CN109348228B - Reversible information hiding system and method for image encryption domain - Google Patents

Reversible information hiding system and method for image encryption domain Download PDF

Info

Publication number
CN109348228B
CN109348228B CN201811073734.7A CN201811073734A CN109348228B CN 109348228 B CN109348228 B CN 109348228B CN 201811073734 A CN201811073734 A CN 201811073734A CN 109348228 B CN109348228 B CN 109348228B
Authority
CN
China
Prior art keywords
image
information
encrypted
embedding
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201811073734.7A
Other languages
Chinese (zh)
Other versions
CN109348228A (en
Inventor
张毅锋
宋畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201811073734.7A priority Critical patent/CN109348228B/en
Publication of CN109348228A publication Critical patent/CN109348228A/en
Application granted granted Critical
Publication of CN109348228B publication Critical patent/CN109348228B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Facsimile Transmission Control (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an image encryption domain reversible information hiding method and system based on image segmentation and image space correlation. At an image sending end, an image owner divides an image into three parts through a designed image division algorithm: black, white and gray portions. Predicting a black part by using a gray part in a mode of combining prediction error expansion and multi-histogram translation, embedding the least significant bit of a white part into the black part of the image through a self-adaptive reversible information hiding algorithm, and generating an encrypted image through an encryption key; the information hiding person embeds the secret information into the image by hiding the secret key. At the image receiving end, the receiver can extract the secret information and then restore the original image, or can restore the original image and then extract the secret information, so that the reversibility of the secret information and the original image is realized. The invention has the advantages of good secrecy, large embedding capacity and the like.

