CN111432216A - Content protection method and recovery method for sensitive area in JPEG image - Google Patents
Content protection method and recovery method for sensitive area in JPEG image Download PDFInfo
- Publication number
- CN111432216A CN111432216A CN202010127046.5A CN202010127046A CN111432216A CN 111432216 A CN111432216 A CN 111432216A CN 202010127046 A CN202010127046 A CN 202010127046A CN 111432216 A CN111432216 A CN 111432216A
- Authority
- CN
- China
- Prior art keywords
- coefficient
- sub
- image
- current
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/134—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
- H04N19/167—Position within a video image, e.g. region of interest [ROI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/169—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding
- H04N19/17—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object
- H04N19/176—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a block, e.g. a macroblock
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/90—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
- H04N19/91—Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The invention discloses a content protection method and a recovery method for a sensitive area in a JPEG image, wherein the content protection method comprises the following steps: selecting one or more sensitive areas needing protection by a user; randomly scrambling the JPEG image sub-blocks containing the selected area, and reversibly embedding the original number of each scrambled sub-block into the DCT coefficients of the sub-block; then reversibly embedding the position information of all sensitive regions into the DCT coefficients of the whole image; thereby obtaining a protected JPEG image. The recovery method adopts the opposite steps, firstly, information is extracted from the protected JPEG image DCT coefficient to find out all scrambled sub-blocks, an original number is extracted from each scrambled sub-block, and the position of the sub-block is adjusted according to the original number to recover the original image. By adopting the method to protect the JPEG image content, an unauthorized user can only see an unprotected non-sensitive area, and an authorized user can restore the original image without distortion through a recovery method.
Description
Technical Field
The invention belongs to the field of digital image content protection and reversible information hiding and recovery, and particularly relates to a content protection method and a recovery method based on JPEG image and reversible data hiding.
Background
In recent years, sharing photos through cloud storage or social media is becoming more popular, and meanwhile, protection of privacy of private photos is more challenging, and the application scenes are convenient for users on one hand and bring about potential safety hazards on the other hand. An image often presents sensitive areas that may contain specific people, things, backgrounds, etc. that may be a nuisance or a hazard to the user's life after the image is disseminated. Limited by storage spaces of intelligent devices such as mobile phones and the like, users select to upload some images with personal privacy to a social platform or a private cloud storage, however, the social platform and some cloud storage servers are not assault, some domestic and foreign social platforms and cloud storage service providers are attacked by hackers, and sensitive privacy images of the users are leaked.
Common methods for protecting image content from leakage are encryption techniques and reversible data hiding techniques. The encryption technology solves the problem of leakage of secret information to a certain extent, but the secret information has a special form of messy codes which may cause the attention of an attacker, and the possibility of cracking the secret information is increased. The reversible data hiding technology is a technology for embedding information into images, videos and audios in a concealed mode, and the technology ensures that original data can be recovered completely without errors while the embedded information is extracted, so that the content of a secret file is protected, and the attention of an attacker can be avoided in the communication process.
One of the existing methods for protecting image content is to encrypt the whole image, but this method increases the space required for storing the image and the transmission bandwidth of the network because the whole image is encrypted, and an unauthorized user cannot see the non-sensitive area of the protected image. Another category is that the local sensitive area can be protected, but it cannot be guaranteed that the authorized user obtains the original image completely without distortion.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a content protection method and a recovery method for sensitive areas in JPEG images.
The purpose of the invention is realized by the following technical scheme: a content protection method for sensitive areas in JPEG images comprises the following steps:
selecting a sensitive area needing to be protected on an original JPEG image, and recording the position information of each area;
entropy decoding the original JPEG image to obtain a DCT coefficient corresponding to the image after quantization, and splitting the DCT coefficient after quantization into subblocks; numbering all sub-blocks in each sensitive area respectively;
randomly scrambling all sub-blocks in each sensitive area needing protection, and reversibly embedding the original number of each scrambled sub-block into the AC coefficient of the sub-block;
reversibly embedding the position information of each sensitive area needing to be protected into the image AC coefficient;
and performing entropy coding to generate a protected JPEG image.
Preferably, the selected sensitive area is rectangular, the position information of each rectangular area is recorded, the position information comprises the coordinates of the upper left corner of the rectangular area and the width and the height of the area, the upper left corner of the image is used as the origin of a coordinate system, the positive direction of the X coordinate is horizontally towards the right, and the positive direction of the Y coordinate is vertically downwards.
Preferably, for each sensitive area needing protection, the sub-blocks in the area are scanned in a certain sequence, the sub-blocks are numbered according to the sequence, and the corresponding number of each sub-block is reversibly embedded into the selected AC coefficient of the sub-block.
Further, if the number of each sub-block is decimal, converting the decimal number into a binary bit, embedding the binary bit into the selected AC coefficient of each sub-block, and setting the binary representation of the number of each sub-block as ciLet the original DCT coefficient be giThen embed ciRear DCT coefficient g'i=gi×2+ci。
Preferably, for each sensitive area to be protected, all sub-blocks within the area are randomly scrambled, and the random positions of the sub-blocks participating in the scrambling are generated by a pseudo-random number generator.
Preferably, the position information of each sensitive area to be protected is reversibly embedded into the image AC coefficients by:
reversibly embedding the position information of each sensitive area into the positions with the AC coefficients of-1 and 1, wherein the specific method comprises the following steps: scanning the AC coefficients of all the sub-blocks of the image according to a certain sequence, and if the current embedded value is 0, keeping the coefficient of the current position unchanged; if the current embedded value is 1, the following determination is performed:
if the AC coefficient of the current position is 1, the AC coefficient becomes 2,
if the AC coefficient of the current position is-1, the AC coefficient becomes-2,
if the current position AC coefficient is not 1, -1, 0, if the current coefficient is greater than 0, the coefficient is added with 1, if the current coefficient is less than 0, the coefficient is subtracted with 1 until all the position information is embedded.
A content recovery method for sensitive areas in JPEG images comprises the following steps:
entropy decoding the protected JPEG image to obtain a quantized DCT coefficient, and splitting the quantized DCT coefficient into coefficient sub-blocks;
extracting the position information of all sensitive areas;
finding out all scrambled sub-blocks according to the position information of all sensitive areas;
extracting the original number of each scrambled sub-block from each scrambled sub-block;
and adjusting the positions of the sub-blocks according to the original numbers of the scrambled word blocks to restore the original image.
Preferably, the method of extracting the position information of all the sensitive areas comprises the following steps:
according to the scanning sequence when the subblocks are scrambled, if the AC coefficient value of the current position is-1 or 1, extracting embedded information 0, wherein the current coefficient is unchanged, if the AC coefficient value of the current position is-2, extracting embedded information 1, adding 1 to the current coefficient, and if the AC coefficient value of the current position is 2, extracting embedded information 1 and subtracting 1 from the current coefficient; if the current position AC coefficient is larger than 2, the coefficient is subtracted by 1, and if the current coefficient value is smaller than-2, the coefficient is added by 1 until all position information is extracted.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention can only carry out content protection on one or more selected sensitive areas in the JPEG image needing to be protected without processing the whole image, thereby reducing the required storage space and the bandwidth of network transmission and enabling an unauthorized user to see unprotected non-sensitive areas. In addition, for authorized users, the original image can be restored without distortion through a recovery method, and further the requirements of unauthorized users and authorized users can be met simultaneously.
Drawings
FIG. 1 is a flow chart of a content protection method in the present invention;
FIG. 2 is a flow chart of a content retrieval method according to the present invention;
FIG. 3 is a schematic view of the sequence of ZigZag;
fig. 4 is a comparison diagram of sensitive area content protection in JPEG images by the method of the present invention, wherein (a) represents the original JPEG image, (b) represents the image processed by the content protection method of the present invention, and (c) represents the original image restored by the content restoration method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Examples
The flows of the content protection method and the recovery method for sensitive areas in JPEG images according to this embodiment are respectively shown in fig. 1 and 2, and as shown in fig. 3, the zigbee sequence is to rearrange 8 × 8 matrix blocks according to the arrow moving direction, and the steps of the above method will be specifically described with respect to the original image shown in fig. 4 (a).
Referring to fig. 1, to protect the content of a sensitive area in an original JPEG image, the method is as follows:
s1.1, selecting N (N ═ 1) sensitive rectangular areas needing privacy protection, and recording the coordinates (Px) of the upper left corner of each rectangular areai,Pyi) And width bw of the regioniAnd a high bhi(i ≦ N). The upper left corner of the image is used as the origin of a coordinate system, the positive direction of the X coordinate is horizontally towards the right, and the positive direction of the Y coordinate is vertically towards the bottom. The area position information is composed of the above four parts.
S1.2, carrying out entropy decoding on the original JPEG image to obtain a DCT coefficient corresponding to the image after quantization, and splitting the DCT coefficient after quantization into coefficient sub-blocks of 8 × 8, wherein the DCT coefficient comprises an AC coefficient and a DC coefficient.
S1.3, for each sensitive rectangular area needing protection, scanning the sub-blocks in the area in a certain sequence and numbering the sub-blocks in the sequence, wherein the image shown in FIG. 4(a) adopts a 512 × 512 test image, and assuming that all coefficient sub-blocks of the image are numbered, because each coefficient sub-block is an 8 × 8 coefficient matrix, the image has 4096 coefficient sub-blocks in total, and the maximum range of the number of the sub-blocks in the area is [0,4095 ]]Each sub-block decimal number is converted into binary bits (the highest 12 bits), and these 12 bits are embedded into the DCT coefficients ordered 4 th to 15 th in the sequence of each sub-block zigbee. Here, ZigZag is an encoding method, in which 8 × 8 coefficient matrices in each sub-block are encoded into a one-dimensional array with a length of 64 according to ZigZag, and this specific value order is the ZigZag order. Specifically, the method comprises the following steps: let the binary representation of each sub-block number be c0c1...c11Let the original DCT coefficient be giThen embed ciDCT coefficient g'i=gi×2+ci。
S1.4 randomly scrambles all sub-blocks in the region, and the random positions of the sub-blocks participating in the scrambling are generated by a pseudo-random number generator.
S1.5 sets L en to be the total length of the sensitive region location information, i.e. equal to the sum of the bits occupied by L en plus the bits occupied by the location information of the N sensitive regions in step S1.1, since Pxi,Pyi,bwi,bhi∈ (0,63), the position information of each region needs 24 × N bits to be stored, here, it is assumed that L en value itself occupies 12 bits, L en equals 12+24 × N, L en bits occupied by position information are embedded into the positions of-1 and 1 of the AC coefficient of the current image, the concrete method is that the AC coefficients of all sub-blocks of the image are scanned in a certain order, if the current AC coefficient needs the embedded information bit biAt 0, the AC coefficient for the current location remains unchanged; information bit b embedded if the current AC coefficient is needediIs 1, if the AC coefficient of the current position is 1, the AC coefficient becomes 2, if the AC coefficient of the current position is-1, the AC coefficient becomes-2; if the current location AC coefficient is not 1 or-1 or 0, then if the current AC coefficient is greater than 0, the AC coefficient is incremented by 1, and if the current AC coefficient is less than 0, the AC coefficient is decremented by 1 until all information is embedded therein. The above process is expressed mathematically as follows:
where b ∈ {0, 1} represents the information bit to be embedded, fiRepresentative is the value of the AC coefficient, f, in the current ploti' represents the AC coefficient value of the corresponding position after embedding the information.
S1.6 entropy encoding generates a protected JPEG image, which is shown in fig. 4(b), and the corresponding unauthorized user can also see the unprotected non-sensitive area.
Based on the content protection method, when the authorized user wants to recover the sensitive area, the method shown in fig. 2 is adopted, which includes the following steps:
s2.1, entropy decoding is carried out on the protected JPEG image to obtain a quantized DCT coefficient, and the quantized DCT coefficient is divided into coefficient sub-blocks of 8 × 8.
S2.2 according to the scanning sequence of the step S1.5, if the AC coefficient of the current position is-1 or 1, the extracted embedded information biIs 0 if the current position AC isNumber-2, extracted embedded information b i1, coefficient plus 1, if the current position AC coefficient is 2, the extracted embedded information biIs 1, the AC coefficient is reduced by 1.
And if the current coefficient is larger than 2, subtracting 1 from the coefficient, and if the current coefficient is smaller than-2, adding 1 to the coefficient until all the sensitive area position information is extracted. The above process is expressed mathematically as follows:
wherein b' represents the extracted information bit, fi ~Representing the AC coefficient after reduction
S2.3 obtaining the coordinates (Px) of the upper left corners of the N privacy-protected rectangular areas according to the data extracted in the step S2.2i,Pyi) And width bw of the regioniAnd a high bhi(i < ═ iv) and, based on the position information, the N protected sensitive areas are located.
S2.4, for each sub-block in each protected rectangular area, extracting the original number of the current block from DCT coefficients from 4 th to 15 th in the selected ZigZag sequence in the block, and restoring all sub-blocks in each rectangular area to the original position according to the original number. Let the original number of the subblock be binary c'0c′1…c′11C'i=g′i mod 2,Wherein is g'iDCT coefficient before reduction, giAre the restored DCT coefficients.
S2.5, the original JPEG image is obtained after entropy coding, and as shown in fig. 4(c), the restoration method can restore the original image without distortion.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.
