CN109348228A - A kind of hiding System and method for of the image encryption domain reversible information based on image segmentation and image space correlation - Google Patents

A kind of hiding System and method for of the image encryption domain reversible information based on image segmentation and image space correlation Download PDF

Info

Publication number
CN109348228A
CN109348228A CN201811073734.7A CN201811073734A CN109348228A CN 109348228 A CN109348228 A CN 109348228A CN 201811073734 A CN201811073734 A CN 201811073734A CN 109348228 A CN109348228 A CN 109348228A
Authority
CN
China
Prior art keywords
image
information
encryption
encrypted
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811073734.7A
Other languages
Chinese (zh)
Other versions
CN109348228B (en
Inventor
张毅锋
宋畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201811073734.7A priority Critical patent/CN109348228B/en
Publication of CN109348228A publication Critical patent/CN109348228A/en
Application granted granted Critical
Publication of CN109348228B publication Critical patent/CN109348228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The invention discloses a kind of image encryption domain reversible information hidden method and system based on image segmentation and image space correlation.In image transmitting terminal, image owner divides the image into three parts: black portions, white portion and grey parts by the image segmentation algorithm designed.Black portions are predicted using grey parts in such a way that prediction difference expansion and the translation of more histograms combine, the least significant bit of white portion is embedded into the black portions of image by adaptive reversible information hidden algorithm, then encrypted image is generated by encryption code key;Information hiding person carries out the insertion of secret information by hiding secret key pair image.In image receiving end, recipient both can first extract secret information and restore original image again or first restore original image to extract secret information again, realize the invertibity of secret information and original image.The present invention has many advantages, such as that crypticity is good, and embedding capacity is big.