Description

Reversible information hiding system and method for image encryption domain
Technical Field
The invention relates to an image encryption domain information hiding technology, and belongs to the technical field of reversible information hiding and image processing.
Background
As an important branch of the information security field, the information hiding technology has been developed rapidly in the new century, and is particularly applied to the fields of digital copyright, secret communication and the like. The reversible data hiding technology has been widely developed due to the characteristics of being capable of realizing reversible recovery of a carrier object and having higher embedding capacity, etc.
On the basis, in order to further ensure the secrecy of the image, a reversible information hiding algorithm based on an image encryption domain is provided. Reversible information hiding in a ciphertext domain serves as an important combination point of an encryption domain signal processing technology and an information hiding technology, a double insurance effect can be achieved for information safety in a data processing process, and especially with popularization of cloud services, reversible information hiding is one of important research points for achieving privacy protection in a cloud environment. There are two criteria for measuring the performance of the algorithm, namely information embedding capacity and distortion degree. The lower the distortion of the image under the same embedding capacity represents the better the integrity of the image, and the less easily the tampering operation of the image is found.
The encryption and decryption process and the information embedding and extraction process are crossed and restricted in the reversible algorithm of the ciphertext domain, so that a plurality of technical difficulties of reversible information hiding of the ciphertext domain are caused, and the method mainly comprises the following four points: firstly, distortion-free decryption of the embedded ciphertext and complete reversibility of carrier recovery are realized; secondly, high-capacity embedding in the ciphertext data; thirdly, the information extraction and decryption processes can be separated; and fourthly, ensuring the safety of the embedding process or the non-detectability of the information and the like. The main reasons for the above difficulties are: on one hand, the current information hiding technology greatly depends on the coding technology of a carrier, the media type or the property of a transform domain, the data characteristics of the carrier are necessarily required to be re-quantized and modified in the process of embedding information, but the encryption can cause the cleartext content to present the largest irregularity and uncertainty, and the original characteristics are difficult to extract and utilize. On the other hand, the modern encryption algorithm requires that the minimum change of the plaintext is also spread to the whole ciphertext space, so that the more the encrypted data modified in the embedding process is, the greater the distortion of the decryption result is, and therefore, the difficulty in embedding information or increasing the embedding capacity is higher under the condition of ensuring that the decryption is not distorted.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: in order to overcome the defects in the prior art, the invention provides an image encryption domain reversible information hiding system and method based on image segmentation and image space correlation, and aims to reduce the distortion degree of the information hiding system and improve the concealment of an encrypted image.
In order to solve the above technical problems, the present invention adopts the following technical means:
the invention firstly provides an image encryption domain reversible information hiding system based on image segmentation and image space correlation, which comprises an encrypted image generation module, an information embedding module and an information extraction and image reconstruction module, wherein:
the encrypted image generation module configured to perform the following actions: the image owner segments the original image into black, gray and white portions that do not overlap each other. The method comprises the steps of predicting black part pixels by utilizing gray part pixels to generate a prediction error histogram, embedding the least significant bit of the white part pixels into the black part in a multi-histogram translation mode to generate an image to be encrypted, generating an encryption stream sequence by utilizing an encryption key to encrypt the image to be encrypted, generating an encrypted image, and sending the encrypted image to an information embedding module.
The information embedding module configured to perform the following actions: the information embedder encrypts the secret information to be embedded by using the information embedding key, the encrypted secret information replaces the least significant bit of the white part of the image to complete the embedding of the secret information, an encrypted image with an identifier is generated, and the encrypted image is sent to the information extraction and image reconstruction module.
The information extraction and image reconstruction module is configured to perform the following actions: the image receiver can respectively carry out the operations of firstly extracting information and then decrypting the image or firstly decrypting the image and then extracting the information on the received image by utilizing the independence of secret information extraction and image decryption, thereby finishing the reversibility guarantee of the original image and the secret information.
The invention also provides an image encryption domain reversible information hiding method based on image segmentation and image space correlation, which is characterized by comprising the following steps of:
step (1), encrypted image generation: carrying out self-adaptive reversible information embedding on the original image I by utilizing prediction error expansion and multi-histogram translation to generate an image I' to be encrypted; generating an encrypted stream sequence r by using an encryption key, and encrypting the image by bitwise XOR to generate an encrypted image E;
step (2), information embedding: encrypting the secret information m to be embedded by using an information embedding key, and replacing the least significant bit of the corresponding pixel of the generated encrypted information stream according to the bit to complete information embedding to obtain an encrypted image E' with an identifier;
