WO2022088516A1 - 一种基于预测误差的可逆数据隐藏方法及系统 - Google Patents

一种基于预测误差的可逆数据隐藏方法及系统 Download PDF

Info

Publication number
WO2022088516A1
WO2022088516A1 PCT/CN2021/071769 CN2021071769W WO2022088516A1 WO 2022088516 A1 WO2022088516 A1 WO 2022088516A1 CN 2021071769 W CN2021071769 W CN 2021071769W WO 2022088516 A1 WO2022088516 A1 WO 2022088516A1
Authority
WO
WIPO (PCT)
Prior art keywords
prediction error
layer
value
pixel
image
Prior art date
Application number
PCT/CN2021/071769
Other languages
English (en)
French (fr)
Inventor
李宏图
李帅
胡亮
孙成宇
迟令
李拓航
Original Assignee
吉林大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 吉林大学 filed Critical 吉林大学
Priority to US17/629,615 priority Critical patent/US20220368808A1/en
Publication of WO2022088516A1 publication Critical patent/WO2022088516A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32203Spatial or amplitude domain methods
    • H04N1/32229Spatial or amplitude domain methods with selective or adaptive application of the additional information, e.g. in selected regions of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32277Compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32288Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image
    • H04N1/32299Multiple embedding, e.g. cocktail embedding, or redundant embedding, e.g. repeating the additional information at a plurality of locations in the image using more than one embedding method
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32347Reversible embedding, i.e. lossless, invertible, erasable, removable or distorsion-free embedding

