CN106251278B - A kind of image encryption domain reversible information hidden method based on histogram feature - Google Patents

A kind of image encryption domain reversible information hidden method based on histogram feature Download PDF

Info

Publication number
CN106251278B
CN106251278B CN201610602261.XA CN201610602261A CN106251278B CN 106251278 B CN106251278 B CN 106251278B CN 201610602261 A CN201610602261 A CN 201610602261A CN 106251278 B CN106251278 B CN 106251278B
Authority
CN
China
Prior art keywords
image
information
encryption
pixel value
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610602261.XA
Other languages
Chinese (zh)
Other versions
CN106251278A (en
Inventor
廖琪男
柯琦
潘瑞冬
蒋曹清
谭义东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610602261.XA priority Critical patent/CN106251278B/en
Publication of CN106251278A publication Critical patent/CN106251278A/en
Application granted granted Critical
Publication of CN106251278B publication Critical patent/CN106251278B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0203Image watermarking whereby the image with embedded watermark is reverted to the original condition before embedding, e.g. lossless, distortion-free or invertible watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Facsimile Image Signal Circuits (AREA)
  • Image Analysis (AREA)

Abstract

The present invention provides a kind of image encryption domain reversible information hidden method based on histogram feature, belongs to digital image encryption and Information hiding field.The present invention includes: the image owner by generating ciphertext image to image pixel positions scrambling encryption and pixel value encryption, then encryption key, ciphertext image block size are issued image recipient, while ciphertext image and its piecemeal size is issued Information hiding person;Information hiding person randomly chooses block image embedding information, generates the ciphertext image of carrying information, embedded key, the ciphertext image containing information and piecemeal size is then issued information receiver, while the ciphertext image containing information is issued image recipient;Information receiver extracts information according to embedded key;Image recipient is according to encryption key decryption and restores image.The invention has the benefit that algorithm is simple, effective, information can be extracted completely and restores original image completely;Information extraction, image decryption and recovery process are completely independent.

