计算机科学 ›› 2022, Vol. 49 ›› Issue (9): 340-346.doi: 10.11896/jsjkx.220300238
郝洁, 平萍, 付德银, 赵红泽
HAO Jie, PING Ping, FU De-yin, ZHAO Hong-ze
摘要: 基于直方图平移(Histogram Shifting,HS)的可逆信息隐藏(Reversible Data Hiding,RDH)是目前信息隐藏中最为普遍的技术,特别是对于结合了差值扩展和直方图平移的方法来说,可以实现较高的嵌入容量和较低的图像失真。文中提出了一种压缩差值后的双直方图平移的可逆信息隐藏方法。该算法通过综合压缩、差值及优化后的直方图平移这3种方法,改进了现有基于直方图平移方法嵌入容量不够大的缺陷,同时也给出了图像像素值在平移过程中产生溢出的处理方式。在接收端,不仅能够完整地提取数据,也能够进行无损的图像恢复。将所提方法与当前流行的4种方法进行了比较,所提方法在嵌入容量方面优于现有的基于直方图平移的算法,其嵌入容量与近年的4种方法相比提升了 23%,11%,57%和93%。实验结果表明,所提方法的嵌入容量大幅增加,能够有效地实现大嵌入容量的可逆信息隐藏。
中图分类号:
[1]LU W,HE L,YEUNG Y,et al.Secure binary image stegano-graphy based on fused distortion measurement[J].IEEE Transa-ctions on Circuits and Systems for Video Technology,2018,29(6):1608-1618. [2]WANG Z,QIAN Z,ZHANG X,et al.On improving distortion functions for jpeg steganography[J].IEEE Access,2018(6):74917-74930. [3]QIN C,JI P,ZHANG X,et al.Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy[J].Signal Process,2017(138):280-293. [4]YUAN X C,LI M.Local multi-watermarking method based on robust and adaptive feature extraction[J].Signal Process,2018(149):103-117. [5]QIAN Z X,ZHOU H,ZHANG W M,et al.Robust steganography using texture synthesis[M]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Cham:Sprin-ger,20177:25-33. [6]SHI Y Q,LI X D,ZHANG X P,et al.Reversible data hiding:Advances in the past two decades[J].IEEE Access,2016,4:3210-3237. [7]LI X L,ZHANG W M,GUI X L,et al.Efficient Reversible Data Hiding Based on Multiple Histograms Modification[J].IEEE Transactions on Information Forensics and Security,2015,10(9):2016-2017. [8]ZENG X T,LI Z,PING L D.Reversible data hiding schemeusing reference pixel and multilayer embedding[J].AEU-International Journal of Electronics and Communications,2012,66(7):532-539. [9]ZHANG T C,HOU T S,WENG S W,et al.Adaptive reversible data hiding with contrast enhancement based on multi-histogram modification[J/OL].IEEE Transactions on Circuits and Systems for Video Technology,2022.https://ieeexplore.ieee.org/document/9691384. [10]BARTON J M.Method and apparatus for embedding authentication information within digital data:US Patent,564997[P].1997-07-08. [11]WEINBERGER M J,RISSANEN J J,ARPS R B.Applications of universal context modeling to lossless compression of gray-scale images[J].IEEE Transactions on Image Processing,1996,5(4):575-586. [12]ZHANG W M,HU X C,LI X L,et al.Recursive HistogramModification:Establishing Equivalency Between Reversible Data Hiding and Loss less Data Compression[J].IEEE Transactions on Image Processing,2013,22(7):2775-2785. [13]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [14]OU B,LI X L,WANG J W.High-fidelity reversible data hiding based on pixel value-ordering and pairwise prediction error expansion[J].Journal of Visual Communication and Image Representation,2016(39):12-23. [15]WANG J X,NI J Q,ZHANG X,et al.Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting[J].IEEE Transactions on Cybernetics,2017,47(2):315-326. [16]TANG J R,ISA N A M.Bi-histogram equalization using modified histogram bins[J].Applied Soft Computing,2017(55):31-43. [17]WANG J X,CHEN X,NI J Q,et al.Multiple Histograms Based Reversible Data Hiding:Framework and Realization[J].IEEE Transactions on Circuits and Systems for Video Technology,2020,30(8):2313-2328. [18]TIAN J.Reversible watermarking by difference expansion[J/OL].Proceedings of Workshop on Multimedia & Security,2002.https://www.researchgate.net/publication/228809844_Reversible_watermarking_by_difference_expansion. [19]HSU F H,WU M H,WANG S J.Reversible data hiding using side-match predictions on steganographic images[J].Multimedia Tools and Applications,2013,67(3):571-591. [20]CHEN Y H,HUANG H C,LIN C C.Block-based reversible data hiding with multi-round estimation and difference alteration[J/OL].Multimedia Tools and Applications,2015:1-26.https://link.springer.com/article/10.1007/s11042-015-2825-9. [21]TSAI Y Y,TSAI D S,LIU C L.Reversible data hiding scheme based on neighboring pixel differences[J].Digital Signal Process,2013,23(3):919-927. [22]HU Y,LEE H,LI J.DE-Based Reversible Data Hiding WithImproved Overflow Location Map[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(2):250-260. [23]THODI D M,RODRIGUEZ J J.Expansion Embedding Techniques for Reversible Watermarking[J].IEEE Transactions on Image Processing,2007,16(3):721-730. [24]NGUYEN