Definitions

  • the invention relates to the field of image encryption, in particular to a reversible data hiding method and system based on prediction error.
  • Steganography is about information hiding, that is, not letting anyone other than the intended recipient know about the transmission event of the information (while not just the content of information) is a skill and science.
  • the reversible data hiding method not only realizes the secret hiding of data into digital images, but also can be fully recovered after the original image embedded data is extracted.
  • Reversible data hiding has many application scenarios due to its reversible characteristics. It is an ideal choice for occasions that require high fidelity, such as military secrets, legal authentication, and telemedicine.
  • the method based on prediction error has better performance.
  • the existing reversible data hiding technology based on prediction error also has many defects.
  • the current reversible data hiding algorithm has the following defects: (1) The larger the embedding capacity, the larger the image distortion. (2) The algorithm is complex and the time complexity is high. (3) The security of the hidden algorithm.
  • the purpose of the present invention is to provide a reversible data hiding method and system based on prediction error, which can effectively solve the problem of image distortion when large-capacity data is embedded.
  • the present invention provides a reversible data hiding method based on prediction error, the method comprising:
  • the partitioning of the image specifically includes:
  • the original pixel sequence is partitioned to obtain blank parts ⁇ a 1 ,a 2 ,...,an ⁇ and shaded parts ⁇ x 1 ,x 2 ,..., x n ⁇ .
  • performing the first layer embedding process on the shadow portion specifically includes:
  • formula (1) indicates that the center pixel is predicted by the surrounding pixels, where i, j respectively represent the row and column of the current pixel location, ⁇ a1, a2,...,an ⁇ are the original in the first layer embedding Pixel values, is a one-dimensional predicted value sequence, and the predicted value is an integer;
  • Xi represents the original pixel value of the current pixel, Represents the predicted value of the first layer of encryption
  • the additional information includes: the length of the secret information and the size of the compressed location map;
  • X′ i represents the pixel value of the first layer encrypted image, represents the predicted value of the pixel in the shaded part, and e'i represents the extended and offset prediction error.
  • embedding the additional information into the first line of the original image pixel specifically includes:
  • the border pixel value is [0, 255];
  • embedding the secret information b ⁇ 0,1 ⁇ into a preset prediction error value range to obtain the expanded and offset prediction error value specifically adopts the following formula:
  • b represents the secret information
  • ei represents the prediction error
  • T represents the range of the embedded prediction error
  • e'i represents the extended and offset prediction error
  • performing multi-layer embedding processing on the blank part specifically includes:
  • the pixels in the blank part are predicted by the encrypted pixels of the first layer with the neighbor pixels as the center, and the encrypted prediction value of the second layer is obtained;
  • the data is embedded and shifted according to the second prediction error histogram to obtain the final encrypted image.
  • extracting the outermost information of the blank part after the multi-layer embedding process specifically includes:
  • extracting the information of the shadow part after the first layer embedding process specifically includes:
  • extracting secret information according to the second prediction error value sequence specifically includes:
  • Pr(i,j) (P's(i,j))+(dw(i,j)-S)/2 (6);
  • S is the extracted secret information bit
  • Pr is the recovered pixel value
  • P's is the predicted value of the encrypted image
  • dw is the predicted error value of the encrypted image
  • the extraction method is based on the following formula:
  • the present invention additionally provides a reversible data hiding system based on prediction error, the system comprising:
  • the image partition module is used to partition the image to obtain the shadow part and the blank part;
  • a first-layer embedding processing module configured to perform first-layer embedding processing on the shadow portion
  • a multi-layer embedding processing module for performing multi-layer embedding processing on the blank part
  • a first extraction module configured to extract the outermost information of the blank part after the multi-layer embedding process
  • the second extraction module is used for extracting the information of the shadow part after the embedding process of the first layer.
  • the present invention discloses the following technical effects:
  • the method of the present invention can reduce the distortion degree of the image while embedding a large amount of data, and solves the conflicting relationship between the embedding capacity and the image distortion well.
  • FIG. 1 is a flowchart of a reversible data hiding method based on prediction error according to an embodiment of the present invention
  • Fig. 2 (a) is the original pixel value of the embodiment of the present invention.
  • FIG. 2(b) is a predicted pixel value according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a moving process of a prediction error histogram according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an embedding process according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a reversible data hiding system based on prediction error according to an embodiment of the present invention.
  • the purpose of the present invention is to provide a reversible data hiding method and system based on prediction error, which can effectively solve the problem of image distortion when large-capacity data is embedded.
  • FIG. 1 is a flowchart of a reversible data hiding method based on prediction error according to an embodiment of the present invention. As shown in FIG. 1 , the method includes:
  • Step 101 Partition the image to obtain the shadow part and the blank part.
  • Partitioning an image specifically includes:
  • the original pixel sequence is partitioned to obtain blank parts ⁇ a 1 ,a 2 ,...,an ⁇ and shaded parts ⁇ x 1 ,x 2 ,..., x n ⁇ .
  • Step 102 Perform a first layer embedding process on the shadow portion.
  • S1 Predict the center pixel with the surrounding pixels of the shaded part to obtain the first-layer encrypted prediction value; as shown in Figures 2(a) and 2(b), the first row, the third One column, last row, and last column are not predicted, so the prediction error values of the first row, first column, last row, and last column are all 0;
  • formula (1) indicates that the center pixel is predicted by the surrounding pixels, where i, j respectively represent the row and column of the current pixel location, ⁇ a1, a2,...,an ⁇ are the original in the first layer embedding Pixel values, is a one-dimensional sequence of predicted values, and the predicted values are integers.
  • Xi represents the original pixel value of the current pixel, Represents the predicted value of the first layer of encryption
  • S3 Calculate the frequency of each value in the first prediction error value sequence, generate a first prediction error histogram, and expand and shift the embedded data by modifying the prediction error histogram, as shown in FIG. 3 .
  • S4 Obtain additional information; the additional information includes: the length of the secret information and the size of the compressed location map.
  • S5 Embed the additional information into the first row of the original image pixels, as shown in FIG. 4 .
  • the additional information is finally embedded into the first row by the least significant bit replacement technique, and the information of the first row is first extracted in the extraction. Therefore, the compressed location map information, and the length of the secret information, are embedded in the first row of the original image pixels as part of the payload.
  • S52 Modify the position map mark corresponding to the modified pixel to 1, and mark the position map of the remaining unmodified pixel values to 0, to obtain a position map matrix composed of 0 and 1;
  • Location map Used to mark pixels that cause overflow problems during embedding.
  • each The modification of the pixel value is at most 1, so only the boundary value pixel needs to be adjusted. For example, change the value of xi (original pixel) to 254, and change the value of xi (original pixel) to 1, and the modification will be performed at the same time.
  • the position map flag corresponding to the pixel value is modified to 1, and the position map flag of the remaining unmodified pixel values is 0.
  • the lossless compression here adopts digital encoding. That is, step S53.
  • b represents the secret information
  • ei represents the prediction error
  • T represents the range of the embedded prediction error
  • e'i represents the extended and offset prediction error
  • X′ i represents the pixel value of the first-layer encrypted image, that is, the pixel value of the first-layer encrypted image, represents the predicted value of the pixel in the shaded part
  • e'i represents the extended and offset prediction error
  • our scheme can perform multi-layer embedding, that is, as shown in Figure 2(a), except for the original image, the remaining image is divided into shadow parts and blank parts, the first layer is embedded in the shadow part, and the remaining blank parts can be
  • multi-layer embedding for example, in the second layer embedding, we select the adjacent pixels on the right side of the same row of shadow pixels for embedding.
  • the value used to predict the second layer during embedding is the value modified during the first layer embedding, and the rest are the same. Note that it is best to divide the secret information into two parts with similar sizes.
  • the pixels encrypted by the first layer are predicted using the same predictor centered on the neighbor pixels, and then the corresponding data embedding and offset are performed. , until the end of the embedded message.
  • Step 103 Multi-layer embedding processing is performed on the blank portion.
  • the difference from the shaded part is that the pixel value prediction of the blank part is based on the pixel value of the encrypted image in the previous layer.
  • the pixels encrypted by the first layer are predicted using the same prediction method formula (1) centered on the neighbor pixels.
  • the blank pixel adjacent to the right side of the same row of the shadow pixel is selected for embedding, and the value used to predict the second layer during embedding is the modified value of the first layer.
  • A1 Predict the blank part of the pixels with the neighbor pixels as the center through the encrypted pixels of the first layer, and obtain the encrypted prediction value of the second layer.
  • A2 Calculate the difference between the original pixel value of the current pixel and the second-layer encrypted prediction value to obtain a second prediction error value sequence.
  • A3 Calculate the frequency of each value in the second-layer prediction error value sequence, and generate a second prediction error histogram, as shown in FIG. 3 .
  • A4 Perform data embedding and translation according to the second prediction error histogram to obtain a final encrypted image.
  • Step 104 Extract the outermost information of the blank part after the multi-layer embedding process.
  • the secret information embedded in the outermost layer is first extracted, and then sequentially extracted to the inner layer, and finally the original image is restored losslessly, and the embedded secret information is obtained.
  • the actual payload capacity in the image is obtained by reading the least significant bits of the first line of the encrypted image. Restores the replaced least significant bits of the first row back to restore the original values of the first row of pixels.
  • B3 Obtain a second prediction error value sequence based on the second-layer encrypted prediction value, and generate a second prediction error histogram.
  • the same scan and prediction commands are used to obtain the pixel prediction value of the encrypted image, and then the label prediction error sequence of the encrypted image is obtained, and the prediction error histogram of the encrypted image is generated.
  • the process is the same as the embedding stage.
  • Pr(i,j) (P's(i,j))+(dw(i,j)-S)/2 (6);
  • S is the extracted secret information bit
  • Pr is the recovered pixel value
  • P's is the predicted value of the encrypted image
  • dw is the predicted error value of the encrypted image
  • the extraction method is based on the following formula:
  • the outermost image and encrypted information can be recovered without loss.
  • the first row of pixels, the first column of pixels, the last row of pixels and the last column of pixels of the original image and the first row of pixels of the encrypted image, the first column of pixels Pixels, the last row of pixels, and the last column of pixels are not changed during embedding and extraction, and the predicted value of the encrypted image is the same as when embedding.
  • Step 105 Extract the information of the shadow part after the first layer embedding process.
  • C1 Get the encrypted image when the first layer is encrypted.
  • C2 Obtain the first-layer encryption prediction value of the encrypted image during the first-layer encryption.
  • C3 Obtain a first prediction error value sequence based on the first-layer encrypted prediction value, and generate a first prediction error histogram.
  • C4 Extract secret information based on the first sequence of prediction error values.
  • the extraction process is the same as the extraction process in step 104:
  • Pr(i,j) (P's(i,j))+(dw(i,j)-S)/2 (9);
  • S is the extracted secret information bit
  • Pr is the recovered pixel value
  • P's is the predicted value of the encrypted image
  • dw is the predicted error value of the encrypted image
  • the extraction method is based on the following formula:
  • C5 Decompress the lossless compressed location map to obtain the decompressed location map.
  • C6 Obtain the pixel whose corresponding position is marked as 1 according to the decompressed position map, modify and restore, restore the original pixel value, and obtain the original image with lossless restoration.
  • FIG. 5 is a schematic structural diagram of a reversible data hiding system based on prediction error according to an embodiment of the present invention. As shown in FIG. 5 , the system includes:
  • the image partitioning module 201 is used to partition the image to obtain the shadow part and the blank part;
  • a first-layer embedding processing module 202 configured to perform first-layer embedding processing on the shadow portion
  • a multi-layer embedding processing module 203 configured to perform multi-layer embedding processing on the blank portion
  • a first extraction module 204 configured to extract the outermost information of the blank part after the multi-layer embedding process
  • the second extraction module 205 is configured to extract the information of the shadow portion after the first layer embedding processing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

