide.And with then identify b=0 and b=1 respectively.
Utilize the information bit b that formula [23] extracts 2the following minimal basis p s b-minbased on weigh, the image intensity value therefore recovered is
p s i = p ~ i s + b 2 = p ~ i s + ( ( p s k 2 - 1 ) - p ~ i s ) = p s k 2 - 1 - - - ( 27 )
That is, the image intensity value of recovery is completely by secondary minimum base p s b-mindecide.And with then identify b=0 and b=1 respectively.
The present invention can also implement in the systems such as windows and Linux.The embodiment of the present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, terminal device (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminal equipment to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing terminal equipment produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
This type of computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing terminal equipment, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
This type of computer program instructions also can be loaded on computing machine or other programmable data processing terminal equipment, make to perform sequence of operations step to produce computer implemented process on computing machine or other programmable terminal equipment, thus the instruction performed on computing machine or other programmable terminal equipment is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Although described the preferred embodiment of the embodiment of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of embodiment of the present invention scope.
Finally, also it should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or terminal device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or terminal device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the terminal device comprising described key element and also there is other identical element.
A kind of the synchronous method above embodiment of the present invention provided and synchro system, be described in detail, apply specific case herein to set forth the principle of the embodiment of the present invention and embodiment, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the embodiment of the present invention; Meanwhile, for one of ordinary skill in the art, according to the thought of the embodiment of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the embodiment of the present invention.

Claims (10)

1. a reversible data concealing method, is characterized in that, comprising:
Pre-treatment step, carries out piecemeal by original, pixel domain image and sorts by gray-scale value in block;
Identification of steps, is undertaken the sequence after sequence detecting, identifying and identification characteristics class block;
Embed watermark information step, to feature class block by the second embedding grammar embed watermark information, this second embedding grammar comprises:
Determine secondary maximum value: the secondary maximum value location of pixels in identification characteristics class block is 1, form secondary maximum value location of pixels figure;
Computational prediction difference: the difference calculating maximum value and secondary maximum value in feature class block;
Embed watermark information: when difference equals 1, be then added on multipole value sequence by the binary code of watermark data;
Embed supplementary step, embed corresponding supplementary.
2. reversible data concealing method according to claim 1, is characterized in that, the feature class block in this identification of steps comprises: k 1class block, k 2class block and mixing k class block;
This k 1class block is minimum gray-value pixel quantity is 1, equivalent greatly number of gray values 1<n p-max≤ n-1, wherein k 1=n p-maxand 1<k1≤n-1;
This k 2class block is very big gray-value pixel quantity is 1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 2=n p-minand 1<k2≤n-1;
This mixing k class block is equivalent greatly gray-value pixel quantity 1<n p-max≤ n-1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 1=n p-max, k 2=n p-minand k 1+ k 2≤ n-1.
3. reversible data concealing method according to claim 1 and 2, is characterized in that, the gray-scale value order sequence by size of this block pixel, secondary maximum value is called secondary maximum base p s b-max, respective pixel is called secondary maximum base pixel p b-max; Secondary minimum value is called secondary minimum base p s b-min, respective pixel is called secondary minimum base pixel p b-min.
4. reversible data concealing method according to claim 1, is characterized in that, this embedding supplementary step comprises:
Replace least significant bit (LSB): calculate supplementary length, extract the least significant bit (LSB) of the front and supplementary equal length number pixel of image, and replace by supplementary;
Embed least significant bit (LSB): the least significant bit (LSB) sequence extracted be embedded in the later pixel of the last embedded block of data.
5. reversible data concealing method according to claim 1, is characterized in that, the supplementary in this embedding supplementary step comprises: the location drawing and supplementary mark.
6. a restoration methods for hiding reversible data, is characterized in that, comprising:
Read supplementary step, after receiving the image of embed watermark information, read and obtain complete supplementary, this supplementary comprises the location drawing and supplementary mark;
Pre-treatment step, carries out piecemeal by the image of embed watermark information and sorts by gray-scale value in block;
Identification of steps, is undertaken the sequence after sequence detecting, identifying and identification characteristics class block;
Treatment step, the secondary maximum that decompresses out from location drawing value location of pixels figure, determines each piece of location drawing, identification block type; Determine secondary maximum value pixel: according to the secondary maximum value location of pixels figure decompressed, determine the secondary maximum value pixel of each piece, be called secondary maximum base pixel; Calculate the difference of the large pixel of secondary maximum base grey scale pixel value and secondary maximum base pixel, difference is 1 extraction watermark information 0, and grey scale pixel value is constant; Difference is 2 extraction watermark informations 1, and grey scale pixel value subtracts 1; Difference is greater than 2 marks without embedding information, and grey scale pixel value is constant; From the pixel that the last embedded block of data is later, extract the least significant bit (LSB) sequence of embedding, and be substituted in the pixel that supplementary takies;
Extract watermark information and Recovery image step, duplicate marking step and treatment step, process each block successively and extract watermark information and each maximum pixel gray-scale value in recovery block, obtainoriginal image.
7. restoration methods according to claim 6, is characterized in that, this feature class block comprises: k 1class block, k 2class block and mixing k class block.
8. restoration methods according to claim 7, is characterized in that, this k 1class block is minimum gray-value pixel quantity is 1, equivalent greatly number of gray values 1<n p-max≤ n-1, wherein k 1=n p-maxand 1<k 1≤ n-1;
When identifying k 1during class block, in the case, i ∈ 1,2 ..., n}, the information bit extracted is:
b = p ~ i s - ( p s n - k 1 + 1 ) ,
Image recovery scheme is:
p s i = p ~ i s i f 1 &le; i &le; n - k 1 p ~ i s - b i f n - k 1 + 1 &le; i &le; n a n d e ~ max k &Element; { 1 , 2 } p ~ i s - 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k > 2
The image intensity value recovered is:
p s i = p ~ i s - b = p ~ i s - ( p ~ i s - ( p s n - k 1 + 1 ) ) = p s n - k 1 + 1.
9. restoration methods according to claim 7, is characterized in that, this k 2class block is very big gray-value pixel quantity is 1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 2=n p-minand 1<k 2≤ n-1;
When identifying k 2during class block, in the case, i ∈ 1,2 ..., n}, the information bit extracted is:
b = ( p s k 2 - 1 ) - p ~ i s
Image recovery scheme is:
p s i = p ~ i s i f k 2 + 1 &le; i &le; n p ~ i s + b i f 1 &le; i &le; k 2 a n d e ~ max k &Element; { - 1 , - 2 } p ~ i s + 1 i f 1 &le; i &le; k 2 a n d e ~ min k < - 2
The image intensity value recovered is:
p s i = p ~ i s + b = p ~ i s + ( ( p s k 2 - 1 ) - p ~ i s ) = p s k 2 - 1.
10. restoration methods according to claim 7, is characterized in that, this mixing k class block is equivalent greatly gray-value pixel quantity 1<n p-max≤ n-1, equivalent minimum number of gray values 1<n p-min≤ n-1, wherein k 1=n p-max, k 2=n p-min, and k 1+ k 2≤ n-1;
When identifying mixing k class block, in the case, i ∈ 1,2 ..., n}, e ~ m a x k = p ~ n - k 1 + 1 s - p s n - k 1 , e ~ m i n k = p ~ k 2 s - p s k 2 + 1 , The information bit that equivalent maximum value place extracts is:
b 1 = p ~ i s - ( p s n - k 1 + 1 )
The information bit that equivalent minimal value place extracts is:
b 2 = ( p s k 2 - 1 ) - p ~ i s
Image recovery scheme is:
p s i = p ~ i s i f k 2 + 1 &le; i &le; n - k 1 p ~ i s - b 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k &Element; { 1 , 2 } p ~ i s - 1 i f n - k 1 + 1 &le; i &le; n a n d e ~ max k > 2 p ~ i s + b 2 i f 1 &le; i &le; k 2 a n d e ~ min k &Element; { - 1 , - 2 } p ~ i s + 1 i f 1 &le; i &le; k 2 a n d e ~ min k < - 2
The image intensity value recovered is:
p i s = p ~ i s - b = p ~ i s - ( p ~ i s - ( p s n - k 1 + 1 ) ) = p s n - k 1 + 1.
CN201510778642.9A 2015-11-12 2015-11-12 Reversible data concealing method and restoration methods Expired - Fee Related CN105447808B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510778642.9A CN105447808B (en) 2015-11-12 2015-11-12 Reversible data concealing method and restoration methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510778642.9A CN105447808B (en) 2015-11-12 2015-11-12 Reversible data concealing method and restoration methods

Publications (2)

Publication Number Publication Date
CN105447808A true CN105447808A (en) 2016-03-30
CN105447808B CN105447808B (en) 2019-02-12

Family

ID=55557942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510778642.9A Expired - Fee Related CN105447808B (en) 2015-11-12 2015-11-12 Reversible data concealing method and restoration methods

Country Status (1)

Country Link
CN (1) CN105447808B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427230A (en) * 2015-11-12 2016-03-23 华北电力大学(保定) Reversible data hiding method
CN105447807A (en) * 2015-11-12 2016-03-30 华北电力大学(保定) Reversible data hiding recovering method
CN106803228A (en) * 2016-12-07 2017-06-06 华北电力大学(保定) Based on obtuse angle Forecasting Methodology, system that reversible information is hidden
CN107369186A (en) * 2017-07-17 2017-11-21 西北工业大学 A kind of information concealing method and device
CN108615217A (en) * 2018-03-22 2018-10-02 西安电子科技大学 A kind of robust reversible watermark method of the anti-JPEG compression based on quantization
CN112132734A (en) * 2020-09-25 2020-12-25 中国人民武装警察部队工程大学 Image reversible information hiding method based on multichannel difference value sorting

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008103646A1 (en) * 2007-02-19 2008-08-28 New Jersey Institute Of Technology Apparatus and method for reversible data hiding in jpeg images
CN101389009A (en) * 2007-09-14 2009-03-18 华为技术有限公司 Watermark information embedding, detection method and device
WO2009099914A1 (en) * 2008-02-01 2009-08-13 New Jersey Institute Of Technology System and method for reversible binary image data hiding using run-length histogram modification and logical operations
CN104200424A (en) * 2014-08-29 2014-12-10 陕西师范大学 Difference conversion based (K, N) meaningful image sharing and recovering method
CN105427230A (en) * 2015-11-12 2016-03-23 华北电力大学(保定) Reversible data hiding method
CN105447807A (en) * 2015-11-12 2016-03-30 华北电力大学(保定) Reversible data hiding recovering method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008103646A1 (en) * 2007-02-19 2008-08-28 New Jersey Institute Of Technology Apparatus and method for reversible data hiding in jpeg images
CN101389009A (en) * 2007-09-14 2009-03-18 华为技术有限公司 Watermark information embedding, detection method and device
WO2009099914A1 (en) * 2008-02-01 2009-08-13 New Jersey Institute Of Technology System and method for reversible binary image data hiding using run-length histogram modification and logical operations
CN104200424A (en) * 2014-08-29 2014-12-10 陕西师范大学 Difference conversion based (K, N) meaningful image sharing and recovering method
CN105427230A (en) * 2015-11-12 2016-03-23 华北电力大学(保定) Reversible data hiding method
CN105447807A (en) * 2015-11-12 2016-03-30 华北电力大学(保定) Reversible data hiding recovering method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
孙鸿睿,等: "改进的差值扩张和平移矢量地图可逆水印算法", 《武汉大学学报 信息科学版》 *
马啸飞: "可逆信息隐藏及其在医学图像中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105427230A (en) * 2015-11-12 2016-03-23 华北电力大学(保定) Reversible data hiding method
CN105447807A (en) * 2015-11-12 2016-03-30 华北电力大学(保定) Reversible data hiding recovering method
CN105427230B (en) * 2015-11-12 2019-01-15 华北电力大学(保定) Reversible data concealing method
CN106803228A (en) * 2016-12-07 2017-06-06 华北电力大学(保定) Based on obtuse angle Forecasting Methodology, system that reversible information is hidden
CN106803228B (en) * 2016-12-07 2020-07-31 华北电力大学(保定) Obtuse angle prediction method and system based on reversible information hiding
CN107369186A (en) * 2017-07-17 2017-11-21 西北工业大学 A kind of information concealing method and device
CN107369186B (en) * 2017-07-17 2019-09-20 西北工业大学 A kind of information concealing method and device
CN108615217A (en) * 2018-03-22 2018-10-02 西安电子科技大学 A kind of robust reversible watermark method of the anti-JPEG compression based on quantization
CN108615217B (en) * 2018-03-22 2021-09-10 西安电子科技大学 Quantization-based JPEG compression resistant robust reversible watermarking method
CN112132734A (en) * 2020-09-25 2020-12-25 中国人民武装警察部队工程大学 Image reversible information hiding method based on multichannel difference value sorting
CN112132734B (en) * 2020-09-25 2024-04-26 中国人民武装警察部队工程大学 Image reversible information hiding method based on multi-channel difference sorting

Also Published As

Publication number Publication date
CN105447808B (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN105447808A (en) Reversible data hiding method and recovering method
CN105427230A (en) Reversible data hiding method
Arham et al. Multiple layer data hiding scheme based on difference expansion of quad
EP2916291B1 (en) Method, apparatus and computer program product for disparity map estimation of stereo images
Ye et al. Perceiving and modeling density for image dehazing
He et al. Efficient PVO-based reversible data hiding using multistage blocking and prediction accuracy matrix
CN110490205B (en) Road scene semantic segmentation method based on full-residual-error hole convolutional neural network
GB2523149A (en) Method, apparatus and computer program product for image-driven cost volume aggregation
Laishram et al. A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (BEASS)
Yin et al. Improved reversible image authentication scheme
CN107292315B (en) Steganalysis method and steganalysis device based on multi-scale LTP (low temperature processing) features
Novozámský et al. Detection of copy-move image modification using JPEG compression model
CN113628116B (en) Training method and device for image processing network, computer equipment and storage medium
Lee et al. Overlapping pixel value ordering predictor for high-capacity reversible data hiding
Chuang et al. Joint index coding and reversible data hiding methods for color image quantization
Liao et al. GIFMarking: The robust watermarking for animated GIF based deep learning
EP2991036B1 (en) Method, apparatus and computer program product for disparity estimation of foreground objects in images
Su et al. Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering
Gudavalli et al. Seetheseams: Localized detection of seam carving based image forgery in satellite imagery
CN113780330A (en) Image correction method and device, computer storage medium and electronic equipment
CN105447807A (en) Reversible data hiding recovering method
Lee et al. Reversible data hiding using a piecewise autoregressive predictor based on two-stage embedding
CN113382126B (en) Image reversible information hiding method and system based on attention guidance
CN110533569A (en) Watermark handling method based on secondary difference expansion
Zheng et al. Joint residual pyramid for joint image super-resolution

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190212

Termination date: 20211112