Claims (8)
1. A content protection method for sensitive areas in JPEG images, characterized by comprising the steps of:
selecting a sensitive area needing to be protected on an original JPEG image, and recording the position information of each area;
entropy decoding the original JPEG image to obtain a DCT coefficient corresponding to the image after quantization, and splitting the DCT coefficient after quantization into subblocks; numbering all sub-blocks in each sensitive area respectively;
randomly scrambling all sub-blocks in each sensitive area needing protection, and reversibly embedding the original number of each scrambled sub-block into the AC coefficient of the sub-block;
reversibly embedding the position information of each sensitive area needing to be protected into the image AC coefficient;
and performing entropy coding to generate a protected JPEG image.
2. The method according to claim 1, wherein the selected sensitive areas are rectangles, and the position information of each rectangular area is recorded, the position information includes the coordinates of the upper left corner of the rectangular area and the width and height of the area, the upper left corner of the image is used as the origin of the coordinate system, the positive direction of the X coordinate is horizontally to the right, and the positive direction of the Y coordinate is vertically downward.
3. The method of claim 1, wherein for each sensitive area to be protected, the sub-blocks in the area are scanned and numbered in a sequence, and the corresponding number of each sub-block is reversibly embedded in the selected AC coefficients of the sub-block.
4. A method as claimed in claim 3, wherein each sub-block is coded decimal, and is converted to binary bits, the binary bits being embedded in the selected AC coefficients of each sub-block, and the binary representation of each sub-block is given as ciLet the original DCT coefficient be giThen embed ciRear DCT coefficient g'i=gi×2+ci。
5. The method of claim 1, wherein for each sensitive area to be protected, all sub-blocks within the area are randomly scrambled, and the random positions of the sub-blocks involved in the scrambling are generated by a pseudo-random number generator.
6. The method of claim 1, wherein the position information of each sensitive area to be protected is reversibly embedded into the AC coefficients of the image by:
reversibly embedding the position information of each sensitive area into the positions with the AC coefficients of-1 and 1, wherein the specific method comprises the following steps: scanning the AC coefficients of all the sub-blocks of the image according to a certain sequence, and if the current embedded value is 0, keeping the coefficient of the current position unchanged; if the current embedded value is 1, the following determination is performed:
if the AC coefficient of the current position is 1, the AC coefficient becomes 2,
if the AC coefficient of the current position is-1, the AC coefficient becomes-2,
if the current position AC coefficient is not 1, -1, 0, if the current coefficient is greater than 0, the coefficient is added with 1, if the current coefficient is less than 0, the coefficient is subtracted with 1 until all the position information is embedded.
7. A content recovery method for sensitive areas in JPEG images, characterized by comprising the steps of:
entropy decoding the protected JPEG image to obtain a quantized DCT coefficient, and splitting the quantized DCT coefficient into coefficient sub-blocks;
extracting the position information of all sensitive areas;
finding out all scrambled sub-blocks according to the position information of all sensitive areas;
extracting the original number of each scrambled sub-block from each scrambled sub-block;
and adjusting the positions of the sub-blocks according to the original numbers of the scrambled word blocks to restore the original image.
8. The method for recovering the content of the sensitive area in the JPEG image as claimed in claim 7, wherein the position information of all the sensitive areas is extracted by:
according to the scanning sequence when the subblocks are scrambled, if the AC coefficient value of the current position is-1 or 1, extracting embedded information 0, wherein the current coefficient is unchanged, if the AC coefficient value of the current position is-2, extracting embedded information 1, adding 1 to the current coefficient, and if the AC coefficient value of the current position is 2, extracting embedded information 1 and subtracting 1 from the current coefficient; if the current position AC coefficient is larger than 2, the coefficient is subtracted by 1, and if the current coefficient value is smaller than-2, the coefficient is added by 1 until all position information is extracted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010127046.5A CN111432216A (en) | 2020-02-28 | 2020-02-28 | Content protection method and recovery method for sensitive area in JPEG image |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010127046.5A CN111432216A (en) | 2020-02-28 | 2020-02-28 | Content protection method and recovery method for sensitive area in JPEG image |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111432216A true CN111432216A (en) | 2020-07-17 |
Family
ID=71551718
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010127046.5A Pending CN111432216A (en) | 2020-02-28 | 2020-02-28 | Content protection method and recovery method for sensitive area in JPEG image |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111432216A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008283479A (en) * | 2007-05-10 | 2008-11-20 | Fujifilm Software Co Ltd | Method, program and device for inserting reversible watermark data and image processing system |
CN102724552A (en) * | 2012-05-30 | 2012-10-10 | 华为技术有限公司 | Image coding method, image decoding method and device |
WO2014146033A1 (en) * | 2013-03-15 | 2014-09-18 | Sinha Tuhin K | Method and apparatus for privately and securely sharing information using public social or sharing network infrastructure |
US20160188893A1 (en) * | 2014-12-29 | 2016-06-30 | Entefy Inc. | System and method of applying adaptive privacy controls to lossy file types |
KR101716318B1 (en) * | 2016-12-29 | 2017-03-14 | (주)다올소프트 | Robust reversible data hiding method and apparatus for jpeg file format image |
CN108009974A (en) * | 2017-10-20 | 2018-05-08 | 西安电子科技大学 | A kind of robust reversible watermark method of anti-JPEG compression, digital television broadcasting system |
CN110113605A (en) * | 2019-05-13 | 2019-08-09 | 四川大学 | A kind of video error coverage method hiding based on histogram translation reversible information |
-
2020
- 2020-02-28 CN CN202010127046.5A patent/CN111432216A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008283479A (en) * | 2007-05-10 | 2008-11-20 | Fujifilm Software Co Ltd | Method, program and device for inserting reversible watermark data and image processing system |
CN102724552A (en) * | 2012-05-30 | 2012-10-10 | 华为技术有限公司 | Image coding method, image decoding method and device |
WO2014146033A1 (en) * | 2013-03-15 | 2014-09-18 | Sinha Tuhin K | Method and apparatus for privately and securely sharing information using public social or sharing network infrastructure |
US20160188893A1 (en) * | 2014-12-29 | 2016-06-30 | Entefy Inc. | System and method of applying adaptive privacy controls to lossy file types |
KR101716318B1 (en) * | 2016-12-29 | 2017-03-14 | (주)다올소프트 | Robust reversible data hiding method and apparatus for jpeg file format image |
CN108009974A (en) * | 2017-10-20 | 2018-05-08 | 西安电子科技大学 | A kind of robust reversible watermark method of anti-JPEG compression, digital television broadcasting system |
CN110113605A (en) * | 2019-05-13 | 2019-08-09 | 四川大学 | A kind of video error coverage method hiding based on histogram translation reversible information |
Non-Patent Citations (1)
Title |
---|
吴昊天 等: "《一种JPEG图像可逆视觉变换算法》", 《华南理工大学学报(自然科学版)》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ma et al. | A reversible data hiding scheme based on code division multiplexing | |
Amirtharajan et al. | An intelligent chaotic embedding approach to enhance stego-image quality | |
Hsu et al. | DCT-based watermarking for video | |
CN108810555B (en) | Thumbnail image privacy protection method based on image compression and elastic resolution | |
CN109547797B (en) | Separable encryption domain information hiding method | |
CN113382127B (en) | Encrypted image reversible information hiding method with elastic selection and run-length coding | |
Mustafa et al. | A proposed algorithm for steganography in digital image based on least significant bit | |
CN105162686A (en) | Multi-form instant information hiding communication method and system based on image medium | |
CN103745479A (en) | Digital steganography and steganalysis method for color image | |
Li et al. | A Semi‐Fragile Video Watermarking Algorithm Based on H. 264/AVC | |
Lee et al. | A lossless large-volume data hiding method based on histogram shifting using an optimal hierarchical block division scheme | |
Mittal et al. | Interpolative AMBTC based reversible data hiding in encrypted images using rhombus mean | |
CN111915474A (en) | Reversible encryption domain information hiding method based on integer transformation | |
CN111432216A (en) | Content protection method and recovery method for sensitive area in JPEG image | |
Chandramouli et al. | Multiple-description framework for oblivious watermarking | |
Hu et al. | Reversible secret image sharing with steganography and dynamic embedding | |
Sivadasan | A survey paper on various reversible data hiding techniques in encrypted images | |
CN113507546A (en) | Image encryption method based on DCT-64 | |
Reddy et al. | Secure steganography using hybrid domain technique | |
Kuo et al. | Reversible data hiding for JPEG based on EMD | |
Lee et al. | Steganographic access control in data hiding using run‐length encoding and modulo‐operations | |
Zhao et al. | Reversible Data Hiding Based on Two-Dimensional Histogram Shifting | |
Al-Bayati et al. | DuoHide: a secure system for hiding multimedia files in dual cover images | |
Patel et al. | A literature review on image quality and embedding payload for image steganography | |
Ahmed et al. | Information hiding in video files using frequency domain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200717 |
|
RJ01 | Rejection of invention patent application after publication |