Description

A kind of image encryption domain reversible information based on image segmentation and image space correlation Hide System and method for
Technical field
The present invention relates to a kind of image encryption domain information concealing technologies, belong to reversible information and hide and image processing techniques neck Domain.
Background technique
As the important branch of information security field, Information Hiding Techniques have been grown rapidly since the new century, especially It is all to have obtained concrete application in fields such as digital publishing rights, confidential corespondences.Reversible data hiding technique is due to can be realized pair The features such as reversible recovery of cover object and embedding capacity with higher, has obtained extensive development.
On this basis, in order to further ensure the secret of image, the reversible information based on image encryption domain is proposed Hidden algorithm.Ciphertext domain reversible information hides the important binding site as encrypted domain signal processing technology and Information Hiding Techniques, It can play the role of double insurance for the information security in data handling procedure, it is reversible especially as the popularization of cloud service Information hiding is to realize one of the research emphasis of secret protection under cloud environment.There are two the standards of measure algorithm performance, first is that letter Embedding capacity is ceased, second is that the distortion factor.The distortion factor of image is lower under the basis of identical embedding capacity represents the complete of image Whole property is better, and the operation of distorting of image is less susceptible to be found.
Encryption process intersects in ciphertext domain reversible algorithm with information insertion extraction process to be existed and conditions each other, and is made At ciphertext domain reversible information hide many technological difficulties, be broadly divided at following 4 points: first is that realize insertion after ciphertext without mistake True solution is close and the completely reversibility of carrier recovery;Second is that the large capacity in ciphertext data is embedded in;Third is that information extraction and decrypting process It is separable;Fourth is that guaranteeing safety or undetectability of information of telescopiny etc..The main reason for above-mentioned difficult point a: side Face, current Information Hiding Techniques greatly rely on the attribute of the coding techniques of carrier, affiliated medium type or transform domain, And the process of embedding information must carry out re-quantization and modification to carrier data feature, but encryption can make the clear content be in Reveal maximum irregularities and uncertainty, original feature is difficult to be extracted and utilize.On the other hand, Modern cryptographic algorithms are wanted The minimum change of plaintext is asked also to will diffuse into the entire cryptogram space, so that the encryption data modified in telescopiny is more, decryption As a result distortion will be bigger, therefore information insertion is carried out in the case where guaranteeing to decrypt without being distorted, or promote embedding capacity Difficulty it is larger.
Summary of the invention
The technical problem to be solved by the present invention is in order to overcome the deficiencies in the prior art, the present invention provides one kind Image encryption domain reversible information based on image segmentation and image space correlation hides System and method for, it is intended to it is hidden to reduce information The distortion factor of hiding system improves the concealment of encrypted image.
The present invention in order to solve the above technical problems, and use following technological means:
Present invention firstly provides a kind of image encryption domain reversible information based on image segmentation and image space correlation is hidden Hiding system, the system include encrypted image generation module, and information is embedded in module, information extraction and image reconstruction module, in which:
The encrypted image generation module, be configured to perform following movement: original image is divided by image owner Black portions, grey parts and the white portion not overlapped.Black portions pixel is carried out using the pixel of grey parts pre- It surveys, generates prediction histogram of error, be embedded into the least significant bit of white portion pixel by the way of the translation of more histograms In black portions, image to be encrypted is generated, encrypted image is treated using encryption key generation encryption stream sequence and is encrypted, generated Encrypted image, and send it to information insertion module.
The information is embedded in module, is configured to perform following movement: information insertion person will be to using information embedded key Insertion secret information is encrypted, and the least significant bit of encrypted secret information replacement image white part is completed secret letter The insertion of breath, generates the encrypted image of tape identification, and sends it to information extraction and image reconstruction module.
The information extraction and image reconstruction module, be configured to perform following movement: image recipient utilizes secret letter Breath extracts and the independence of image decryption can carry out the operation of image decryption or elder generation after first information extraction to receiving image respectively The invertibity guarantee of original image and secret information is completed in the operation of information extraction after image decryption.
The present invention also proposes that a kind of image encryption domain reversible information based on image segmentation and image space correlation is hidden Method, which is characterized in that comprise the following steps that
Step (1), encrypted image generate: utilizing prediction difference expansion and more histograms to translate, carry out certainly to original image I Reversible information insertion is adapted to, image I' to be encrypted is generated;Encryption stream sequence r is generated using encryption key, passes through step-by-step exclusive or pair Image carries out encryption and generates encrypted image E;