T S,CHANG C C,HUYNH N T.A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm[J].Journal of Visual Communication and Image Representation,2015(33):389-397. [25]XUE B,LI X,WANG J,et al.Improved reversible data hiding based on two-dimensional difference-histogram modification[J].Multimedia Tools and Applications,2016,76(11):1-19. [26]ARHAM A,HUGROHO H A,ADJI T B.Multiple layer data hiding scheme based on difference expansion of quad☆[J].Signal Processing,2017(137):52-62. [27]NI Z C,SHI Y Q,ANASRI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Techno-logy,2006,16(3):354-362. [28]FALLAHPOUR M,SEDAAGHI M H.High capacity losslessdata hiding based on histogram modification[J].IEICE Electron Express,2007,4(7):205-210. [29]TSAI P,HU Y C,YEH H L.Reversible image hiding schemeusing predictive coding and histogram shifting[J].Signal Proces-sing,2009,89(6):1129-1143. [30]BISWAS T,HASAN M M,DEBNATH T.A New Method of Reversible Data Hiding Based on Compressed Gray Level Histogram Shifting[C]//2016 3rd International Conference on Electrical Engineering and Information Communication Technology.IEEE,2016:1-6. [31]JUNG K H.A high-capacity reversible data hiding scheme based on sorting and prediction in digital images[J].Multimedia Tools and Applications,2017,76(11):13127-13137. [32]JIA Y J,YIN Z X,ZHANG X P,et al.Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting[J].Signal Processing,2019(163):238-246. [33]PAN Z B,GAO X Y,GAO E,et al.Adaptive Complexity for Pixel-Value-Ordering Based Reversible Data Hiding[J].IEEE Signal Processing Letters,2020(27):912-919. |
[1] | 周连兵, 周湘贞, 崔学荣. 基于双重二维混沌映射的压缩图像加密方案 Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map 计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235 |
[2] | 楚玉春, 龚航, 王学芳, 刘培顺. 基于YOLOv4的目标检测知识蒸馏算法研究 Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 计算机科学, 2022, 49(6A): 337-344. https://doi.org/10.11896/jsjkx.210600204 |
[3] | 武霖, 孙静宇. 多分支RA胶囊网络及在图像分类中的应用 Multi-branch RA Capsule Network and Its Application in Image Classification 计算机科学, 2022, 49(6): 224-230. https://doi.org/10.11896/jsjkx.210400087 |
[4] | 程祥鸣, 邓春华. 基于无标签知识蒸馏的人脸识别模型的压缩算法 Compression Algorithm of Face Recognition Model Based on Unlabeled Knowledge Distillation 计算机科学, 2022, 49(6): 245-253. https://doi.org/10.11896/jsjkx.210400023 |
[5] | 陈志文, 王坤, 周广蕴, 王旭, 张晓丹, 朱虎明. 基于胶囊网络及其权重剪枝的SAR图像变化检测方法 SAR Image Change Detection Method Based on Capsule Network with Weight Pruning 计算机科学, 2021, 48(7): 190-198. https://doi.org/10.11896/jsjkx.200800225 |
[6] | 钱心缘, 吴文渊. 基于R-SIS和R-LWE构建的IBE加密方案 Identity-based Encryption Scheme Based on R-SIS/R-LWE 计算机科学, 2021, 48(6): 315-323. https://doi.org/10.11896/jsjkx.200700215 |
[7] | 刘东, 王叶斐, 林建平, 马海川, 杨闰宇. 端到端优化的图像压缩技术进展 Advances in End-to-End Optimized Image Compression Technologies 计算机科学, 2021, 48(3): 1-8. https://doi.org/10.11896/jsjkx.201100134 |
[8] | 孙彦丽, 叶炯耀. 基于剪枝与量化的卷积神经网络压缩方法 Convolutional Neural Networks Compression Based on Pruning and Quantization 计算机科学, 2020, 47(8): 261-266. https://doi.org/10.11896/jsjkx.190700062 |
[9] | 丁青锋, 奚韬, 连义翀, 吴泽祥. 基于物理层安全的空间调制系统天线选择算法 Antenna Selection for Spatial Modulation Based on Physical Layer Security 计算机科学, 2020, 47(7): 322-327. https://doi.org/10.11896/jsjkx.190600133 |
[10] | 蒋文斌, 符智, 彭晶, 祝简. 一种基于4Bit编码的深度学习梯度压缩算法 4Bit-based Gradient Compression Method for Distributed Deep Learning System 计算机科学, 2020, 47(7): 220-226. https://doi.org/10.11896/jsjkx.200300097 |
[11] | 尚进跃, 毕秀丽, 肖斌, 李伟生. 基于DCT系数哈希的图像篡改检测算法 Image Forgery Detection Based on DCT Coefficients Hashing 计算机科学, 2020, 47(6): 310-315. https://doi.org/10.11896/jsjkx.190600081 |
[12] | 倪晓军, 佘戌豪. 面向无线传感网络应用的改进LZW算法 Improvement of LZW Algorithms for Wireless Sensor Networks 计算机科学, 2020, 47(5): 260-264. https://doi.org/10.11896/jsjkx.190400108 |
[13] | 郑哲, 胡庆浩, 刘青山, 冷聪. 量化权值激活的生成对抗网络 Quantizing Weights and Activations in Generative Adversarial Networks 计算机科学, 2020, 47(5): 144-148. https://doi.org/10.11896/jsjkx.190700176 |
[14] | 刘玉红,刘树英,付福祥. 基于卷积神经网络的压缩感知重构算法优化 Optimization of Compressed Sensing Reconstruction Algorithms Based on Convolutional Neural Network 计算机科学, 2020, 47(3): 143-148. https://doi.org/10.11896/jsjkx.190100199 |
[15] | 田伟, 刘浩, 陈根龙, 宫晓蕙. 面向分块压缩感知的交叉子集导引自适应观测 Cross Subset-guided Adaptive Measurement for Block Compressive Sensing 计算机科学, 2020, 47(12): 190-196. https://doi.org/10.11896/jsjkx.200800197 |
|