step (3), information extraction and image reconstruction, and one of the following processes is selected and executed: the method comprises the following steps of firstly extracting the secret information and then decrypting the image, or firstly decrypting the image and then extracting the secret information, and specifically comprises the following steps:
(1) firstly, extracting the secret information and then decrypting the image: directly reading the least significant bit of the corresponding pixel to obtain an encrypted information stream, and decrypting by using an information hiding key to obtain secret information; generating an encryption sequence stream by using an encryption key, carrying out bitwise XOR on the image to obtain a decrypted image I', and carrying out reversible recovery on the image by using the principles of prediction error expansion and multi-histogram translation;
(2) decrypting the image and extracting the secret information: generating an encryption sequence stream by using an encryption key to perform bitwise XOR decryption on other bits except the least significant bit embedded by the secret information in the image to obtain a decrypted image; reading the least significant bit of the corresponding pixel to obtain encrypted stream information, and decrypting by using an information hiding key to obtain secret information; and reversible recovery is carried out on the image by using the principles of prediction error expansion and multi-histogram translation.
Further, the image encryption domain reversible information hiding method based on image segmentation and image space correlation provided by the invention specifically comprises the following steps of:
step 101, removing the last column and the last row of the image, and dividing the image into three parts, namely a gray part: the horizontal and vertical coordinates all satisfy mod (i + j, 2) 1, black part: the abscissa satisfies mod (i + j, 2) 1, the ordinate satisfies mod (i, 2) 0, the white portion: the abscissa satisfies mod (i + j, 2) 1, and the ordinate satisfies mod (i, 2) 1;
step 102, predicting the pixel x of the black part to generate a predicted value
Figure GDA0002848075530000031
Generating prediction error
Figure GDA0002848075530000032
103, calculating the area complexity CM of the pixels x of the black part, and classifying the pixels x into four levels according to the size difference of the CM, so that all black pixel points are classified into four levels to generate four prediction error histograms;
step 104, translating the four prediction error histograms by using a method of translating two pairs of extreme points, and embedding the least significant bit of the white part pixel into the four prediction error histograms;
step 105, continuously embedding a series of auxiliary information required by the self-adaptive embedding part into the black part according to the same embedding rule to generate an image I';
and 106, generating an encrypted stream sequence r by using the encryption key, and encrypting the image by bitwise XOR to generate an encrypted image.
Further, in the method for hiding reversible information in the image encryption domain based on image segmentation and image spatial correlation provided by the present invention, the step 102 is to predict the pixel value according to diamond prediction:
Figure GDA0002848075530000033
wherein v is1,v2,v3,v4Representing the upper, lower, left and right adjacent pixel values of pixel value x.
Further, in the image encryption domain invertible information hiding method based on image segmentation and image spatial correlation provided by the present invention, the region complexity in step 103 is generated by adjacent pixel values of x:
CMi=|v1-v3|+|v2-v4| (2)
selecting 3 thresholds to satisfy:
Figure GDA0002848075530000034
to CMiDivided into 4 intervals I0=[0,s0],I1=[s0+1,s1],I2=[s1+1,s2],I3=[s2+1,s3],CMiFalls within the corresponding interval CMiIs updated to j, generating four prediction error histograms.
Further, in the image encryption domain invertible information hiding method based on image segmentation and image spatial correlation provided by the present invention, the method for predicting error histogram shift in step 104 is described as follows:
Figure GDA0002848075530000035
wherein a < b is the two extrema of the two pairs of extremum points.
The two extreme points of the four prediction error histograms are selected according to the following three conditions:
a. for n ∈ {0, 1, 2, 3}, an=-bn-1;
b. For n ∈ {0, 1, 2, 3}, bn∈{0,1…,7,∞};
c、b0≤b1≤b2≤b3
Further, according to the present invention, an image encryption domain reversible information hiding method based on image segmentation and image spatial correlation is provided, where the auxiliary information in step 105 includes:
1) the length of the location information map utilized to prevent overflow or underflow of image pixel values;
2) the position information map after the length coding compression;
3)bn,n∈{0,1,2,3};
4)sn,n∈{0,1,2};
5) the last processed pixel index after the end of step 104;
in front of all these side information, the total length of these side information is represented by an 8-bit sequence, assuming that the total length of all these sequences is SauxBit, recording the top S of the image processed in step 104auxLeast significant bit generation sequence S of bitsLSBThe sequence SLSBEmbedding the black part in the same way as step 104, and then embedding SauxBit side information pre-replacement SauxAnd finally generating an image I' to be encrypted by using the least significant bits of the bits.
Further, according to the image encryption domain reversible information hiding method based on image segmentation and image spatial correlation provided by the present invention, the image encryption in step 106 is completed through an exclusive or operation.
Assuming that the size of the image I' to be encrypted is W × L, the pixel value Xi,j′∈[0,255]If i is more than or equal to 1 and less than or equal to W and j is more than or equal to 1 and less than or equal to L, the encrypted image E is calculated by the following formula:
Figure GDA0002848075530000041
after the encryption operation is completed, a 16-bit sequence representing the capacity of embedding information is embedded in the least significant bits of the first 16 bits of the black part of the image, so that the information hiding person can know the total amount of information which can be hidden.
Further, the image encryption domain reversible information hiding method based on image segmentation and image space correlation provided by the invention specifically comprises the following information embedding steps:
step 201, reading the first 16 least significant bits of the black part to obtain the total amount of embeddable information;
step 202, encrypting the secret information m by an information hiding key to generate m';
and step 203, replacing the least significant bit of the white part pixel with the encrypted secret information m 'by using a least significant bit replacement principle to obtain the encrypted image E' with the identification.