Description

A kind of image encryption domain reversible information hidden method based on histogram feature
Technical field
The present invention relates to digital image encryptions and Information hiding field more particularly to a kind of image based on histogram feature Encrypted domain reversible information hidden method.
Background technique
Information hiding and data encryption are two big common technologies of information security.Information hiding is exactly the feeling using people Secret information (such as data, writings and image information) is embedded into open biography to the visual redundancy characteristic of Digital Media by organ In defeated Digital Media (such as image, video and audio), but it is not easy to be discovered by the vision of people, auditory system, to reach Utilize the disclosed purpose for carrying close media transmission secret information.Here data encryption is to convert Digital Media to not in plain text Intelligible ciphertext, so that the content to Digital Media is protected.Due to the insertion of information, cause carrier image more or less There is distortion in ground, but in certain particular applications such as military, medical treatment and judicial domain, does not allow similar situation but, Then, reversible information concealing technology comes into being.Reversible information is hidden in can be lossless after carrying close image taking-up secret information Restore initial carrier image.With the increasingly intensification to personal privacy protection idea, individual digital image and scientific research number The security needs such as word image, national security digital picture and court's evidence obtaining digital picture, at this moment add these digital pictures It is close to become abnormal important.Have increasing need for third party now directly encrypted image data can be managed, this just need to Management information is added in encrypted image.If store arrive long-range cloud encrypted image, need to image classification, the information of owner, Copyright information and other relevant informations etc..Information insertion person is exactly a unauthorized third parties, he does not allow to know host Clear content, so cannot also obtain the feature under host's plaintext state.For example, image is encrypted in medical image For protecting the privacy of patient.But the third party (system manager, office worker, nurse etc.) for being responsible for managing these pictures answers This can directly be embedded in additional information in ciphertext image, and at this moment third party does not both need to decrypt as data insertion person Image also requires no knowledge about the feature under image plaintext state.For another example, in the application of cloud computing, user is on Cloud Server The image data of storage needs secret protection, so first to encrypt, at this moment, some classification letters is embedded in the image of these encryptions Breath, copyright information, data serch information or any other relevant information task just need by cloud computing service supplier not The case where ciphertext data, gets off completion.When being just desirable to keep the integrality of encrypted image there are also a kind of application, encryption figure is calculated The cryptographic Hash of picture is simultaneously directly embedded into encrypted image.Alternatively, cyclic redundancy check code (CRC) or other error correction informations can also To be embedded in into.Then, encrypted domain reversible information concealing technology becomes research in recent years hot spot.
Existing scholar proposes some about the reversible steganography scheme of ciphertext domain at present, but there is lack using upper for these schemes It falls into or insufficient.2011, Zhang [1] proposed to become based on the reversible steganographic algorithm of ciphertext domain of exclusive or encryption and pixel interdependence The representational method in one, ciphertext domain Information hiding field, but the image of the algorithm restores and information extraction is united based on probability (pixel interdependence is a statistical property) of meter characteristic, the correctness degree and piecemeal size of image recovery extent and information extraction It is related, and there is always certain image fault degree and information extraction error rates.2012, Hong et al. [2] considered between image block Boundary information improve Zhang algorithm, make image restore and information extraction accuracy further increase.2013, Liu Shangyi Et al. [3] propose that encrypted domain hiding reversible data innovatory algorithm classify based on image block correlation, image restore to mention with information Accuracy is taken further to improve.2014, the innovatory algorithm that Li et al. people [4] proposes be a kind of cancellations piecemeal operate and with random It spreads to substitute and obtain the promotion of correlation statistics performance, and improve precision of prediction with accurate prediction technique, to make image Restore and information extraction accuracy further improves.2012, Zhang [5] proposed a kind of separable ciphertext image latent writing Scheme, information extraction and image, which restore two operations, to be individually performed, non-interference, but its image restores with information extraction also It is fully established on this statistical nature of image pixel correlation, so its invertibity still cannot as document [1-4] Guarantee.Document [6]-[8] are to carry out pretreated method to image before a kind of encryption, i.e., compress image portion score before encryption According to vacating space is left information insertion for and used.Document [9] is that a kind of scramble image encryption domain using histogram translation is reversible hidden Write method, document [10] are a kind of reversible steganographic algorithms of ciphertext domain based on the translation of pixel value difference histogram.
In these algorithms, document [1]-[4] image decryption and information extraction sequence be it is fixed, i.e., first decrypt and extract afterwards Information, information owner must be also image information owner;Document [6]-[10] algorithm is in image decryption and information extraction It is separable, and be completely reversibility.But document [1]-[5], [7]-[10] algorithm in, image restore when, all need It to be operated by information extraction and image decryption, it is easy to obtain image information from operating process and secret information, image are extensive Multiple person must be image information and secret information owner simultaneously, limit the popularity of application.
Bibliography:
[1]X.Zhang.Reversible data hiding in encrypted image[J].IEEE Signal Processing Letters,2011,18(4):255-258.
[2]W.Hong,T.Chen,H.Wu.An improved reversible data hiding in encrypted images using side match[J].IEEE Signal Processing Letters,2012,19(4):199-202.
[3] Liu Shangyi, Huo Yongjin, Luo Xinrong, the encrypted domain hiding reversible data for waiting to classify based on image block correlation [J] Wuhan University Journal (Edition), 2013,5 (10): 486-490.
[4]Ming Li,Di Xiao,ZhongxianPeng,Hai Nan,A modified reversible data hiding in encrypted images using random diffusion and accurate prediction, ETRI Journal,2014,36(2):325-328.
[5]X.Zhang.Separable reversible data hiding in encrypted image[J] .IEEE Transactions on Information Forensics and Security,2012,7(2):826-832.
[6]K.Ma,W.Zhang,X.Zhao,et al.Reversible data hiding in encrypted images by reserving room before encryption[J].IEEE Transactions on Information Forensics and Security,2013,8(3):553-562.
[7]W.Zhang,K.Ma,N.Yu.Reversibility improved data hiding in encrypted images[J].Signal Processing,2014,94:118-127.
[8] Han Xiyu, Qian Zhenxing, Zhang Xinpeng, the reversible information in encrypted image for waiting to send on demand hide [J] application Scientific journal, 2015,33 (1): 50-58.
[9] reversible information hidden algorithm [J] computer engineering and application in Zheng Hongying, Gao Zhen, Xiao Di ciphertext image, 2014,50 (7): 186-18.
[10] ciphertext reversible water mark algorithm [J] computer that Xiao Di, Du She, Zheng Hongying are translated based on difference domain histogram Application study, 2014,31 (12): 3668-3672.
Summary of the invention
To solve the problems of the prior art, the present invention provides a kind of reversible letter in image encryption domain based on histogram feature Hidden method is ceased, using pixel permutation encrypted image histogram feature different from pixel value encrypted image come hiding information, originally Inventive method flow diagram is as shown in Figure 1.
The present invention includes the following steps: (1) image owner to image encryption step: the image owner passes through encryption first Key pair original image pixels position carries out scrambling encryption, then carries out pixel value to the low level of certain digit of each pixel value Encryption generates ciphertext image;According to image histogram feature be determined to distinguish the certain digit of block image pixel value a high position with The minimum piecemeal size of low level different characteristic;Finally encryption key, differentiating method and minimum piecemeal size are sent to image and connect Ciphertext image, differentiating method and minimum piecemeal size are sent to Information hiding person by receipts person;
(2) Information hiding person's embedding information step: Information hiding person according to minimum piecemeal size to ciphertext image block, with Machine selection block, the high position and low level of the certain digit of block image pixel value are exchanged according to differentiating method, information 0 or 1, and generation is loaded with letter Then embedded key, the ciphertext image containing information, differentiating method and minimum piecemeal size are sent to letter by the ciphertext image of breath Recipient is ceased, while the ciphertext image containing information is sent to image recipient;
(3) information receiver extracts information Step: information receiver is according to embedded key, minimum piecemeal size, differentiation side The image histogram characteristic value of method, a high position for the certain digit of block image pixel value and low level from the ciphertext image containing information into Row information is extracted, and then extracts secret information;
(4) image recipient decryption and restore image step: image recipient according to encryption key, minimum piecemeal size, The image histogram characteristic value of differentiating method, a high position for the certain digit of block image pixel value and low level is to the ciphertext graph containing information Decrypted image is obtained as carrying out image decryption, image recovery operation and image decryption operation are consistent, and decrypted image is original graph Picture.
Information embedding theory of the invention and method are totally different from existing algorithm, and algorithm is simple, effective.According to existing Resume image, resume image of the invention be it is safe, information embedded quantity than document [1]-[5] be representative steganography Algorithm is at least higher by 14-28 times, and meet that the information extraction of recipient, image decryption and image restore simultaneously is completely independent The completely reversibility of property, steganography encrypted image, will effectively meet more practical applications.
The present invention is further improved, and in step (1), extracts low four progress pixel value encryption of image pixel value; The minimum piecemeal size is to be determined to distinguish block image pixel value high four and low four according to image histogram feature The minimum piecemeal size of different characteristic.It is high due to the main feature of the Gao Siwei representative image of pixel value, low four similar noises Four histogram features for also just having an original image or scrambling encryption image, low four histograms for having a pixel value encrypted image Feature.
The present invention is further improved, and in step (1), the scrambling encryption method of image pixel positions is as follows:
A1: the size of original image A is set as m × n, m × n is generated by encryption key and obeys not repeating at random for [1, m × n] Sequence S1, m × n obey [0,15] random sequence S2
A2: picture element matrix A is transformed to one-dimension array Pt (1:m × n), transformation for mula are as follows: P by raster scan ordert ((i-1) n+j)=A (i, j), wherein i=1,2,3 ..., m, j=1,2,3 ..., n;
A3: random sequence S is pressed1Sequential value array Pt (1:m × n) is transformed to new array P, transformation for mula are as follows: P one by one (i)=Pt(S1(i)), wherein i=1,2,3 ..., m × n;
The pixel value encryption method are as follows: use random sequence S2To low four of the pixel value of the encrypted image of scramble into Row encryption, encrypts formula are as follows:Wherein, i=1,2,3 ..., m × n then will by raster scan order The picture element matrix B of C (i) reconstruct generates encrypted image file.
The present invention is further improved, in step (2), according to information 0 or 1 exchange block image pixel value Gao Siwei and Low four.
The present invention is further improved, and the Gao Siwei of the block image pixel value after encryption, after Information hiding and low four are Scrambling encryption or pixel value encryption, are to judge to distinguish according to respective histogram feature.
The present invention is further improved, and according to histogram feature, the judgement differentiating method of use includes comentropy, pixel value Very poor and pixel value frequency.
The present invention is further improved, in step (2), information embedding method are as follows: if information is 0, high four are to set Disorderly encryption, low four encrypt for pixel value;If information is 1, high four encrypt for pixel value, and low four are scrambling encryption;It is embedding The method for entering information includes the following steps:
B1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in Key generates the u × v not repeating random number sequence R for obeying [1, u × v];
B2: according to information and sequence R sequence, one block of image is randomly choosed, judges current block image slices according to differentiating method The Gao Siwei of plain value is scrambling encryption or pixel value encryption, if it is scrambling encryption that information, which is 0, Gao Siwei, low four are picture Element is worth encryption, and Gao Siwei and low four do not change;Otherwise, Gao Siwei and low four exchanges;If information is 1, on the contrary;
B3: executing step B2 repeatedly, until information insertion finishes.
The present invention is further improved, and in step (3), the method for extracting information includes the following steps:
C1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in Key generates the u × v not repeating random number sequence R for obeying [1, u × v];
C2: according to sequence R sequence, randomly choosing one block of image, judges current block image pixel value according to differentiating method Gao Siwei is scrambling encryption or pixel value encryption, if Gao Siwei is scrambling encryption, low four encrypt for pixel value, then believing Breath is 0;Conversely, information is 1;
C3: executing step C2 repeatedly, until information extraction finishes.
The present invention is further improved, and in step (4), decryption and the method for restoring image include the following steps:
D1: according to the image minimum piecemeal size h × w determined in step (1), h × w block is divided the image into;
D2: pressing raster scan order selection block, judges that the Gao Siwei of current block image pixel value is to set according to differentiating method Disorderly encryption or pixel value encryption, if Gao Siwei is pixel value encryption, the Gao Siwei of block image and low four transpositions;
D3: executing step D2 repeatedly, until high four bit recovery of the pixel value of all blocks of images is in situ;
D4: according to encryption key, by the process of encrypted image inversely by low four pixel values decryption of image, location of pixels Unrest is inverted, obtains original image completely.
The present invention is further improved, and in step (3) and step (4), the information receiver and image recipient are The people of same permission or the people of different rights.Information extraction, image decryption and the recovery process of recipient is not completely independent, mutually not Interference.
Compared with prior art, the beneficial effects of the present invention are: algorithm is simple, effectively, information and complete can be extracted completely It is complete to restore original image;Information extraction, image decryption and recovery process are completely independent, are non-interference, to solve information extraction The problems such as information extraction key and image decryption keys must be possessed with the permanent order of image decryption, image recuperator, make to calculate Method has better application and bigger application range;Improve the hiding insertion of the encrypted domain reversible information based on block image Rate.
Detailed description of the invention
Fig. 1 is the method for the present invention flow diagram;
Fig. 2 is theoretical foundation of the present invention --- the histogram feature of original image, scrambling encryption image;
Fig. 3 is theoretical foundation of the present invention --- the histogram feature of pixel value encrypted image;
Fig. 4 is lena original image;
Fig. 5 is Fig. 4 encrypted image effect picture;
Fig. 6 is the high four bit images histogram of pixel value of Lena encrypted image;
Fig. 7 is the low four bit images histogram of pixel value of Lena encrypted image.
Specific embodiment
The present invention is described in further details with reference to the accompanying drawings and examples.
This example is that histogram feature based on image carries out image encryption and Information hiding, wherein it is of the invention it is specific according to According to as follows:
Image encryption usually has image pixel positions scramble, pixel value encryption, and scramble and pixel value encryption three simultaneously Kind mode.Scrambling encryption and pixel value encryption have similarly can not recognition effect, but the pixel value histogram of scrambling encryption image Figure is consistent with original plaintext image, and the pixel value histogram of pixel value encrypted image is then uniformly distributed in pixel value range.Such as The pixel value histogram of the original image of Lena image shown in Fig. 2 is consistent with the histogram of its scrambling encryption image;It is shown in Fig. 3 The histogram of the pixel value encrypted image of Lena image is uniformly distributed in pixel value range.Image block encryption also has same histogram Figure feature.
By Fig. 2 and Fig. 3 it is found that piece image encryption or image block encryption be scrambling encryption or pixel value encryption be can be with It is distinguished by histogram feature, but since histogram feature is statistical characteristics, it is necessary to have sufficiently large image block ability It is correct to distinguish.Scrambling encryption and pixel value encryption two image block assembled arrangements can representative information 0 and 1, here it is this hairs Bright theoretical foundation.
Wherein, according to fig. 2 with histogram feature shown in Fig. 3, this example can with comentropy, pixel value is very poor and pixel value The encryption that frequency distinguishes original image to measure judgement is scrambling encryption or pixel value encryption.
(1) comentropy
Comentropy can measure out the distribution situation of gray value (pixel value) in image or image block, and intensity profile is more equal Even, image information entropy is bigger, otherwise comentropy is smaller.The calculation expression of comentropy are as follows:
In formula, x is stochastic variable, p (xi) it is xiThe probability of appearance, x indicates the pixel value of image herein.By comentropy Feature and Fig. 2 and histogram feature shown in Fig. 3 are it is found that the comentropy of pixel value encrypted image is greater than scrambling encryption image Comentropy.
(2) pixel value frequency
Pixel value frequency refers to the frequency that certain pixel value occurs in image or image block, by Fig. 2 and histogram shown in Fig. 3 Figure feature is it is found that the pixel value frequency of pixel value encrypted image is less than the pixel value frequency of pixel permutation encrypted image.
(3) pixel value is very poor
The very poor difference for referring to the max pixel value in image or image block and minimum pixel value of pixel value, pixel value are very poor fixed Justice are as follows: d=pixmax-pixmin, in formula, pixmaxAnd pixminRespectively max pixel value and minimum pixel value.By Fig. 2 and Fig. 3 Shown in histogram feature it is found that when there is minimum pixel value and max pixel value simultaneously in scramble image or image block, pixel The very poor pixel value equal to pixel permutation encrypted image of pixel value for being worth encrypted image is very poor, can not use very poor judgement image at this time It is scrambling encryption or pixel value encryption;When minimum pixel value and max pixel value do not occur simultaneously in scramble image or image block When, the very poor pixel value greater than pixel permutation encrypted image of the pixel value of pixel value encrypted image is very poor.
As shown in Figure 1, as an embodiment of the present invention, the method for the present invention includes the following steps: (1) image owner To image encryption step: the image owner passes through encryption key first and carries out scrambling encryption to original image pixels position, then To the low level of certain digit of each pixel value, for example two to four can be selected not carry out pixel value encryption not etc., generate ciphertext Image;It is determined to distinguish a high position for the certain digit of block image pixel value and low level different characteristic according to image histogram feature Minimum piecemeal size, using this minimum piecemeal size as the ciphertext image block size of further encryption and Information hiding.Finally Encryption key, differentiating method and minimum piecemeal size are sent to image recipient, ciphertext image, differentiating method and minimum point Block size is sent to Information hiding person;
(2) Information hiding person's embedding information step: Information hiding person is according to image minimum piecemeal size to ciphertext image point Block randomly chooses block, and the high position and low level of the certain digit of block image pixel value are exchanged according to information 0 or 1, generates carrying information Then ciphertext image is sent to embedded key, the ciphertext image containing information, differentiating method and minimum piecemeal size information and connects Receipts person, while the ciphertext image containing information is sent to image recipient;
(3) information receiver extracts information Step: information receiver is according to embedded key, the certain digit of block image pixel value A high position and the image histogram characteristic value of low level carry out information extraction, and then extract secret information;
(4) image recipient decryption and recovery image step: image recipient is according to encryption key, block image pixel value one A high position for positioning number and the image histogram characteristic value of low level carry out image decryption and obtain decrypted image, image recovery operation and figure Picture decryption oprerations are consistent, and decrypted image is original image.
The present invention can well solve three problems existing for existing algorithm:
(1) algorithm recipient can restore original image and completely correct extraction information completely.
(2) information extraction of algorithm recipient, image decryption and recovery process are completely independent, are non-interference, to solve The permanent order of information extraction and image decryption, image recuperator must possess information extraction key and image decryption keys etc. and ask Topic makes algorithm have better application and bigger application range.
(3) the hiding insertion rate of the encrypted domain reversible information based on block image is improved.
As an embodiment of the present invention, due to the main feature of the Gao Siwei representative image of pixel value, low four classes It is noise-like, Gao Siwei also just have the histogram feature of original image or scrambling encryption image, low four have pixel value encryption figure The histogram feature of picture.Low four progress pixel value encryption in step (1), to image pixel value;The minimum piecemeal is big The small minimum piecemeal size to be determined to distinguish block image pixel value high four and low four according to image histogram feature.Cause This, in step (1), the present embodiment to the information concealing method of image encryption also referred to as four steganographic algorithms of height, specifically: adopt Capture element scrambling encryption image, low four are made pixel value encryption, four exchange representative informations 0 or 1 of height of image block.
The specific implementation steps are as follows for the present embodiment:
(1) the image encryption step of the image owner
The scrambling encryption method of image pixel positions is as follows:
A1: the size of original image A is set as m × n, m × n is generated by encryption key and obeys not repeating at random for [1, m × n] Sequence S1, m × n obey [0,15] random sequence S2
A2: picture element matrix A is transformed to one-dimension array Pt (1:m × n), transformation for mula are as follows: P by raster scan ordert ((i-1) n+j)=A (i, j), wherein i=1,2,3 ..., m, j=1,2,3 ..., n;
A3: random sequence S is pressed1Sequential value array Pt (1:m × n) is transformed to new array P, transformation for mula are as follows: P one by one (i)=Pt(S1(i)), wherein i=1,2,3 ..., m × n;
The pixel value encryption method are as follows:
With random sequence S2Low four of the pixel value of the encrypted image of scramble are encrypted, formula is encrypted are as follows:Wherein, i=1,2,3 ..., m × n, then, the picture element matrix for reconstructing C (i) by raster scan order B generates encrypted image file.
Encrypted image piecemeal:
This example is hidden using the difference of pixel permutation encrypted image and the histogram feature of pixel value encrypted image The basis of information, and histogram feature is based on statistical nature, the otherness of these statistical natures needs certain statistic It could correctly embody.Therefore, the size that the image block of hiding information is determined according to histogram feature is needed.Method is to make all sub-blocks The Gao Siwei histogram feature of image can be distinguished correctly with low four histogram features, i.e., piecemeal size makes all sub-images all Meet one of the following conditions: Gao Siwei comentropy is less than the max pixel value frequency of low four comentropies or Gao Siwei greater than low The pixel value of four max pixel value frequency or Gao Siwei is very poor, and to be less than low four pixel values very poor.
The minimum image piecemeal example of three kinds of judgment methods is as shown in table 1, and it is abundant that this table only lists representative gray level Lena, peppers, airplane, baboon, lake and bridge standard testing image and gray level it is relatively simple Cartoon image cartoon and grid image gird, the size of these images are 512 × 512.Due to bridge, cartoon and Gird is with the presence of the Gao Siwei minimum pixel value and max pixel value of block image, therefore the minimum piecemeal of very poor method is without feasible Solution.
Table 1
Piece image steganography can only select one to judge that differentiating method determines the smallest image block size, then with determination Image minimum piecemeal size come to image carry out piecemeal, in order to make encrypted image with after embedding information encrypted image holding phase Same histogram feature, four random transpositions of height of block image after piecemeal size determines.
(2) Information hiding person's embedding information step:
The information embedding method of this example are as follows: if information is 0, high four are scrambling encryption, and low four encrypt for pixel value; If information is 1, high four encrypt for pixel value, and low four are scrambling encryption.The embedding information method includes the following steps:
B1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in Key generates the u × v not repeating random number sequence R for obeying [1, u × v].
B2: according to information and sequence R sequence, one block of image is randomly choosed, judges the Gao Siwei of current block image pixel value It is scrambling encryption or pixel value encryption, if it is scrambling encryption that information, which is 0, Gao Siwei, low four encrypt for pixel value, Gao Si Position does not change with low four;Otherwise, Gao Siwei and low four exchanges.If information is 1, on the contrary.
B3: executing step B2 repeatedly, until information insertion finishes.
(3) method that information receiver extracts information includes the following steps:
C1: according to the image minimum piecemeal size h × w determined in step (1), dividing the image into u × v block, close by being embedded in Key generates the u × v not repeating random number sequence R for obeying [1, u × v];
C2: according to sequence R sequence, one block of image is randomly choosed, judges that the Gao Siwei of current block image pixel value is scramble Encryption or pixel value encryption, if Gao Siwei is scrambling encryption, low four encrypt for pixel value, then information is 0;Conversely, Information is 1;
C3: executing step C2 repeatedly, until information extraction finishes.
(4) method of image recipient decryption and recovery image, includes the following steps:
D1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into;
D2: raster scan order selection block is pressed, judges that the pixel value Gao Siwei of current block image is scrambling encryption or picture Element value encryption, if Gao Siwei is pixel value encryption, the Gao Siwei of block of pixels and low four transpositions;
D3: executing step D2 repeatedly, until high four bit recovery of the pixel value of all blocks of images is in situ;
D4: according to encryption key, by the process of encrypted image inversely by low four pixel values decryption of image, location of pixels Unrest is inverted, obtains original image completely.
In step (3) and step (4), the people or difference of the information receiver and image recipient for same permission The people of permission.Information extraction, image decryption and the recovery process of recipient is completely independent, is non-interference.Information extraction, image solution It is close and restore permission be completely independent, i.e., regardless of sequence, be not required to possess two or more permissions.
Specifically, as shown in Figure 4-Figure 7, by taking lena image as an example, size m × n of the original image lena of the present embodiment It is 512 × 512, secret information is random binary information.Lena original image and lena ciphertext image effect picture are respectively such as Fig. 4 With shown in Fig. 5.The Gao Siwei pixel value of Lena image Gao Siwei scrambling encryption and the low encrypted ciphertext image of four pixel values Histogram and low four pixel value histograms difference are as shown in Figure 6 and Figure 7.Determine that the smallest piecemeal is big with pixel value range method It is small, therefore ciphertext block size h × w is the ciphertext minimum piecemeal size 6 × 7 determining with the very poor judgement of pixel value, ciphertext block u × v is 85 × 73.From carry ciphertext image zooming-out binary message and insertion when binary system random information it is completely the same, solution Close image and recovery image and original image are completely the same.
Information embedding theory of the invention and method are totally different from existing algorithm, and algorithm is simple, effective.According to existing Resume image, Encryption Algorithm of the invention be it is safe, information embedded quantity than document [1]-[5] be represent steganographic algorithm extremely It is higher by 14-28 times less, and meets the information extraction of recipient, the complete independence of image decryption and image recovery, extraction simultaneously The completely reversibility of the total correctness of information, steganography encrypted image, will effectively meet more practical applications.
The specific embodiment of the above is better embodiment of the invention, is not limited with this of the invention specific Practical range, the scope of the present invention includes being not limited to present embodiment, all equal according to equivalence changes made by the present invention Within the scope of the present invention, i.e., it is hidden according to the different histogram features of scrambling encryption image and pixel value encrypted image The method of information is within the scope of the invention.For example, block Digital Image Scrambling and pixel value encryption respectively indicate information 0 With 1 or 1 and 0, the different histogram features for being also based on scrambling encryption image and pixel value encrypted image carry out hiding information, Within the scope of the present invention.

Claims (10)

1. a kind of image encryption domain reversible information hidden method based on histogram feature, utilizes pixel permutation encrypted image and picture The different histogram features of plain value encrypted image carry out hiding information, it is characterised in that include the following steps:
(1) the image owner is to image encryption step: the image owner passes through encryption key to original image pixels position first Scrambling encryption is carried out, pixel value encryption then is carried out to the low level of certain digit of each pixel value, generates ciphertext image;According to Image histogram feature is determined to distinguish the minimum piecemeal of the high position and low level different characteristic of the certain digit of block image pixel value Size;Encryption key, differentiating method and minimum piecemeal size are finally sent to image recipient, ciphertext image, differentiation side Method and minimum piecemeal size are sent to Information hiding person;
(2) Information hiding person's embedding information step: Information hiding person is according to minimum piecemeal size to ciphertext image block, random choosing Block is selected, the high position and low level of the certain digit of block image pixel value are exchanged according to information 0 or 1, generates the ciphertext image of carrying information, Then embedded key, the ciphertext image containing information, differentiating method and minimum piecemeal size are sent to information receiver, simultaneously Ciphertext image containing information is sent to image recipient;
(3) information receiver extracts information Step: information receiver is according to embedded key, the height of the certain digit of block image pixel value The image histogram characteristic value of position and low level carries out information extraction, and then extracts secret information;
(4) image recipient decryption and recovery image step: image recipient positions according to encryption key, block image pixel value one The image histogram characteristic value of several a high position and low level carries out image decryption and obtains decrypted image.
2. image encryption domain reversible information hidden method according to claim 1, it is characterised in that: in step (1), mention Take low four progress pixel value encryption of image pixel value;The minimum piecemeal size is to determine energy according to image histogram feature Enough distinguish block image pixel value high four and low four minimum piecemeal sizes.
3. image encryption domain reversible information hidden method according to claim 2, it is characterised in that: in step (1), figure As the scrambling encryption method of location of pixels is as follows:
A1: the size of original image A is set as m × n-pixel, m × n is generated by encryption key and obeys not repeating at random for [1, m × n] Sequence S1, m × n obey [0,15] random sequence S2
A2: picture element matrix A is transformed to one-dimension array P by raster scan ordert(1:m × n), transformation for mula are as follows:
Pt((i-1) n+j)=A (i, j), wherein i=1,2,3 ..., m, j=1,2,3 ..., n;
A3: random sequence S is pressed1Sequential value one by one array Pt(1:m × n) transforms to new array P, transformation for mula are as follows:
P (i)=Pt(S1(i)), wherein i=1,2,3 ..., m × n;
The pixel value encryption method are as follows: use random sequence S2Low four of the pixel value of the encrypted image of scramble are added It is close, encrypt formula are as follows:Wherein, i=1,2,3 ..., m × n, then, by raster scan order by C (i) The picture element matrix B of reconstruct generates encrypted image file.
4. image encryption domain reversible information hidden method according to claim 2, it is characterised in that: in step (2), according to It is believed that 0 or 1 exchange block image pixel value high four and low four of breath.
5. image encryption domain reversible information hidden method according to claim 4, it is characterised in that: after encryption, information it is hidden The Gao Siwei of block image pixel value behind hiding and it is low four be scrambling encryption or pixel value encryption, be according to respective histogram Feature judgement is distinguished.
6. image encryption domain reversible information hidden method according to claim 5, it is characterised in that: according to histogram spy Sign, the judgement differentiating method of use include that comentropy, pixel value be very poor and pixel value frequency.
7. image encryption domain reversible information hidden method according to claim 6, it is characterised in that: in step (2), letter Cease embedding method are as follows: if information is 0, high four are scrambling encryption, and low four encrypt for pixel value;If information is 1, Gao Si Position is that pixel value encrypts, and low four are scrambling encryption;The method of embedding information includes the following steps:
B1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into, is produced by embedded key Raw u × v is obeyed the not repeating random number sequence R of [1, u × v];
B2: according to information and sequence R sequence, one block of image is randomly choosed, judges that the Gao Siwei of current block image pixel value is to set Disorderly encryption or pixel value encryption, if information be 0, Gao Siwei be scrambling encryption, low four for pixel value encrypt, Gao Siwei and Low four do not change;Otherwise, Gao Siwei and low four exchanges;If information is 1, on the contrary;
B3: executing step B2 repeatedly, until information insertion finishes.
8. image encryption domain reversible information hidden method according to claim 6, it is characterised in that: in step (3), mention The method of breath of winning the confidence includes the following steps:
C1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into, is produced by embedded key Raw u × v is obeyed the not repeating random number sequence R of [1, u × v];
C2: according to sequence R sequence, one block of image is randomly choosed, judges that the Gao Siwei of current block image pixel value is scrambling encryption Or pixel value encryption, if Gao Siwei is scrambling encryption, low four encrypt for pixel value, then information is 0;
Conversely, information is 1;
C3: executing step C2 repeatedly, until information extraction finishes.
9. image encryption domain reversible information hidden method according to claim 6, it is characterised in that: in step (4), solution Method that is close and restoring image includes the following steps:
D1: according to the image minimum piecemeal size h × w determined in step (1), u × v block is divided the image into;
D2: raster scan order selection block image is pressed, judges that the pixel value Gao Siwei of current block image is scrambling encryption or picture Element value encryption, if Gao Siwei is pixel value encryption, the Gao Siwei of block of pixels and low four transpositions;
D3: executing step D2 repeatedly, until all pieces of high four bit recovery of pixel value is in situ;
D4: according to encryption key, inversely low four pixel values decryption of image, location of pixels are inverted by the process of encrypted image Disorderly, original image is obtained completely.
10. image encryption domain reversible information hidden method according to claim 1, it is characterised in that: in step (3) and step Suddenly in (4), the information receiver and image recipient are the people of same permission or the people of different rights.
CN201610602261.XA 2016-07-27 2016-07-27 A kind of image encryption domain reversible information hidden method based on histogram feature Expired - Fee Related CN106251278B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610602261.XA CN106251278B (en) 2016-07-27 2016-07-27 A kind of image encryption domain reversible information hidden method based on histogram feature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610602261.XA CN106251278B (en) 2016-07-27 2016-07-27 A kind of image encryption domain reversible information hidden method based on histogram feature

Publications (2)

Publication Number Publication Date
CN106251278A CN106251278A (en) 2016-12-21
CN106251278B true CN106251278B (en) 2019-06-21

Family

ID=57604040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610602261.XA Expired - Fee Related CN106251278B (en) 2016-07-27 2016-07-27 A kind of image encryption domain reversible information hidden method based on histogram feature

Country Status (1)

Country Link
CN (1) CN106251278B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875323B (en) * 2017-01-18 2020-08-18 中国人民武装警察部队工程大学 Information hiding method and device based on image encryption
CN106941402B (en) * 2017-04-01 2020-07-10 中国人民武装警察部队工程大学 Homomorphic ciphertext domain reversible hiding method
CN107103631B (en) * 2017-04-17 2019-06-21 西南交通大学 Encrypted domain reversible information hidden method based on classification scramble and hiding information classification
CN107809644B (en) * 2017-10-26 2019-08-20 宁波工程学院 A kind of encryption area image reversible data concealing method of double-encryption
CN109756459B (en) * 2017-11-06 2022-03-29 阿里巴巴集团控股有限公司 Data processing method, data identification method, data processing device, data identification device, and data processing medium
CN108334593B (en) * 2018-01-30 2022-01-28 西安电子科技大学 Secure ciphertext image duplicate removal method in cloud environment and cloud server
CN108566500B (en) * 2018-03-02 2021-02-26 西南交通大学 Reversible hiding method of self-adaptive image encryption domain based on hybrid encryption mechanism
CN108447492B (en) * 2018-03-13 2021-08-20 中山大学 Self-adaptive histogram translation reversible information hiding method based on segmentation
CN110827187B (en) * 2018-08-13 2023-10-31 厦门雅迅网络股份有限公司 Information steganography and recovery method
CN109617682B (en) * 2018-12-12 2020-11-13 北京邮电大学 Ciphertext domain reversible information hiding method based on histogram left-right shifting
CN109547797B (en) * 2019-01-02 2021-02-05 太原科技大学 Separable encryption domain information hiding method
CN110136046A (en) * 2019-05-20 2019-08-16 李小平 Two image scramblings with thresholding hide and the method for reconstruct
CN110502646A (en) * 2019-08-02 2019-11-26 广州多益网络股份有限公司 A kind of multimedia file purification method, device, storage medium and terminal device
CN111915474B (en) * 2020-07-08 2023-10-10 绍兴聚量数据技术有限公司 Reversible encryption domain information hiding method based on integer transformation
CN113362213B (en) * 2021-05-10 2023-05-16 哈尔滨工业大学 Encryption domain watermarking method based on histogram
CN113742765B (en) * 2021-11-08 2022-02-08 天津嘉萱智财云科技有限公司 Intelligent cloud data security protection system and method based on block chain
CN115811578B (en) * 2023-02-03 2023-05-02 潍坊医学院附属医院 Digital processing method for medical recuperation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268588A (en) * 2013-05-24 2013-08-28 上海大学 Encrypted domain lossless reversible information concealing method based on carrier image check code
CN103971323A (en) * 2014-05-22 2014-08-06 复旦大学 Digital watermark steganography method based on scrambling transformation and morphological component analysis

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268588A (en) * 2013-05-24 2013-08-28 上海大学 Encrypted domain lossless reversible information concealing method based on carrier image check code
CN103971323A (en) * 2014-05-22 2014-08-06 复旦大学 Digital watermark steganography method based on scrambling transformation and morphological component analysis

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"An improved reversible data hiding in encrypted images";Shuang Yi.etc;《2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)》;20150903;Page225-229
"基于直方图修改的图像密文域可逆信息隐藏";郑淑丽等;《微电子学与计算机》;20151231;第32卷(第12期);第105-109+11页
"多比特嵌入的加密图像中可逆信息隐藏方法";王子驰等;《小型微型计算机系统》;20141031;第35卷(第10期);第2331-2335页

Also Published As

Publication number Publication date
CN106251278A (en) 2016-12-21

Similar Documents

Publication Publication Date Title
CN106251278B (en) A kind of image encryption domain reversible information hidden method based on histogram feature
Bouslimi et al. A joint encryption/watermarking system for verifying the reliability of medical images
Chang et al. Privacy-preserving reversible information hiding based on arithmetic of quadratic residues
CN105634732B (en) A kind of more bit reversible information hidden methods of ciphertext domain
Anand et al. Joint watermarking-encryption-ECC for patient record security in wavelet domain
CN106022011A (en) Image-based confidential information spreading method, device and system
Yari et al. An overview and computer forensic challenges in image steganography
CN102088611B (en) H.264 standard motion vector-based method for embedding and extracting fragile watermark
CN111988639B (en) Video encryption and decryption method based on cryptographic algorithm and reversible steganography
Atee et al. Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding
Sazaki et al. Implementation of affine transform method and advanced hill cipher for securing digital images
Jin et al. A reversible data hiding algorithm based on secret sharing
Brar et al. Double layer image security system using encryption and steganography
Kaur et al. XOR-EDGE based video steganography and testing against chi-square steganalysis
Riaz et al. Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
CN103617589A (en) Information hiding method based on local histogram
Rao et al. A novel information security scheme using cryptic steganography
Al-Laham et al. Digital Image Slicing to Strengthen the Security of LSB Technique of Encrypting Text Messages
Chavan et al. Lossless tagged visual cryptography scheme using bit plane slicing for image processing
Raju et al. Modified encryption standard for reversible data hiding using AES and LSB steganography
QASSIM et al. Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm
Ishikawa et al. Learnable Cube-Based Video Encryption for Privacy-Preserving Action Recognition
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
Zhao et al. Steganography based on image morphing
Sharma et al. A comprehensive survey on data hiding technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190621

Termination date: 20200727