本发明涉及一种基于预测误差的可逆数据隐藏方法及系统,所述方法包括:对图像进行分区,得到阴影部分和空白部分;对所述阴影部分进行第一层嵌入处理;对所述空白部分进行多层嵌入处理;提取所述多层嵌入处理后的空白部分的最外层信息;提取所述第一层嵌入处理后的阴影部分的信息。本发明中的上述方法能够有效解决大容量数据嵌入的时候图像失真的问题。

Description

一种基于预测误差的可逆数据隐藏方法及系统
本申请要求于2020年10月26日提交中国专利局、申请号为202011154309.8、发明名称为“一种基于预测误差的可逆数据隐藏方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及图像加密领域,特别是涉及一种基于预测误差的可逆数据隐藏方法及系统。
背景技术
随着互联网技术的发展,信息在传输过程中也带来了种种的信息安全问题,隐写术是关于信息隐藏,即,不让计划的接收者之外的任何人知道信息的传递事件(而不只是信息的内容)的一门技巧与科学。其中,可逆数据隐藏方法不仅实现了隐秘地将数据隐藏到数字图像中,并且原始图像嵌入数据被提取出后,可以完全恢复。可逆数据隐藏因其可逆的特性有着诸多的应用场景,对保真度要求较高的场合,是理想的选择,例如:军事机密、法律认证以及远程医疗等。可逆数据隐藏的方法中,其中基于预测误差的方法具有较好的性能体现。
当然现有的基于预测误差的可逆数据隐藏技术也存在许多缺陷。目前的可逆数据隐藏算法存在以下缺陷:(1)较大的嵌入容量,会使图像失真变大。(2)算法复杂,时间复杂度高。(3)隐藏算法的安全性。
发明内容
基于此,本发明的目的是提供一种基于预测误差的可逆数据隐藏方法及系统,有效解决大容量数据嵌入的时候图像失真的问题。
为实现上述目的,本发明提供了一种基于预测误差的可逆数据隐藏方法,所述方法包括:
对图像进行分区,得到阴影部分和空白部分;
对所述阴影部分进行第一层嵌入处理;
对所述空白部分进行多层嵌入处理;
提取所述多层嵌入处理后的空白部分的最外层信息;
提取所述第一层嵌入处理后的阴影部分的信息。
可选的,所述对图像进行分区具体包括:
对所述图像由左至右由上至下进行扫描,得到图像的原始像素序列{c 1,c 2,…,c n};
将所述原始像素序列进行分区,得到空白部分{a 1,a 2,…,a n}和阴影部分{x 1,x 2,…,x n}。
可选的,对所述阴影部分进行第一层嵌入处理具体包括:
以所述阴影部分的周边像素对中心像素进行预测,得到第一层加密预测值;所述阴影部分像素的第一行、第一列、最后一行以及最后一列都不进行预测;
具体采用以下公式:
Figure PCTCN2021071769-appb-000001
其中,公式(1)表示通过周边像素对中心像素进行预测,其中,i,j分别表示当前像素所在位置的行和列,{a1,a2,…,an}在第一层嵌入中均为原始像素值,
Figure PCTCN2021071769-appb-000002
为一维的预测值序列,预测值为整数;
计算当前像素的原始像素值与所述第一层加密预测值的差值,得到第一预测误差值序列(e1,…,en),具体采用以下公式:
Figure PCTCN2021071769-appb-000003
其中,Xi表示当前像素的原始像素值,
Figure PCTCN2021071769-appb-000004
表示第一层加密预测值;
计算所述第一预测误差值序列中每一个值的频率,生成第一预测误差 直方图;
获取附加信息;所述附加信息包括:秘密信息长度和压缩的位置图大小;
将所述附加信息嵌入到原始图像像素的第一行;
将秘密信息b∈{0,1}嵌入到预先设定的预测误差值范围内,得到经过拓展和偏移的预测误差值;
基于拓展和偏移后的预测误差值确定第一层加密图像;
具体采用以下公式:
Figure PCTCN2021071769-appb-000005
其中X′ i表示第一层加密图像的像素值,
Figure PCTCN2021071769-appb-000006
表示阴影部分像素预测值,e′i表示经过拓展和偏移的预测误差。
可选的,将所述附加信息嵌入到原始图像像素的第一行具体包括:
调整阴影部分的边界像素值;所述边界像素值为[0,255];
将进行修改的像素对应的位置图标记修改为1,其余未修改的像素值的位置映射图标记为0,得到由0和1组成的位置图矩阵;
将所述位置图矩阵进行压缩得到压缩的位置图;
将所述压缩的位置图嵌入到原始图像像素的第一行。
可选的,所述将秘密信息b∈{0,1}嵌入到预先设定的预测误差值范围内,得到经过拓展和偏移的预测误差值具体采用以下公式:
Figure PCTCN2021071769-appb-000007
其中,b表示秘密信息,ei表示预测误差,T表示被嵌入的预测误差的范围,e′i表示经过拓展和偏移的预测误差。
可选的,对所述空白部分进行多层嵌入处理具体包括:
通过第一层加密后的像素以邻居像素为中心对空白部分像素进行预测,得到第二层加密预测值;
计算当前像素的原始像素值与所述第二层加密预测值的差值,得到第二预测误差值序列;
计算所述第二层预测误差值序列中每一个值的频率,生成第二预测误差直方图;
根据所述第二预测误差直方图进行数据的嵌入和平移,得到最终的加密图像。
可选的,提取所述多层嵌入处理后的空白部分的最外层信息具体包括:
提取第一行嵌入的附加信息;
获取加密图像的像素第二层加密预测值;
基于所述第二层加密预测值得到第二预测误差值序列,并生成第二预测误差直方图;
根据所述第二预测误差值序列提取秘密信息;
恢复最外层加密图像的像素值。
可选的,提取所述第一层嵌入处理后的阴影部分的信息具体包括:
获取第一层加密时的加密图像;
获取第一层加密时的加密图像的第一层加密预测值;
基于所述第一层加密预测值得到第一预测误差值序列,并生成第一预测误差直方图;
基于所述第一预测误差值序列提取秘密信息;
将无损压缩的位置图进行解压,获得解压的位置图;
根据解压的位置图得到相应位置标记为1的像素,并修改还原,恢复原始像素值,并得到无损恢复的原始图像。
可选的,根据所述第二预测误差值序列提取秘密信息具体包括:
根据T=1,dw(i,j)在[-2,1)进行提取秘密信息;
根据公式:S=mod(dw(i,j)+1,2) (5)
Pr(i,j)=(P′s(i,j))+(dw(i,j)-S)/2 (6);
其中,S是提取的秘密信息位,Pr是恢复的像素值,P′s是加密图像预测值,dw是加密图像的预测误差值;
剩余像素在[1,+∞)和(-∞,-2)的范围内是经过扩展平移的像素,并没有进行嵌入信息,提取方法根据以下公式:
Figure PCTCN2021071769-appb-000008
直至空白部分所有的秘密信息提取完成结束。
本发明另外提供一种基于预测误差的可逆数据隐藏系统,所述系统包括:
图像分区模块,用于对图像进行分区,得到阴影部分和空白部分;
第一层嵌入处理模块,用于对所述阴影部分进行第一层嵌入处理;
多层嵌入处理模块,用于对所述空白部分进行多层嵌入处理;
第一提取模块,用于提取所述多层嵌入处理后的空白部分的最外层信息;
第二提取模块,用于提取所述第一层嵌入处理后的阴影部分的信息。
根据本发明提供的具体实施例,本发明公开了以下技术效果:
(1)本发明方法能够满足在大量数据嵌入的同时,降低图像的失真度,很好的解决了嵌入容量与图像失真的冲突关系。
(2)本发明算法时间复杂度低。
(3)本发明算法安全性高。
说明书附图
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例一种基于预测误差的可逆数据隐藏方法流程图;
图2(a)为本发明实施例原始像素值;
图2(b)为本发明实施例经过预测的像素值;
图3为本发明实施例预测误差直方图移动过程示意图;
图4为本发明实施例嵌入过程示意图;
图5为本发明实施例一种基于预测误差的可逆数据隐藏系统结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的目的是提供一种基于预测误差的可逆数据隐藏方法及系统,有效解决大容量数据嵌入的时候图像失真的问题。
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合附图和具体实施方式对本发明作进一步详细的说明。
图1为本发明实施例一种基于预测误差的可逆数据隐藏方法流程图,如图1所示,所述方法包括:
步骤101:对图像进行分区,得到阴影部分和空白部分。
对当前图像进行分区,分为阴影部分和空白部分两区域,首先对阴影部分像素进行第一层嵌入处理。随后可对空白部分像素进行多层嵌入处理。
对图像进行分区具体包括:
对所述图像由左至右由上至下进行扫描,得到图像的原始像素序列{c 1,c 2,…,c n};
将所述原始像素序列进行分区,得到空白部分{a 1,a 2,…,a n}和阴影部分{x 1,x 2,…,x n}。
步骤102:对所述阴影部分进行第一层嵌入处理。
具体包括:
S1:以所述阴影部分的周边像素对中心像素进行预测,得到第一层加密预测值;如图2(a)和图2(b)所示,所述阴影部分像素的第一行、 第一列、最后一行以及最后一列都不进行预测,因此,第一行、第一列、最后一行以及最后一列的预测误差值均为0;
具体采用以下公式:
Figure PCTCN2021071769-appb-000009
其中,公式(1)表示通过周边像素对中心像素进行预测,其中,i,j分别表示当前像素所在位置的行和列,{a1,a2,…,an}在第一层嵌入中均为原始像素值,
Figure PCTCN2021071769-appb-000010
为一维的预测值序列,预测值为整数。
S2:计算当前像素的原始像素值与所述第一层加密预测值的差值,得到第一预测误差值序列(e1,…,en),具体采用以下公式:
Figure PCTCN2021071769-appb-000011
其中,Xi表示当前像素的原始像素值,
Figure PCTCN2021071769-appb-000012
表示第一层加密预测值;
S3:计算所述第一预测误差值序列中每一个值的频率,生成第一预测误差直方图,嵌入数据通过修改预测误差直方图进行拓展和平移,如图3所示。
S4:获取附加信息;所述附加信息包括:秘密信息长度和压缩的位置图大小。
S5:将所述附加信息嵌入到原始图像像素的第一行,如图4所示。
在我们的方法中将附加信息通过最低有效位替换技术最后嵌入到第一行,并且在提取中首先提取第一行的信息。因此,压缩的位置图信息,以及秘密信息长度作为有效载容的部分嵌入到原始图像像素的第一行中去。
具体包括:
S51:调整阴影部分的边界像素值;所述边界像素值为[0,255]。
S52:将进行修改的像素对应的位置图标记修改为1,其余未修改的像素值的位置映射图标记为0,得到由0和1组成的位置图矩阵;
Location map(位置映射图):用来标记在嵌入过程中会引起溢出问题的像素。为了防止灰度图像在嵌入信息以后发生上溢和下溢的问题,也就是说超过[0,255]范围,我们会在一个可靠的范围内调节像素值,因此在我们的方法中,每个像素值的修改最多为1,因此只需要调整边界值像素,例如,将值为255得xi(原始像素)修改为254,将值为0的xi(原始像素)改为1,同时将进行修改的像素对应的位置图标记修改为1,其余未进行修改的像素值的位置映射图标记为0。这里我们得到是一个与给定图像大小相同的一个由0和1组成的矩阵(即位置图矩阵),然后将得到的矩阵通过无损压缩技术,进行压缩,这里的无损压缩采用数字编码的方式,即步骤S53。
S53:将所述位置图矩阵进行压缩得到压缩的位置图。
S54:将所述压缩的位置图嵌入到原始图像像素的第一行。
S6:将秘密信息b∈{0,1}嵌入到预测误差为[0,-1]内,得到经过拓展和偏移的预测误差值e′i。
具体采用以下公式:
Figure PCTCN2021071769-appb-000013
其中,b表示秘密信息,ei表示预测误差,T表示被嵌入的预测误差的范围,e′i表示经过拓展和偏移的预测误差。
S7:基于拓展和偏移后的预测误差值确定第一层加密图像;
具体采用以下公式:
Figure PCTCN2021071769-appb-000014
其中X′ i表示第一层加密图像的像素值,也就是第 一层加密图像的像素值,
Figure PCTCN2021071769-appb-000015
表示阴影部分像素预测值,e′i表示经过拓展和偏移的预测误差。
同样地,我们的方案可以进行多层嵌入,也就是说如图2(a),除原始图像四周,将剩余图像分为阴影部分和空白部分,第一层嵌入在阴影部分,剩余空白部分可以进行多层嵌入,比如在第二层嵌入我们选择阴影像素同一行的右侧相邻像素进行嵌入,嵌入时用来参与预测第二层的值是第一层嵌入时修改的值,其余相同,注意最好将秘密信息分成大小接近的两部分,第一层嵌入结束以后,通过第一层加密后的像素以邻居像素为中心使用相同的预测器进行预测,随后进行相应的数据嵌入和偏移,直至嵌入信息结束。
步骤103:对所述空白部分进行多层嵌入处理。
与阴影部分不同的是空白部分的像素值预测是根据前一层加密图像的像素值进行。第一层嵌入结束以后,通过第一层加密后的像素以邻居像素为中心使用相同的预测方法公式(1)进行预测。
在第二层嵌入时选择阴影像素同一行的右侧相邻的空白像素进行嵌入,嵌入时用来参与预测第二层的值是第一层嵌入时修改过的值。
若采用两层嵌入,最好将秘密信息分成大小接近的两部分,随后进行相应的数据嵌入和偏移,直至所有信息嵌入结束。
具体包括如下步骤:
A1:通过第一层加密后的像素以邻居像素为中心对空白部分像素进行预测,得到第二层加密预测值。
A2:计算当前像素的原始像素值与所述第二层加密预测值的差值,得到第二预测误差值序列。
A3:计算所述第二层预测误差值序列中每一个值的频率,生成第二预测误差直方图,如图3所示。
A4:根据所述第二预测误差直方图进行数据的嵌入和平移,得到最终的加密图像。
步骤104:提取所述多层嵌入处理后的空白部分的最外层信息。
在提取秘密信息和恢复原始图像的过程中,首先提取嵌入在最外层的秘密信息,然后在依次向内层提取,最终无损恢复原始图像,并得到嵌入的秘密信息。
具体包括:
B1:提取第一行嵌入的附加信息。
恢复第一行的原始像素值。通过读取加密图像第一行的最低有效位得到图像中实际的有效载容。将第一行被替换的最低有效位还原回去从而恢复第一行像素的原始值。
B2:获取加密图像的像素第二层加密预测值。
B3:基于所述第二层加密预测值得到第二预测误差值序列,并生成第二预测误差直方图。
具体的,使用相同的扫描和预测命令去得到加密图像的像素预测值,随后获取加密图像的标记预测误差序列,生成加密图像的预测误差直方图,过程与嵌入阶段相同。
B4:根据所述第二预测误差值序列提取秘密信息。
根据T=1,dw(i,j)在[-2,1)进行提取秘密信息;
根据公式:S=mod(dw(i,j)+1,2) (5)
Pr(i,j)=(P′s(i,j))+(dw(i,j)-S)/2 (6);
其中,S是提取的秘密信息位,Pr是恢复的像素值,P′s是加密图像预测值,dw是加密图像的预测误差值;
剩余像素在[1,+∞)和(-∞,-2)的范围内是经过扩展平移的像素,并没有进行嵌入信息,提取方法根据以下公式:
Figure PCTCN2021071769-appb-000016
直至空白部分所有的秘密信息提取完成结束。
B5:恢复最外层加密图像的像素值。
根据上述过程最外层的图像以及加密信息能够被无损的恢复,这里原 始图像的第一行像素,第一列像素,最后一行像素以及最后一列像素和加密图像的第一行像素,第一列像素,最后一行像素以及最后一列像素在嵌入和提取过程中并未改变,加密图像的预测值与嵌入时是相同的。
步骤105:提取所述第一层嵌入处理后的阴影部分的信息。
C1:获取第一层加密时的加密图像。
C2:获取第一层加密时的加密图像的第一层加密预测值。
C3:基于所述第一层加密预测值得到第一预测误差值序列,并生成第一预测误差直方图。
C4:基于所述第一预测误差值序列提取秘密信息。
提取过程与步骤104中的提取过程一致:
根据T=1,dw(i,j)在[-2,1)进行提取秘密信息;
根据公式:S=mod(dw(i,j)+1,2) (8)
Pr(i,j)=(P′s(i,j))+(dw(i,j)-S)/2 (9);
其中,S是提取的秘密信息位,Pr是恢复的像素值,P′s是加密图像预测值,dw是加密图像的预测误差值;
剩余像素在[1,+∞)和(-∞,-2)的范围内是经过扩展平移的像素,并没有进行嵌入信息,提取方法根据以下公式:
Figure PCTCN2021071769-appb-000017
直至所有的秘密信息提取完成结束。
C5:将无损压缩的位置图进行解压,获得解压的位置图。
C6:根据解压的位置图得到相应位置标记为1的像素,并修改还原,恢复原始像素值,并得到无损恢复的原始图像。
图5为本发明实施例一种基于预测误差的可逆数据隐藏系统结构示意图,如图5所示,所述系统包括:
图像分区模块201,用于对图像进行分区,得到阴影部分和空白部分;
第一层嵌入处理模块202,用于对所述阴影部分进行第一层嵌入处理;
多层嵌入处理模块203,用于对所述空白部分进行多层嵌入处理;
第一提取模块204,用于提取所述多层嵌入处理后的空白部分的最外层信息;
第二提取模块205,用于提取所述第一层嵌入处理后的阴影部分的信息。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。
本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处。综上所述,本说明书内容不应理解为对本发明的限制。

Claims (10)

  1. 一种基于预测误差的可逆数据隐藏方法,其特征在于,所述方法包括:
    对图像进行分区,得到阴影部分和空白部分;
    对所述阴影部分进行第一层嵌入处理;
    对所述空白部分进行多层嵌入处理;
    提取所述多层嵌入处理后的空白部分的最外层信息;
    提取所述第一层嵌入处理后的阴影部分的信息。
  2. 根据权利要求1所述的基于预测误差的可逆数据隐藏方法,其特征在于,所述对图像进行分区具体包括:
    对所述图像由左至右由上至下进行扫描,得到图像的原始像素序列{c 1,c 2,…,c n};
    将所述原始像素序列进行分区,得到空白部分{a 1,a 2,…,a n}和阴影部分{x 1,x 2,…,x n}。
  3. 根据权利要求1所述的基于预测误差的可逆数据隐藏方法,其特征在于,对所述阴影部分进行第一层嵌入处理具体包括:
    以所述阴影部分的周边像素对中心像素进行预测,得到第一层加密预测值;所述阴影部分像素的第一行、第一列、最后一行以及最后一列都不进行预测;
    具体采用以下公式:
    Figure PCTCN2021071769-appb-100001
    其中,公式(1)表示通过周边像素对中心像素进行预测,其中,i,j分别表示当前像素所在位置的行和列,{a1,a2,…,an}在第一层嵌入中均为原始像素值,
    Figure PCTCN2021071769-appb-100002
    为一维的预测值序列,预测值为整数;
    计算当前像素的原始像素值与所述第一层加密预测值的差值,得到第一预测误差值序列(e1,…,en),具体采用以下公式:
    Figure PCTCN2021071769-appb-100003
    其中,Xi表示当前像素的原始像素值,
    Figure PCTCN2021071769-appb-100004
    表示第一层加密预测值;
    计算所述第一预测误差值序列中每一个值的频率,生成第一预测误差直方图;
    获取附加信息;所述附加信息包括:秘密信息长度和压缩的位置图大小;
    将所述附加信息嵌入到原始图像像素的第一行;
    将秘密信息b∈{0,1}嵌入到预先设定的预测误差值范围内,得到经过拓展和偏移的预测误差值;
    基于拓展和偏移后的预测误差值确定第一层加密图像;
    具体采用以下公式:
    Figure PCTCN2021071769-appb-100005
    其中X′ i表示第一层加密图像的像素值,
    Figure PCTCN2021071769-appb-100006
    表示阴影部分像素预测值,e′i表示经过拓展和偏移的预测误差。
  4. 根据权利要求3所述的基于预测误差的可逆数据隐藏方法,其特征在于,将所述附加信息嵌入到原始图像像素的第一行具体包括:
    调整阴影部分的边界像素值;所述边界像素值为[0,255];
    将进行修改的像素对应的位置图标记修改为1,其余未修改的像素值的位置映射图标记为0,得到由0和1组成的位置图矩阵;
    将所述位置图矩阵进行压缩得到压缩的位置图;
    将所述压缩的位置图嵌入到原始图像像素的第一行。
  5. 根据权利要求3所述的基于预测误差的可逆数据隐藏方法,其特征在于,所述将秘密信息b∈{0,1}嵌入到预先设定的预测误差值范围内,得到经过拓展和偏移的预测误差值具体采用以下公式:
    Figure PCTCN2021071769-appb-100007
    其中,b表示秘密信息,ei表示预测误差,T表示被嵌入的预测误差的范围,e′i表示经过拓展和偏移的预测误差。
  6. 根据权利要求1所述的基于预测误差的可逆数据隐藏方法,其特征在于,对所述空白部分进行多层嵌入处理具体包括:
    通过第一层加密后的像素以邻居像素为中心对空白部分像素进行预测,得到第二层加密预测值;
    计算当前像素的原始像素值与所述第二层加密预测值的差值,得到第二预测误差值序列;
    计算所述第二层预测误差值序列中每一个值的频率,生成第二预测误差直方图;
    根据所述第二预测误差直方图进行数据的嵌入和平移,得到最终的加密图像。
  7. 根据权利要求1所述的基于预测误差的可逆数据隐藏方法,其特征在于,提取所述多层嵌入处理后的空白部分的最外层信息具体包括:
    提取第一行嵌入的附加信息;
    获取加密图像的像素第二层加密预测值;
    基于所述第二层加密预测值得到第二预测误差值序列,并生成第二预测误差直方图;
    根据所述第二预测误差值序列提取秘密信息;
    恢复最外层加密图像的像素值。
  8. 根据权利要求1所述的基于预测误差的可逆数据隐藏方法,其特征在于,提取所述第一层嵌入处理后的阴影部分的信息具体包括:
    获取第一层加密时的加密图像;
    获取第一层加密时的加密图像的第一层加密预测值;
    基于所述第一层加密预测值得到第一预测误差值序列,并生成第一预测误差直方图;
    基于所述第一预测误差值序列提取秘密信息;
    将无损压缩的位置图进行解压,获得解压的位置图;
    根据解压的位置图得到相应位置标记为1的像素,并修改还原,恢复原始像素值,并得到无损恢复的原始图像。
  9. 根据权利要求1所述的基于预测误差的可逆数据隐藏方法,其特征在于,根据所述第二预测误差值序列提取秘密信息具体包括:
    根据T=1,dw(i,j)在[-2,1)进行提取秘密信息;
    根据公式:S=mod(dw(i,j)+1,2)  (5)
    Pr(i,j)=(P′s(i,j))+(dw(i,j)-S)/2  (6);
    其中,S是提取的秘密信息位,Pr是恢复的像素值,P′s是加密图像预测值,dw是加密图像的预测误差值;
    剩余像素在[1,+∞)和(-∞,-2)的范围内是经过扩展平移的像素,并没有进行嵌入信息,提取方法根据以下公式:
    Figure PCTCN2021071769-appb-100008
    直至空白部分所有的秘密信息提取完成结束。
  10. 一种基于预测误差的可逆数据隐藏系统,所述系统包括:
    图像分区模块,用于对图像进行分区,得到阴影部分和空白部分;
    第一层嵌入处理模块,用于对所述阴影部分进行第一层嵌入处理;
    多层嵌入处理模块,用于对所述空白部分进行多层嵌入处理;
    第一提取模块,用于提取所述多层嵌入处理后的空白部分的最外层信息;
    第二提取模块,用于提取所述第一层嵌入处理后的阴影部分的信息。
PCT/CN2021/071769 2020-10-26 2021-01-14 一种基于预测误差的可逆数据隐藏方法及系统 WO2022088516A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/629,615 US20220368808A1 (en) 2020-10-26 2021-01-14 Method and system for hiding reversible data based on prediction errors

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011154309.8 2020-10-26
CN202011154309.8A CN112333348B (zh) 2020-10-26 2020-10-26 一种基于预测误差的可逆数据隐藏方法及系统

Publications (1)

Publication Number Publication Date
WO2022088516A1 true WO2022088516A1 (zh) 2022-05-05

Family

ID=74311001

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/071769 WO2022088516A1 (zh) 2020-10-26 2021-01-14 一种基于预测误差的可逆数据隐藏方法及系统

Country Status (3)

Country Link
US (1) US20220368808A1 (zh)
CN (1) CN112333348B (zh)
WO (1) WO2022088516A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134474A (zh) * 2022-06-30 2022-09-30 西安理工大学 基于像素预测的参数二叉树可逆数据隐藏方法
CN116468594A (zh) * 2023-05-09 2023-07-21 淮阴工学院 基于菱形像素对互补嵌入的可逆水印算法
CN116934726A (zh) * 2023-07-28 2023-10-24 西安邮电大学 一种分区域的医学图像数据隐藏和隐私保护方法

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923314B (zh) * 2021-10-09 2022-08-05 河海大学 一种可逆数据隐藏方法及装置
CN114567710B (zh) * 2021-12-03 2023-06-06 湖北工业大学 一种基于岭回归预测的可逆数据隐写方法及系统
CN114466112A (zh) * 2022-01-11 2022-05-10 山东师范大学 基于多重直方图自适应修改的可逆数据隐藏方法及系统
CN115842682B (zh) * 2023-02-17 2023-05-05 杭银消费金融股份有限公司 一种用于网络防护的权限风险分析方法及系统

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105741225A (zh) * 2016-02-01 2016-07-06 西安电子科技大学 一种多维预测误差扩展的可逆水印方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748362B1 (en) * 1999-09-03 2004-06-08 Thomas W. Meyer Process, system, and apparatus for embedding data in compressed audio, image video and other media files and the like
CN101236645A (zh) * 2008-02-28 2008-08-06 上海交通大学 基于无损数字水印的图像篡改检测和定位方法
CN102262773A (zh) * 2010-05-29 2011-11-30 深圳宝嘉电子设备有限公司 双阈值的图像无损数据嵌入方法
CN107087086B (zh) * 2017-04-27 2019-02-05 齐鲁工业大学 一种基于码分复用的大容量可逆信息隐藏方法
CN109348228B (zh) * 2018-09-14 2021-05-04 东南大学 一种图像加密域可逆信息隐藏系统与方法

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105741225A (zh) * 2016-02-01 2016-07-06 西安电子科技大学 一种多维预测误差扩展的可逆水印方法

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LI SHUAI; HU LIANG; SUN CHENGYU; CHI LING; LI TUOHANG; LI HONGTU: "A Reversible Data Hiding Algorithm Based on Prediction Error With Large Amounts of Data Hiding in Spatial Domain", IEEE ACCESS, IEEE, USA, vol. 8, 24 November 2020 (2020-11-24), USA , pages 214732 - 214741, XP011824002, DOI: 10.1109/ACCESS.2020.3040048 *
QU, JUNZHENG: "Research on Reversible Digital Watermarking of Color Image", INFORMATION & TECHNOLOGY, CHINA MASTER’S THESES FULL-TEXT DATABASE, 1 November 2015 (2015-11-01), pages 1 - 73, XP055927269, [retrieved on 20220601] *
VASILIY SACHNEV ; HYOUNG JOONG KIM ; JEHO NAM ; SUNDARAM SURESH ; YUN QING SHI: "Reversible Watermarking Algorithm Using Sorting and Prediction", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, IEEE, USA, vol. 19, no. 7, 1 July 2009 (2009-07-01), USA, pages 989 - 999, XP011254903, ISSN: 1051-8215 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134474A (zh) * 2022-06-30 2022-09-30 西安理工大学 基于像素预测的参数二叉树可逆数据隐藏方法
CN116468594A (zh) * 2023-05-09 2023-07-21 淮阴工学院 基于菱形像素对互补嵌入的可逆水印算法
CN116934726A (zh) * 2023-07-28 2023-10-24 西安邮电大学 一种分区域的医学图像数据隐藏和隐私保护方法

Also Published As

Publication number Publication date
CN112333348B (zh) 2021-08-24
CN112333348A (zh) 2021-02-05
US20220368808A1 (en) 2022-11-17

Similar Documents

Publication Publication Date Title
WO2022088516A1 (zh) 一种基于预测误差的可逆数据隐藏方法及系统
Ou et al. Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion
Peng et al. Improved PVO-based reversible data hiding
Wang et al. Efficient generalized integer transform for reversible watermarking
Weng et al. Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding
Qin et al. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism
Li et al. General framework to histogram-shifting-based reversible data hiding
Weng et al. Optimal PPVO-based reversible data hiding
Yang et al. Reversible steganography based on side match and hit pattern for VQ-compressed images
CN111898136A (zh) 一种基于预测误差值排序的高保真可逆信息隐藏方法和装置
Wang et al. High capacity reversible image watermarking based on integer transform
CN111464717B (zh) 利用直方图平移的具有对比度拉升的可逆信息隐藏方法
CN108416724B (zh) 一种基于多预测器的可逆信息隐藏方法
CN108805788B (zh) 基于图像拓扑结构的可逆水印方法
WO2020051953A1 (zh) 基于预测误差加法扩展的可逆图像水印方法及装置
Fan et al. Multiple histogram based adaptive pairwise prediction-error modification for efficient reversible image watermarking
CN113032813B (zh) 基于改进的像素局部复杂度计算和多峰嵌入的可逆信息隐藏方法
CN107241597A (zh) 一种结合四叉树自适应编码的可逆信息隐藏方法
Su et al. Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering
Weng et al. Reversible data hiding based on the local smoothness estimator and optional embedding strategy in four prediction modes
He et al. Reversible Data Hiding Based on Multiple Pairwise PEE and Two‐Layer Embedding
CN110533569B (zh) 基于二次差值扩展的水印处理方法
CN108510425B (zh) 基于ippvo和优化mhm的可逆水印方法
Bhatnagar et al. Reversible Data Hiding scheme for color images based on skewed histograms and cross-channel correlation
CN109389546B (zh) 多分块可逆水印嵌入方法及装置、水印提取方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21884261

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21884261

Country of ref document: EP

Kind code of ref document: A1