Step (2), information insertion: secret information m to be embedded is encrypted using information embedded key, to generation Encoded information stream carries out the least significant bit of step-by-step replacement respective pixel, completes information insertion, obtains tape identification encrypted image E';
Step (3), information extraction and image reconstruction select an execution following below scheme: decrypted image after secret information is first extracted, Or secret information is extracted after first decrypted image, specifically:
(1) first extract secret information after decrypted image: the least significant bit for directly reading respective pixel obtains encryption information Stream, is decrypted using Information hiding key, obtains secret information;Ciphering sequence stream is generated using encryption key to carry out image Step-by-step exclusive or is decrypted to obtain decrypted image I ", is carried out using the principle of prediction difference expansion and the translation of more histograms to image Reversible recovery;
(2) extract secret information after first decrypted image: it is secret to removing in image to generate ciphering sequence stream using encryption key Other bits of the least significant bit of information insertion carry out step-by-step exclusive or and are decrypted to obtain decrypted image;Read respective pixel Least significant bit obtain encryption stream information, be decrypted using Information hiding key, obtain secret information;Utilize prediction error The principle of extension and the translation of more histograms carries out reversible recovery to image.
Further, a kind of image encryption domain based on image segmentation and image space correlation proposed by the invention can Inverse information concealing method, encrypted image generation step are specific as follows:
Step 101, last column and last line for removing image, divide the image into three parts, i.e. grey parts: transverse and longitudinal Coordinate is all satisfied mod (i+j, 2)=1, black portions: abscissa meets mod (i+j, 2)=1, ordinate meet mod (i, 2)= 0, white portion: abscissa meets mod (i+j, 2)=1, ordinate meets mod (i, 2)=1;
Step 102 carries out prediction generation predicted value to the pixel x of black portionsGenerate prediction error
Step 103 calculates the pixel x of black portions its region complexity CM, is classified as four according to the difference of the size of CM A grade, then all black pixel points have been divided into four grades, generate four prediction histogram of error;
Step 104 translates four prediction histogram of error using the method that two pairs of extreme points translate, by white portion The least significant bit of point pixel is embedded;
Step 105 continues a series of auxiliary informations required for adaptive feed-forward network part according to same embedding method It is embedded into black portions, generates image I';
Step 106 flows sequence r using encryption key generation encryption, carries out encryption generation to image by step-by-step exclusive or and adds Close image.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, the step 102 are to be predicted to carry out pixel value prediction according to diamond shape:
Wherein v1,v2,v3,v4Represent the adjacent pixel values up and down of pixel value x.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, region complexity is generated by the adjacent pixel values of x in the step 103:
CMi=| v1-v3|+|v2-v4| (2)
3 threshold values are chosen to meet:
By CMiIt is divided into 4 interval I0=[0, s0],I1=[s0+1,s1],I2=[s1+1,s2],I3=[s2+1,s3], CMi Fall in corresponding section CMiIt will be updated to j, generate four prediction histogram of error.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, the method for prediction histogram of error translation is described as follows in the step 104:
Wherein a <b is two extreme values of two pairs of extreme points pair.
The selection of two pairs of extreme points of four prediction histogram of error is according to following three conditions:
A, for n ∈ { 0,1,2,3 }, an=-bn-1;
B, for n ∈ { 0,1,2,3 }, bn∈{0,1…,7,∞};
c、b0≤b1≤b2≤b3
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, auxiliary information includes: in the step 105
It 1) is the length for the location information map for preventing image pixel value overflow or underflow from utilizing;
2) by the location information map after length coding compression;
3)bn,n∈{0,1,2,3};
4)sn,n∈{0,1,2};
5) the last one processed pixel subscript after step 104 terminates;
Before all these auxiliary informations, the total length of these auxiliary informations is indicated using 8 bit sequences, it is assumed that institute The overall length of these sequences is SauxBit records the preceding S of the image after step 104 is processedauxThe minimum of bit has Imitate position formation sequence SLSB, by sequence SLSBIt is embedded into black portions according to processing mode same as step 104, then by Saux S before bit auxiliary information is replacedauxThe least significant bit of bit ultimately generates image I' to be encrypted.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method to image encryption is completed by xor operation in the step 106.
Assuming that the size of image I' to be encrypted is W × L, pixel value Xi,j' ∈ [0,255], 1≤i≤W, 1≤j≤L, then plus Close image E is calculated by following formula:
Into the least significant bit of preceding 16 bits of picture black part, insertion represents insertion after cryptographic operation completion 16 bit sequences of information capability capacity, the informational capacity that can be hidden with allowing Information hiding person to know.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, information Embedded step are specific as follows:
Step 201, the least significant bit for reading 16 bits before black portions, obtain embeddable informational capacity;
Step 202 carries out encryption generation m ' by Information hiding key pair secret information m;
Step 203, using least significant bit replacement principle the least significant bit of white portion pixel is replaced with into encryption after Secret information m ', obtain tape identification encrypted image E'.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, information extraction and image reconstruction step (first decrypted image after extraction secret information) are specific as follows:
Step 301, the secret information for reading the insertion of white portion least significant bit pass through its progress of Information hiding key pair Decryption obtains secret information m;
Step 302 is decrypted to obtain decrypted image using encryption key to image E';
Step 303 obtains original image to the reversible extraction of decrypted image progress.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, information extraction and image reconstruction step (extracting secret information after first decrypted image) are specific as follows:
Step 401 is decrypted using the pixel that encryption key conceals secret information to image E' removing and is decrypted Image;
Step 402, the secret information for reading the insertion of white portion least significant bit pass through its progress of Information hiding key pair Decryption obtains secret information m;
Step 403 obtains original image to the reversible extraction of decrypted image progress.
Further, a kind of image encryption domain based on image segmentation and image space correlation that the present invention is mentioned is reversible Information concealing method, which is characterized in that as follows to the reversible extraction concrete operations of decrypted image in the step 303 and 403:
1) S before readingauxThe least significant bit of bit forms auxiliary information sequence;
2) with opposite scanning sequency from black portions N' bit to NendBit extraction SLSBSequence, S before restoringaux The least significant bit of bit;
3) while extensive with opposite scanning sequency from the least significant bit for extracting white portion before black portions in N' bit These multiple white portion pixels;
4) by the way that recovery is decrypted to location information map, prevent overflow or underflow from changing the pixel of pixel value.
Wherein 2), 3) in extraction operation it is specific as follows:
{ (a is obtained according to the four of generation prediction histogram of error and auxiliary informationn,bn), 0≤n≤3 pass through formula (6) Embedding information extraction is carried out, carries out image recovery by formula (7):
Wherein a <b, a, b are respectively two extreme values of two pairs of extreme points pair.
The invention adopts the above technical scheme, and possessed advantage is compared with prior art:
Image space correlation and image encryption domain are combined by the present invention, can be effectively realized secret information and schemed Reversible as encrypted domain is hidden, and compared with already present correlation technique, the present invention not only makes better use of image feature itself Reversible information operation is carried out, the distortion factor of information embedded images has been greatly reduced.On the one hand, using the translation of more histograms and in advance It surveys difference expansion and greatly reduces the distortion during image concealing, on the other hand realize recipient's image decryption and information mentions The independence of extract operation, preferably protects picture material.
Detailed description of the invention
Fig. 1 is the block diagram of system of the present invention.
Fig. 2 is that a kind of image encryption domain reversible information based on image segmentation and image space correlation of the present invention hides side The process flow diagram of method.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments and specification Attached drawing 1-2 carries out clear, complete description to technical solution of the present invention, it is clear that specific embodiment described herein is only used To explain the present invention, it is not intended to limit the present invention.
Those skilled in the art can understand that unless otherwise defined, all terms used herein (including skill Art term and scientific term) there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Also It should be understood that those terms such as defined in the general dictionary should be understood that have in the context of the prior art The consistent meaning of meaning will not be explained in an idealized or overly formal meaning and unless defined as here.
More histograms are translated and are predicted that difference expansion algorithm is combined with encrypted domain Information hiding by the present invention, reduce figure As the distortion factor of encrypted domain Information hiding, image concealment is improved.
Embodiment 1:
As shown in Figure 1, present invention firstly provides a kind of image encryption domain based on image segmentation and image space correlation Reversible information hides system, which includes encrypted image generation module, and information is embedded in module, information extraction and image reconstruction mould Block, in which:
The encrypted image generation module, be configured to perform following movement: original image is divided by image owner Black portions, grey parts and the white portion not overlapped.Black portions pixel is carried out using the pixel of grey parts pre- It surveys, generates prediction histogram of error, be embedded into the least significant bit of white portion pixel by the way of the translation of more histograms In black portions, image to be encrypted is generated, encrypted image is treated using encryption key generation encryption stream sequence and is encrypted, generated Encrypted image, and send it to information insertion module.
The information is embedded in module, is configured to perform following movement: information insertion person will be to using information embedded key Insertion secret information is encrypted, and the least significant bit of encrypted secret information replacement image white part is completed secret letter The insertion of breath, generates the encrypted image of tape identification, and sends it to information extraction and image reconstruction module.
The information extraction and image reconstruction module, be configured to perform following movement: image recipient utilizes secret letter Breath extracts and the independence of image decryption can carry out the operation of image decryption or elder generation after first information extraction to receiving image respectively The invertibity guarantee of original image and secret information is completed in the operation of information extraction after image decryption.
Embodiment 2:
As shown in Fig. 2, the present invention also proposes that a kind of image encryption domain based on image segmentation and image space correlation can Inverse information concealing method, the specific steps are as follows:
1) encrypted image generates:
1.1) last column and last line for removing image, divide the image into three parts, i.e. grey parts: transverse and longitudinal coordinate Be all satisfied mod (i+j, 2)=1, black portions: abscissa meets mod (i+j, 2)=1, ordinate meets mod (i, 2)=0, white Color part: abscissa meets mod (i+j, 2)=1, ordinate meets mod (i, 2)=1;
1.2) the pixel x of black portions is predicted to carry out pixel value prediction according to diamond shape:
Wherein v1,v2,v3,v4Represent the adjacent pixel values up and down of pixel value x.Prediction generates predicted valueIt generates Predict error
1.3) its region complexity CM is calculated to the pixel x of black portions:
CMi=| v1-v3|+|v2-v4| (2)
3 threshold values are chosen to meet:
By CMiIt is divided into 4 interval I0=[0, s0],I1=[s0+1,s1],I2=[s1+1,s2],I3=[s2+1,s3], CMi Which section CM fallen iniIt will be updated to j, generate four prediction histogram of error.
1.4) four prediction histogram of error are translated using the method that two pairs of extreme points translate, by white portion picture The least significant bit of element is embedded;
Wherein a <b is two extreme values of two pairs of extreme points pair.
The selection of two pairs of extreme points of four prediction histogram of error is according to following three conditions:
A, for n ∈ { 0,1,2,3 }, an=-bn-1;
B, for n ∈ { 0,1,2,3 }, bn∈{0,1…,7,∞};
c、b0≤b1≤b2≤b3
1.5) a series of auxiliary informations required for adaptive feed-forward network part are continued to be embedded according to same embedding method Into black portions, auxiliary information includes:
It a) is the length for the location information map for preventing image pixel value overflow or underflow from utilizing;
B) by the location information map after length coding compression;
c)bn,n∈{0,1,2,3};
d)sn,n∈{0,1,2};
E) the last one processed pixel subscript after step 1.4 terminates.
Before all these auxiliary informations, the total length of these auxiliary informations is indicated using 8 bit sequences, it is assumed that institute The overall length of these sequences is SauxBit records the preceding S of the image after step 104 is processedauxThe minimum of bit has Imitate position formation sequence SLSB, by sequence SLSBIt is embedded into black portions according to processing mode same as step 104, then by Saux S before bit auxiliary information is replacedauxThe least significant bit of bit ultimately generates image I' to be encrypted.
Generate image I';
1.6) encryption stream sequence r is generated using encryption key, it is assumed that the size of image I' to be encrypted is W × L, pixel value Xi,j' ∈ [0,255], 1≤i≤W, 1≤j≤L, then encrypted image E is calculated by following formula:
Into the least significant bit of preceding 16 bits of picture black part, insertion represents insertion after cryptographic operation completion 16 bit sequences of information capability capacity, with the informational capacity for allowing Information hiding person to know that he can hide.
2) information is embedded in:
2.1) read black portions before 16 bits least significant bit, obtain embeddable informational capacity.
2.2) encryption is carried out by Information hiding key pair secret information m and generates m '.
2.3) least significant bit of white portion pixel is replaced with using least significant bit replacement principle encrypted secret Confidential information m ' obtains tape identification encrypted image E'.
3) information extraction and image reconstruction (first extracting decrypted image after secret information)
3.1) secret information of white portion least significant bit insertion is read, it is decrypted by Information hiding key pair Obtain secret information m.
3.2) image E' is decrypted to obtain decrypted image using encryption key.
3.3) reversible extraction is carried out to decrypted image and obtains original image.Reversible extraction concrete operations are as follows:
A) S before readingauxThe least significant bit of bit forms auxiliary information sequence.
B) with opposite scanning sequency from black portions N' bit to NendBit extraction SLSBSequence, S before restoringaux The least significant bit of bit.
C) while extensive with opposite scanning sequency from the least significant bit for extracting white portion before black portions in N' bit These multiple white portion pixels.
D) by the way that recovery is decrypted to location information map, prevent overflow or underflow from changing the pixel of pixel value.
Extraction operation wherein in b, c is specific as follows:
{ (a is obtained according to four prediction histogram of error of generation and auxiliary informationn,bn), 0≤n≤3, by formula (6) into Row embedding information is extracted, and carries out image recovery by formula (7):
Wherein, a, b are respectively two extreme values of two pairs of extreme points pair.
4) information extraction and image reconstruction (extracting secret information after first decrypted image)
4.1) it is decrypted to obtain decrypted image using the pixel that encryption key conceals secret information to image E' removing
4.2) secret information of white portion least significant bit insertion is read, it is decrypted by Information hiding key pair Obtain secret information m.
4.3) reversible extraction is carried out to decrypted image and obtains original image.Reversible extraction step is the same as step 3.3.
Those skilled in the art can understand that the various operations crossed by discussion in the present invention, method, process In step, measure, scheme can be replaced, changed, combined or be deleted.Further, there is in the present invention mistake by discussion Various operations, method, other steps, measures, and schemes in process can also be replaced, change, reset, decomposing, combining or It deletes.Further, it is in the prior art have in various operations, method disclosed in the present invention, process step, arrange It applies, scheme may also be alternated, changed, rearranged, decomposed, combined or deleted.
Embodiments of the present invention are explained in detail above in conjunction with attached drawing, but the invention is not limited to above-mentioned Embodiment within the knowledge of a person skilled in the art can also be before not departing from present inventive concept It puts and makes a variety of changes.

Claims (10)

1. a kind of image encryption domain reversible information hidden method based on image segmentation and image space correlation, feature exist In comprising the following steps that
Step (1), encrypted image generate: being translated, carried out to original image I adaptive using prediction difference expansion and more histograms Reversible information insertion, generates image I ' to be encrypted;Encryption stream sequence r is generated using encryption key, by step-by-step exclusive or to image It carries out encryption and generates encrypted image E;
Step (2), information insertion: secret information m to be embedded is encrypted using information embedded key, the encryption to generation Information flow carries out the least significant bit of step-by-step replacement respective pixel, completes information insertion, obtains tape identification encrypted image E ';
Step (3), information extraction and image reconstruction select an execution following below scheme: decrypted image after secret information is first extracted, or Secret information is extracted after first decrypted image, specifically:
1) first extract secret information after decrypted image: the least significant bit for directly reading respective pixel obtains encoded information stream, benefit It is decrypted with Information hiding key, obtains secret information;Ciphering sequence stream is generated using encryption key, and step-by-step is carried out to image Exclusive or is decrypted to obtain decrypted image I ", is carried out using prediction difference expansion and the principle of more histograms translation to image reversible Restore;
2) extract secret information after first decrypted image: it is embedding to secret information is removed in image to generate ciphering sequence stream using encryption key Other bits of the least significant bit entered carry out step-by-step exclusive or and are decrypted to obtain decrypted image;Read the minimum of respective pixel Significance bit obtains encryption stream information, is decrypted using Information hiding key, obtains secret information;Using prediction difference expansion and The principle of more histogram translations carries out reversible recovery to image.
2. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 1 Hidden method, which is characterized in that encrypted image generation step is specific as follows:
Step 101, last column and last line for removing image, divide the image into three parts, i.e. grey parts: transverse and longitudinal coordinate Be all satisfied mod (i+j, 2)=1, black portions: abscissa meets mod (i+j, 2)=1, ordinate meets mod (i, 2)=0, white Color part: abscissa meets mod (i+j, 2)=1, ordinate meets mod (i, 2)=1;
Step 102 carries out prediction generation predicted value to the pixel x of black portionsGenerate prediction error
Step 103 calculates the pixel x of black portions its region complexity CM, is classified as four etc. according to the difference of the size of CM Grade, then all black pixel points have been divided into four grades, generate four prediction histogram of error;
Step 104 translates four prediction histogram of error using the method that two pairs of extreme points translate, by white portion picture The least significant bit of element is embedded;
A series of auxiliary informations required for adaptive feed-forward network part are continued to be embedded in by step 105 according to same embedding method Into black portions, image I ' is generated;
Step 106 generates encryption stream sequence r using encryption key, carries out encryption to image by step-by-step exclusive or and generates encryption figure Picture.
3. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 2 Hidden method, which is characterized in that the step 102 is to be predicted to carry out pixel value prediction according to diamond shape, specifically:
Wherein v1, v2, v3, v4Represent the adjacent pixel values up and down of pixel value x.
4. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 2 Hidden method, which is characterized in that region complexity is generated by the adjacent pixel values of x in the step 103:
CMi=| v1-v3|+|v2-v4| (2)
3 threshold values are chosen to meet:
By CMiIt is divided into 4 interval I0=[0, s0], I1=[s0+ 1, s1], I2=[s1+ 1, s2], I3=[s2+ 1, s3], CMiIt falls in pair The section CM answerediIt will be updated to j, generate four prediction histogram of error.
5. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 2 Hidden method, which is characterized in that the method that histogram of error translation is predicted in the step 104 is described as follows:
Wherein a < b, a, b are respectively two extreme values of two pairs of extreme points pair;
The selection of two pairs of extreme points of four prediction histogram of error is according to following three conditions:
A, for n ∈ { 0,1,2,3 }, an=-bn-1;
B, for n ∈ { 0,1,2,3 }, bn∈ { 0,1..., 7, ∞ };
c、b0≤b1≤b2≤b3
6. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 2 Hidden method, which is characterized in that auxiliary information includes: in the step 105
It 1) is the length for the location information map for preventing image pixel value overflow or underflow from utilizing;
2) by the location information map after length coding compression;
3)bn, n ∈ { 0,1,2,3 };
4)sn, n ∈ { 0,1,2 };
5) the last one processed pixel subscript after step 104 terminates;
Before all these auxiliary informations, the total length of these auxiliary informations is indicated using 8 bit sequences, it is assumed that it is all this The overall length of a little sequences is SauxBit records the preceding S of the image after step 104 is processedauxThe least significant bit of bit Formation sequence SLSB, by sequence SLSBIt is embedded into black portions according to processing mode same as step 104, then by SauxBit S before auxiliary information is replacedauxThe least significant bit of bit ultimately generates image I ' to be encrypted.
7. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 2 Hidden method, which is characterized in that it to image encryption is completed by xor operation in the step 106, specifically:
Assuming that the size of image I ' to be encrypted is W × L, pixel value XI, j' ∈ [0,255], 1≤i≤W, 1≤j≤L then encrypt figure As E is calculated by following formula:
Into the least significant bit of preceding 16 bits of picture black part, insertion represents embedding information after cryptographic operation completion 16 bit sequences of power capacity, the informational capacity that can be hidden with allowing Information hiding person to know.
8. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 1 Hidden method, which is characterized in that information Embedded step is specific as follows:
Step 201, the least significant bit for reading 16 bits before black portions, obtain embeddable informational capacity;
Step 202 carries out encryption generation m ' by Information hiding key pair secret information m;
Step 203, the least significant bit of white portion pixel replaced with using least significant bit replacement principle it is encrypted secret Confidential information m ' obtains tape identification encrypted image E '.
9. a kind of image encryption domain reversible information based on image segmentation and image space correlation according to claim 1 Hidden method, which is characterized in that in information extraction and image reconstruction step, such as to the reversible extraction concrete operations of decrypted image Under:
1) S before readingauxThe least significant bit of bit forms auxiliary information sequence;
2) with opposite scanning sequency from black portions the N ' bit to NendBit extraction SLSBSequence, S before restoringauxBit Least significant bit;
3) this while being restored from the least significant bit for extracting white portion before black portions in N ' bit with opposite scanning sequency A little white portion pixels;
4) by the way that recovery is decrypted to location information map, prevent overflow or underflow from changing the pixel of pixel value.
Wherein 2), 3) in extraction operation it is specific as follows:
{ (a is obtained according to the four of generation prediction histogram of error and auxiliary informationn, bn), 0≤n≤3 are carried out by formula (6) Embedding information is extracted, and carries out image recovery by formula (7):
Wherein a < b, a, b are respectively two extreme values of two pairs of extreme points pair.
10. a kind of image encryption domain reversible information based on image segmentation and image space correlation hides system, feature exists In, including encrypted image generation module, information insertion module, information extraction and image reconstruction module, in which:
The encrypted image generation module, is configured to perform following movement: original image is divided into the black not overlapped Partially, grey parts and white portion predict black portions pixel using the pixel of grey parts, generate prediction error The least significant bit of white portion pixel is embedded into black portions by the way of the translation of more histograms, is generated by histogram Image to be encrypted generates encryption stream sequence using encryption key and treats encrypted image and encrypted, and generates encrypted image, and by its It is sent to information insertion module;
The information is embedded in module, is configured to perform following movement: using information embedded key by secret information to be embedded into The least significant bit of encrypted secret information replacement image white part is completed the insertion of secret information, generated by row encryption The encrypted image of tape identification, and send it to information extraction and image reconstruction module;
The information extraction and image reconstruction module are configured to perform following movement: being extracted and image solution using secret information Close independence can carry out after first information extraction information after the operation of image decryption or first image decryption to receiving image respectively The invertibity guarantee of original image and secret information is completed in the operation of extraction.
CN201811073734.7A 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain Active CN109348228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811073734.7A CN109348228B (en) 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811073734.7A CN109348228B (en) 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain

Publications (2)

Publication Number Publication Date
CN109348228A true CN109348228A (en) 2019-02-15
CN109348228B CN109348228B (en) 2021-05-04

Family

ID=65305256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811073734.7A Active CN109348228B (en) 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain

Country Status (1)

Country Link
CN (1) CN109348228B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840895A (en) * 2019-02-19 2019-06-04 安徽大学 A kind of reversible colour of skin smoothing method and its original image restoration methods with reversible information hidden function
CN109949199A (en) * 2019-02-27 2019-06-28 北京交通大学 The reversible information hidden method adaptively extended based on two-dimensional prediction histogram of error
CN111988639A (en) * 2020-06-16 2020-11-24 北卡科技有限公司 Video encryption and decryption method based on national cryptographic algorithm and reversible steganography
CN112019699A (en) * 2019-12-16 2020-12-01 江苏水印科技有限公司 Encrypted image reversible information hiding method based on lossless compression
CN112052854A (en) * 2020-09-14 2020-12-08 南京信息工程大学 Medical image reversible information hiding method for realizing self-adaptive contrast enhancement
CN112132732A (en) * 2020-09-10 2020-12-25 宁波大学科学技术学院 Pixel prediction method of stereo image, reversible information hiding and extracting method, terminal and storage medium
CN112202984A (en) * 2020-09-25 2021-01-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
CN112333348A (en) * 2020-10-26 2021-02-05 吉林大学 Reversible data hiding method and system based on prediction error
CN113382127A (en) * 2021-06-10 2021-09-10 绍兴聚量数据技术有限公司 Encrypted image reversible information hiding method based on elastic selection and run length coding
CN113452688A (en) * 2021-06-24 2021-09-28 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms
CN115225771A (en) * 2022-07-08 2022-10-21 广东技术师范大学 Method and device for hiding reversible information of encrypted image and computer equipment
CN115604401A (en) * 2022-12-13 2023-01-13 无锡弘鼎软件科技有限公司(Cn) Traceable electronic seal encryption method
CN115842682A (en) * 2023-02-17 2023-03-24 杭银消费金融股份有限公司 Authority risk analysis method and system for network protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6546139B1 (en) * 1998-10-07 2003-04-08 Sony Corporation Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
JP2010288070A (en) * 2009-06-11 2010-12-24 Hitachi Kokusai Electric Inc Image coding apparatus
CN103414892A (en) * 2013-07-25 2013-11-27 西安空间无线电技术研究所 Method for hiding high-capacity compression-resisting image information
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image
CN107241597A (en) * 2017-05-05 2017-10-10 中国人民武装警察部队工程大学 A kind of reversible information hidden method of combination quaternary tree adaptive coding

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6546139B1 (en) * 1998-10-07 2003-04-08 Sony Corporation Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
JP2010288070A (en) * 2009-06-11 2010-12-24 Hitachi Kokusai Electric Inc Image coding apparatus
CN103414892A (en) * 2013-07-25 2013-11-27 西安空间无线电技术研究所 Method for hiding high-capacity compression-resisting image information
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image
CN107241597A (en) * 2017-05-05 2017-10-10 中国人民武装警察部队工程大学 A kind of reversible information hidden method of combination quaternary tree adaptive coding

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘瑞: "可逆水印技术及其在加密领域的研究算法", 《万方数据库》 *
程航: "基于图像块分组的加密域可逆信息隐藏", 《北京工业大学学报》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840895A (en) * 2019-02-19 2019-06-04 安徽大学 A kind of reversible colour of skin smoothing method and its original image restoration methods with reversible information hidden function
CN109949199A (en) * 2019-02-27 2019-06-28 北京交通大学 The reversible information hidden method adaptively extended based on two-dimensional prediction histogram of error
CN112019699A (en) * 2019-12-16 2020-12-01 江苏水印科技有限公司 Encrypted image reversible information hiding method based on lossless compression
CN111988639A (en) * 2020-06-16 2020-11-24 北卡科技有限公司 Video encryption and decryption method based on national cryptographic algorithm and reversible steganography
CN111988639B (en) * 2020-06-16 2022-10-21 北卡科技有限公司 Video encryption and decryption method based on cryptographic algorithm and reversible steganography
CN112132732A (en) * 2020-09-10 2020-12-25 宁波大学科学技术学院 Pixel prediction method of stereo image, reversible information hiding and extracting method, terminal and storage medium
CN112132732B (en) * 2020-09-10 2023-06-02 宁波大学科学技术学院 Pixel prediction method, reversible information hiding and extracting method, terminal and storage medium for stereoscopic image
CN112052854A (en) * 2020-09-14 2020-12-08 南京信息工程大学 Medical image reversible information hiding method for realizing self-adaptive contrast enhancement
CN112052854B (en) * 2020-09-14 2023-09-12 南京信息工程大学 Medical image reversible information hiding method for realizing self-adaptive contrast enhancement
CN112202984B (en) * 2020-09-25 2022-04-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
CN112202984A (en) * 2020-09-25 2021-01-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
CN112333348A (en) * 2020-10-26 2021-02-05 吉林大学 Reversible data hiding method and system based on prediction error
CN113382127A (en) * 2021-06-10 2021-09-10 绍兴聚量数据技术有限公司 Encrypted image reversible information hiding method based on elastic selection and run length coding
CN113452688A (en) * 2021-06-24 2021-09-28 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms
CN113452688B (en) * 2021-06-24 2022-07-08 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms
CN115225771A (en) * 2022-07-08 2022-10-21 广东技术师范大学 Method and device for hiding reversible information of encrypted image and computer equipment
CN115225771B (en) * 2022-07-08 2023-07-28 广东技术师范大学 Method and device for hiding reversible information of encrypted image and computer equipment
CN115604401A (en) * 2022-12-13 2023-01-13 无锡弘鼎软件科技有限公司(Cn) Traceable electronic seal encryption method
CN115842682A (en) * 2023-02-17 2023-03-24 杭银消费金融股份有限公司 Authority risk analysis method and system for network protection
CN115842682B (en) * 2023-02-17 2023-05-05 杭银消费金融股份有限公司 Authority risk analysis method and system for network protection

Also Published As

Publication number Publication date
CN109348228B (en) 2021-05-04

Similar Documents

Publication Publication Date Title
CN109348228A (en) A kind of hiding System and method for of the image encryption domain reversible information based on image segmentation and image space correlation
Puteaux et al. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images
Qin et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection
Yin et al. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression
CN112311954B (en) Ciphertext domain reversible information hiding method based on complementary code mark and bitmap embedding
Huang et al. High-capacity reversible data hiding in encrypted image based on specific encryption process
CN109803142B (en) Encrypted domain image reversible data hiding method based on neighborhood prediction
Ren et al. Reversible data hiding in encrypted binary images by pixel prediction
CN111861844A (en) Reversible watermarking method based on image block authentication
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN111898138B (en) Separable ciphertext domain reversible data hiding method
Anushiadevi et al. Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram
CN111464718B (en) Encryption image reversible information hiding method based on interpolation technology
CN114172630B (en) Reversible information hiding method based on addition homomorphic encryption and multi-high-order embedding
Gao et al. High-performance reversible data hiding in encrypted images with adaptive Huffman code
CN114493968A (en) Data hiding method based on most significant bit replacement and least significant bit compression
CN114666453A (en) Separable ciphertext domain reversible data hiding method based on bit plane segmentation
CN111915474B (en) Reversible encryption domain information hiding method based on integer transformation
Puteaux et al. High-capacity reversible data hiding in encrypted images using MSB prediction
CN113382127B (en) Encrypted image reversible information hiding method with elastic selection and run-length coding
Lin et al. Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding.
Vaish et al. A systematic review on various reversible data hiding techniques in digital images
Dhande et al. A Brief Review on Reversible Data Hiding in Encrypted Image
CN115348361B (en) Encryption image reversible data encryption and decryption method based on multi-MSB block coding
Sen et al. A contemplator on reversible data hiding in encrypted domain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant