TW201023587A - Method of high capacity reversible data hiding scheme using edge prediction error - Google Patents
Method of high capacity reversible data hiding scheme using edge prediction error Download PDFInfo
- Publication number
- TW201023587A TW201023587A TW97147108A TW97147108A TW201023587A TW 201023587 A TW201023587 A TW 201023587A TW 97147108 A TW97147108 A TW 97147108A TW 97147108 A TW97147108 A TW 97147108A TW 201023587 A TW201023587 A TW 201023587A
- Authority
- TW
- Taiwan
- Prior art keywords
- value
- prediction
- predicted
- information
- image
- Prior art date
Links
Landscapes
- Image Processing (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
Description
201023587 發明說明: 【發明所屬之技術領域】 本發明係-種資訊藏入圖像的方法,尤其是 具有高隱藏量的可回復式資訊藏入方法。 關於 種 【先前技術】 資料隱藏法是一種將保密的資訊藏在影像 術’藉由傳送藏有資訊的影像達到保密資訊與影像傳輪的201023587 Description of the Invention: [Technical Field] The present invention is a method for hiding information into images, in particular, a recoverable information hiding method having a high hidden amount. About [Prior Art] Data hiding is a way to hide confidential information in video technology. By transmitting information with hidden information to achieve confidential information and image transmission.
Φ J M防止影像遭到不當拷貝,P 以繼定内容的正確性,追縱資令Λ 于 伙頁Λ放佈情形,監視資訊 傳播出去等等的一種方法。—般的眘 奴的資讯隱藏法在藏入後, 人眼無法辨別出藏入後圖片與原圖的差異,但卻是對影像 造成永久性的失真,在-些應用上,特別是醫學影像了軍 事用途的影像’需要保留完全正確的影像,即使是微小的 差異也不被允許。因此,有些學者提出一些方法可以還原 做為藏入媒介的影像,這種方法稱為可回復式影像隱藏法 ❿(reversible data hiding)。除了在一般二維的影像可使用可 回復式資料隱藏法,在音矾、3 D影像與視訊上面,譬如將 相關資訊藏入音訊、3D影像與視訊上面,作為補充資料、 增加訊號内容、鑑定内容的正確性或是判定訊號是否遭到 破壞等等。 近年來有許多學者分別提出不同的可回復式資料隱藏 法’分別有針對藏量、藏入後影像品質與藏量控制等方面 的研究’例如’由N i等學者所提出的統計圖位移法 (histogram shift) [Zhicheng Ni ’ Yun-Qjng Shi > Nirwan 201023587Φ J M prevents the image from being improperly copied. P is a method of correcting the content, tracking the order, distributing the information, and monitoring the information. After the information hiding method of the common Shennu is hidden, the human eye can't distinguish the difference between the hidden image and the original image, but it is a permanent distortion to the image. In some applications, especially medicine. Imaging images for military use 'requires the preservation of completely correct images, even small differences are not allowed. Therefore, some scholars have proposed that some methods can be restored as images hidden in the medium. This method is called reversible data hiding. In addition to the general two-dimensional image, you can use the recoverable data hiding method. In the audio, 3D video and video, for example, the relevant information is hidden in the audio, 3D video and video, as supplementary information, increase the signal content, and identify The correctness of the content or whether the signal is destroyed or not. In recent years, many scholars have proposed different recoverable data hiding methods, which are related to the research on the amount of images and the quality of the images after storage, such as the statistical map displacement method proposed by scholars such as Ni. (histogram shift) [Zhicheng Ni ' Yun-Qjng Shi > Nirwan 201023587
Ansari,and Wei Su, “ Reversible data hiding,” IEEE Trans, on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354 - 361, Mar. 2006],其資訊 之藏量約在 〇.3bpp(bits per pixel)且藏入後影像的 PSNR(Pixel Signal to Noise Ratio)品質在 48dB ;由 Tian 所提出的差值擴展法(difference expansion)[丄Tian, “ Reversible Data Embedding Using a Difference Expansion,” IEEE Trans, on Circuits and Systems for ❹ Video Technology,vol. 1 3 > No.8 > pp.890-896 > Aug. 2003. ; J. Tian and Raymond O. Wells, Jr., “ Reversible data-embedding with a hierarchical structure ” , International Conference on ImageAnsari, and Wei Su, “Reversible data hiding,” IEEE Trans, on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354 - 361, Mar. 2006], whose information is about 〇 .3bpp(bits per pixel) and the PSNR (Pixel Signal to Noise Ratio) quality of the image after hiding is 48dB; the difference expansion method proposed by Tian [丄Tian, “Reversible Data Embedding Using a Difference Expansion” , IEEE Trans, on Circuits and Systems for ❹ Video Technology, vol. 1 3 > No. 8 > pp. 890-896 > Aug. 2003. ; J. Tian and Raymond O. Wells, Jr., “ Reversible data-embedding with a hierarchical structure ” , International Conference on Image
Processing (ICIP), vol. 5, pp. 24-27, Oct. 2004]具 有資訊可藏入量達2bpp以上,且藏入的PSNR品質約於 15dB左右。Processing (ICIP), vol. 5, pp. 24-27, Oct. 2004] has information that can be hidden more than 2bpp, and the PSNR quality is about 15dB.
Tian所提出的方法在藏入大約i.5bpp以上的資訊後, ❿影像就像灑了雜訊般,失真情形嚴重。Tian所提的方法雖 具有可以藏入大量資料的優點,但其品質不佳。因此,如 何讓使用者可以依照藏量的不同分別得到最佳的影像品 質,目前則無有效的控制法則。這方面的問題一直是許多 研究專注的題材’如Thodi等人的統計圖位移(histogram shift)專研究[D. M. Thodi and J. J. Rodriquez, “ Prediction-error-based reversible watermarking,’, inAfter the method proposed by Tian has hidden information of about i.5bpp or more, the image is like a spurious noise, and the distortion is serious. Although the method proposed by Tian has the advantage of being able to hide a large amount of data, its quality is not good. Therefore, there is no effective control law for users to obtain the best image quality depending on the amount of storage. The problem in this area has been the subject of many research's such as the histogram shift of Thodi et al. [D. M. Thodi and J. J. Rodriquez, “Predict-error-based reversible watermarking,’, in
Proc_ IEEE Conf. Image Processing » Oct. 2004,pp. 1549 - 1552. ; “Reversible watermarking by prediction- 201023587 error expansion » in Proc. IEEE Southwest Symp. Image Analysis and Interpretation, Mar. 2004, pp. 28 - 30.; - Expansion embedding techniques for reversible • watermarking > IEEE Trans, on Image Processing > vol. 13’ no_ 3, pp. 721- 730, Mar· 2007.]即是一例。"Currently, Rep. - Expansion embedding techniques for reversible • watermarking > IEEE Trans, on Image Processing > vol. 13' no_ 3, pp. 721- 730, Mar· 2007.] is an example.
Thodi除提出統計圖位移的方法(histogram shift)改進 藏量控制機制’也另外提出一個使資訊藏入之後影像失真 度更小的方法一預測誤差擴展法(prediCti〇n-error 〇 expansion)。預測誤差擴展法是以預測值與目標值的差距, 作為藏有資訊的媒介,若是預估值越正確則可藏入之資訊 量會越高,藏入的影像品質越好,所以,預測誤差擴展法 ’ 整體的藏入資訊量較大’且藏入資訊之後的影像失真度較 小。然而,Thodi之方法需要藏入的槽頭(overheac|)比丁jail 所提之方法大,若在以統計圖位移法控制藏量下作測試, 在藏量0.2bpp以下時’ Thodi所提出的影像品質稍微比丁jan 的方法差。 ® Thodl等人的預測誤差值擴展法是利用影像當中的相關 性,以相關性得到一個預測值與原值的差距以作為藏入資 料的媒介,而擴展運算是將該差值變為兩倍,再將藏入資 汛放置於變為空值的最後一個位元,所以當預測結果越接 近正確數值,具有較小的誤差,對藏入後的品質越佳,可 得到的藏入區域也越多。觀察Thod丨等人的位置對應圖 (location map),發現在邊界區域不可藏入機率較高。所謂 的位置對應圖(location map)是用來標示原影像中的像素對 (Pairs of pixe|s)是否為可擴展(expanded)的位置圖,也就 201023587In addition to the proposed histogram shift to improve the inventory control mechanism, Thodi also proposes a prediCti〇n-error 〇 expansion method that reduces the image distortion after the information is hidden. The prediction error expansion method is the difference between the predicted value and the target value. As the medium with information, if the estimated value is correct, the amount of information that can be hidden is higher, and the quality of the hidden image is better. Therefore, the prediction error The expansion method 'has a large amount of information hidden in the whole' and the image distortion after hiding the information is small. However, the method of Thodi requires that the trough head (overheac|) is larger than that proposed by Dingjail. If it is tested under the control of the statistical displacement method, it is recommended by Thodi when the amount is below 0.2bpp. The image quality is slightly worse than Dingjan's method. ® Thodl et al.'s prediction error value expansion method uses the correlation in the image to obtain the difference between the predicted value and the original value as a medium for hiding data, and the expansion operation doubles the difference. Then, the hidden assets are placed in the last bit that becomes null, so when the prediction result is closer to the correct value, there is a smaller error, and the better the quality after hiding, the available hiding area is also more. Observing the location map of Thod丨 et al., it is found that the probability of being hidden in the boundary area is high. The so-called location map is used to indicate whether the pair of pixels in the original image (Pairs of pixe|s) is expandable, that is, 201023587
Thodi 之 是其是能否藏入資料的位置圖。以下進一步說明 預測誤差值擴展法: (1)預測法則: 偏山等人提出的方法以雷射掃㈣順序來掃描影像中 所有的像素做預測。請參考第五圖,❹三個預測參考值 心、心、h來預測值a。預測的順序是從左 使得預測值不會參考到已藏有資訊的參考值二=: 還原時所使用的預測順序為藏人的反序。Th灿等人使用的 U器法貝j與預測值如式⑴所示。其中3為預測值。 max(c2, c3), if c, < min(c2, c3) min(C2,Cj),ifCi>max(C7,q) 、c2 +c3 otherwiseThodi is a location map of whether or not it can be hidden. The prediction error value expansion method is further explained below: (1) Prediction rule: The method proposed by Bishan et al. scans all the pixels in the image in the order of laser sweep (four) for prediction. Please refer to the fifth figure, ❹ three predicted reference values, heart, heart, h to predict the value a. The order of prediction is from the left so that the predicted value does not refer to the reference value that has information hidden. == The prediction order used in the restoration is the reverse order of the Tibetan. The U-method j and the predicted value used by Thcan et al. are shown in equation (1). 3 of them are predicted values. Max(c2, c3), if c, < min(c2, c3) min(C2,Cj),ifCi>max(C7,q) ,c2 +c3 otherwise
Th〇d丨等人提出的另一預測藏入方法,如下式(2)所示。 員測值與目標值的差值為h,即為藏人資訊的媒介。藏入 資。ft的方法為一擴展運算,h,為差值h經該擴展運算後之 ©結果,定義為已藏有資訊的差值。a,為已藏入資訊的像素 值。 h = “,h’ = 2h+b,(2) ^其中,b為藏入資訊數值。以8位元影像為例,用來 藏入貝讯的像素之數值必須界在〇到255之間,才可擴展, 否則,不對a做任何運算。Thidj等人的預測還原方法,如 下式(3)。其步驟係包含:先計算藏有資訊的差值h'、還原 201023587Another method of predicting hiding proposed by Th〇d丨 et al. is shown in the following formula (2). The difference between the measured value and the target value is h, which is the medium for Tibetan information. Hiding money. The ft method is an extended operation, and h is the difference result h after the expansion operation. The result is defined as the difference in which the information has been hidden. a, is the pixel value of the information that has been hidden. h = ",h' = 2h+b,(2) ^ where b is the information value. For the 8-bit image, the value of the pixel used to hide the beacon must be between 255 and 255. , can be extended, otherwise, do not do any operation on a. Thidj et al.'s predictive reduction method, as shown in the following formula (3). The steps include: first calculate the difference h' of hidden information, restore 201023587
差值ί、還居、的像素值百以及取出藏人資訊 h’ = a’ - SDifference ί, still live, pixel value and extract Tibetan information h’ = a’ - S
^ b = h' mod 2^ b = h' mod 2
<—* /N a = a + h ⑶ ❹ 上列的像素對能否擴展以一個與原影像相同大小的位 址對應圖(location map)來紀錄,此對應圖是還原影像的必 要條件,故需要將此對應圖藏入影像當中。為了減少藏入 資料的大小,我們將該對應圖以JBIG2格式壓縮。 (2)統計囷位移法則: 為了改進藏量控制機制,Thodi等人提出一統計圖位移 方法,改進了 Tiari的方法在藏量較小時的影像品質。丁|抓 Q的方法在藏量小的時候,仍然可能對較大的差值做擴展, 因此影像品質不佳。Thodi之該統計圖位移方法,係對可擴 展的差值取一臨界值,絕對值小於臨界值則做擴展,大於 臨界值的區域做位移’讓數值落在較大或較小的區域,使 解碼時得以辨認。此統計圖位移方法詳細說明如下: 請參考第六圖,其為取512x512的8位元灰階影像之 擴展差值的統計結果,其橫軸是差值的大小,縱軸是數量。 依照欲藏入空間的大小’在統計圖當中選擇部份的值執行 擴展運算,其中差值小的數值出現率最高。 8 201023587 請參考第七圖’為了減少藏入後影像的差距,從絕對 值相對較小的數值優先選擇,得出一個最佳臨界值。選取 一臨界值」>〇 ’針對對差值在範圍内的組合做擴展運 算’即為第七圖中之丨nner region。擴展之後,數值的範圍 為落在[-242d + l] ’即為|nner regj0ri,因此只有原本在 [-4J]範圍的數值為可藏入的範圍。 將其他沒做擴展的部份(Outer region)向左或向右位移 」,即是對負數的差值減去J ,對正數的差值加上」+1,以 ❹ 避免與擴展後的值重疊的機會,如第八圖所示。位移的運 算與還原運算如式(4)與式(5)。 h h + A+ \, ifh>A h~ Δ, if h<-Δ (4) h [VA-l,ifhs>2A + l hs+A, ifh <-2Δ (5) 〜其中,λ是未藏入資訊的差值,\是做位移之後的差值, 办是還原位移運算後的差值。 細上所述,該統計圖位移方法的優點與特性包含: (丨).由於位址對應圖形在任何藏量之下皆為固3定的, 因此可經由預先計算’再加上欲藏人的秘密資訊(p_ad), 即可自統計圖内找出最適臨界值,達到藏量控制; (丨丨).位移的部份不需要複雜的計算 升並且在藏量小的 時候,所位移的量不大,卻能有效的 寸工利以較小的差值做 9 201023587 擴展運算,因此得以Λ 兴例句明‘、藏1較少時具有較好的影像品質。 牛*。刖述之藏入運算,請參考第九圖,假执 入的區域值,右下德本劣 ^ ^ ^ 像素為預測值a,其他區域為預測來 值,欲藏入值Mi。因此,藏入運算如下:預料考 ⑴·計算預測值占,計算預測錯誤值卜 58 a = c2+c3-Cl=56 + 60-58 〇 ^ = ^-^ = 55-58 = -3 益⑻·判斷Λ是否小於臨界值,若小於則做擴展運算與 藏入資訊,否則,做位移運算。 (丨丨丨·)·做擴展運算,得到藏有資訊的差值為,,。計算 藏入資訊的像素值 /z’ = 2x/j + 6 = 2x(—3) + U—5 Ο α’ = λ + // = 58 + (~ 5) = 53 叫若還原的像素值介在[〇,255]之間,判為可合法 藏入,否貝1卜則不做擴展運算。在對影像的每一個像素值 做預測與藏人之後’即可得到藏有f訊的影像。 另外,再舉例說明Th⑽之取出資訊與還原影像,請 參考第十®,右下區域為藏有資訊的值心其他區域為預 測參考值,其資訊取出與影像還原之計算如下: 201023587 (i).計算預測值S ’計算預測錯誤值V。 ^ = 56 + 60-58 = 58 53~58 = ~5 (ii) .差值小於2倍的臨界值,代表有做過擴展運算, 並藏有數值。<—* /N a = a + h (3) 能否 Whether the pixel pair listed above can be expanded and recorded with a location map of the same size as the original image. This map is necessary for restoring the image. Therefore, you need to hide this map into the image. In order to reduce the size of the hidden data, we compress the map in JBIG2 format. (2) Statistical 囷 Displacement Rule: In order to improve the control mechanism of the volume control, Thodi et al. proposed a statistical displacement method to improve the image quality of the Tiari method when the amount is small. Ding|When the method of grasping Q is small, it is still possible to expand the larger difference, so the image quality is not good. Thodi's statistical displacement method takes a critical value for the expandable difference. If the absolute value is smaller than the critical value, the expansion is performed. The area larger than the critical value is displaced. Let the value fall in a larger or smaller area. It is recognized when decoding. The chart displacement method is described in detail as follows: Please refer to the sixth figure, which is the statistical result of the extended difference of the 512x512 8-bit gray-scale image. The horizontal axis is the difference value and the vertical axis is the quantity. The expansion operation is performed by selecting a part of the value in the chart according to the size of the space to be hidden, wherein the value of the small difference has the highest occurrence rate. 8 201023587 Please refer to the seventh figure' In order to reduce the gap between the images after hiding, the value of the relatively small absolute value is preferred to obtain an optimal threshold. Selecting a critical value > 〇 ‘ for the combination of the difference within the range is the 丨nner region in the seventh graph. After the expansion, the range of the value falls to [-242d + l] ', which is |nner regj0ri, so only the value originally in the range of [-4J] is a range that can be hidden. Shifting the other parts of the Outer region to the left or right, that is, subtracting J from the difference of negative numbers and adding +1 to the difference of positive numbers to avoid the extended value Opportunities for overlap, as shown in Figure 8. The calculation and reduction operations of the displacement are as shown in equations (4) and (5). Hh + A+ \, ifh>A h~ Δ, if h<-Δ (4) h [VA-l,ifhs>2A + l hs+A, ifh <-2Δ (5) ~ where λ is not hidden The difference of the incoming information, \ is the difference after the displacement, and is the difference after the displacement calculation. As described above, the advantages and characteristics of the statistical displacement method include: (丨). Since the address corresponding to the graphic is fixed under any quantity, it can be pre-calculated by adding 'plus The secret information (p_ad), you can find the optimal threshold value from the statistical map to achieve the storage control; (丨丨). The displacement part does not need complex calculations and the displacement is small when the storage is small. The amount is not large, but it can effectively make the 9 201023587 expansion calculation with a small difference, so it can be used to make a good image quality. Cattle*. For the hidden operation, please refer to the ninth figure, the area value of the fake implementation, the lower right and the lower ^ ^ ^ pixels are the predicted value a, the other areas are the predicted values, and the value Mi is hidden. Therefore, the hidden operation is as follows: expected test (1)·calculate the predicted value, calculate the predicted error value 58 a = c2+c3-Cl=56 + 60-58 〇^ = ^-^ = 55-58 = -3 benefit (8) · Determine whether Λ is less than the critical value. If it is smaller, do the expansion operation and hide the information. Otherwise, do the displacement operation. (丨丨丨·)· Do the expansion operation and get the difference between the hidden information, ,. Calculate the pixel value of the hidden information /z' = 2x/j + 6 = 2x(-3) + U—5 Ο α' = λ + // = 58 + (~ 5) = 53 If the restored pixel value is Between [〇, 255], it is judged that it can be legally hidden, and if it is not, the expansion operation is not performed. After predicting each pixel value of the image and hiding it, you can get an image with a video. In addition, for example, the Th (10) fetch information and the restored image, please refer to the tenth®, the lower right area is the predicted value of other areas with the information value, and the information extraction and image restoration are calculated as follows: 201023587 (i) Calculate the predicted value S ' to calculate the predicted error value V. ^ = 56 + 60-58 = 58 53~58 = ~5 (ii) The difference is less than 2 times the critical value, which means that there has been an expansion operation and a value is hidden.
(iii) .還原的差值石’取出藏入值f與還原像素值α。 hf -5 X _ 2 _ =—3(iii) The reduced difference stone 'takes out the hidden value f and restores the pixel value α. Hf -5 X _ 2 _ =—3
a = a + h = 58 — 3 = 55 6 = /7,mod2 = l (iv)·由還原的數值β = 3與= f得知,此方法可以正確 的取出資訊並完全還原。 综合前述說明,Thodi所提出之資訊藏入方法之流程圖 可第十一圖所示,其中,藏入步驟簡述如下: (i)·計算預測誤差; (Η)_擴展判斷,係測試可做擴展的數量; (iii),根據可擴展的數量之測試結果,紀錄位置對應圖, 201023587 並壓縮此圖形; (iv) .將壓縮的位置對應圖形與秘密資訊(pay|〇ac|)合成 * 藏入字串’由藏入字串的長度在統計圖中選擇適當的臨界 值; (v) .執行臨界值判斷,當判斷結果顯示做擴展運算,將 欲藏入字串藏入,同時完成位移運算; (vi) .位置對應圖以及臨界值的數值以一最小位元取代 (LSB replacement)的方式,覆寫影像中的像素。為了達到 ❹可還原的特性,被覆寫的位元(overwrite bit)必須接在秘密 資訊(payload)之後一同藏入擴展的位置。 藏入字串說明第十二A、B圖。第十二A圖是藏入的 資訊内容示意圖,其表示藏入秘密資訊(pay丨〇ad)之後的狀 態’其後半部需要先保留一些空間(empty);該藏入的位元 内容之長度與位置對應圖形(如第十二B圖所示)相同,且 由於位置對應圖形以一最小位元取代(LSB rep丨 法藏入影像最前面幾個像素之中,冑了能夠完全還原影像, ❹將被取代之位元(overwmebit)寫入預留的空間當中。 在位置對應圖前面’會加上幾個資訊,包含了位置對 應圖形的長度、位移臨界值的大小、秘密資訊的長度。在 還原時,以優先解出這些資訊來完成整個解碼。在完成了 資訊的藏入後’得到的影像就是藏有秘密資訊的影;了。 解碼時,直接利用影像當中的還原資訊就可得到藏入的資 訊與還原影像,不需要傳送額外的資訊。 另外,所藏入之資訊還原的方法,其步驟簡要說明如 12 201023587 (丨).從影像的最前面像素取出位置對應圖形並解壓縮. (丨丨)還原被覆蓋位元(overwrite bit) - (Πί)·取出秘密資訊(payload) 〇ν)_還原擴展(expansion)與位移(shift)運算。 換言之’資訊還原的方法係為資訊藏入方法的逆執行 步驟。 依據前述說明可知’ Thodi等人所提供的方法,其邊界 區域不可藏入資訊的機率偏高,導致整體的資訊藏入量過 © 低。 。 【發明内容】 為了解決既有之資訊藏入方法於邊界區域不可藏入之 機率偏高,導致可藏資訊量偏低的問題,本發明係採一可 考慮圖形邊界變化之預測器,以對邊界區域的資訊進行較 為正確的預估,進一步得到較好的藏入後影像品質與較大 的藏量。 Ο 配合前述技術問題及發明目的,本發明提供一種利用 邊緣預測誤差之高容量可回復式資訊隱藏法,其步驟包含: 預測誤差值,係選擇一原始影像,針對該原始影像的 每—個像素執行一誤差值預測’其指定每一像素為一預測 目標’其以一三階段邊緣導向預測器(edge_based predict〇r) 產生預測誤差值,該三階段預測器包含: 第一階段’對該原始影像中二分之一數量的像素分別 執行誤差值預測’係將該原始圖像之列數為偶數、行數為 奇數或是行數為奇數、列數為偶數的像素做逐一指定為該 13 201023587 預測目標’並以該預測目標的上下左右四個鄰居像素作為 該預測參考值,以該預測參考值及該預測目標的差值計 - 算,其依據下列一預測值設定判斷計算方法決定該預測 值,該預測值設定判斷計算方法之步驟包含: (1) 若四個預測參考值皆相等,直接將該預測參考值 設定為該預測目標之預測值; (2) 若有任兩個預測參考值相等,並將數值相同之預 測參考值設給預测值;以及 〇 (3)若四個預測參考值皆不相等,則選擇數值大小位 於中間的兩個數值予以平均,平均所得的數值即為該預測 值; ❹ 第一 Is自段.對該原始影像尹四分之一數量的像素進行 預、、J係將原始影像之列數為奇數、行數為奇數的像素逐 -做為該預測目標,再取該預測目標的左上、左下、右上、 右:四個鄰居像素之數值為該預測參考值,並利用該預測 值"又疋判斷4算方法配合計算每個像素的預測值;以及 、第三階段:對該原始影像中最後剩下之四分之一的像 素^亍預Μ I將列數為偶數、行數為偶數的像素逐一做 =測目標,並取每-預測目標的上、下、左、右四個鄰 計算每個像素的預測ΓΓΓΓ定判斷計算方法配合 接設為零;以及其中,本階段之最後-個位元直 進行擴=界值判斷,係以Thodi之一預測誤差擴展法 爹像、lj斷及—臨界值判斷’該擴展判斷針對該原始 景“象之母-像素之該預測值與目標值之差值是否可以進行 14 201023587 -擴展運算,❹】斷結果為i,則執行該臨界值判斷,反 之則結束,而該臨界值判斷係判斷每一像素之差值之絕對 值與-臨界值之大小關係,當絕對值小於臨界值則執行一 擴展及藏入,而當絕對值大於臨界值的像素則執 運算步驟,其中: 1 # 该擴展及藏入步驟係將差值可進行擴展之像素進行藏 入資訊動作;以及 該位移運算步驟係將不可擴展之像素進行一數值累加 〇 而讓像素值產生位移之動作。 其中’該擴展及藏入步驟係使用Tjan之一多層藏入方 法將資訊藏入該原始影像之像素之中。 其中,該擴展及藏入步驟係先使用Tjari之一多層藏入 方法進行一〜二層之資訊藏入,再利用Thod丨之方法對該 原始影像進行資訊藏入。 其中’該臨界值係以Thodi之一統計圖位移方法選取。 藉此,本發明可以在具有邊界之原始圖像藏入資訊, ®大為提升資訊藏入量。 【實施方式】 請參考第一圖’其為本發明之利用邊緣預測誤差之高 容量可回復式資訊隱藏法的較佳實施例,其步驟包含執行 —心知邊緣導向預測器(1 〇 )、擴展及臨界值判斷(2 〇)以及擴 展、藏入及位移(30)。 該執行三階段邊緣導向預測器(1 〇〉步驟: 為了改善Thodi等人所提出之方法達到更好的邊界預 15 201023587 測,本較佳實施例提出一個新的預測法則,其目的是對影 像的相關性做到最佳利用。參考在壓縮法中常用到的方法, ,以目標像素的上、下、左、右四個方向或是左上、左下、 右上、右下四個方向的像素值做為預測參考,若四個預測 值當中有兩個值相同,則認定此處為邊界,並將預測值設 為邊界值。本執行三階段邊緣導向預測器(1〇)步驟係用一 三階段邊緣導向預測器(edge_based predict〇r)對欲藏入一 秘密資訊的一原始圖像内的每一個像素預測其誤差值,該 ©預測器執行三個階段,在每個階段中依照一預測目標之四 鄰居像素特性,分成數種產生預測值的方法。該三階段邊 緣導向預測器所執行各個階段分述如下: 第-階段:對原始圖像中二分之—數量的像素做預測, 係將該原始圖像之列數為偶數、行數為奇數或是行數為奇 數、列數為偶數的像素設為一預測目標,如第二A圖及第 =圖所示。第:A 圖中 ’(M)、(G2)、(Q4)、(11)、(13) 等私不「1」之區塊之像素數值為該預測目標,〇,〇)、(12)、 © ( ’4) (3’G)、(3,2)..·等區塊之像素數值為—預測參考值。 清參考第二B圖,取每一預測目標⑷的上、下、左、右四 :鄰居像素之數值為預測參考值⑹〜C4),以對該預測目a = a + h = 58 — 3 = 55 6 = /7, mod2 = l (iv)· It is known from the restored values β = 3 and = f that this method can correctly retrieve the information and completely restore it. Based on the above description, the flow chart of the information hiding method proposed by Thodi can be shown in the eleventh figure. The hiding steps are briefly described as follows: (i)·calculate the prediction error; (Η)_Extended judgment, the test can be (iii), according to the test result of the scalable quantity, record the position map, 201023587 and compress the graph; (iv). Combine the compressed position corresponding graph with the secret information (pay|〇ac|) * Hide the string 'select the appropriate threshold value from the length of the hidden string; (v) . Execute the critical value judgment, when the judgment result shows that the expansion operation is performed, the data string to be hidden is hidden, and at the same time Completion of the displacement operation; (vi) The position map and the value of the threshold value overwrite the pixels in the image by a LSB replacement. In order to achieve the reversible nature, the overwritten bit must be hidden in the extended location after the payload. The hidden string indicates the twelfth A and B pictures. Figure 12A is a schematic diagram of the hidden information content, which indicates the state after the secret information (pay丨〇ad). The latter half needs to reserve some space first (empty); the length of the hidden bit content It is the same as the position-corresponding graphic (as shown in Figure 12B), and since the position-corresponding graphic is replaced with a minimum bit (LSB rep is hidden in the first few pixels of the image, it is possible to completely restore the image, ❹ Write the replaced bit (overwmebit) into the reserved space. In front of the position map, 'add a few information, including the length of the position corresponding graph, the size of the displacement threshold, and the length of the secret information. When restoring, the above information is decoded first to complete the decoding. After the information is hidden, the obtained image is the shadow of the secret information. When decoding, the information in the image can be directly used to obtain the hidden information. Incoming information and restoring images, no need to transmit additional information. In addition, the method of information restoration is hidden, and the steps are briefly described as 12 201023587 (丨). From the image Corresponding to the pixel pattern in front of the removal position and decompression (Shushu) is covered by reducing bit (overwrite bit) -. (Πί) · extracted secret information (payload) 〇ν) _ reduction extension (Expansion) and displacement (Shift) operation. In other words, the method of information restoration is the reverse execution step of the information hiding method. According to the foregoing description, the method provided by Thodi et al. has a high probability that the boundary region cannot be hidden in information, resulting in an overall information hiding amount of low. . SUMMARY OF THE INVENTION In order to solve the problem that the existing information hiding method has a high probability that the boundary region cannot be hidden, resulting in a low amount of information that can be stored, the present invention adopts a predictor that can consider the change of the graphical boundary to The information in the boundary area is more correctly estimated, and the image quality and the larger amount of storage are better obtained.配合 In combination with the foregoing technical problems and the object of the invention, the present invention provides a high-capacity recoverable information hiding method using edge prediction error, the steps comprising: predicting an error value, selecting an original image for each pixel of the original image Performing an error value prediction 'which specifies each pixel as a prediction target' generates a prediction error value by a three-stage edge-guided predictor (edge_based predictr), the three-stage predictor comprising: One-half the number of pixels in the image respectively perform error value prediction 'the pixels whose number of columns of the original image is even, the number of rows is odd, or the number of rows is odd, and the number of columns is even is designated as the 13 201023587 predicts the target' and uses the four neighboring pixels of the upper and lower left and right of the predicted target as the predicted reference value, and calculates the difference between the predicted reference value and the predicted target, which is determined according to the following predicted value setting judgment method. The predicted value, the step of determining the calculation method of the predicted value includes: (1) if the four predicted reference values are equal, directly The predicted reference value is set as the predicted value of the predicted target; (2) if any two predicted reference values are equal, and the predicted reference value with the same value is set to the predicted value; and 〇(3) if four predicted reference values If they are not equal, then the two values with the numerical value in the middle are selected and averaged, and the average value is the predicted value; ❹ the first Is self segment. Pre-, the first quarter of the original image The J system uses the pixels whose original image number is odd and the number of rows is odd as the prediction target, and then takes the upper left, lower left, upper right, and right of the predicted target: the values of the four neighboring pixels are the predicted reference values. And using the predicted value " again to determine the 4 calculation method to calculate the predicted value of each pixel; and, the third stage: the last remaining quarter of the original image of the pixel will be predicted Pixels whose number of columns is even and whose number of rows is even are measured one by one, and the predictions of each pixel are calculated for each pixel of the upper, lower, left and right sides of each prediction target. And, among them, At the end of the stage - a bit directly performs the expansion = boundary value judgment, which is based on Thodi's prediction error expansion method image, lj break and - critical value judgment 'the extension judges the mother-pixel of the original scene Whether the difference between the predicted value and the target value can be performed 14 201023587 - Extended operation, if the result of the break is i, the critical value judgment is performed, and vice versa, and the critical value judgment determines the absolute value of each pixel The relationship between the value and the -threshold value, when the absolute value is less than the critical value, an expansion and hiding are performed, and when the absolute value is larger than the critical value, the operation step is performed, wherein: 1 # The expansion and the hiding step are poor The pixel whose value can be expanded is used to hide the information action; and the step of shifting the operation is performed by accumulating the value of the non-expandable pixel and causing the pixel value to be displaced. The 'expanding and hiding step' uses one of Tjan's multi-layered hiding methods to hide information into the pixels of the original image. The expansion and hiding steps are first carried out by using one of the Tjari multi-layer hiding methods to hide the information of the first to the second layer, and then the information of the original image is hidden by the method of Thod. Wherein the critical value is selected by one of Thodi's statistical map displacement methods. Thereby, the present invention can hide information in the original image with the boundary, and greatly enhance the information hiding amount. [Embodiment] Please refer to the first figure, which is a preferred embodiment of the high-capacity recoverable information hiding method using edge prediction error according to the present invention, the steps of which include executing - a known edge-oriented predictor (1 〇), Expansion and threshold judgment (2 〇) as well as expansion, hiding and displacement (30). The implementation of the three-stage edge-directed predictor (1 〇> step: in order to improve the method proposed by Thodi et al. to achieve a better boundary pre-test 15 201023587, the preferred embodiment proposes a new prediction rule, the purpose of which is to image The correlation is best utilized. Refer to the method commonly used in the compression method, in the four directions of the target pixel's up, down, left, and right directions or the top left, bottom left, top right, and bottom right. As a prediction reference, if two of the four predicted values are the same, then the boundary is assumed to be the boundary and the predicted value is set as the boundary value. The three-stage edge-oriented predictor (1〇) step of the implementation is one or three. The edge-based predictor (edge_based predictr) predicts the error value for each pixel in an original image that is to be hidden into a secret information. The © predictor performs three stages, in accordance with a prediction in each stage. The four neighbor pixel characteristics of the target are divided into several methods for generating predicted values. The stages performed by the three-stage edge-directed predictor are described as follows: Stage--: Divided into the original image - the number of pixels to be predicted, the number of columns of the original image is even, the number of rows is odd or the number of rows is odd, the number of columns is even number is set as a prediction target, such as the second A map and the third = In the figure: A: The pixel values of '(M), (G2), (Q4), (11), (13), etc., which are not "1", are the predicted targets, 〇, 〇) The pixel values of the blocks of (12), © ( '4) (3'G), (3, 2), etc. are - prediction reference values. Referring to the second B picture, the upper, lower, left, and right four of each prediction target (4) are taken: the value of the neighboring pixel is the prediction reference value (6) to C4) to the prediction target.
Ma)之-預測值進行預測。該預測值的計算方法係以保留 象_的邊界區域為主要考量,其數值之設定方式可能包 含下列狀況: I⑴右四個預測參考值(C1〜C4)皆相等,則直接將該預 1 ’考值(C1〜C4)設定為該預測目標(a)之預測值; *有4兩個預測參考值(C 1〜C4)相等,則假定該原 16 201023587 將此邊界數值設為預 始影像存在一邊界經過該預測目標 測值; (3)若四個預測參考值(C1〜C4)皆不相等,則將四 測參考值(C1〜C4)進行大小排序,並選擇數值大小位於中 間的兩個數值予以平均,平均所得的數值即定義為該預測 值0 第二階段:對原始影像中四分之—數量的像素進行預 測’係將原始影像之列數為奇數、行數為奇數的像素做為 該預測目標’如第三A圖及第三b圖所示。如同第一階严 之方式’以第三A圖中標示「2」之像數為預測目標,取^ 測目標的左上、左下、右上、右下四個鄰居像素之數值為 預測參考值。預測值與預測參考值的位置關係如第三B圖 所示,其中3表示預測目標Ί、…4為預測參考 值,其中,第二階段的預測值計算法同第—階段。Ma) - Predicted values are predicted. The calculation method of the predicted value is mainly based on the boundary area of the reserved image _, and the setting method of the value may include the following conditions: I(1) The right four prediction reference values (C1~C4) are equal, and the pre-1' is directly The test value (C1 to C4) is set as the predicted value of the predicted target (a); * If there are 4 predicted reference values (C 1 to C4) equal, it is assumed that the original 16 201023587 sets the boundary value as the pre-image There is a boundary passing the predicted target value; (3) if the four predicted reference values (C1~C4) are not equal, the four reference values (C1~C4) are sorted by size, and the value is selected in the middle. The two values are averaged, and the average value is defined as the predicted value. The second stage: predicting the quarter-number of pixels in the original image, the number of columns of the original image is odd, and the number of rows is odd. The pixel is used as the prediction target as shown in the third A diagram and the third b diagram. As the first-order strict method, the number of images marked with "2" in the third A picture is used as the prediction target, and the values of the four neighboring pixels of the upper left, lower left, upper right, and lower right of the measurement target are taken as prediction reference values. The positional relationship between the predicted value and the predicted reference value is as shown in the third B-picture, where 3 indicates that the predicted target Ί, ... 4 is the predicted reference value, and the predicted value of the second stage is calculated as the first-stage.
第三階段:對影像中最後剩下之四分之一的像素進行 預測,係將列數為偶數、行數為偶數的像素做為預測目標, 第四A、B圖所示。以第四A圖標示「3」之像素為預測目 心,並取每-預測目標的上、下、左、右四個鄰居為胃測 參考值。預測值與預測參考值的位置關係如第四B圖所示, 其中a表不預測目標,心、q、心和心為預測參考值。 ^在第三階段所產生的資訊,於日後對影像解碼取回隱 藏資訊時,係最先被解碼判斷的部分,為了避免第三階段 之預測值不受到藏入資訊的影響,故將第三階段的預測參 考值的最後一個位元(LSB)不納入採用而直接設為零,讓藏 入與取出端所得出的預測值相同,如下列公式(6),其中〆、 17 201023587 第二階段的預測值之計算 (6) 4、C;和C:為實際的預測參考值 方式與第一及第二階段相同。 c; = c,-c, mod2 c'2 = c2-c2 mod 2 C3 =c3-c3 mod2 c; =c4-c4 mod 2 具f,mod2運算表 該擴展運算及判斷(20)步驟: 當前列之執行三階段邊緣導向預測器⑽步驟依據三 6段完成該原始影像中所有的預測誤差擴展法 丨〇n-error expansion)’分別針對三像素完成預測, ::驟利用偏所提的個階段完成之預測目標直進行擴 移運m頭(GVerhead)則僅於該三階緣 器⑽步驟之第三階段藏人。由於本較佳實施方 藏1用了邊界誤差計算’故可得出較小的差值、較多的 藏入&間與較好的藏入影像品質。 另外’若是該播頭大於第三階段的可藏範圍,則不可 ::::種情況常發生在藏量較小的區域,大約在〜 為了改進這項缺點我們將預測階段改為只使 階段的預測與藏人,來達到對小藏量與高影像品質的要求。 預測界值判斷(2G)步驟’係以ThGdi所提出的 、擴展法,先判斷對原始影像中的每一個像素計算 預估值、目標值及預估及目標值之差值,以判定像素之差 18 201023587 可以進行擴展’當判斷結果為「是」,則進行臨界 值判斷’反之則無動作結束。 . $成可擴展㈣㈣進行臨界值錢,其係對可擴展 -的差值取—臨界值,當絕對值小於臨界值則執行-擴展及 藏入(32)步驟,而大於臨界值的像素區域執行一位移運曾 (34)步驟,讓數值落在較大或較小的區域,使解碼: 辨認。 該擴展、藏入及位移(30)步驟,當完成前述步驟㈣後, =利…提出之一多層藏入方法,提高資料藏入原始 影像的目的,多層藏入的方法為先以所提的方法藏入,若 無法使用該多層藏入方法時,則改用偏⑴之藏入方法。 :於影像在藏入一次之後’相鄰像素之間的相關性便減少, 減入大量資訊之後,影像品質會快速下降,並且因所提的 方,對槽頭(。州head)的大小限制較多,因此,本步驟㈣ 則疋先以Tian之多層藏入古,土、社^ ^ Μ藏人方法進行前-〜:層之資訊藏入 後’則最後以偏丨之藏入方法完成最後—次的資訊藏入。 …’以本較佳實施步驟執行的資訊藏入可讓原始影 ,完成兩層至三層之資訊藏人,藏入量達到166〜2 62_, 影像品質在PSNR 18dB左右。 為了驗’證本較佳實施方法於實際藏入資料的效果,請 “附件一〜四’其為四張不同内容、影像大小為512x512 像素且為8位元的灰階影像;豆由 暂 1豕,八中’我們以JPEG壓縮品 :為90%的Lena影像作為藏入的資訊,而以本較佳實施 :法進行-層與三層資訊藏入’並同時比較丁㈣所提之 進行資訊藏人。其中,⑻⑻分心原始影像及以本較 19 201023587 =施方法完成資訊藏人的影像,⑷(d)則分別代表本較佳 方方法與Th0di彳法之藏入特性比較的圖表。附件二、 則以不同的圖式内容,執行與附件一相 入盘 比較結果》 〃 我們以重複藏入所提的資訊隱藏法,達到高容量。所 提:資訊隱藏法是利用影像當中的邊界變化作預測,當藏 入資訊之後’邊界的預測法則會漸漸無法使用,所以在藏 入夕層*的時候’會在無法使用所提方法藏人之後,試著以 伽⑴等人所提的方法藏人。所提的高容量可回復式資訊隱 藏比較對象是Tian所提的資訊隱藏法,其方法可達到接近 脚p的容量。我們使用每—層交互不同方向作藏人,譬如 ”兒第層以水平方向取兩兩—組作Haar轉換,第二層便 使用垂直方向取兩兩一組作Harr轉換。 為了驗證所提可回復式資訊隱藏方法具有高容量,我 們使用四張大小為512x512 m Λ h 约Z 的8位凡灰階影像作測試,分別 為 airp丨ane、Lena、Peppers、Bab〇on,實驗結果如附件 ❹ 五到附件十二所示’其中附件五到人為藏有機密資訊的影 像之視覺品質比較,而附件九到十二為在多層藏入㈣_ embedd丨ng)下所提演算法肖丁&所提方法的實驗結果比 較。在最佳狀況下,所提方法可以藏人三層,藏入的資訊 最多可達2.62_,影像品質如同麗了雜訊一般,但仍可 辨認出影像當中的重要影像資訊,PSNR最差大約在⑸已。 由圖中的比較’可以清楚的看出所提方法比原本丁加所提 的以多層藏入差值擴展(difference expansi〇n)的方法,所 藏的量多报多’在同等藏量之下影像品f較好約細甚至 20 201023587 10dB 〇 我們可由多層藏入的圖片與數據看出,藏入的資料量 越多’影像品質漸漸下降。對不同的影像來說,區域變化 越複雜的圖片所能藏入的量越少,如附件八的_咖,圖 中具有複雜的毛髮,在實驗中只能藏入兩層,得到1.33bpp 的藏量與PSNR他⑶日的影像品質,但變辦_时 五的―可藏的量高達2.62bpp,影像 18.15dB。 參 【圖式簡單說明】 第一圖為本發明較佳實施例之流程圖。 第二A、B ®&本發明較佳實施例之第一預測目標及 預測參考像素關係之示意圖。 第三A、B圖為本發明較佳實施例之第二預測目標及 預測參考像素關係之示意圖。 第四A、B圖為本發明較佳實施例之第三預測目標及 φ預測參考像素關係之示意圖。 第五圖為既有之ThocN方法的預測目標及預測參考像 素關係示意圖。 第六圖為既有之Thodi方法之像素誤差統計圖。 第七圖為既有之Thodi方法之已擴展之像素誤差统 圖。 , 第八圖為既有之Thodi方法之已擴展及位移之像素誤 差統計圖β ' 第九圖為既有之Thodi方法之藏入運算計算示意圖。 21 201023587 第十圖為既有之Thod i方法之還原影像計算示意圖。 第十一圖為既有之Thod i之資訊藏入方法流程圖。 , 第十二A、B圖為既有之一藏入字串資訊内容示意圖。 '【主要元件符號說明】 無。The third stage: predicting the last remaining quarter of the pixels in the image, using pixels with even numbers and even numbers as prediction targets, as shown in the fourth and fourth graphs. The pixel of the "3" indicated by the fourth A icon is used as the prediction target, and the four neighbors of the upper, lower, left, and right of each prediction target are used as the gastric reference value. The positional relationship between the predicted value and the predicted reference value is as shown in the fourth B-picture, where a indicates that the target is not predicted, and the heart, q, heart, and heart are predicted reference values. ^ The information generated in the third stage is the first part to be decoded and judged when the hidden information is retrieved from the image decoding in the future. In order to prevent the predicted value of the third stage from being affected by the hidden information, it will be the third. The last bit (LSB) of the predicted reference value of the phase is not included and is directly set to zero, so that the predicted value obtained by the hidden and the extracted end is the same, as shown in the following formula (6), where 〆, 17 201023587 second stage Calculation of predicted values (6) 4, C; and C: The actual predicted reference value is the same as the first and second stages. c; = c, -c, mod2 c'2 = c2-c2 mod 2 C3 = c3-c3 mod2 c; =c4-c4 mod 2 with f, mod2 table This extended operation and judgment (20) steps: current column The implementation of the three-stage edge-directed predictor (10) step completes all the prediction error expansion methods in the original image according to the three six segments, and the prediction is performed for three pixels, respectively. The completed prediction target is directly expanded and migrated (GVerhead) only to the third stage of the third-order (10) step. Since the preferred embodiment 1 uses the boundary error calculation, it is possible to obtain a smaller difference, a larger number of bins & and a better image quality. In addition, if the broadcast is larger than the third stage, then the :::: kind of situation often occurs in a small area, about ~ In order to improve this shortcoming, we will change the forecast stage to only the stage. The predictions and Tibetans, to meet the requirements for small reserves and high image quality. The prediction boundary value judgment (2G) step is based on the extension method proposed by ThGdi, and first determines the difference between the estimated value, the target value, and the estimated and target values for each pixel in the original image to determine the pixel. Difference 18 201023587 It is possible to expand 'When the judgment result is "Yes", the critical value is judged. $成 expandable (4) (4) to carry out the threshold value, which is the value of the extension - the threshold value, when the absolute value is less than the critical value, the -expansion and hiding (32) steps are performed, and the pixel area larger than the critical value is executed. A displacement is carried out in the (34) step, allowing the value to fall in a larger or smaller area to enable decoding: identification. The expansion, hiding, and shifting (30) steps, when the foregoing step (4) is completed, a multi-layer hiding method is proposed to improve the purpose of hiding data into the original image, and the method of multi-layer hiding is first proposed. The method is hidden. If the multi-layer hiding method cannot be used, the method of hiding the partial (1) is used instead. : After the image is hidden once, the correlation between adjacent pixels is reduced. After a large amount of information is reduced, the image quality will drop rapidly, and the size of the slot head (. state head) is limited by the proposed method. More, therefore, in this step (4), the first layer of Tian is hidden in the ancient, the soil, the society ^ ^ Μ Tibetan method to carry out the pre-~: layer of information hidden after the 'then, finally completed by the method of partiality The last-time information is hidden. ... The information carried out by the preferred implementation steps can be used to allow the original image to complete the two- to three-layer information Tibetans, with a storage amount of 166~2 62_, and an image quality of about 18 dB PSNR. In order to verify the effect of the preferred implementation method on the actual data hiding, please click "Annex 1 ~ 4" for four different content, the image size is 512x512 pixels and is 8-bit grayscale image;豕,八中' We use JPEG compression: 90% of Lena images as hidden information, and with this preferred implementation: method - layer and three layers of information hidden in 'and at the same time compare Ding (4) proposed Information Tibetans. Among them, (8) (8) distracted original images and images of Tibetans completed by 19 201023587 = Shi, and (4) (d) represent graphs comparing the preferred methods with the hidden features of the Th0di method. Attachment 2, the results of the comparison with the Annex I are performed in different schemas. 〃 We have repeatedly added the proposed information hiding method to achieve high capacity. The information hiding method is to use the image. Boundary changes are predicted. When the information is hidden, the 'boundary prediction method will gradually become unusable, so when you are hiding in the eve*, you will try to use the saga (1) and others after you are unable to use the proposed method. The method of Tibetans. The proposed high-capacity recoverable information hiding comparison object is the information hiding method proposed by Tian, and the method can reach the capacity close to the foot p. We use each direction to interact with different directions for Tibetans, such as "the first layer to level The direction takes two or two—the group is Haar converted, and the second layer uses the vertical direction to take two or two sets for Harr conversion. In order to verify that the proposed retrievable information hiding method has high capacity, we use four 8-bit grayscale images of size 512x512 m Λ h and about Z for airp丨ane, Lena, Peppers, Bab〇on, The experimental results are as shown in Annex ❹ V to Annex 12, where the visual quality of the images in Annex 5 to the man-made information is compared, and the annexes 9 to 12 are based on the multi-layered (4) _ embedd丨ng algorithm. The experimental results of the method proposed by Xiaoding & In the best case, the proposed method can hide three layers, and the information hidden in the file can be up to 2.62_. The image quality is like the noise, but the important image information in the image can still be recognized. The PSNR is the worst. In (5) already. From the comparison in the figure, it can be clearly seen that the proposed method is more than the original method of the differential expansion (difference expansi〇n). The lower image product f is preferably about fine or even 20 201023587 10dB 〇 We can see from the pictures and data hidden in multiple layers that the more data is hidden, the image quality is gradually declining. For different images, the more complex the image changes, the less the amount of images can be hidden. For example, the attached coffee has complicated hair. In the experiment, only two layers can be hidden, and 1.33bpp is obtained. The amount of image and PSNR his (3) day image quality, but the change of _ _ five can be hidden up to 2.62bpp, image 18.15dB. BRIEF DESCRIPTION OF THE DRAWINGS The first figure is a flow chart of a preferred embodiment of the present invention. A second A, B ® & schematic diagram of a first predicted target and a predicted reference pixel relationship of a preferred embodiment of the present invention. The third A and B diagrams are schematic diagrams of the second prediction target and the predicted reference pixel relationship in the preferred embodiment of the present invention. The fourth and fourth graphs are diagrams showing the relationship between the third prediction target and the φ prediction reference pixel in the preferred embodiment of the present invention. The fifth figure is a schematic diagram of the predicted target and predicted reference pixel relationship of the existing ThocN method. The sixth picture shows the pixel error statistics of the existing Thodi method. The seventh figure is an expanded pixel error map of the existing Thodi method. The eighth figure is the expanded and shifted pixel error statistical graph of the existing Thodi method. The ninth figure is a schematic diagram of the hidden operation calculation of the existing Thodi method. 21 201023587 The tenth figure is a schematic diagram of the restored image calculation of the existing Thod i method. The eleventh figure is a flow chart of the information hiding method of the existing Thod i. The twelfth A and B pictures are schematic diagrams of the information content of one of the existing hidden strings. '[Main component symbol description] None.
22twenty two
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW97147108A TWI397299B (en) | 2008-12-04 | 2008-12-04 | Method of high capacity reversible data hiding scheme using edge prediction error |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW97147108A TWI397299B (en) | 2008-12-04 | 2008-12-04 | Method of high capacity reversible data hiding scheme using edge prediction error |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201023587A true TW201023587A (en) | 2010-06-16 |
TWI397299B TWI397299B (en) | 2013-05-21 |
Family
ID=44833451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW97147108A TWI397299B (en) | 2008-12-04 | 2008-12-04 | Method of high capacity reversible data hiding scheme using edge prediction error |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI397299B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI472947B (en) * | 2012-08-10 | 2015-02-11 | Univ Nat Changhua Education | Method for hiding information in picture |
CN109948307A (en) * | 2019-03-01 | 2019-06-28 | 北京交通大学 | Reversible data concealing method based on pixel multi-scale prediction |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9502274D0 (en) * | 1995-02-06 | 1995-03-29 | Central Research Lab Ltd | Method and apparatus for coding information |
TW468337B (en) * | 2000-05-12 | 2001-12-11 | Chung Shan Inst Of Science | Steganography method with reduced distortion |
US6631198B1 (en) * | 2000-06-19 | 2003-10-07 | Digimarc Corporation | Perceptual modeling of media signals based on local contrast and directional edges |
US6633654B2 (en) * | 2000-06-19 | 2003-10-14 | Digimarc Corporation | Perceptual modeling of media signals based on local contrast and directional edges |
US6611608B1 (en) * | 2000-10-18 | 2003-08-26 | Matsushita Electric Industrial Co., Ltd. | Human visual model for data hiding |
US7190805B2 (en) * | 2002-04-30 | 2007-03-13 | Hewlett-Packard Development Company, L.P. | Method of and system for edge watermarking of an image |
EP2410726B1 (en) * | 2004-02-02 | 2014-12-03 | Nippon Telegraph And Telephone Corporation | Digital watermark detection apparatus, method and program |
TWI288873B (en) * | 2004-02-17 | 2007-10-21 | Mitsubishi Electric Corp | Method for burying watermarks, method and device for inspecting watermarks |
-
2008
- 2008-12-04 TW TW97147108A patent/TWI397299B/en not_active IP Right Cessation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI472947B (en) * | 2012-08-10 | 2015-02-11 | Univ Nat Changhua Education | Method for hiding information in picture |
CN109948307A (en) * | 2019-03-01 | 2019-06-28 | 北京交通大学 | Reversible data concealing method based on pixel multi-scale prediction |
Also Published As
Publication number | Publication date |
---|---|
TWI397299B (en) | 2013-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hong et al. | A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification | |
Peng et al. | Adaptive reversible data hiding scheme based on integer transform | |
He et al. | Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion | |
Arham et al. | Multiple layer data hiding scheme based on difference expansion of quad | |
Wu et al. | A reversible data hiding method with contrast enhancement for medical images | |
Ou et al. | Reversible data hiding based on PDE predictor | |
Hong et al. | Reversible data hiding for high quality images using modification of prediction errors | |
Hsiao et al. | Block-based reversible data embedding | |
Naheed et al. | Intelligent reversible watermarking technique in medical images using GA and PSO | |
CN111898136A (en) | High-fidelity reversible information hiding method and device based on prediction error value sequencing | |
Lu et al. | Reversible data hiding using local edge sensing prediction methods and adaptive thresholds | |
Chen et al. | Adaptive reversible image watermarking scheme | |
CN113032813B (en) | Reversible information hiding method based on improved pixel local complexity calculation and multi-peak embedding | |
Luo et al. | Convolutional neural networks-based stereo image reversible data hiding method | |
CN114399419B (en) | Reversible image watermarking algorithm based on prediction error expansion | |
CN115049715B (en) | Image steganography method based on texture fusion feature block matching and large embedding rate product code | |
Uyyala et al. | Reversible data hiding using improved gradient based prediction and adaptive histogram bin shifting | |
Mao et al. | Reversible data hiding based on adaptive IPVO and two-segment pairwise PEE | |
CN113744113B (en) | Image reversible information hiding method driven by convolutional neural network | |
CN110047029B (en) | Reversible information hiding method and device with contrast enhancement by combining multi-layer difference expansion | |
Wang et al. | An improved reversible watermarking scheme using weighted prediction and watermarking simulation | |
Liu et al. | Multi-dimensional constraints-based PPVO for high fidelity reversible data hiding | |
CN108510425B (en) | Reversible watermarking method based on IPPVO and optimized MHM | |
Xiao et al. | Reversible data hiding using histogram shifting in small blocks | |
TW201023587A (en) | Method of high capacity reversible data hiding scheme using edge prediction error |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |