CN106251278B - A kind of image encryption domain reversible information hidden method based on histogram feature - Google Patents
A kind of image encryption domain reversible information hidden method based on histogram feature Download PDFInfo
- Publication number
- CN106251278B CN106251278B CN201610602261.XA CN201610602261A CN106251278B CN 106251278 B CN106251278 B CN 106251278B CN 201610602261 A CN201610602261 A CN 201610602261A CN 106251278 B CN106251278 B CN 106251278B
- Authority
- CN
- China
- Prior art keywords
- image
- information
- encryption
- pixel value
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0203—Image watermarking whereby the image with embedded watermark is reverted to the original condition before embedding, e.g. lossless, distortion-free or invertible watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
- Facsimile Image Signal Circuits (AREA)
- Image Analysis (AREA)
Abstract
The present invention provides a kind of image encryption domain reversible information hidden method based on histogram feature, belongs to digital image encryption and Information hiding field.The present invention includes: the image owner by generating ciphertext image to image pixel positions scrambling encryption and pixel value encryption, then encryption key, ciphertext image block size are issued image recipient, while ciphertext image and its piecemeal size is issued Information hiding person;Information hiding person randomly chooses block image embedding information, generates the ciphertext image of carrying information, embedded key, the ciphertext image containing information and piecemeal size is then issued information receiver, while the ciphertext image containing information is issued image recipient;Information receiver extracts information according to embedded key;Image recipient is according to encryption key decryption and restores image.The invention has the benefit that algorithm is simple, effective, information can be extracted completely and restores original image completely;Information extraction, image decryption and recovery process are completely independent.
Description
Technical field
The present invention relates to digital image encryptions and Information hiding field more particularly to a kind of image based on histogram feature
Encrypted domain reversible information hidden method.
Background technique
Information hiding and data encryption are two big common technologies of information security.Information hiding is exactly the feeling using people
Secret information (such as data, writings and image information) is embedded into open biography to the visual redundancy characteristic of Digital Media by organ
In defeated Digital Media (such as image, video and audio), but it is not easy to be discovered by the vision of people, auditory system, to reach
Utilize the disclosed purpose for carrying close media transmission secret information.Here data encryption is to convert Digital Media to not in plain text
Intelligible ciphertext, so that the content to Digital Media is protected.Due to the insertion of information, cause carrier image more or less
There is distortion in ground, but in certain particular applications such as military, medical treatment and judicial domain, does not allow similar situation but,
Then, reversible information concealing technology comes into being.Reversible information is hidden in can be lossless after carrying close image taking-up secret information
Restore initial carrier image.With the increasingly intensification to personal privacy protection idea, individual digital image and scientific research number
The security needs such as word image, national security digital picture and court's evidence obtaining digital picture, at this moment add these digital pictures
It is close to become abnormal important.Have increasing need for third party now directly encrypted image data can be managed, this just need to
Management information is added in encrypted image.If store arrive long-range cloud encrypted image, need to image classification, the information of owner,
Copyright information and other relevant informations etc..Information insertion person is exactly a unauthorized third parties, he does not allow to know host
Clear content, so cannot also obtain the feature under host's plaintext state.For example, image is encrypted in medical image
For protecting the privacy of patient.But the third party (system manager, office worker, nurse etc.) for being responsible for managing these pictures answers
This can directly be embedded in additional information in ciphertext image, and at this moment third party does not both need to decrypt as data insertion person
Image also requires no knowledge about the feature under image plaintext state.For another example, in the application of cloud computing, user is on Cloud Server
The image data of storage needs secret protection, so first to encrypt, at this moment, some classification letters is embedded in the image of these encryptions
Breath, copyright information, data serch information or any other relevant information task just need by cloud computing service supplier not
The case where ciphertext data, gets off completion.When being just desirable to keep the integrality of encrypted image there are also a kind of application, encryption figure is calculated
The cryptographic Hash of picture is simultaneously directly embedded into encrypted image.Alternatively, cyclic redundancy check code (CRC) or other error correction informations can also
To be embedded in into.Then, encrypted domain reversible information concealing technology becomes research in recent years hot spot.
Existing scholar proposes some about the reversible steganography scheme of ciphertext domain at present, but there is lack using upper for these schemes
It falls into or insufficient.2011, Zhang [1] proposed to become based on the reversible steganographic algorithm of ciphertext domain of exclusive or encryption and pixel interdependence
The representational method in one, ciphertext domain Information hiding field, but the image of the algorithm restores and information extraction is united based on probability
(pixel interdependence is a statistical property) of meter characteristic, the correctness degree and piecemeal size of image recovery extent and information extraction
It is related, and there is always certain image fault degree and information extraction error rates.2012, Hong et al. [2] considered between image block
Boundary information improve Zhang algorithm, make image restore and information extraction accuracy further increase.2013, Liu Shangyi
Et al. [3] propose that encrypted domain hiding reversible data innovatory algorithm classify based on image block correlation, image restore to mention with information
Accuracy is taken further to improve.2014, the innovatory algorithm that Li et al. people [4] proposes be a kind of cancellations piecemeal operate and with random
It spreads to substitute and obtain the promotion of correlation statistics performance, and improve precision of prediction with accurate prediction technique, to make image
Restore and information extraction accuracy further improves.2012, Zhang [5] proposed a kind of separable ciphertext image latent writing
Scheme, information extraction and image, which restore two operations, to be individually performed, non-interference, but its image restores with information extraction also
It is fully established on this statistical nature of image pixel correlation, so its invertibity still cannot as document [1-4]
Guarantee.Document [6]-[8] are to carry out pretreated method to image before a kind of encryption, i.e., compress image portion score before encryption
According to vacating space is left information insertion for and used.Document [9] is that a kind of scramble image encryption domain using histogram translation is reversible hidden
Write method, document [10] are a kind of reversible steganographic algorithms of ciphertext domain based on the translation of pixel value difference histogram.
In these algorithms, document [1]-[4] image decryption and information extraction sequence be it is fixed, i.e., first decrypt and extract afterwards
Information, information owner must be also image information owner;Document [6]-[10] algorithm is in image decryption and information extraction
It is separable, and be completely reversibility.But document [1]-[5], [7]-[10] algorithm in, image restore when, all need
It to be operated by information extraction and image decryption, it is easy to obtain image information from operating process and secret information, image are extensive
Multiple person must be image information and secret information owner simultaneously, limit the popularity of application.
Bibliography:
[1]X.Zhang.Reversible data hiding in encrypted image[J].IEEE Signal
Processing Letters,2011,18(4):255-258.
[2]W.Hong,T.Chen,H.Wu.An improved reversible data hiding in encrypted
images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.
[3] Liu Shangyi, Huo Yongjin, Luo Xinrong, the encrypted domain hiding reversible data for waiting to classify based on image block correlation
[J] Wuhan University Journal (Edition), 2013,5 (10): 486-490.
[4]Ming Li,Di Xiao,ZhongxianPeng,Hai Nan,A modified reversible data
hiding in encrypted images using random diffusion and accurate prediction,
ETRI Journal,2014,36(2):325-328.
[5]X.Zhang.Separable reversible data hiding in encrypted image[J]
.IEEE Transactions on Information Forensics and Security,2012,7(2):826-832.
[6]K.Ma,W.Zhang,X.Zhao,et al.Reversible data hiding in encrypted
images by reserving room before encryption[J].IEEE Transactions on
Information Forensics and Security,2013,8(3):553-562.
[7]W.Zhang,K.Ma,N.Yu.Reversibility improved data hiding in encrypted
images[J].Signal Processing,2014,94:118-127.
[8] Han Xiyu, Qian Zhenxing, Zhang Xinpeng, the reversible information in encrypted image for waiting to send on demand hide [J] application
Scientific journal, 2015,33 (1): 50-58.
[9] reversible information hidden algorithm [J] computer engineering and application in Zheng Hongying, Gao Zhen, Xiao Di ciphertext image,
2014,50 (7): 186-18.
[10] ciphertext reversible water mark algorithm [J] computer that Xiao Di, Du She, Zheng Hongying are translated based on difference domain histogram
Application study, 2014,31 (12): 3668-3672.
Summary of the invention
To solve the problems of the prior art, the present invention provides a kind of reversible letter in image encryption domain based on histogram feature
Hidden method is ceased, using pixel permutation encrypted image histogram feature different from pixel value encrypted image come hiding information, originally
Inventive method flow diagram is as shown in Figure 1.
The present invention includes the following steps: (1) image owner to image encryption step: the image owner passes through encryption first
Key pair original image pixels position carries out scrambling encryption, then carries out pixel value to the low level of certain digit of each pixel value
Encryption generates ciphertext image;According to image histogram feature be determined to distinguish the certain digit of block image pixel value a high position with
The minimum piecemeal size of low level different characteristic;Finally encryption key, differentiating method and minimum piecemeal size are sent to image and connect
Ciphertext image, differentiating method and minimum piecemeal size are sent to Information hiding person by receipts person;
(2) Information hiding person's embedding information step: Information hiding person according to minimum piecemeal size to ciphertext image block, with
Machine selection block, the high position and low level of the certain digit of block image pixel value are exchanged according to differentiating method, information 0 or 1, and generation is loaded with letter
Then embedded key, the ciphertext image containing information, differentiating method and minimum piecemeal size are sent to letter by the ciphertext image of breath
Recipient is ceased, while the ciphertext image containing information is sent to image recipient;
(3) information receiver extracts information Step: information receiver is according to embedded key, minimum piecemeal size, differentiation side
The image histogram characteristic value of method, a high position for the certain digit of block image pixel value and low level from the ciphertext image containing information into
Row information is extracted, and then extracts secret information;
(4) image recipient decryption and restore image step: image recipient according to encryption key, minimum piecemeal size,
The image histogram characteristic value of differentiating method, a high position for the certain digit of block image pixel value and low level is to the ciphertext graph containing information
Decrypted image is obtained as carrying out image decryption, image recovery operation and image decryption operation are consistent, and decrypted image is original graph
Picture.
Information embedding theory of the invention and method are totally different from existing algorithm, and algorithm is simple, effective.According to existing
Resume image, resume image of the invention be it is safe, information embedded quantity than document [1]-[5] be representative steganography
Algorithm is at least higher by 14-28 times, and meet that the information extraction of recipient, image decryption and image restore simultaneously is completely independent
The completely reversibility of property, steganography encrypted image, will effectively meet more practical applications.
The present invention is further improved, and in step (1), extracts low four progress pixel value encryption of image pixel value;
The minimum piecemeal size is to be determined to distinguish block image pixel value high four and low four according to image histogram feature
The minimum piecemeal size of different characteristic.It is high due to the main feature of the Gao Siwei representative image of pixel value, low four similar noises
Four histogram features for also just having an original image or scrambling encryption image, low four histograms for having a pixel value encrypted image
Feature.
The present invention is further improved, and in step (1), the scrambling encryption method of image pixel positions is as follows:
A1: the size of original image A is set as m × n, m × n is generated by encryption key and obeys not repeating at random for [1, m × n]
Sequence S1, m × n obey [0,15] random sequence S2;
A2: picture element matrix A is transformed to one-dimension array Pt (1:m × n), transformation for mula are as follows: P by raster scan ordert
((i-1) n+j)=A (i, j), wherein i=1,2,3 ..., m, j=1,2,3 ..., n;
A3: random sequence S is pressed1Sequential value array Pt (1:m × n) is transformed to new array P, transformation for mula are as follows: P one by one
(i)=Pt(S1(i)), wherein i=1,2,3 ..., m × n;
The pixel value encryption method are as follows: use random sequence S2To low four of the pixel value of the encrypted image of scramble into
Row encryption, encrypts formula are as follows:Wherein, i=1,2,3 ..., m × n then will by raster scan order
The picture element matrix B of C (i) reconstruct generates encrypted image file.
The present invention is further improved, in step (2), according to information 0 or 1 exchange block image pixel value Gao Siwei and
Low four.
The present invention is further improved, and the Gao Siwei of the block image pixel value after encryption, after Information hiding and low four are
Scrambling encryption or pixel value encryption, are to judge to distinguish according to respective histogram feature.
The present invention is further improved, and according to histogram feature, the judgement differentiating method of use includes comentropy, pixel value
Very poor and pixel value frequency.
The present invention is further improved, in step (2), information embedding method are as follows: if information is 0, high four are to set
Disorderly encryption, low four encrypt for pixel value;If information is 1, high four encrypt for pixel value, and low four are scrambling encryption;It is embedding
The method for entering information includes the following steps:
B1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in
Key generates the u × v not repeating random number sequence R for obeying [1, u × v];
B2: according to information and sequence R sequence, one block of image is randomly choosed, judges current block image slices according to differentiating method
The Gao Siwei of plain value is scrambling encryption or pixel value encryption, if it is scrambling encryption that information, which is 0, Gao Siwei, low four are picture
Element is worth encryption, and Gao Siwei and low four do not change;Otherwise, Gao Siwei and low four exchanges;If information is 1, on the contrary;
B3: executing step B2 repeatedly, until information insertion finishes.
The present invention is further improved, and in step (3), the method for extracting information includes the following steps:
C1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in
Key generates the u × v not repeating random number sequence R for obeying [1, u × v];
C2: according to sequence R sequence, randomly choosing one block of image, judges current block image pixel value according to differentiating method
Gao Siwei is scrambling encryption or pixel value encryption, if Gao Siwei is scrambling encryption, low four encrypt for pixel value, then believing
Breath is 0;Conversely, information is 1;
C3: executing step C2 repeatedly, until information extraction finishes.
The present invention is further improved, and in step (4), decryption and the method for restoring image include the following steps:
D1: according to the image minimum piecemeal size h × w determined in step (1), h × w block is divided the image into;
D2: pressing raster scan order selection block, judges that the Gao Siwei of current block image pixel value is to set according to differentiating method
Disorderly encryption or pixel value encryption, if Gao Siwei is pixel value encryption, the Gao Siwei of block image and low four transpositions;
D3: executing step D2 repeatedly, until high four bit recovery of the pixel value of all blocks of images is in situ;
D4: according to encryption key, by the process of encrypted image inversely by low four pixel values decryption of image, location of pixels
Unrest is inverted, obtains original image completely.
The present invention is further improved, and in step (3) and step (4), the information receiver and image recipient are
The people of same permission or the people of different rights.Information extraction, image decryption and the recovery process of recipient is not completely independent, mutually not
Interference.
Compared with prior art, the beneficial effects of the present invention are: algorithm is simple, effectively, information and complete can be extracted completely
It is complete to restore original image;Information extraction, image decryption and recovery process are completely independent, are non-interference, to solve information extraction
The problems such as information extraction key and image decryption keys must be possessed with the permanent order of image decryption, image recuperator, make to calculate
Method has better application and bigger application range;Improve the hiding insertion of the encrypted domain reversible information based on block image
Rate.
Detailed description of the invention
Fig. 1 is the method for the present invention flow diagram;
Fig. 2 is theoretical foundation of the present invention --- the histogram feature of original image, scrambling encryption image;
Fig. 3 is theoretical foundation of the present invention --- the histogram feature of pixel value encrypted image;
Fig. 4 is lena original image;
Fig. 5 is Fig. 4 encrypted image effect picture;
Fig. 6 is the high four bit images histogram of pixel value of Lena encrypted image;
Fig. 7 is the low four bit images histogram of pixel value of Lena encrypted image.
Specific embodiment
The present invention is described in further details with reference to the accompanying drawings and examples.
This example is that histogram feature based on image carries out image encryption and Information hiding, wherein it is of the invention it is specific according to
According to as follows:
Image encryption usually has image pixel positions scramble, pixel value encryption, and scramble and pixel value encryption three simultaneously
Kind mode.Scrambling encryption and pixel value encryption have similarly can not recognition effect, but the pixel value histogram of scrambling encryption image
Figure is consistent with original plaintext image, and the pixel value histogram of pixel value encrypted image is then uniformly distributed in pixel value range.Such as
The pixel value histogram of the original image of Lena image shown in Fig. 2 is consistent with the histogram of its scrambling encryption image;It is shown in Fig. 3
The histogram of the pixel value encrypted image of Lena image is uniformly distributed in pixel value range.Image block encryption also has same histogram
Figure feature.
By Fig. 2 and Fig. 3 it is found that piece image encryption or image block encryption be scrambling encryption or pixel value encryption be can be with
It is distinguished by histogram feature, but since histogram feature is statistical characteristics, it is necessary to have sufficiently large image block ability
It is correct to distinguish.Scrambling encryption and pixel value encryption two image block assembled arrangements can representative information 0 and 1, here it is this hairs
Bright theoretical foundation.
Wherein, according to fig. 2 with histogram feature shown in Fig. 3, this example can with comentropy, pixel value is very poor and pixel value
The encryption that frequency distinguishes original image to measure judgement is scrambling encryption or pixel value encryption.
(1) comentropy
Comentropy can measure out the distribution situation of gray value (pixel value) in image or image block, and intensity profile is more equal
Even, image information entropy is bigger, otherwise comentropy is smaller.The calculation expression of comentropy are as follows:
In formula, x is stochastic variable, p (xi) it is xiThe probability of appearance, x indicates the pixel value of image herein.By comentropy
Feature and Fig. 2 and histogram feature shown in Fig. 3 are it is found that the comentropy of pixel value encrypted image is greater than scrambling encryption image
Comentropy.
(2) pixel value frequency
Pixel value frequency refers to the frequency that certain pixel value occurs in image or image block, by Fig. 2 and histogram shown in Fig. 3
Figure feature is it is found that the pixel value frequency of pixel value encrypted image is less than the pixel value frequency of pixel permutation encrypted image.
(3) pixel value is very poor
The very poor difference for referring to the max pixel value in image or image block and minimum pixel value of pixel value, pixel value are very poor fixed
Justice are as follows: d=pixmax-pixmin, in formula, pixmaxAnd pixminRespectively max pixel value and minimum pixel value.By Fig. 2 and Fig. 3
Shown in histogram feature it is found that when there is minimum pixel value and max pixel value simultaneously in scramble image or image block, pixel
The very poor pixel value equal to pixel permutation encrypted image of pixel value for being worth encrypted image is very poor, can not use very poor judgement image at this time
It is scrambling encryption or pixel value encryption;When minimum pixel value and max pixel value do not occur simultaneously in scramble image or image block
When, the very poor pixel value greater than pixel permutation encrypted image of the pixel value of pixel value encrypted image is very poor.
As shown in Figure 1, as an embodiment of the present invention, the method for the present invention includes the following steps: (1) image owner
To image encryption step: the image owner passes through encryption key first and carries out scrambling encryption to original image pixels position, then
To the low level of certain digit of each pixel value, for example two to four can be selected not carry out pixel value encryption not etc., generate ciphertext
Image;It is determined to distinguish a high position for the certain digit of block image pixel value and low level different characteristic according to image histogram feature
Minimum piecemeal size, using this minimum piecemeal size as the ciphertext image block size of further encryption and Information hiding.Finally
Encryption key, differentiating method and minimum piecemeal size are sent to image recipient, ciphertext image, differentiating method and minimum point
Block size is sent to Information hiding person;
(2) Information hiding person's embedding information step: Information hiding person is according to image minimum piecemeal size to ciphertext image point
Block randomly chooses block, and the high position and low level of the certain digit of block image pixel value are exchanged according to information 0 or 1, generates carrying information
Then ciphertext image is sent to embedded key, the ciphertext image containing information, differentiating method and minimum piecemeal size information and connects
Receipts person, while the ciphertext image containing information is sent to image recipient;
(3) information receiver extracts information Step: information receiver is according to embedded key, the certain digit of block image pixel value
A high position and the image histogram characteristic value of low level carry out information extraction, and then extract secret information;
(4) image recipient decryption and recovery image step: image recipient is according to encryption key, block image pixel value one
A high position for positioning number and the image histogram characteristic value of low level carry out image decryption and obtain decrypted image, image recovery operation and figure
Picture decryption oprerations are consistent, and decrypted image is original image.
The present invention can well solve three problems existing for existing algorithm:
(1) algorithm recipient can restore original image and completely correct extraction information completely.
(2) information extraction of algorithm recipient, image decryption and recovery process are completely independent, are non-interference, to solve
The permanent order of information extraction and image decryption, image recuperator must possess information extraction key and image decryption keys etc. and ask
Topic makes algorithm have better application and bigger application range.
(3) the hiding insertion rate of the encrypted domain reversible information based on block image is improved.
As an embodiment of the present invention, due to the main feature of the Gao Siwei representative image of pixel value, low four classes
It is noise-like, Gao Siwei also just have the histogram feature of original image or scrambling encryption image, low four have pixel value encryption figure
The histogram feature of picture.Low four progress pixel value encryption in step (1), to image pixel value;The minimum piecemeal is big
The small minimum piecemeal size to be determined to distinguish block image pixel value high four and low four according to image histogram feature.Cause
This, in step (1), the present embodiment to the information concealing method of image encryption also referred to as four steganographic algorithms of height, specifically: adopt
Capture element scrambling encryption image, low four are made pixel value encryption, four exchange representative informations 0 or 1 of height of image block.
The specific implementation steps are as follows for the present embodiment:
(1) the image encryption step of the image owner
The scrambling encryption method of image pixel positions is as follows:
A1: the size of original image A is set as m × n, m × n is generated by encryption key and obeys not repeating at random for [1, m × n]
Sequence S1, m × n obey [0,15] random sequence S2;
A2: picture element matrix A is transformed to one-dimension array Pt (1:m × n), transformation for mula are as follows: P by raster scan ordert
((i-1) n+j)=A (i, j), wherein i=1,2,3 ..., m, j=1,2,3 ..., n;
A3: random sequence S is pressed1Sequential value array Pt (1:m × n) is transformed to new array P, transformation for mula are as follows: P one by one
(i)=Pt(S1(i)), wherein i=1,2,3 ..., m × n;
The pixel value encryption method are as follows:
With random sequence S2Low four of the pixel value of the encrypted image of scramble are encrypted, formula is encrypted are as follows:Wherein, i=1,2,3 ..., m × n, then, the picture element matrix for reconstructing C (i) by raster scan order
B generates encrypted image file.
Encrypted image piecemeal:
This example is hidden using the difference of pixel permutation encrypted image and the histogram feature of pixel value encrypted image
The basis of information, and histogram feature is based on statistical nature, the otherness of these statistical natures needs certain statistic
It could correctly embody.Therefore, the size that the image block of hiding information is determined according to histogram feature is needed.Method is to make all sub-blocks
The Gao Siwei histogram feature of image can be distinguished correctly with low four histogram features, i.e., piecemeal size makes all sub-images all
Meet one of the following conditions: Gao Siwei comentropy is less than the max pixel value frequency of low four comentropies or Gao Siwei greater than low
The pixel value of four max pixel value frequency or Gao Siwei is very poor, and to be less than low four pixel values very poor.
The minimum image piecemeal example of three kinds of judgment methods is as shown in table 1, and it is abundant that this table only lists representative gray level
Lena, peppers, airplane, baboon, lake and bridge standard testing image and gray level it is relatively simple
Cartoon image cartoon and grid image gird, the size of these images are 512 × 512.Due to bridge, cartoon and
Gird is with the presence of the Gao Siwei minimum pixel value and max pixel value of block image, therefore the minimum piecemeal of very poor method is without feasible
Solution.
Table 1
Piece image steganography can only select one to judge that differentiating method determines the smallest image block size, then with determination
Image minimum piecemeal size come to image carry out piecemeal, in order to make encrypted image with after embedding information encrypted image holding phase
Same histogram feature, four random transpositions of height of block image after piecemeal size determines.
(2) Information hiding person's embedding information step:
The information embedding method of this example are as follows: if information is 0, high four are scrambling encryption, and low four encrypt for pixel value;
If information is 1, high four encrypt for pixel value, and low four are scrambling encryption.The embedding information method includes the following steps:
B1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in
Key generates the u × v not repeating random number sequence R for obeying [1, u × v].
B2: according to information and sequence R sequence, one block of image is randomly choosed, judges the Gao Siwei of current block image pixel value
It is scrambling encryption or pixel value encryption, if it is scrambling encryption that information, which is 0, Gao Siwei, low four encrypt for pixel value, Gao Si
Position does not change with low four;Otherwise, Gao Siwei and low four exchanges.If information is 1, on the contrary.
B3: executing step B2 repeatedly, until information insertion finishes.
(3) method that information receiver extracts information includes the following steps:
C1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in
Key generates the u × v not repeating random number sequence R for obeying [1, u × v];
C2: according to sequence R sequence, one block of image is randomly choosed, judges that the Gao Siwei of current block image pixel value is scramble
Encryption or pixel value encryption, if Gao Siwei is scrambling encryption, low four encrypt for pixel value, then information is 0;Conversely,
Information is 1;
C3: executing step C2 repeatedly, until information extraction finishes.
(4) method of image recipient decryption and recovery image, includes the following steps:
D1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into;
D2: raster scan order selection block is pressed, judges that the pixel value Gao Siwei of current block image is scrambling encryption or picture
Element value encryption, if Gao Siwei is pixel value encryption, the Gao Siwei of block of pixels and low four transpositions;
D3: executing step D2 repeatedly, until high four bit recovery of the pixel value of all blocks of images is in situ;
D4: according to encryption key, by the process of encrypted image inversely by low four pixel values decryption of image, location of pixels
Unrest is inverted, obtains original image completely.
In step (3) and step (4), the people or difference of the information receiver and image recipient for same permission
The people of permission.Information extraction, image decryption and the recovery process of recipient is completely independent, is non-interference.Information extraction, image solution
It is close and restore permission be completely independent, i.e., regardless of sequence, be not required to possess two or more permissions.
Specifically, as shown in Figure 4-Figure 7, by taking lena image as an example, size m × n of the original image lena of the present embodiment
It is 512 × 512, secret information is random binary information.Lena original image and lena ciphertext image effect picture are respectively such as Fig. 4
With shown in Fig. 5.The Gao Siwei pixel value of Lena image Gao Siwei scrambling encryption and the low encrypted ciphertext image of four pixel values
Histogram and low four pixel value histograms difference are as shown in Figure 6 and Figure 7.Determine that the smallest piecemeal is big with pixel value range method
It is small, therefore ciphertext block size h × w is the ciphertext minimum piecemeal size 6 × 7 determining with the very poor judgement of pixel value, ciphertext block u
× v is 85 × 73.From carry ciphertext image zooming-out binary message and insertion when binary system random information it is completely the same, solution
Close image and recovery image and original image are completely the same.
Information embedding theory of the invention and method are totally different from existing algorithm, and algorithm is simple, effective.According to existing
Resume image, Encryption Algorithm of the invention be it is safe, information embedded quantity than document [1]-[5] be represent steganographic algorithm extremely
It is higher by 14-28 times less, and meets the information extraction of recipient, the complete independence of image decryption and image recovery, extraction simultaneously
The completely reversibility of the total correctness of information, steganography encrypted image, will effectively meet more practical applications.
The specific embodiment of the above is better embodiment of the invention, is not limited with this of the invention specific
Practical range, the scope of the present invention includes being not limited to present embodiment, all equal according to equivalence changes made by the present invention
Within the scope of the present invention, i.e., it is hidden according to the different histogram features of scrambling encryption image and pixel value encrypted image
The method of information is within the scope of the invention.For example, block Digital Image Scrambling and pixel value encryption respectively indicate information 0
With 1 or 1 and 0, the different histogram features for being also based on scrambling encryption image and pixel value encrypted image carry out hiding information,
Within the scope of the present invention.
Claims (10)
1. a kind of image encryption domain reversible information hidden method based on histogram feature, utilizes pixel permutation encrypted image and picture
The different histogram features of plain value encrypted image carry out hiding information, it is characterised in that include the following steps:
(1) the image owner is to image encryption step: the image owner passes through encryption key to original image pixels position first
Scrambling encryption is carried out, pixel value encryption then is carried out to the low level of certain digit of each pixel value, generates ciphertext image;According to
Image histogram feature is determined to distinguish the minimum piecemeal of the high position and low level different characteristic of the certain digit of block image pixel value
Size;Encryption key, differentiating method and minimum piecemeal size are finally sent to image recipient, ciphertext image, differentiation side
Method and minimum piecemeal size are sent to Information hiding person;
(2) Information hiding person's embedding information step: Information hiding person is according to minimum piecemeal size to ciphertext image block, random choosing
Block is selected, the high position and low level of the certain digit of block image pixel value are exchanged according to information 0 or 1, generates the ciphertext image of carrying information,
Then embedded key, the ciphertext image containing information, differentiating method and minimum piecemeal size are sent to information receiver, simultaneously
Ciphertext image containing information is sent to image recipient;
(3) information receiver extracts information Step: information receiver is according to embedded key, the height of the certain digit of block image pixel value
The image histogram characteristic value of position and low level carries out information extraction, and then extracts secret information;
(4) image recipient decryption and recovery image step: image recipient positions according to encryption key, block image pixel value one
The image histogram characteristic value of several a high position and low level carries out image decryption and obtains decrypted image.
2. image encryption domain reversible information hidden method according to claim 1, it is characterised in that: in step (1), mention
Take low four progress pixel value encryption of image pixel value;The minimum piecemeal size is to determine energy according to image histogram feature
Enough distinguish block image pixel value high four and low four minimum piecemeal sizes.
3. image encryption domain reversible information hidden method according to claim 2, it is characterised in that: in step (1), figure
As the scrambling encryption method of location of pixels is as follows:
A1: the size of original image A is set as m × n-pixel, m × n is generated by encryption key and obeys not repeating at random for [1, m × n]
Sequence S1, m × n obey [0,15] random sequence S2;
A2: picture element matrix A is transformed to one-dimension array P by raster scan ordert(1:m × n), transformation for mula are as follows:
Pt((i-1) n+j)=A (i, j), wherein i=1,2,3 ..., m, j=1,2,3 ..., n;
A3: random sequence S is pressed1Sequential value one by one array Pt(1:m × n) transforms to new array P, transformation for mula are as follows:
P (i)=Pt(S1(i)), wherein i=1,2,3 ..., m × n;
The pixel value encryption method are as follows: use random sequence S2Low four of the pixel value of the encrypted image of scramble are added
It is close, encrypt formula are as follows:Wherein, i=1,2,3 ..., m × n, then, by raster scan order by C (i)
The picture element matrix B of reconstruct generates encrypted image file.
4. image encryption domain reversible information hidden method according to claim 2, it is characterised in that: in step (2), according to
It is believed that 0 or 1 exchange block image pixel value high four and low four of breath.
5. image encryption domain reversible information hidden method according to claim 4, it is characterised in that: after encryption, information it is hidden
The Gao Siwei of block image pixel value behind hiding and it is low four be scrambling encryption or pixel value encryption, be according to respective histogram
Feature judgement is distinguished.
6. image encryption domain reversible information hidden method according to claim 5, it is characterised in that: according to histogram spy
Sign, the judgement differentiating method of use include that comentropy, pixel value be very poor and pixel value frequency.
7. image encryption domain reversible information hidden method according to claim 6, it is characterised in that: in step (2), letter
Cease embedding method are as follows: if information is 0, high four are scrambling encryption, and low four encrypt for pixel value;If information is 1, Gao Si
Position is that pixel value encrypts, and low four are scrambling encryption;The method of embedding information includes the following steps:
B1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into, is produced by embedded key
Raw u × v is obeyed the not repeating random number sequence R of [1, u × v];
B2: according to information and sequence R sequence, one block of image is randomly choosed, judges that the Gao Siwei of current block image pixel value is to set
Disorderly encryption or pixel value encryption, if information be 0, Gao Siwei be scrambling encryption, low four for pixel value encrypt, Gao Siwei and
Low four do not change;Otherwise, Gao Siwei and low four exchanges;If information is 1, on the contrary;
B3: executing step B2 repeatedly, until information insertion finishes.
8. image encryption domain reversible information hidden method according to claim 6, it is characterised in that: in step (3), mention
The method of breath of winning the confidence includes the following steps:
C1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into, is produced by embedded key
Raw u × v is obeyed the not repeating random number sequence R of [1, u × v];
C2: according to sequence R sequence, one block of image is randomly choosed, judges that the Gao Siwei of current block image pixel value is scrambling encryption
Or pixel value encryption, if Gao Siwei is scrambling encryption, low four encrypt for pixel value, then information is 0;
Conversely, information is 1;
C3: executing step C2 repeatedly, until information extraction finishes.
9. image encryption domain reversible information hidden method according to claim 6, it is characterised in that: in step (4), solution
Method that is close and restoring image includes the following steps:
D1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into;
D2: raster scan order selection block image is pressed, judges that the pixel value Gao Siwei of current block image is scrambling encryption or picture
Element value encryption, if Gao Siwei is pixel value encryption, the Gao Siwei of block of pixels and low four transpositions;
D3: executing step D2 repeatedly, until all pieces of high four bit recovery of pixel value is in situ;
D4: according to encryption key, inversely low four pixel values decryption of image, location of pixels are inverted by the process of encrypted image
Disorderly, original image is obtained completely.
10. image encryption domain reversible information hidden method according to claim 1, it is characterised in that: in step (3) and step
Suddenly in (4), the information receiver and image recipient are the people of same permission or the people of different rights.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610602261.XA CN106251278B (en) | 2016-07-27 | 2016-07-27 | A kind of image encryption domain reversible information hidden method based on histogram feature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610602261.XA CN106251278B (en) | 2016-07-27 | 2016-07-27 | A kind of image encryption domain reversible information hidden method based on histogram feature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106251278A CN106251278A (en) | 2016-12-21 |
CN106251278B true CN106251278B (en) | 2019-06-21 |
Family
ID=57604040
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610602261.XA Expired - Fee Related CN106251278B (en) | 2016-07-27 | 2016-07-27 | A kind of image encryption domain reversible information hidden method based on histogram feature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106251278B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106875323B (en) * | 2017-01-18 | 2020-08-18 | 中国人民武装警察部队工程大学 | Information hiding method and device based on image encryption |
CN106941402B (en) * | 2017-04-01 | 2020-07-10 | 中国人民武装警察部队工程大学 | Homomorphic ciphertext domain reversible hiding method |
CN107103631B (en) * | 2017-04-17 | 2019-06-21 | 西南交通大学 | Encrypted domain reversible information hidden method based on classification scramble and hiding information classification |
CN107809644B (en) * | 2017-10-26 | 2019-08-20 | 宁波工程学院 | A kind of encryption area image reversible data concealing method of double-encryption |
CN109756459B (en) * | 2017-11-06 | 2022-03-29 | 阿里巴巴集团控股有限公司 | Data processing method, data identification method, data processing device, data identification device, and data processing medium |
CN108334593B (en) * | 2018-01-30 | 2022-01-28 | 西安电子科技大学 | Secure ciphertext image duplicate removal method in cloud environment and cloud server |
CN108566500B (en) * | 2018-03-02 | 2021-02-26 | 西南交通大学 | Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism |
CN108447492B (en) * | 2018-03-13 | 2021-08-20 | 中山大学 | Self-adaptive histogram translation reversible information hiding method based on segmentation |
CN110827187B (en) * | 2018-08-13 | 2023-10-31 | 厦门雅迅网络股份有限公司 | Information steganography and recovery method |
CN109617682B (en) * | 2018-12-12 | 2020-11-13 | 北京邮电大学 | Ciphertext domain reversible information hiding method based on histogram left-right shifting |
CN109547797B (en) * | 2019-01-02 | 2021-02-05 | 太原科技大学 | Separable encryption domain information hiding method |
CN110136046A (en) * | 2019-05-20 | 2019-08-16 | 李小平 | Two image scramblings with thresholding hide and the method for reconstruct |
CN110502646A (en) * | 2019-08-02 | 2019-11-26 | 广州多益网络股份有限公司 | A kind of multimedia file purification method, device, storage medium and terminal device |
CN111915474B (en) * | 2020-07-08 | 2023-10-10 | 绍兴聚量数据技术有限公司 | Reversible encryption domain information hiding method based on integer transformation |
CN113362213B (en) * | 2021-05-10 | 2023-05-16 | 哈尔滨工业大学 | Encryption domain watermarking method based on histogram |
CN113742765B (en) * | 2021-11-08 | 2022-02-08 | 天津嘉萱智财云科技有限公司 | Intelligent cloud data security protection system and method based on block chain |
CN115811578B (en) * | 2023-02-03 | 2023-05-02 | 潍坊医学院附属医院 | Digital processing method for medical recuperation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268588A (en) * | 2013-05-24 | 2013-08-28 | 上海大学 | Encrypted domain lossless reversible information concealing method based on carrier image check code |
CN103971323A (en) * | 2014-05-22 | 2014-08-06 | 复旦大学 | Digital watermark steganography method based on scrambling transformation and morphological component analysis |
-
2016
- 2016-07-27 CN CN201610602261.XA patent/CN106251278B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103268588A (en) * | 2013-05-24 | 2013-08-28 | 上海大学 | Encrypted domain lossless reversible information concealing method based on carrier image check code |
CN103971323A (en) * | 2014-05-22 | 2014-08-06 | 复旦大学 | Digital watermark steganography method based on scrambling transformation and morphological component analysis |
Non-Patent Citations (3)
Title |
---|
"An improved reversible data hiding in encrypted images";Shuang Yi.etc;《2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)》;20150903;Page225-229 |
"基于直方图修改的图像密文域可逆信息隐藏";郑淑丽等;《微电子学与计算机》;20151231;第32卷(第12期);第105-109+11页 |
"多比特嵌入的加密图像中可逆信息隐藏方法";王子驰等;《小型微型计算机系统》;20141031;第35卷(第10期);第2331-2335页 |
Also Published As
Publication number | Publication date |
---|---|
CN106251278A (en) | 2016-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106251278B (en) | A kind of image encryption domain reversible information hidden method based on histogram feature | |
Bouslimi et al. | A joint encryption/watermarking system for verifying the reliability of medical images | |
Chang et al. | Privacy-preserving reversible information hiding based on arithmetic of quadratic residues | |
CN105634732B (en) | A kind of more bit reversible information hidden methods of ciphertext domain | |
Anand et al. | Joint watermarking-encryption-ECC for patient record security in wavelet domain | |
CN106022011A (en) | Image-based confidential information spreading method, device and system | |
Yari et al. | An overview and computer forensic challenges in image steganography | |
CN102088611B (en) | H.264 standard motion vector-based method for embedding and extracting fragile watermark | |
CN111988639B (en) | Video encryption and decryption method based on cryptographic algorithm and reversible steganography | |
Atee et al. | Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding | |
Sazaki et al. | Implementation of affine transform method and advanced hill cipher for securing digital images | |
Jin et al. | A reversible data hiding algorithm based on secret sharing | |
Brar et al. | Double layer image security system using encryption and steganography | |
Kaur et al. | XOR-EDGE based video steganography and testing against chi-square steganalysis | |
Riaz et al. | Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography | |
CN103617589A (en) | Information hiding method based on local histogram | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Al-Laham et al. | Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages | |
Chavan et al. | Lossless tagged visual cryptography scheme using bit plane slicing for image processing | |
Raju et al. | Modified encryption standard for reversible data hiding using AES and LSB steganography | |
QASSIM et al. | Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm | |
Ishikawa et al. | Learnable Cube-Based Video Encryption for Privacy-Preserving Action Recognition | |
Hegde et al. | Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis | |
Zhao et al. | Steganography based on image morphing | |
Sharma et al. | A comprehensive survey on data hiding technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190621 Termination date: 20200727 |