Further, according to the image encryption domain reversible information hiding method based on image segmentation and image spatial correlation provided by the present invention, the steps of information extraction and image reconstruction (firstly extracting the secret information and then decrypting the image) are specifically as follows:
step 301, reading the secret information embedded by the least significant bit of the white part, and decrypting the secret information by using an information hiding key to obtain secret information m;
step 302, decrypting the image E' by using the encryption key to obtain a decrypted image;
and step 303, carrying out reversible extraction on the decrypted image to obtain an original image.
Further, according to the image encryption domain reversible information hiding method based on image segmentation and image spatial correlation provided by the present invention, the information extraction and image reconstruction steps (firstly, decrypting the image and then extracting the secret information) are specifically as follows:
step 401, decrypting the pixel of the image E' without the hidden secret information by using the encryption key to obtain a decrypted image;
step 402, reading the secret information embedded by the least significant bit of the white part, and decrypting the secret information by using an information hiding key to obtain secret information m;
and step 403, performing reversible extraction on the decrypted image to obtain an original image.
Further, the method for hiding reversible information in image encryption domain based on image segmentation and image spatial correlation provided by the present invention is characterized in that the reversible extraction of decrypted image in steps 303 and 403 specifically comprises the following operations:
1) s before readingauxThe least significant bit of the bits constitutes an auxiliary information sequence;
2) from the Nth' bit to the Nth bit of the black part in the reverse scanning orderendBit extraction SLSBSequence, S before recoveryauxThe least significant bit of the bit;
3) extracting the least significant bits of the white portion from the first N' bits of the black portion in a reverse scan order while recovering the white portion pixels;
4) by decrypting the location information map for recovery, pixels whose pixel values are changed by overflow or underflow are prevented.
Wherein the extraction operations in 2) and 3) are as follows:
obtaining { (a) from the generated four prediction error histograms and the side informationn,bn) N is more than or equal to 0 and less than or equal to 3, embedded information is extracted through an equation (6), and image restoration is performed through an equation (7):
Figure GDA0002848075530000051
Figure GDA0002848075530000052
wherein a < b, a and b are two extreme values of the two pairs of extreme value points respectively.
By adopting the technical scheme, compared with the prior art, the invention has the advantages that:
the invention combines the image space correlation with the image encryption domain, can effectively realize the reversible hiding of the secret information in the image encryption domain, and compared with the existing correlation method, the invention not only better utilizes the self characteristics of the image to carry out reversible information operation, but also greatly reduces the distortion degree of the information embedded image. On one hand, distortion in the image hiding process is greatly reduced by utilizing multi-histogram translation and prediction error expansion, on the other hand, independence of image decryption and information extraction operation of a receiving party is realized, and image content is better protected.
Drawings
FIG. 1 is a block diagram of the system of the present invention.
FIG. 2 is a processing flow chart of an image encryption domain reversible information hiding method based on image segmentation and image spatial correlation according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clearly and completely understood, the technical solutions of the present invention are described below with reference to the following embodiments and the accompanying fig. 1-2 of the specification, and it is obvious that the specific embodiments described herein are only used for explaining the present invention and are not used for limiting the present invention.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The invention combines the multi-histogram translation and prediction error expansion algorithm with the encryption domain information hiding, reduces the distortion degree of the image encryption domain information hiding, and improves the image hiding performance.
Example 1:
as shown in fig. 1, the present invention firstly proposes an image encryption domain reversible information hiding system based on image segmentation and image spatial correlation, the system includes an encrypted image generation module, an information embedding module, and an information extraction and image reconstruction module, wherein:
the encrypted image generation module configured to perform the following actions: the image owner segments the original image into black, gray and white portions that do not overlap each other. The method comprises the steps of predicting black part pixels by utilizing gray part pixels to generate a prediction error histogram, embedding the least significant bit of the white part pixels into the black part in a multi-histogram translation mode to generate an image to be encrypted, generating an encryption stream sequence by utilizing an encryption key to encrypt the image to be encrypted, generating an encrypted image, and sending the encrypted image to an information embedding module.
The information embedding module configured to perform the following actions: the information embedder encrypts the secret information to be embedded by using the information embedding key, the encrypted secret information replaces the least significant bit of the white part of the image to complete the embedding of the secret information, an encrypted image with an identifier is generated, and the encrypted image is sent to the information extraction and image reconstruction module.
The information extraction and image reconstruction module is configured to perform the following actions: the image receiver can respectively carry out the operations of firstly extracting information and then decrypting the image or firstly decrypting the image and then extracting the information on the received image by utilizing the independence of secret information extraction and image decryption, thereby finishing the reversibility guarantee of the original image and the secret information.
Example 2:
as shown in fig. 2, the present invention further provides an image encryption domain reversible information hiding method based on image segmentation and image spatial correlation, which comprises the following specific steps:
1) and (3) encrypted image generation:
1.1) remove the last column and the last row of the image, divide the image into three parts, namely the gray part: the horizontal and vertical coordinates all satisfy mod (i + j, 2) 1, black part: the abscissa satisfies mod (i + j, 2) 1, the ordinate satisfies mod (i, 2) 0, the white portion: the abscissa satisfies mod (i + j, 2) 1, and the ordinate satisfies mod (i, 2) 1;
1.2) carrying out pixel value prediction on pixels x of a black part according to diamond prediction:
Figure GDA0002848075530000071
wherein v is1,v2,v3,v4Representing the upper, lower, left and right adjacent pixel values of pixel value x. Predicting to generate predicted values
Figure GDA0002848075530000072
Generating prediction error
Figure GDA0002848075530000073
1.3) calculating the area complexity CM for the pixels x of the black part:
CMi=|v1-v3|+|v2-v4| (2)
selecting 3 thresholds to satisfy:
Figure GDA0002848075530000074
to CMiDivided into 4 intervals I0=[0,s0],I1=[s0+1,s1],I2=[s1+1,s2],I3=[s2+1,s3],CMiIn which interval CM fallsiIs updated to j, generating four prediction error histograms.
1.4) translating the four prediction error histograms by using a method of translating two pairs of extreme points, and embedding the least significant bit of the white part pixel into the four prediction error histograms;
Figure GDA0002848075530000075
wherein a < b is the two extrema of the two pairs of extremum points.
The two extreme points of the four prediction error histograms are selected according to the following three conditions:
a. for n ∈ {0, 1, 2, 3}, an=-bn-1;
b. For n ∈ {0, 1, 2, 3}, bn∈{0,1…,7,∞};
c、b0≤b1≤b2≤b3
1.5) continuously embedding a series of auxiliary information required by the adaptive embedding part into the black part according to the same embedding rule, wherein the auxiliary information comprises:
a) the length of the location information map utilized to prevent overflow or underflow of image pixel values;
b) the position information map after the length coding compression;
c)bn,n∈{0,1,2,3};
d)sn,n∈{0,1,2};
e) the last processed pixel index after step 1.4 ends.
In front of all these side information, the total length of these side information is represented by an 8-bit sequence, assuming that the total length of all these sequences is SauxBit, recording the top S of the image processed in step 104auxLeast significant bit generation sequence S of bitsLSBThe sequence SLSBEmbedding the black part in the same way as step 104, and then embedding SauxBit side information pre-replacement SauxAnd finally generating an image I' to be encrypted by using the least significant bits of the bits.
Generating an image I';
1.6) generating an encrypted stream sequence r using the encryption key, assuming the size of the image I' to be encryptedIs W × L, pixel value Xi,j′∈[0,255]If i is more than or equal to 1 and less than or equal to W and j is more than or equal to 1 and less than or equal to L, the encrypted image E is calculated by the following formula:
Figure GDA0002848075530000081
after the encryption operation is completed, a 16-bit sequence representing the capacity of embedding information is embedded in the least significant bits of the first 16 bits of the black part of the image, so that the information hider knows the total amount of information he can hide.
2) Information embedding:
2.1) reading the least significant bit of the first 16 bits of the black part to obtain the total amount of embeddable information.
2.2) generating m' by encrypting the secret information m through the information hiding key.
2.3) replacing the least significant bit of the white part pixel with the encrypted secret information m 'by using the least significant bit replacement principle to obtain the encrypted image E' with the identification.
3) Information extraction and image reconstruction (extracting secret information and then decrypting image)
3.1) reading the secret information embedded by the least significant bit of the white part, and decrypting the secret information by using the information hiding key to obtain the secret information m.
3.2) decrypting the image E' by using the encryption key to obtain a decrypted image.
And 3.3) carrying out reversible extraction on the decrypted image to obtain an original image. The reversible extraction is specifically performed as follows:
a) s before readingauxThe least significant bits of the bits constitute the auxiliary information sequence.
b) From the Nth' bit to the Nth bit of the black part in the reverse scanning orderendBit extraction SLSBSequence, S before recoveryauxThe least significant bit of the bit.
c) The least significant bits of the white portion are extracted from the first N' bits of the black portion in the reverse scan order while recovering the white portion pixels.
d) By decrypting the location information map for recovery, pixels whose pixel values are changed by overflow or underflow are prevented.
Wherein the extraction operations in b and c are as follows:
from the generation of four prediction error histograms and side information results { (a)n,bn) N is more than or equal to 0 and less than or equal to 3, embedded information is extracted through an equation (6), and image restoration is performed through an equation (7):
Figure GDA0002848075530000091
Figure GDA0002848075530000092
wherein, a and b are two extreme values of two pairs of extreme value points respectively.
4) Information extraction and image reconstruction (decryption of image and extraction of secret information)
4.1) decrypting the pixels of the image E' without the hidden secret information by using the encryption key to obtain a decrypted image
4.2) reading the secret information embedded by the least significant bit of the white part, and decrypting the secret information by the information hiding key to obtain the secret information m.
And 4.3) carrying out reversible extraction on the decrypted image to obtain an original image. The reversible extraction procedure is the same as step 3.3.
Those of skill in the art will appreciate that the various operations, methods, steps in the processes, acts, or solutions discussed in the present application can be interchanged, modified, combined, or eliminated. Further, various operations, methods, steps in the flows, which have been discussed in the present application, may be interchanged, modified, rearranged, decomposed, combined, or eliminated. Further, steps, measures, schemes in the various operations, methods, procedures disclosed in the prior art and the present invention can also be alternated, changed, rearranged, decomposed, combined, or deleted.
The embodiments of the present invention have been described in detail with reference to the drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (1)

1. An image encryption domain reversible information hiding method based on image segmentation and image spatial correlation is characterized by comprising the following steps:
step (1), encrypted image generation: carrying out self-adaptive reversible information embedding on the original image I by utilizing prediction error expansion and multi-histogram translation to generate an image I' to be encrypted; generating an encrypted stream sequence r by using an encryption key, and encrypting the image by bitwise XOR to generate an encrypted image E;
step (2), information embedding: encrypting the secret information m to be embedded by using an information embedding key, and replacing the least significant bit of the corresponding pixel of the generated encrypted information stream according to the bit to complete information embedding to obtain an encrypted image E' with an identifier;
step (3), information extraction and image reconstruction, and one of the following processes is selected and executed: the method comprises the following steps of firstly extracting the secret information and then decrypting the image, or firstly decrypting the image and then extracting the secret information, and specifically comprises the following steps:
1) firstly, extracting the secret information and then decrypting the image: directly reading the least significant bit of the corresponding pixel to obtain an encrypted information stream, and decrypting by using an information hiding key to obtain secret information; generating an encryption sequence stream by using an encryption key, carrying out bitwise XOR on the image to obtain a decrypted image I', and carrying out reversible recovery on the image by using the principles of prediction error expansion and multi-histogram translation;
2) decrypting the image and extracting the secret information: generating an encryption sequence stream by using an encryption key to perform bitwise XOR decryption on other bits except the least significant bit embedded by the secret information in the image to obtain a decrypted image; reading the least significant bit of the corresponding pixel to obtain encrypted stream information, and decrypting by using an information hiding key to obtain secret information; reversible recovery is carried out on the image by using the principles of prediction error expansion and multi-histogram translation;
the steps of generating the encrypted image are as follows:
step 101, removing the last column and the last row of the image, and dividing the image into three parts, namely a gray part: the horizontal and vertical coordinates all satisfy mod (i + j, 2) 1, black part: the abscissa satisfies mod (i + j, 2) 1, the ordinate satisfies mod (i, 2) 0, the white portion: the abscissa satisfies mod (i + j, 2) 1, and the ordinate satisfies mod (i, 2) 1;
step 102, predicting the pixel x of the black part to generate a predicted value
Figure FDA0002848075520000011
Generating prediction error
Figure FDA0002848075520000012
103, calculating the area complexity CM of the pixels x of the black part, and classifying the pixels x into four levels according to the size difference of the CM, so that all black pixel points are classified into four levels to generate four prediction error histograms;
step 104, translating the four prediction error histograms by using a method of translating two pairs of extreme points, and embedding the least significant bit of the white part pixel into the four prediction error histograms;
step 105, continuously embedding a series of auxiliary information required by the self-adaptive embedding part into the black part according to the same embedding rule to generate an image I';
106, generating an encryption stream sequence r by using an encryption key, and encrypting the image by bitwise XOR to generate an encrypted image;
the step 102 is to perform pixel value prediction according to diamond prediction, specifically:
Figure FDA0002848075520000021
wherein v is1,v2,v3,v4Adjacent pixel values above, below, to the left, and to the right of the representative pixel value x;
the region complexity in step 103 is generated by the neighboring pixel values of x:
CMi=|v1-v3|+|v2-v4| (2)
selecting 3 thresholds to satisfy:
Figure FDA0002848075520000022
to CMiDivided into 4 intervals I0=[0,s0],I1=[s0+1,s1],I2=[s1+1,s2],I3=[s2+1,s3],CMiFalls within the corresponding interval CMiWill be updated to j, generating four prediction error histograms;
the method for predicting the shift of the error histogram in step 104 is described as follows:
Figure FDA0002848075520000023
wherein a is less than b, and a and b are two extreme values of the two pairs of extreme value points respectively;
the two extreme points of the four prediction error histograms are selected according to the following three conditions:
a. for n ∈ {0, 1, 2, 3}, an=-bn-1;
b. For n ∈ {0, 1, 2, 3}, bn∈{0,1...,7,∞};
c、b0≤b1≤b2≤b3
The auxiliary information in step 105 includes:
1) the length of the location information map utilized to prevent overflow or underflow of image pixel values;
2) the position information map after the length coding compression;
3)bn,n∈{0,1,2,3};
4)sn,n∈{0,1,2};
5) the last processed pixel index after the end of step 104;
in front of all these side information, the total length of these side information is represented by an 8-bit sequence, assuming that the total length of all these sequences is SauxBit, recording the top S of the image processed in step 104auxLeast significant bit generation sequence S of bitsLSBThe sequence SLSBEmbedding the black part in the same way as step 104, and then embedding SauxBit side information pre-replacement SauxThe least significant bit of the bit finally generates an image I' to be encrypted;
the encrypting the image in step 106 is completed through an exclusive or operation, specifically:
assuming that the size of the image I' to be encrypted is W × L, the pixel value Xi,j′∈[0,255]If i is more than or equal to 1 and less than or equal to W and j is more than or equal to 1 and less than or equal to L, the encrypted image E is calculated by the following formula:
Figure FDA0002848075520000031
embedding a 16-bit sequence representing the capacity of information embedding capacity in the least significant bits of the first 16 bits of the black part of the image after the encryption operation is finished so as to enable an information hiding person to know the total amount of information which can be hidden;
the information embedding step is specifically as follows:
step 201, reading the first 16 least significant bits of the black part to obtain the total amount of embeddable information;
step 202, encrypting the secret information m by an information hiding key to generate m';
step 203, replacing the least significant bit of the white part pixel with the encrypted secret information m 'by using a least significant bit replacement principle to obtain an encrypted image E' with an identifier;
in the information extraction and image reconstruction steps, the reversible extraction of the decrypted image specifically operates as follows:
1) s before readingauxThe least significant bit of the bits constitutes an auxiliary information sequence;
2) from the Nth' bit to the Nth bit of the black part in the reverse scanning orderendBit extraction SLSBSequence, S before recoveryauxThe least significant bit of the bit;
3) extracting the least significant bits of the white portion from the first N' bits of the black portion in a reverse scan order while recovering the white portion pixels;
4) through carrying out decryption recovery on the position information map, pixels with changed pixel values by overflow or underflow are prevented;
wherein the extraction operations in 2) and 3) are as follows:
obtaining { (a) from the generated four prediction error histograms and the side informationn,bn) N is more than or equal to 0 and less than or equal to 3, embedded information is extracted through an equation (6), and image restoration is performed through an equation (7):
Figure FDA0002848075520000032
Figure FDA0002848075520000033
wherein a is less than b, and a and b are two extreme values of the two pairs of extreme value points respectively.
CN201811073734.7A 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain Expired - Fee Related CN109348228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811073734.7A CN109348228B (en) 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811073734.7A CN109348228B (en) 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain

Publications (2)

Publication Number Publication Date
CN109348228A CN109348228A (en) 2019-02-15
CN109348228B true CN109348228B (en) 2021-05-04

Family

ID=65305256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811073734.7A Expired - Fee Related CN109348228B (en) 2018-09-14 2018-09-14 Reversible information hiding system and method for image encryption domain

Country Status (1)

Country Link
CN (1) CN109348228B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840895B (en) * 2019-02-19 2021-03-12 安徽大学 Reversible skin color smoothing method with reversible information hiding function and original image recovery method thereof
CN109949199B (en) * 2019-02-27 2021-03-02 北京交通大学 Reversible information hiding method based on two-dimensional prediction error histogram adaptive expansion
CN112019699A (en) * 2019-12-16 2020-12-01 江苏水印科技有限公司 Encrypted image reversible information hiding method based on lossless compression
CN111988639B (en) * 2020-06-16 2022-10-21 北卡科技有限公司 Video encryption and decryption method based on cryptographic algorithm and reversible steganography
CN112132732B (en) * 2020-09-10 2023-06-02 宁波大学科学技术学院 Pixel prediction method, reversible information hiding and extracting method, terminal and storage medium for stereoscopic image
CN112052854B (en) * 2020-09-14 2023-09-12 南京信息工程大学 Medical image reversible information hiding method for realizing self-adaptive contrast enhancement
CN112202984B (en) * 2020-09-25 2022-04-08 中国人民武装警察部队工程大学 Ciphertext domain reversible information hiding method based on error correction redundancy
CN112333348B (en) * 2020-10-26 2021-08-24 吉林大学 Reversible data hiding method and system based on prediction error
CN113382127B (en) * 2021-06-10 2023-06-20 绍兴聚量数据技术有限公司 Encrypted image reversible information hiding method with elastic selection and run-length coding
CN113452688B (en) * 2021-06-24 2022-07-08 山东三未信安信息科技有限公司 Image encryption and decryption method and device based on SM4 and SM2 algorithms
CN115225771B (en) * 2022-07-08 2023-07-28 广东技术师范大学 Method and device for hiding reversible information of encrypted image and computer equipment
CN115604401B (en) * 2022-12-13 2023-03-03 无锡弘鼎软件科技有限公司 Traceable electronic seal encryption method
CN115842682B (en) * 2023-02-17 2023-05-05 杭银消费金融股份有限公司 Authority risk analysis method and system for network protection
CN116260915B (en) * 2023-03-02 2024-07-30 西南交通大学 Differential security encryption image reversible information hiding method based on two-dimensional classification mark

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6546139B1 (en) * 1998-10-07 2003-04-08 Sony Corporation Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
JP2010288070A (en) * 2009-06-11 2010-12-24 Hitachi Kokusai Electric Inc Image coding apparatus
CN103414892A (en) * 2013-07-25 2013-11-27 西安空间无线电技术研究所 Method for hiding high-capacity compression-resisting image information
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image
CN107241597A (en) * 2017-05-05 2017-10-10 中国人民武装警察部队工程大学 A kind of reversible information hidden method of combination quaternary tree adaptive coding

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6546139B1 (en) * 1998-10-07 2003-04-08 Sony Corporation Coding apparatus and method, decoding apparatus and method, data processing system, storage medium, and signal
JP2010288070A (en) * 2009-06-11 2010-12-24 Hitachi Kokusai Electric Inc Image coding apparatus
CN103414892A (en) * 2013-07-25 2013-11-27 西安空间无线电技术研究所 Method for hiding high-capacity compression-resisting image information
CN105847629A (en) * 2016-03-18 2016-08-10 大连大学 Reversible information hiding method for encrypted image
CN107241597A (en) * 2017-05-05 2017-10-10 中国人民武装警察部队工程大学 A kind of reversible information hidden method of combination quaternary tree adaptive coding

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
可逆水印技术及其在加密领域的研究算法;刘瑞;《万方数据库》;20160330;第3-5章 *
基于图像块分组的加密域可逆信息隐藏;程航;《北京工业大学学报》;20160531;全文 *

Also Published As

Publication number Publication date
CN109348228A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN109348228B (en) Reversible information hiding system and method for image encryption domain
Puteaux et al. An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images
Qin et al. Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection
Yin et al. Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression
Puyang et al. Reversible data hiding in encrypted images with two-MSB prediction
CN112311954B (en) Ciphertext domain reversible information hiding method based on complementary code mark and bitmap embedding
Huang et al. High-capacity reversible data hiding in encrypted image based on specific encryption process
CN109348230B (en) Ciphertext domain high-capacity image reversible data hiding method
Ren et al. Reversible data hiding in encrypted binary images by pixel prediction
Qiu et al. High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding
CN111898138B (en) Separable ciphertext domain reversible data hiding method
CN111861844A (en) Reversible watermarking method based on image block authentication
CN113114869B (en) Ciphertext domain high-capacity image reversible data hiding method based on MSB prediction
CN111464718B (en) Encryption image reversible information hiding method based on interpolation technology
Mo et al. Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation.
CN112132736A (en) Encryption image reversible information hiding method based on interpolation technology
CN114493968B (en) Data hiding method based on most significant bit replacement and least significant bit compression
CN114172630B (en) Reversible information hiding method based on addition homomorphic encryption and multi-high-order embedding
CN115001689A (en) High-embedding-rate reversible data hiding method and system capable of resisting internal attack
CN111915474B (en) Reversible encryption domain information hiding method based on integer transformation
CN117640851A (en) Encryption domain reversible information hiding method based on bit plane reassignment
CN116405182A (en) Reversible information hiding method based on recursion structure and blocking thought
Puteaux et al. High-capacity reversible data hiding in encrypted images using MSB prediction
Angreni et al. Enhancing DE-based data hiding method by controlling the expansion
CN108962267A (en) A kind of encryption voice content authentication method based on Hash feature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210504